Skip to main content

IS5403 Week 8 Quizezz

6
Question

A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers. They make a mistake by using the wrong forensic tool during their forensics examination. What should the investigator do?

Correct
 
6 of 10
7
Question

When data is collected for a forensic investigation, what order should be followed?

Correct
 
7 of 10
8
Question

Along with the forensic investigation effort, the man hours and expense should not be tracked since the costs are always justified regardless, of the actual amount involved.

Correct
 
8 of 10
9
Question

For what purpose would it be desired to capture the system image?

Correct
 
9 of 10
10
Question

The forensic investigator at a crime lab will be performing a forensic analysis of a hard drive that was brought in by state troopers. What should be done before performing the analysis?

Correct
6
Question

The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless access points and separate networks for internal users and guests are required. Which of the following should separate each network? (Choose all that apply.)

Correct
 
6 of 10
7
Question

Which of the following is true concerning vulnerability scanning? (Choose all that apply.)

Correct
 
7 of 10
8
Question

How is credentialed scanning better than non-credentialed scanning? (Choose all that apply.)

Correct
 
8 of 10
9
Question

Help from a Recovery Agent is necessary when:

Correct
 
9 of 10
10
Question

What is the difference between a key escrow and a recovery agent? (Choose all that apply.)

Correct
Which of the following is the average amount of time that it will take a device to recover from a failure that is not a terminal failure?
CORRECT
Bria is reviewing the company's updated personal email policy. Which of the following will she NOT find in it?
CORRECT
Which of these is NOT a response to risk?
CORRECT
Which policy defines the actions users may perform while accessing systems and networking equipment?
CORRECT

Which of the following approaches to risk calculation typically assigns a numeric value (1-10) or label (High, Medium, or Low) represents a risk?

CORRECT
Which of the following is NOT a security risk of social media sites for users?
INCORRECT
Bob needs to create an agreement between his company and a third-party organization that demonstrates a "convergence of will" between the parties so that they can work together. Which type of agreement will Bob use?
CORRECT
Which of the following risk control types would use video surveillance systems and barricades to limit access to secure sites?
CORRECT

While traveling abroad, Giuseppe needs to use public Internet cafe computers to access the secure network. Which of the following non-persistence tools should he use?

CORRECT
Which of the following covers the procedures of managing object authorizations?
CORRECT
Simona needs to research a control that attempts to discourage security violations before they occur. Which control will she research?
CORRECT

Agnella was asked to create a report that listed the reasons why a contractor should be provided penetration testing authorization. Which of the following would she NOT list in her report?
CORRECT
What describes the ability of an enterprise data center to revert to its former size after expanding?
CORRECT
What is a collection of suggestions that should be implemented?
CORRECT
Which of the following threats would be classified as the actions of a hactivist?
CORRECT
Which of the following is NOT a time employee training should be conducted?
CORRECT
Which statement is NOT something that a security policy must do?
CORRECT

Which statement does NOT describe a characteristic of a policy?

CORRECT
For adult learners, which approach is often preferred?
CORRECT

Tomassa is asked to determine the expected monetary loss every time a risk occurs. Which formula will she use?
CORRECT


Question 1

Not yet answered
Points out of 1.00
Flag question

Question text

A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
Select one:
a.
charlist.exe
b.
charmap.exe
c.
listchar.exe
d.
chardump.exe


Question 2

Not yet answered
Points out of 1.00
Flag question

Question text

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
Select one:
a.
confidentiality
b.
encryption
c.
availability
d.
integrity

Question 3

Answer saved
Points out of 1.00
Flag question

Question text

A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:
Select one:
a.
service point agreement
b.
recovery time objective
c.
recovery point objective
d.
service level agreement


Question 4

Not yet answered
Points out of 1.00
Flag question

Question text

What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?
Select one:
a.
VDI
b.
OTG
c.
OTA
d.
COPE

Question 5

Not yet answered
Points out of 1.00
Flag question

Question text

What specific type of hardware card inserts into a web server that contains one or more co-processors to handle SSL/TLS
processing?
Select one:
a.
SSL decryptor
b.
SSL/TLS accelerator
c.
security module
d.
media gateway


Question 6

Not yet answered
Points out of 1.00
Flag question

Question text

What is the end result of a penetration test?
Select one:
a.
penetration test system
b.
penetration test view
c.
penetration test profile
d.
penetration test report

