6
Question
The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless access points and separate networks for internal users and guests are required. Which of the following should separate each network? (Choose all that apply.)
Correct
10
Question
What is the difference between a key escrow and a recovery agent? (Choose all that apply.)
Correct
Which of the following is the average amount of time that it will take a device to recover from a failure that is not a terminal failure?
CORRECT
Bria is reviewing the company's updated personal email policy. Which of the following will she NOT find in it?
CORRECT
Which of these is NOT a response to risk?
CORRECT
Which policy defines the actions users may perform while accessing systems and networking equipment?
CORRECT
Which of the following approaches to risk calculation typically assigns a numeric value (1-10) or label (High, Medium, or Low) represents a risk?
CORRECT
Which of the following is NOT a security risk of social media sites for users?
INCORRECT
Bob needs to create an agreement between his company and a third-party organization that demonstrates a "convergence of will" between the parties so that they can work together. Which type of agreement will Bob use?
CORRECT
Which of the following risk control types would use video surveillance systems and barricades to limit access to secure sites?
CORRECT
While traveling abroad, Giuseppe needs to use public Internet cafe computers to access the secure network. Which of the following non-persistence tools should he use?
CORRECT
Which of the following covers the procedures of managing object authorizations?
CORRECT
Simona needs to research a control that attempts to discourage security violations before they occur. Which control will she research?
CORRECT
Agnella was asked to create a report that listed the reasons why a contractor should be provided penetration testing authorization. Which of the following would she NOT list in her report?
CORRECT
What describes the ability of an enterprise data center to revert to its former size after expanding?
CORRECT
What is a collection of suggestions that should be implemented?
CORRECT
Which of the following threats would be classified as the actions of a hactivist?
CORRECT
Which of the following is NOT a time employee training should be conducted?
CORRECT
Which statement is NOT something that a security policy must do?
CORRECT
Which statement does NOT describe a characteristic of a policy?
CORRECT
For adult learners, which approach is often preferred?
CORRECT
Tomassa is asked to determine the expected monetary loss every time a risk occurs. Which formula will she use?
CORRECT
Question 1
Not yet answered
Points out of 1.00
Flag question
Question text
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
Select one:
a.
charlist.exe
b.
charmap.exe
c.
listchar.exe
d.
chardump.exe
Question 2
Not yet answered
Points out of 1.00
Flag question
Question text
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
Select one:
a.
confidentiality
b.
encryption
c.
availability
d.
integrity
Question 3
Answer saved
Points out of 1.00
Flag question
Question text
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:
Select one:
a.
service point agreement
b.
recovery time objective
c.
recovery point objective
d.
service level agreement
Question 4
Not yet answered
Points out of 1.00
Flag question
Question text
What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?
Select one:
a.
VDI
b.
OTG
c.
OTA
d.
COPE
Question 5
Not yet answered
Points out of 1.00
Flag question
Question text
What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS
processing?
processing?
Select one:
a.
SSL decryptor
b.
SSL/TLS accelerator
c.
security module
d.
media gateway
Question 6
Not yet answered
Points out of 1.00
Flag question
Question text
What is the end result of a penetration test?
Select one:
a.
penetration test system
b.
penetration test view
c.
penetration test profile
d.
penetration test report
Question 7
Not yet answered
Points out of 1.00
Flag question
Question text
Websites that group individuals and organizations into clusters or groups based on some sort are considered to be what type of networks?
Select one:
a.
social management network
b.
social control network
c.
social media network
d.
social engineering network
Question 8
Not yet answered
Points out of 1.00
Flag question
Question text
Slave devices that are connected to a piconet and are sending transmissions are known as what?
Select one:
a.
active slave
b.
neutral slaves
c.
passive slaves
d.
parked slaves
Question 9
Not yet answered
Points out of 1.00
Flag question
Question text
Generally considered to be the most important information security policies, what item below defines the actions a user may perform while accessing systems and networking equipment?
Select one:
a.
data loss policies
b.
VPN policies
c.
encryption policies
d.
acceptable use policies
Question 10
Not yet answered
Points out of 1.00
Flag question
Question text
The use of what item below involves the creation of a large pre-generated data set of candidate digests?
Select one:
a.
rainbow tables
b.
randomized character list
c.
cascade tables
d.
word list
Question 11
Not yet answered
Points out of 1.00
Flag question
Question text
What social engineering principal frightens and coerces a victim by using threats?
Select one:
a.
authority
b.
scarcity
c.
urgency
d.
intimidation
Question 12
Answer saved
Points out of 1.00
Flag question
Question text
What can be used to increase the strength of hashed passwords?
Select one:
a.
single crypting
b.
salt
c.
double hashing
d.
key stretching
Question 13
Not yet answered
Points out of 1.00
Flag question
Question text
The goal of what type of threat evaluation is to better understand who the attackers are, why they attack, and what types of attacks might occur?
Select one:
a.
threat modeling
b.
threat profiling
c.
threat mitigation
d.
risk modeling
Question 14
Not yet answered
Points out of 1.00
Flag question
Question text
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
Select one:
a.
3DES
b.
RSA
c.
AES
d.
Twofish
Question 15
Not yet answered
Points out of 1.00
Flag question
Question text
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
Select one:
a.
hub
b.
router
c.
switch
d.
bridge
Question 16
Not yet answered
Points out of 1.00
Flag question
Question text
What describes an agreement between two or more parties and demonstrates a "convergence of will" between the parties
so that they can work together?
so that they can work together?
Select one:
a.
MOU
b.
NDA
c.
ISA
d.
BPA
Question 17
Not yet answered
Points out of 1.00
Flag question
Question text
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
Select one:
a.
MAC address
b.
