6
Question
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The server has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?
Correct
6
Question
What happens when you execute the following command:
netsh advfirewall set allprofiles state off
Correct
Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?
CORRECT
Which of the following is NOT a service model in cloud computing?
CORRECT
Which of these is the most secure protocol for transferring files?
CORRECT
DNSSEC adds additional _____ and message header information, which can be used to verify that the requested data has not been altered in transmission.
CORRECT
Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?
CORRECT
Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?
CORRECT
Which of the following is NOT a security concern of virtualized environments?
CORRECT
Which of the following can be used to prevent a buffer overflow attack?
CORRECT
Which of these is NOT correct about an SSL/TLS accelerator?
CORRECT
Which version of Simple Network Management Protocol (SNMP) is considered the most secure?
CORRECT
Which type of device log contains the most beneficial security data?
CORRECT
Which of the following TCP/IP protocols do not relate to security?
CORRECT
Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?
CORRECT
Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?
CORRECT
Which type of hypervisor does not run on an underlying operating system?
CORRECT
What functions of a switch does a software defined network separate?
CORRECT
Which type of cloud is offered to specific organizations that have common concerns?
CORRECT
Which application stores the user's desktop inside a virtual machine that resides on a server and is accessible from multiple locations?
CORRECT
Which type of log can provide details regarding requests for specific files on a system?
CORRECT
What is the recommended secure protocol for voice and video applications?
CORRECT
The primary design of a(n) _____ is to capture the transmissions from legitimate users.
CORRECT
What is the primary weakness of wired equivalent privacy (WEP)?
CORRECT
Which of these is a vulnerability of MAC address filtering?
CORRECT
Why is a rogue AP a security vulnerability?
CORRECT
Which technology is predominately used for contactless payment systems?
CORRECT
Which of these is NOT a type of wireless AP probe?
CORRECT
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?
CORRECT
Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?
CORRECT
Which of the following is NOT true of a wireless router?
CORRECT
Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?
CORRECT
Which of these is NOT a risk when a home wireless router is not securely configured?
CORRECT
Which of these is NOT a limitation of turning off the SSID broadcast from an AP?
CORRECT
Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?
CORRECT
What is a difference between NFC and RFID?
CORRECT
Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered?
CORRECT
WPA replaces WEP with _____.
CORRECT
A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?
CORRECT
Which of the following is NOT a wireless peripheral protection option?
CORRECT
AES-CCMP is the encryption protocol standard used in _____.
CORRECT
Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?
CORRECT
Comments
Post a Comment