Question 7

Not yet answered
Points out of 1.00
Flag question

Question text

Websites that group individuals and organizations into clusters or groups based on some sort are considered to be what type of networks?
Select one:
a.
social management network
b.
social control network
c.
social media network
d.
social engineering network


Question 8

Not yet answered
Points out of 1.00
Flag question

Question text

Slave devices that are connected to a piconet and are sending transmissions are known as what?
Select one:
a.
active slave
b.
neutral slaves
c.
passive slaves
d.
parked slaves

Question 9

Not yet answered
Points out of 1.00
Flag question

Question text

Generally considered to be the most important information security policies, what item below defines the actions a user may perform while accessing systems and networking equipment?
Select one:
a.
data loss policies
b.
VPN policies
c.
encryption policies
d.
acceptable use policies

Question 10

Not yet answered
Points out of 1.00
Flag question

Question text

The use of what item below involves the creation of a large pre-generated data set of candidate digests?
Select one:
a.
rainbow tables
b.
randomized character list
c.
cascade tables
d.
word list


Question 11

Not yet answered
Points out of 1.00
Flag question

Question text

What social engineering principal frightens and coerces a victim by using threats?
Select one:
a.
authority
b.
scarcity
c.
urgency
d.
intimidation

Question 12

Answer saved
Points out of 1.00
Flag question

Question text

What can be used to increase the strength of hashed passwords?
Select one:
a.
single crypting
b.
salt
c.
double hashing
d.
key stretching



Question 13

Not yet answered
Points out of 1.00
Flag question

Question text

The goal of what type of threat evaluation is to better understand who the attackers are, why they attack, and what types of attacks might occur?
Select one:
a.
threat modeling
b.
threat profiling
c.
threat mitigation
d.
risk modeling


Question 14

Not yet answered
Points out of 1.00
Flag question

Question text

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
Select one:
a.
3DES
b.
RSA
c.
AES
d.
Twofish


Question 15

Not yet answered
Points out of 1.00
Flag question

Question text

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
Select one:
a.
hub
b.
router
c.
switch
d.
bridge

Question 16

Not yet answered
Points out of 1.00
Flag question

Question text

What describes an agreement between two or more parties and demonstrates a "convergence of will" between the parties
so that they can work together?
Select one:
a.
MOU
b.
NDA
c.
ISA
d.
BPA


Question 17

Not yet answered
Points out of 1.00
Flag question

Question text

How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
Select one:
a.
MAC address
b.
IP address
c.
VLAN
d.
subnets


Question 18

Not yet answered
Points out of 1.00
Flag question

Question text

What are the two types of cross-site attacks? (Choose all that apply.)
Select one or more:
a.
cross-site request forgery attacks
b.
cross-site flood attacks
c.
cross-site input attacks
d.
cross-site scripting attacks

Question 19

Not yet answered
Points out of 1.00
Flag question

Question text

What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?
Select one:
a.
full disk encryption
b.
disk encryption
c.
OS encryption
d.
system encryption

Question 20

Not yet answered
Points out of 1.00
Flag question

Question text

On and SDN network, what specific unit gives traffic the permission to flow through the network?
Select one:
a.
SDN router
b.
SDN firewall
c.
SDN gateway
d.
SDN controller


Question 21

Not yet answered
Points out of 1.00
Flag question

Question text

What access control model below is considered to be the most restrictive access control model, and involves assigning access controls to users strictly according to the custodian?
Select one:
a.
Mandatory Access Control
b.
Role Based Access Control
c.
Discretionary Access Control
d.
Rule Based Access Control


Question 22

Not yet answered
Points out of 1.00
Flag question

Question text

Select the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users.
Select one:
a.
CHAP
b.
TACACS
c.
Kerberos
d.
Aurora

 


Question 23

Not yet answered
Points out of 1.00
Flag question

Question text

A metallic enclosure that prevents the entry or escape of an electromagnetic field is known as a:
Select one:
a.
bollard cage
b.
Newton cage
c.
mantrap
d.
Faraday cage


Question 24

Not yet answered
Points out of 1.00
Flag question

Question text

In Microsoft Windows, what type of templates are a collection of security configuration settings?
Select one:
a.
system
b.
user
c.
administrator
d.
security