IP address
c.
VLAN
d.
subnets
Question 18
Not yet answered
Points out of 1.00
Flag question
Question text
What are the two types of cross-site attacks? (Choose all that apply.)
Select one or more:
a.
cross-site request forgery attacks
b.
cross-site flood attacks
c.
cross-site input attacks
d.
cross-site scripting attacks
Question 19
Not yet answered
Points out of 1.00
Flag question
Question text
What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?
Select one:
a.
full disk encryption
b.
disk encryption
c.
OS encryption
d.
system encryption
Question 20
Not yet answered
Points out of 1.00
Flag question
Question text
On and SDN network, what specific unit gives traffic the permission to flow through the network?
Select one:
a.
SDN router
b.
SDN firewall
c.
SDN gateway
d.
SDN controller
Question 21
Not yet answered
Points out of 1.00
Flag question
Question text
What access control model below is considered to be the most restrictive access control model, and involves assigning access controls to users strictly according to the custodian?
Select one:
a.
Mandatory Access Control
b.
Role Based Access Control
c.
Discretionary Access Control
d.
Rule Based Access Control
Question 22
Not yet answered
Points out of 1.00
Flag question
Question text
Select the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users.
Select one:
a.
CHAP
b.
TACACS
c.
Kerberos
d.
Aurora
Question 23
Not yet answered
Points out of 1.00
Flag question
Question text
A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:
Select one:
a.
bollard cage
b.
Newton cage
c.
mantrap
d.
Faraday cage
Question 24
Not yet answered
Points out of 1.00
Flag question
Question text
In Microsoft Windows, what type of templates are a collection of security configuration settings?
Select one:
a.
system
b.
user
c.
administrator
d.
security
Question 25
Not yet answered
Points out of 1.00
Flag question
Question text
Select the device that is designed to exclusively monitor the RF frequency for network transmissions?
Select one:
a.
wireless device probe
b.
dedicated probe
c.
access point probe
d.
WAP
Question 26
Answer saved
Points out of 1.00
Flag question
Question text
The action that is taken by a subject over an object is called a(n):
Select one:
a.
access
b.
authorization
c.
operation
d.
control
Question 27
Not yet answered
Points out of 1.00
Flag question
Question text
The use of a single authentication credential that is shared across multiple networks is called:
Select one:
a.
risk management
b.
authorization management
c.
access management
d.
identity management
Question 28
Not yet answered
Points out of 1.00
Flag question
Question text
What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store?
Select one:
a.
Symbian
b.
Android
c.
Blackberry OS
d.
iOS
Question 29
Not yet answered
Points out of 1.00
Flag question
Question text
A port in what state below implies that an application or service assigned to that port is listening for any instructions?
Select one:
a.
open port
b.
empty port
c.
interruptible system
d.
closed port
Question 30
Not yet answered
Points out of 1.00
Flag question
Question text
Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
Select one:
a.
HCPA
b.
USHIPA
c.
HIPAA
d.
HLPDA
Question 31
Not yet answered
Points out of 1.00
Flag question
Question text
Data that is in an unencrypted form is referred to as which of the following?
Select one:
a.
cleartext
b.
simpletext
c.
crypttext
d.
plain text
Question 32
Not yet answered
Points out of 1.00
Flag question
Question text
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?
Select one:
a.
feature pack
b.
roll-up
c.
patch
d.
service pack
Question 33
Answer saved
Points out of 1.00
Flag question
Question text
During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?
Select one:
a.
verification request
b.
authentication request
c.
accounting request
d.
access request
Question 34
Not yet answered
Points out of 1.00
Flag question
Question text
The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?
Select one:
a.
unilateral Sign On
b.
federated Sign On
c.
single Sign On
d.
individual Sign On
Question 35
Not yet answered
Points out of 1.00
Flag question
Question text
User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?
Select one:
a.
orphaned
b.
inactive
c.
abandoned
d.
stale
Question 36
Not yet answered
Points out of 1.00
Flag question
Question text
What PIN is considered to be the most commonly used PIN?
Select one:
a.
1234
b.
0000
c.
7777
d.
4321
Question 37
Not yet answered
Points out of 1.00
Flag question
Question text
What social engineering principal convinces a victim an immediate action is needed?
Select one:
a.
intimidation
b.
authority
c.
scarcity
d.
urgency
Question 38
Not yet answered
Points out of 1.00
Flag question
Question text
Piconets in which connections exist between different piconets are known as which of the following terms?
Select one:
a.
honeynet
b.
scatternet
c.
boundnet
d.
broadnet
Question 39
Not yet answered
Points out of 1.00
Flag question
Question text
What is a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest?
Select one:
a.
counter
b.
nonce
c.
salt
d.
initialization vector
Question 40
Not yet answered
Points out of 1.00
Flag question
Question text
Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?
Select one:
a.
RADIUS
b.
Telnet
c.
FTP
d.
ICMP
Question 41
Not yet answered
Points out of 1.00
Flag question
Question text
A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?
Select one:
a.
laptop
b.
subnotebook
c.
netbook
d.
tablet
Question 42
Not yet answered
Points out of 1.00
Flag question
Question text
What publicly released software security update is intended to repair a vulnerability?
Select one:
a.
service pack
b.
patch
c.
renewal
d.
update
Question 43
Not yet answered
Points out of 1.00
Flag question
Question text
Multiple sectors on a disk, when combined, are referred to as a:
Select one:
a.
track
b.
platter
c.
cluster
d.
slice
Question 44
Not yet answered
Points out of 1.00
Flag question
Question text
What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
Select one:
a.
Rijndal
b.
Whirlpool
c.
Twofish
d.