Question 25

Not yet answered
Points out of 1.00
Flag question

Question text

Select the device that is designed to exclusively monitor the RF frequency for network transmissions?
Select one:
a.
wireless device probe
b.
dedicated probe
c.
access point probe
d.
WAP


Question 26

Answer saved
Points out of 1.00
Flag question

Question text

The action that is taken by a subject over an object is called a(n):
Select one:
a.
access
b.
authorization
c.
operation
d.
control


Question 27

Not yet answered
Points out of 1.00
Flag question

Question text

The use of a single authentication credential that is shared across multiple networks is called:
Select one:
a.
risk management
b.
authorization management
c.
access management
d.
identity management


Question 28

Not yet answered
Points out of 1.00
Flag question

Question text

What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store?
Select one:
a.
Symbian
b.
Android
c.
Blackberry OS
d.
iOS


Question 29

Not yet answered
Points out of 1.00
Flag question

Question text

A port in what state below implies that an application or service assigned to that port is listening for any instructions?
Select one:
a.
open port
b.
empty port
c.
interruptible system
d.
closed port


Question 30

Not yet answered
Points out of 1.00
Flag question

Question text

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
Select one:
a.
HCPA
b.
USHIPA
c.
HIPAA
d.
HLPDA


Question 31

Not yet answered
Points out of 1.00
Flag question

Question text

Data that is in an unencrypted form is referred to as which of the following?
Select one:
a.
cleartext
b.
simpletext
c.
crypttext
d.
plain text


Question 32

Not yet answered
Points out of 1.00
Flag question

Question text

What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?
Select one:
a.
feature pack
b.
roll-up
c.
patch
d.
service pack


Question 33

Answer saved
Points out of 1.00
Flag question

Question text

During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?
Select one:
a.
verification request
b.
authentication request
c.
accounting request
d.
access request


Question 34

Not yet answered
Points out of 1.00
Flag question

Question text

The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?
Select one:
a.
unilateral Sign On
b.
federated Sign On
c.
single Sign On
d.
individual Sign On


Question 35

Not yet answered
Points out of 1.00
Flag question

Question text

User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?
Select one:
a.
orphaned
b.
inactive
c.
abandoned
d.
stale



Question 36

Not yet answered
Points out of 1.00
Flag question

Question text

What PIN is considered to be the most commonly used PIN?
Select one:
a.
1234
b.
0000
c.
7777
d.
4321


Question 37

Not yet answered
Points out of 1.00
Flag question

Question text

What social engineering principal convinces a victim an immediate action is needed?
Select one:
a.
intimidation
b.
authority
c.
scarcity
d.
urgency


Question 38

Not yet answered
Points out of 1.00
Flag question

Question text

Piconets in which connections exist between different piconets are known as which of the following terms?
Select one:
a.
honeynet
b.
scatternet
c.
boundnet
d.
broadnet


Question 39

Not yet answered
Points out of 1.00
Flag question

Question text

What is a value that can be used to ensure that plaintext, when hashed, will not consistently result in the same digest?
Select one:
a.
counter
b.
nonce
c.
salt
d.
initialization vector


Question 40

Not yet answered
Points out of 1.00
Flag question

Question text

Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?
Select one:
a.
RADIUS
b.
Telnet
c.
FTP
d.
ICMP


Question 41

Not yet answered
Points out of 1.00
Flag question

Question text

A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer?
Select one:
a.
laptop
b.
subnotebook
c.
netbook
d.
tablet



Question 42

Not yet answered
Points out of 1.00
Flag question

Question text

What publicly released software security update is intended to repair a vulnerability?
Select one:
a.
service pack
b.
patch
c.
renewal
d.
update


Question 43

Not yet answered
Points out of 1.00
Flag question

Question text

Multiple sectors on a disk, when combined, are referred to as a:
Select one:
a.
track
b.
platter
c.
cluster
d.
slice


Question 44

Not yet answered
Points out of 1.00
Flag question

Question text

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
Select one:
a.
Rijndal
b.
Whirlpool
c.
Twofish
d.
Blowfish


Question 45

Not yet answered
Points out of 1.00
Flag question

Question text

What dedicated hardware device aggregates hundreds or thousands of VPN connections?
Select one:
a.
VPN concentrator
b.
VPN gateway
c.
VPN switch
d.
VPN server


Question 46

Not yet answered
Points out of 1.00
Flag question

Question text

What process does a penetration tester rely on to access an ever higher level of resources?
Select one:
a.
pivot
b.
continuous exploitation
c.
persistence
d.
spinning


Question 47

Not yet answered
Points out of 1.00
Flag question

Question text

What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face?
Select one:
a.
reactive biometrics
b.
cognitive biometrics
c.
physical biometrics
d.
standard biometrics

Question 48

Not yet answered
Points out of 1.00
Flag question

Question text

If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?
Select one:
a.
Bob's private key and Alice's public key.
b.
Alice's private key.
c.
Bob's private key.
d.
Bob and Alice's keys.