Blowfish
Question 45
Not yet answered
Points out of 1.00
Flag question
Question text
What dedicated hardware device aggregates hundreds or thousands of VPN connections?
Select one:
a.
VPN concentrator
b.
VPN gateway
c.
VPN switch
d.
VPN server
Question 46
Not yet answered
Points out of 1.00
Flag question
Question text
What process does a penetration tester rely on to access an ever higher level of resources?
Select one:
a.
pivot
b.
continuous exploitation
c.
persistence
d.
spinning
Question 47
Not yet answered
Points out of 1.00
Flag question
Question text
What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?
Select one:
a.
reactive biometrics
b.
cognitive biometrics
c.
physical biometrics
d.
standard biometrics
Question 48
Not yet answered
Points out of 1.00
Flag question
Question text
If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?
Select one:
a.
Bob's private key and Alice's public key.
b.
Alice's private key.
c.
Bob's private key.
d.
Bob and Alice's keys.
Question 49
Not yet answered
Points out of 1.00
Flag question
Question text
A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:
Select one:
a.
warm site
b.
spare site
c.
hot site
d.
cold site
Question 50
Not yet answered
Points out of 1.00
Flag question
Question text
At what stage can a certificate no longer be used for any type of authentication?
Select one:
a.
expiration
b.
creation
c.
revocation
d.
suspension
Question 51
Not yet answered
Points out of 1.00
Flag question
Question text
What process addresses how long data must be kept and how it is to be secured?
Select one:
a.
legal and compliance
b.
legal retention
c.
data methodology
d.
data retention
Question 52
Not yet answered
Points out of 1.00
Flag question
Question text
During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?
Select one:
a.
threat scanner
b.
port scanner
c.
vulnerability profiler
d.
application profiler
Question 53
Not yet answered
Points out of 1.00
Flag question
Question text
The Authentication Header (AH) protocol is a part of what encryption protocol suite below?
Select one:
a.
TLS 3.0
b.
GPG
c.
IPSec
d.
SSL
Question 54
Not yet answered
Points out of 1.00
Flag question
Question text
What federation system technology uses federation standards to provide SSO and exchanging attributes?
Select one:
a.
Windows Live ID
b.
Open ID Connect
c.
OAuth
d.
Shibboleth
Question 55
Not yet answered
Points out of 1.00
Flag question
Question text
Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability.
Select one:
a.
intrusive
b.
non-intrusive
c.
active
d.
passive
Question 56
Not yet answered
Points out of 1.00
Flag question
Question text
Select the technology that can be used to examine content through application-level filtering.
Select one:
a.
Firewall
b.
Web security gateway
c.
Security proxy
d.
Application gateway
Question 57
Not yet answered
Points out of 1.00
Flag question
Question text
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
Select one:
a.
Session blocking
b.
Session replay
c.
Session spoofing
d.
Session hijacking
Question 58
Not yet answered
Points out of 1.00
Flag question
Question text
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
Select one:
a.
ECC
b.
IKE
c.
FCC
d.
RSA
Question 59
Not yet answered
Points out of 1.00
Flag question
Question text
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
Select one:
a.
ad-hoc peer
b.
endpoint
c.
access Point
d.
WMM
Question 60
Not yet answered
Points out of 1.00
Flag question
Question text
Select the EAP protocol that uses digital certificates for authentication?
Select one:
a.
EAP-FAST
b.
EAP-TLS
c.
EAP-MSCHAPv2
d.
EAP-AKA
Question 61
Not yet answered
Points out of 1.00
Flag question
Question text
What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?
Select one:
a.
DNS
b.
TCP
c.
ARP
d.
UDP
Question 62
Not yet answered
Points out of 1.00
Flag question
Question text
What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
Select one:
a.
clickjacking
b.
domain hijacking
c.
DNS spoofing
d.
pointer hack
Question 63
Not yet answered
Points out of 1.00
Flag question
Question text
If using the MD5 hashing algorithm, what is the length to which each message is padded?
Select one:
a.
64 bits
b.
32 bits
c.
128 bits
d.
512 bits
Question 64
Not yet answered
Points out of 1.00
Flag question
Question text
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
Select one:
a.
split
b.
Swiss cheese
c.
appender
d.
stealth
Question 65
Not yet answered
Points out of 1.00
Flag question
Question text
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
Select one:
a.
ransomware
b.
hostageware
c.
lock-ware
d.
stealware
Question 66
Not yet answered
Points out of 1.00
Flag question
Question text
Select the option that best describes a policy:
Select one:
a.
A list of all items that have a positive economic value
b.
A document that outlines specific requirements or rules that must be met
c.
A collection of suggestions that should be implemented
d.
A collection of requirements specific to the system or procedure that must be met by everyone
Question 67
Not yet answered
Points out of 1.00
Flag question
Question text
What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply.)
Select one or more:
a.
data plane
b.
management plane
c.
data plane
d.
control plane
Question 68
Not yet answered
Points out of 1.00
Flag question
Question text
What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?
Select one:
a.
least functionality
b.
function limiting
c.
whitelisting
d.
blacklisting
Question 69
Not yet answered
Points out of 1.00
Flag question
Question text
If a penetration tester has gained access to a network and then tries to move around inside the network to other resources, what procedure is the tester performing?
Select one:
a.
persistence
b.
pivot
c.
secondary exploitation
d.
spinning
Question 70
Not yet answered
Points out of 1.00
Flag question
Question text
Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?
Select one:
a.
application whitelist
b.
inventory permissions
c.
application control
d.
malware management
Question 71
Not yet answered
Points out of 1.00
Flag question
Question text
Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:
Select one:
a.
Registration Authority
b.
Participation Authority
c.