Question 49

Not yet answered
Points out of 1.00
Flag question

Question text

A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:
Select one:
a.
warm site
b.
spare site
c.
hot site
d.
cold site


Question 50

Not yet answered
Points out of 1.00
Flag question

Question text

At what stage can a certificate no longer be used for any type of authentication?
Select one:
a.
expiration
b.
creation
c.
revocation
d.
suspension


Question 51

Not yet answered
Points out of 1.00
Flag question

Question text

What process addresses how long data must be kept and how it is to be secured?
Select one:
a.
legal and compliance
b.
legal retention
c.
data methodology
d.
data retention



Question 52

Not yet answered
Points out of 1.00
Flag question

Question text

During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?
Select one:
a.
threat scanner
b.
port scanner
c.
vulnerability profiler
d.
application profiler


Question 53

Not yet answered
Points out of 1.00
Flag question

Question text

The Authentication Header (AH) protocol is a part of what encryption protocol suite below?
Select one:
a.
TLS 3.0
b.
GPG
c.
IPSec
d.
SSL


Question 54

Not yet answered
Points out of 1.00
Flag question

Question text

What federation system technology uses federation standards to provide SSO and exchanging attributes?
Select one:
a.
Windows Live ID
b.
Open ID Connect
c.
OAuth
d.
Shibboleth


Question 55

Not yet answered
Points out of 1.00
Flag question

Question text

Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability.
Select one:
a.
intrusive
b.
non-intrusive
c.
active
d.
passive


Question 56

Not yet answered
Points out of 1.00
Flag question

Question text

Select the technology that can be used to examine content through application-level filtering.
Select one:
a.
Firewall
b.
Web security gateway
c.
Security proxy
d.
Application gateway

Question 57

Not yet answered
Points out of 1.00
Flag question

Question text

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
Select one:
a.
Session blocking
b.
Session replay
c.
Session spoofing
d.
Session hijacking


Question 58

Not yet answered
Points out of 1.00
Flag question

Question text

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
Select one:
a.
ECC
b.
IKE
c.
FCC
d.
RSA


Question 59

Not yet answered
Points out of 1.00
Flag question

Question text

What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
Select one:
a.
ad-hoc peer
b.
endpoint
c.
access Point
d.
WMM


Question 60

Not yet answered
Points out of 1.00
Flag question

Question text

Select the EAP protocol that uses digital certificates for authentication?
Select one:
a.
EAP-FAST
b.
EAP-TLS
c.
EAP-MSCHAPv2
d.
EAP-AKA


Question 61

Not yet answered
Points out of 1.00
Flag question

Question text

What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?
Select one:
a.
DNS
b.
TCP
c.
ARP
d.
UDP

Question 62

Not yet answered
Points out of 1.00
Flag question

Question text

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
Select one:
a.
clickjacking
b.
domain hijacking
c.
DNS spoofing
d.
pointer hack

Question 63

Not yet answered
Points out of 1.00
Flag question

Question text

If using the MD5 hashing algorithm, what is the length to which each message is padded?
Select one:
a.
64 bits
b.
32 bits
c.
128 bits
d.
512 bits


Question 64

Not yet answered
Points out of 1.00
Flag question

Question text

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
Select one:
a.
split
b.
Swiss cheese
c.
appender
d.
stealth


Question 65

Not yet answered
Points out of 1.00
Flag question

Question text

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
Select one:
a.
ransomware
b.
hostageware
c.
lock-ware
d.
stealware


Question 66

Not yet answered
Points out of 1.00
Flag question

Question text

Select the option that best describes a policy:
Select one:
a.
A list of all items that have a positive economic value
b.
A document that outlines specific requirements or rules that must be met
c.
A collection of suggestions that should be implemented
d.
A collection of requirements specific to the system or procedure that must be met by everyone