Certification Authority
d.
Delegation Authority
Question 72
Not yet answered
Points out of 1.00
Flag question
Question text
Select the XML standard that allows secure web domains to exchange user authentication and authorization data and is used extensively for online e-commerce transactions.
Select one:
a.
LDAPS
b.
SDML
c.
SAML
d.
TACACS
Question 73
Not yet answered
Points out of 1.00
Flag question
Question text
What data unit is associated with the Open Systems Interconnection layer four?
Select one:
a.
segment
b.
packet
c.
bit
d.
frame
Question 74
Not yet answered
Points out of 1.00
Flag question
Question text
How is the coverage area for a cellular telephony network usually divided in a typical city?
Select one:
a.
Square square shaped cells.
b.
Triangle shaped cells.
c.
Hexagon shaped cells.
d.
Circular shaped cells.
Question 75
Not yet answered
Points out of 1.00
Flag question
Question text
What software methodology includes security automation?
Select one:
a.
Agile
b.
Secure DevOps
c.
DevOps
d.
Secure Agile
Question 76
Not yet answered
Points out of 1.00
Flag question
Question text
What can be defined as the planning, coordination, and communications functions that are needed to resolve an incident in an efficient manner?
Select one:
a.
incident handling
b.
incident management
c.
incident planning
d.
incident reporting
Question 77
Not yet answered
Points out of 1.00
Flag question
Question text
What control is designed to identify any threat that has reached the system?
Select one:
a.
deterrent control
b.
detective control
c.
preventive control
d.
compensating control
Question 78
Not yet answered
Points out of 1.00
Flag question
Question text
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?
Select one:
a.
system exception
b.
hardware instruction
c.
system call
d.
unit call
Question 80
Not yet answered
Points out of 1.00
Flag question
Question text
If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?
Select one:
a.
complete network segregation
b.
physical network segregation
c.
network isolation
d.
logical network segregation
Question 81
Not yet answered
Points out of 1.00
Flag question
Question text
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
Select one:
a.
$500,000
b.
$1,500,000
c.
$250,000
d.
$50,000
Question 82
Not yet answered
Points out of 1.00
Flag question
Question text
What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?
Select one:
a.
SSL/TLS accelerator
b.
SSL/TLS tap
c.
SSL/TLS mirror
d.
SSL/TLS access point
Question 83
Not yet answered
Points out of 1.00
Flag question
Question text
In information security, which of the following is an example of a threat actor?
Select one:
a.
all of the above
b.
a person attempting to break into a secure computer network
c.
a virus that attacks a computer network
d.
a force of nature such as a tornado that could destroy computer equipment
Question 84
Not yet answered
Points out of 1.00
Flag question
Question text
A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?
Select one:
a.
Certificate policy (CP)
b.
Lifecycle policy (LP)
c.
Certificate practice statement (CPS)
d.
Access policy (AP)
Question 85
Not yet answered
Points out of 1.00
Flag question
Question text
What alternative term can be used to describe asymmetric cryptographic algorithms?
Select one:
a.
public key cryptography
b.
user key cryptography
c.
private key cryptography
d.
cipher-text cryptography
Question 86
Not yet answered
Points out of 1.00
Flag question
Question text
In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional load?
Select one:
a.
symmetric server
b.
asymmetric server
c.
asymmetric network
d.
symmetric network
Question 87
Not yet answered
Points out of 1.00
Flag question
Question text
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
Select one:
a.
challenge
b.
password
c.
token
d.
biometric detail
Question 88
Answer saved
Points out of 1.00
Flag question
Question text
In what type of cloud computing does the customer have some control over the operating systems, storage, and their installed applications?
Select one:
a.
Application as a Service
b.
Software as a Service
c.
Infrastructure as a Service
d.
System as a Service
Question 89
Answer saved
Points out of 1.00
Flag question
Question text
DNS poisoning can be prevented using the latest edition of what software below?
Select one:
a.
BIND
b.
WINS
c.
finger
d.
DHCP
Question 90
Not yet answered
Points out of 1.00
Flag question
Question text
What is the term for a network set up with intentional vulnerabilities?
Select one:
a.
honeypot
b.
honeycomb
c.
honey hole
d.
honeynet
Question 91
Not yet answered
Points out of 1.00
Flag question
Question text
What common method is used to ensure the security and integrity of a root CA?
Select one:
a.
Only use the root CA infrequently.
b.
Keep it in an offline state from the network.
c.
Password protect the root CA
d.
Keep it in an online state and encrypt it.
Question 92
Not yet answered
Points out of 1.00
Flag question
Question text
Select the proprietary wireless network technology that is used primarily by sensors for communicating data.
Select one:
a.
Bluetooth
b.
SCD
c.
USB
d.
ANT
Question 93
Not yet answered
Points out of 1.00
Flag question
Question text
An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be in?
Select one:
a.
secure port
b.
hardened port
c.
closed port
d.
open port
Question 94
Answer saved
Points out of 1.00
Flag question
Question text
How many different Microsoft Windows file types can be infected with a virus?
Select one:
a.
80
b.
50
c.
60
d.
70
Question 95
Not yet answered
Points out of 1.00
Flag question
Question text
A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?
Select one:
a.
Set up a proxy in front of the web server
b.
Install a VPN, configure host
c.
Configure a reduction point on a firewall
d.
Create a DMZ, add necessary hosts.
Question 96
Not yet answered
Points out of 1.00
Flag question
Question text
Mobile devices with global positioning system (GPS) abilities typically make use of:
Select one:
a.
location services
b.
weak passwords
c.
open networks
d.
anti-virus software
Question 97
Not yet answered
Points out of 1.00
Flag question
Question text
The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?
Select one:
a.
Create a subnet for each network switch in use
b.
Add all users to a single network segment
c.
Create additional subnets for the separate groups
d.
Create a VLAN and add the users' computers / ports to the correct VLAN
Question 98
Not yet answered
Points out of 1.00
Flag question
Question text
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:
Select one:
a.
system standard
b.
system view
c.
system image
d.
system baseline
Question 99
Not yet answered
Points out of 1.00
Flag question
Question text
What encryption protocol is used for WPA2?
Select one:
a.
TKIP
b.
CCMP
c.
CBC-MAC
d.
TKIP MIC
Question 100
Not yet answered
Points out of 1.00
Flag question
Question text
What specific type of authentication can be based on where the user is located?
Select one:
a.
GPS
b.
geolocation
c.
somewhere locating
d.
geocache
Question 101
Not yet answered
Points out of 1.00
Flag question
Question text
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
Select one:
a.
A rootkit
b.
A macro
c.
A process
d.
A program
Question 102
Not yet answered
Points out of 1.00
Flag question
Question text
Due to the potential impact of changes that can affect all users in an organization, and considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?
Select one:
a.
change management team
b.
security control team
c.
compliance team
d.
incident response team
Question 103
Not yet answered
Points out of 1.00
Flag question
Question text
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:
Select one:
a.
disaster planning
b.
enterprise disaster planning
c.
business management planning
d.
business continuity planning
Question 104
Not yet answered
Points out of 1.00
Flag question
Question text
Select the option that best describes an asset:
Select one:
a.
any item that is owned by an enterprise
b.
any item that is used by management
c.
any item that has a positive economic value
d.
any item that is used by all employees
Question 105
Not yet answered
Points out of 1.00
Flag question
Question text
What option below represents an example of behavioral biometrics?
Select one:
a.
keystroke dynamics
b.
facial recognition
c.
user dynamics
d.
fingerprint recognition
Question 106
Not yet answered
Points out of 1.00
Flag question
Question text
A framework for all of the entities involved in digital certificates for digital certificate management is known as:
Select one:
a.
private key infrastructure
b.
shared key infrastructure
c.
public key infrastructure
d.
network key infrastructure
Question 107
Not yet answered
Points out of 1.00
Flag question
Question text
Select the item that is not considered to be a basic characteristic of mobile devices.
Select one:
a.
A small form factor.
b.
A mobile operating system.
c.
A removable media storage.
d.
A data synchronization capabilities.
Question 108
Not yet answered
Points out of 1.00
Flag question
Question text
Select the term used to describe tracking software that is deployed without the consent or control of the user.
Select one:
a.
malware
b.
botnet
c.
Trojan
d.
spyware
Question 109
Not yet answered
Points out of 1.00
Flag question
Question text
The goal of redundancy is to reduce what variable?
Select one:
a.
average time between failures
b.
median time to recovery
c.
mean time to recovery
d.
median time between failures
Question 110
Not yet answered
Points out of 1.00
Flag question
Question text
What monitors emails for spam and other unwanted content to prevent these messages from being delivered?
Select one:
a.
firewall
b.
mail gateway
c.
code emulation
d.
router gateway
Question 111
Not yet answered
Points out of 1.00
Flag question
Question text
What is the maximum number of characters that can exist within a SSID name?
Select one:
a.
26
b.
12
c.
32
d.
10
Question 112
Not yet answered
Points out of 1.00
Flag question
Question text
What criteria must be met for an XXS attack to occur on a specific website?
Select one:
a.
The website must accept user input while validating it and use that input in a response.
b.
The website must accept user input without validating it and use that input in a response.
c.
The website must accept user input while validating it and omit that input in a response.
d.
The website must not accept user input without validating it and use that input in a response.
Question 113
Not yet answered
Points out of 1.00
Flag question
Question text
What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks, and each block is then encrypted separately?
Select one:
a.
Electronic Code Book
b.
Galois/Counter
c.
Counter
d.
Cipher Block Chaining
Question 114
Not yet answered
Points out of 1.00
Flag question
Question text
What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?
Select one:
a.
FTP
b.
Kerberos
c.
RADIUS
d.
TACACS
Question 115
Not yet answered
Points out of 1.00
Flag question
Question text
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?
Select one:
a.
Advanced Persistent Threat
b.
Embedded Attacks
c.
Modified Threat
d.
Inside Attacks
Question 116
Not yet answered
Points out of 1.00
Flag question
Question text
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
Select one:
a.
192 bits
b.
128 bits
c.
160 bits
d.
96 bits
Question 117
Not yet answered
Points out of 1.00
Flag question
Question text
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
Select one:
a.
Common Access Card (CAC)
b.
Personal Credential Card (PCC)
c.
Credential Validation Card (CVC)
d.
Identity Validation Card (IVC)
Question 118
Not yet answered
Points out of 1.00
Flag question
Question text
A virus that infects an executable program file is known as?
Select one:
a.
macro virus
b.
program virus
c.
companion virus
d.
boot sector virus
Question 119
Not yet answered
Points out of 1.00
Flag question
Question text
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
Select one:
a.
Roller barrier
b.
Anti-climb
c.
Spiked barrier
d.
Rotating spikes
Question 120
Not yet answered
Points out of 1.00
Flag question
Question text
What data unit is associated with the Open Systems Interconnection layer two?
Select one:
a.
segment
b.
packet
c.
bit
d.
frame
Question 121
Not yet answered
Points out of 1.00
Flag question
Question text
A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n):
Select one:
a.
ACL
b.
DAC
c.
entity
d.
ACE
Question 122
Not yet answered
Points out of 1.00
Flag question
Question text
The process by which keys are managed by a third party, such as a trusted CA, is known as?
Select one:
a.
key renewal
b.
key destruction
c.
key management
d.
key escrow
Question 123
Not yet answered
Points out of 1.00
Flag question
Question text
What process describes using technology as a basis for controlling the access and usage of sensitive data?
Select one:
a.
control diversity
b.
administrative controls
c.
technical controls
d.
vendor diversity
Question 124
Not yet answered
Points out of 1.00
Flag question
Question text
A collection of suggestions that should be implemented is referred to as a:
Select one:
a.
baseline
b.
security policy
c.
guideline
d.
security procedure
Question 125
Not yet answered
Points out of 1.00
Flag question
Question text
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?
Select one:
a.
interface capture
b.
port identity
c.
port mirroring
d.
port snooping
Question 126
Not yet answered
Points out of 1.00
Flag question
Question text
What language below is used to view and manipulate data that is stored in a relational database?
Select one:
a.
C
b.
ISL
c.
DQL
d.
SQL
Question 127
Not yet answered
Points out of 1.00
Flag question
Question text
At what level of the OSI model does the IP protocol function?
Select one:
a.
Presentation Layer
b.
Network Layer
c.
Data link Layer
d.
Transport Layer
Question 128
Not yet answered
Points out of 1.00
Flag question
Question text
The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length?
Select one:
a.
32 bits
b.
64 bits
c.
24 bits
d.
48 bits
Question 129
Not yet answered
Points out of 1.00
Flag question
Question text
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms?
Select one:
a.
Bluejacking
b.
Bluetalking
c.
Bluecracking
d.
Bluesnarfing
Question 130
Not yet answered
Points out of 1.00
Flag question
Question text
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?
Select one:
a.
Slammer
b.
Code Red
c.
Nimda
d.
Love Bug
Question 131
Not yet answered
Points out of 1.00
Flag question
Question text
Choose the SQL injection statement example below that could be used to find specific users:
Select one:
a.
whatever' OR full_name equals '%Mia%'
b.
whatever' OR full_name = '%Mia%'
c.
whatever' OR full_name LIKE '%Mia%'
d.
whatever' OR full_name IS '%Mia%'
Question 132
Not yet answered
Points out of 1.00
Flag question
Question text
What federated identity management (FIM) relies on token credentials?
Select one:
a.
OpenPass
b.
Shibboleth
c.
OpenID
d.
OAuth
Question 133
Not yet answered
Points out of 1.00
Flag question
Question text
What is another term used for a security weakness?
Select one:
a.
risk
b.
opportunity
c.
threat
d.
vulnerability
Question 134
Not yet answered
Points out of 1.00
Flag question
Question text
What specific science discipline do most social engineering attacks rely on when they are being used?
Select one:
a.
psychology
b.
psychiatry
c.
criminology
d.
engineering
Question 135
Not yet answered
Points out of 1.00
Flag question
Question text
How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"
Select one:
a.
Cloud Application Management
b.
Extended Application Management
c.
Mobile Application Management
d.
Remote Application Management
Question 136
Not yet answered
Points out of 1.00
Flag question
Question text
To assist with controlling orphaned and dormant accounts, what can be used to indicate when an account is no longer active?
Select one:
a.
last login
b.
password expiration
c.
account expiration
d.
account last used
Question 137
Not yet answered
Points out of 1.00
Flag question
Question text
Select the term that best describes automated attack software?
Select one:
a.
open-source utility
b.
intrusion application
c.
open-source intelligence
d.
insider software
Question 138
Not yet answered
Points out of 1.00
Flag question
Question text
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
Select one:
a.
top hat
b.
bollard
c.
roller barrier
d.
fence
Question 139
Not yet answered
Points out of 1.00
Flag question
Question text
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
Select one:
a.
Stateless packet filtering
b.
Stateful packet filtering
c.
Stateful frame filtering
d.
Stateless frame filtering
Question 140
Not yet answered
Points out of 1.00
Flag question
Question text
Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
Select one:
a.
NIS
b.
WINS
c.
DNS
d.
TACACS+
Question 141
Not yet answered
Points out of 1.00
Flag question
Question text
An attack that takes advantage of the procedures for initiating a session is known as what type of attack?
Select one:
a.
DNS amplification attack
b.
SYN flood attack
c.
smurf attack
d.
IP spoofing
Question 142
Not yet answered
Points out of 1.00
Flag question
Question text
What specific process in application development removes a resource that is no longer needed?
Select one:
a.
deprovisioning
b.
change management
c.
baselining
d.
version control
Question 143
Not yet answered
Points out of 1.00
Flag question
Question text
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
Select one:
a.
adware
b.
spam
c.
Trojan
d.
keylogger
Question 144
Not yet answered
Points out of 1.00
Flag question
Question text
A user or a process functioning on behalf of the user that attempts to access an object is known as the:
Select one:
a.
reference monitor
b.
label
c.
subject
d.
entity
Question 145
Not yet answered
Points out of 1.00
Flag question
Question text
If a user has more than one type of authentication credential, what type of authentication is being used?
Select one:
a.
multifactor authentication
b.
pattern authentication
c.
token authentication
d.
verified authentication
Question 146
Not yet answered
Points out of 1.00
Flag question
Question text
Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:
Select one:
a.
penetration testing
b.
risk management
c.
vulnerability testing
d.
computer forensics
Question 147
Not yet answered
Points out of 1.00
Flag question
Question text
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
Select one:
a.
router
b.
hub
c.
firewall
d.
switch
Question 148
Not yet answered
Points out of 1.00
Flag question
Question text
In which type of encryption is the same key used to encrypt and decrypt data?
Select one:
a.
private
b.
public
c.
asymmetric
d.
symmetric
Question 149
Not yet answered
Points out of 1.00
Flag question
Question text
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
Select one:
a.
DNS marking
b.
DNS overloading
c.
Phishing
d.
DNS poisoning
Question 150
Not yet answered
Points out of 1.00
Flag question
Question text
The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following options?
Select one:
a.
DIB
b.
DAP
c.
DIT
d.
LDAP
Question 151
Not yet answered
Points out of 1.00
Flag question
Question text
Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.
Select one:
a.
EAP-FAST
b.
EAP-AKA
c.
EAP-TLS
d.
EAP-MSCHAPv2
Question 152
Not yet answered
Points out of 1.00
Flag question
Question text
A Wi-Fi enabled microSD card is an example of what type of device?
Select one:
a.
mobile card
b.
PCIe
c.
SDIO
d.
Secure Digital
Question 153
Not yet answered
Points out of 1.00
Flag question
Question text
What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents?
Select one:
a.
cybercriminal
b.
cyberterrorism
c.
hacking
d.
cracking
Question 154
Not yet answered
Points out of 1.00
Flag question
Question text
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?
Select one:
a.
distributed
b.
local
c.
centered
d.
remote
Question 155
Not yet answered
Points out of 1.00
Flag question
Question text
What kind of networking device forwards packets across different computer networks by reading destination addresses?
Select one:
a.
switch
b.
router
c.
bridge
d.
firewall
Question 156
Not yet answered
Points out of 1.00
Flag question
Question text
According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?
Select one:
a.
27
b.
10
c.
18
d.
15
Question 157
Not yet answered
Points out of 1.00
Flag question
Question text
What specific type of phishing attack uses the telephone to target a victim?
Select one:
a.
whaling
b.
target phishing
c.
vishing
d.
spear phishing
Question 158
Not yet answered
Points out of 1.00
Flag question
Question text
What information security position reports to the CISO and supervises technicians, administrators, and security staff?
Select one:
a.
security administrator
b.
security manager
c.
security auditor
d.
security engineer
Question 159
Not yet answered
Points out of 1.00
Flag question
Question text
Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
Select one:
a.
identity
b.
integrity
c.
availability
d.
confidentiality
Question 160
Not yet answered
Points out of 1.00
Flag question
Question text
Select the email protocols that are not secure? (Choose all that apply.)
Select one or more:
a.
S/MIME
b.
IMAP
c.
TLS
d.
POP
Question 161
Not yet answered
Points out of 1.00
Flag question
Question text
If a user uses the operating system's "delete" command to erase data, what type of data removal procedure was used?
Select one:
a.
purging
b.
data sanitation
c.
degaussing
d.
wiping
Question 162
Not yet answered
Points out of 1.00
Flag question
Question text
What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?
Select one:
a.
Galois/Counter
b.
Counter
c.
Electronic Code Book
d.
Cipher Block Chaining
Question 163
Not yet answered
Points out of 1.00
Flag question
Question text
What allows an application to implement an encryption algorithm for execution?
Select one:
a.
crypto service providers
b.
counters
c.
crypto modules
d.
initialization vectors
Question 164
Not yet answered
Points out of 1.00
Flag question
Question text
Select below the type of malware that appears to have a legitimate use, but contains something malicious:
Select one:
a.
script
b.
Trojan
c.
worm
d.
virus
Question 165
Not yet answered
Points out of 1.00
Flag question
Question text
What level of security access should a computer user have to do their job?
Select one:
a.
limiting amount
b.
password protected
c.
least amount
d.
authorized access
Question 166
Not yet answered
Points out of 1.00
Flag question
Question text
What is the main weakness associated with the use of passwords?
Select one:
a.
handshake technology
b.
encryption technology
c.
human memory
d.
human reliability
Question 167
Not yet answered
Points out of 1.00
Flag question
Question text
What is the name of the process that basically takes a snapshot of the current security of an organization?
Select one:
a.
threat analysis
b.
vulnerability appraisal
c.
risk assessment
d.
threat assessment
Question 168
Not yet answered
Points out of 1.00
Flag question
Question text
A QR code can't contain which of the following items directly?
Select one:
a.
A phone number.
b.
A video.
c.
A URL.
d.
An e-mail address.
Question 169
Not yet answered
Points out of 1.00
Flag question
Question text
Anti-virus products typically utilize what type of virus scanning analysis?
Select one:
a.
Static analysis
b.
Wildcard scanning analysis
c.
Heuristic detection analysis
d.
String scanning analysis
Question 170
Not yet answered
Points out of 1.00
Flag question
Question text
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?
Select one:
a.
Enable a smart card
b.
Enable a sleep time setting
c.
Enable a challenge-response screen
d.
Enable a lock screen
Question 171
Not yet answered
Points out of 1.00
Flag question
Question text
Select the specific type of interview that is usually conducted when an employee leaves the company?
Select one:
a.
post interview
b.
last interview
c.
initial interview
d.
exit interview
Question 172
Not yet answered
Points out of 1.00
Flag question
Question text
Bluetooth is an example of what type of technology below?
Select one:
a.
Personal Area Network
b.
Limited Area Network
c.
Private Area Network
d.
Small Area Network
Question 173
Not yet answered
Points out of 1.00
Flag question
Question text
How can an area be made secure from a non-secured area via two interlocking doors to a small room?
Select one:
a.
Using a pit
b.
Using a mantrap
c.
Using a closet
d.
Using a lockout
Question 174
Not yet answered
Points out of 1.00
Flag question
Question text
An administrator needs to examine FTP commands that are being passed to a server. What port should the administrator be monitoring?
Select one:
a.
22
b.
21
c.
19
d.
20
Question 175
Not yet answered
Points out of 1.00
Flag question
Question text
What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?
Select one:
a.
phreaking
b.
social engineering
c.
reverse engineering
d.
hacking
Question 176
Not yet answered
Points out of 1.00
Flag question
Question text
What is the U.S. federal government standard for digital signatures?
Select one:
a.
Digital Signature Algorithm
b.
Data Encryption Standard
c.
Advanced Encryption Standard
d.
Elliptic Curve Cryptography
Question 177
Not yet answered
Points out of 1.00
Flag question
Question text
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
Select one:
a.
sanctioned
b.
rogue
c.
legitimate
d.
random
Question 178
Not yet answered
Points out of 1.00
Flag question
Question text
Select below the type of cluster where standby server exists only to take over for another server in the event of its failure.
Select one:
a.
symmetric network
b.
asymmetric server
c.
symmetric server
d.
asymmetric network
Question 179
Not yet answered
Points out of 1.00
Flag question
Question text
What cryptographic transport algorithm is considered to be significantly more secure than SSL?
Select one:
a.
AES
b.
ESSL
c.
HTTPS
d.
TLS
Question 180
Not yet answered
Points out of 1.00
Flag question
Question text
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as which of the following?
Select one:
a.
mandatory splitting
b.
separation of duties
c.
role reversal
d.
process sharing
Question 181
Not yet answered
Points out of 1.00
Flag question
Question text
What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?
Select one:
a.
mirror image
b.
baseline
c.
thin image
d.
logical image
Question 182
Not yet answered
Points out of 1.00
Flag question
Question text
An administrator needs to view packets and decode and analyze their contents. What type of application should the administrator use?
Select one:
a.
protocol analyzer
b.
application analyzer
c.
threat profiler
d.
system analyzer
Question 183
Not yet answered
Points out of 1.00
Flag question
Question text
The exchange of information among DNS servers regarding configured zones is known as:
Select one:
a.
zone transfer
b.
zone sharing
c.
zone removal
d.
resource request
Question 184
Not yet answered
Points out of 1.00
Flag question
Question text
An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?
Select one:
a.
Load balancing
b.
stateful packet filtering
c.
proxy servers
d.
failover servers
Question 185
Not yet answered
Points out of 1.00
Flag question
Question text
What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
Select one:
a.
forward proxy server
b.
telnet server
c.
DNS server
d.
VPN server
Question 186
Not yet answered
Points out of 1.00
Flag question
Question text
Select the option that represents a wearable technology.
Select one:
a.
Google Glass
b.
Android
c.
iPhone
d.
Google Chromebook
Question 187
Not yet answered
Points out of 1.00
Flag question
Question text
In information security, what can constitute a loss?
Select one:
a.
theft of information
b.
a delay in transmitting information that results in a financial penalty
c.
the loss of good will or a reputation
d.
all of the above
Question 188
Not yet answered
Points out of 1.00
Flag question
Question text
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:
Select one:
a.
cable lock
b.
shield lock
c.
U-lock
d.
safe lock
Question 189
Not yet answered
Points out of 1.00
Flag question
Question text
Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.
Select one:
a.
web-based
b.
netbook
c.
notebook
d.
tablet
Question 190
Not yet answered
Points out of 1.00
Flag question
Question text
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income, what type of attack are they using?
Select one:
a.
URL hijacking
b.
Web squatting
c.
typo hijacking
d.
spoofing
Question 191
Answer saved
Points out of 1.00
Flag question
Question text
What is the maximum range of most Bluetooth 5 devices?
Select one:
a.
800 ft
b.
60 meters
c.
150 meters
d.
200 ft
Question 192
Not yet answered
Points out of 1.00
Flag question
Question text
What specific ways can a session token be transmitted? (Choose all that apply.)
Select one or more:
a.
In the header of the HTTP requisition.
b.
In the trailer of a frame.
c.
In the URL.
d.
In the header of a packet.
Question 193
Not yet answered
Points out of 1.00
Flag question
Question text
Select the secure alternative to the telnet protocol:
Select one:
a.
SSH
b.
IPsec
c.
HTTPS
d.
TLS
Question 194
Not yet answered
Points out of 1.00
Flag question
Question text
How can an administrator keep devices powered when power is interrupted?
Select one:
a.
uninterruptible power supply
b.
redundant power supply
c.
replica power supply
d.
uninterruptible system supply
Question 195
Not yet answered
Points out of 1.00
Flag question
Question text
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
Select one:
a.
watering hole
b.
adware
c.
typo Squatting
d.
spam
Question 196
Not yet answered
Points out of 1.00
Flag question
Question text
A written document that states how an organization plans to protect the company's information technology assets is a:
Select one:
a.
standard
b.
security procedure
c.
guideline
d.
security policy
Question 197
Not yet answered
Points out of 1.00
Flag question
Question text
What technology uses a chip on the motherboard of the computer to provide cryptographic services?
Select one:
a.
TPM
b.
HSM
c.
FDE
d.
SEDs
Question 198
Not yet answered
Points out of 1.00
Flag question
Question text
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
Select one:
a.
lock
b.
loop
c.
substitution
d.
shift
Question 199
Not yet answered
Points out of 1.00
Flag question
Question text
Authentication for WPA Personal is accomplished by using what type of key?
Select one:
a.
MIC
b.
IV
c.
PSK
d.
TKIP
Question 200
Not yet answered
Points out of 1.00
Flag question
Question text
What security standard was introduced in conjunction with UEFI?
Select one:
a.
Unified Boot
b.
Firmware Interface
c.
BIOS
d.
Secure Boot
Comments
Post a Comment