Question 67

Not yet answered
Points out of 1.00
Flag question

Question text

What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply.)
Select one or more:
a.
data plane
b.
management plane
c.
data plane
d.
control plane


Question 68

Not yet answered
Points out of 1.00
Flag question

Question text

What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks?
Select one:
a.
least functionality
b.
function limiting
c.
whitelisting
d.
blacklisting


Question 69

Not yet answered
Points out of 1.00
Flag question

Question text

If a penetration tester has gained access to a network and then tries to move around inside the network to other resources, what procedure is the tester performing?
Select one:
a.
persistence
b.
pivot
c.
secondary exploitation
d.
spinning


Question 70

Not yet answered
Points out of 1.00
Flag question

Question text

Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?
Select one:
a.
application whitelist
b.
inventory permissions
c.
application control
d.
malware management


Question 71

Not yet answered
Points out of 1.00
Flag question

Question text

Select the term that is used to describe a trusted third-party agency that is responsible for issuing digital certificates:
Select one:
a.
Registration Authority
b.
Participation Authority
c.
Certification Authority
d.
Delegation Authority


Question 72

Not yet answered
Points out of 1.00
Flag question

Question text

Select the XML standard that allows secure web domains to exchange user authentication and authorization data and is used extensively for online e-commerce transactions.
Select one:
a.
LDAPS
b.
SDML
c.
SAML
d.
TACACS

Question 73

Not yet answered
Points out of 1.00
Flag question

Question text

What data unit is associated with the Open Systems Interconnection layer four?
Select one:
a.
segment
b.
packet
c.
bit
d.
frame


Question 74

Not yet answered
Points out of 1.00
Flag question

Question text

How is the coverage area for a cellular telephony network usually divided in a typical city?
Select one:
a.
Square square shaped cells.
b.
Triangle shaped cells.
c.
Hexagon shaped cells.
d.
Circular shaped cells.


Question 75

Not yet answered
Points out of 1.00
Flag question

Question text

What software methodology includes security automation?
Select one:
a.
Agile
b.
Secure DevOps
c.
DevOps
d.
Secure Agile


Question 76

Not yet answered
Points out of 1.00
Flag question

Question text

What can be defined as the planning, coordination, and communications functions that are needed to resolve an incident in an efficient manner?
Select one:
a.
incident handling
b.
incident management
c.
incident planning
d.
incident reporting


Question 77

Not yet answered
Points out of 1.00
Flag question

Question text

What control is designed to identify any threat that has reached the system?
Select one:
a.
deterrent control
b.
detective control
c.
preventive control
d.
compensating control

Question 78

Not yet answered
Points out of 1.00
Flag question

Question text

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?
Select one:
a.
system exception
b.
hardware instruction
c.
system call
d.
unit call


Question 80

Not yet answered
Points out of 1.00
Flag question

Question text

If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?
Select one:
a.
complete network segregation
b.
physical network segregation
c.
network isolation
d.
logical network segregation



Question 81

Not yet answered
Points out of 1.00
Flag question

Question text

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
Select one:
a.
$500,000
b.
$1,500,000
c.
$250,000
d.
$50,000


Question 82

Not yet answered
Points out of 1.00
Flag question

Question text

What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?
Select one:
a.
SSL/TLS accelerator
b.
SSL/TLS tap
c.
SSL/TLS mirror
d.
SSL/TLS access point


Question 83

Not yet answered
Points out of 1.00
Flag question

Question text

In information security, which of the following is an example of a threat actor?
Select one:
a.
all of the above
b.
a person attempting to break into a secure computer network
c.
a virus that attacks a computer network
d.
a force of nature such as a tornado that could destroy computer equipment


Question 84

Not yet answered
Points out of 1.00
Flag question

Question text

A document that describes in detail how a CA uses and manages certificates, as well as how end users register for a digital certificate, is known as?
Select one:
a.
Certificate policy (CP)
b.
Lifecycle policy (LP)
c.
Certificate practice statement (CPS)
d.
Access policy (AP)


Question 85

Not yet answered
Points out of 1.00
Flag question

Question text

What alternative term can be used to describe asymmetric cryptographic algorithms?
Select one:
a.
public key cryptography
b.
user key cryptography
c.
private key cryptography
d.
cipher-text cryptography


Question 86

Not yet answered
Points out of 1.00
Flag question

Question text

In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional load?
Select one:
a.
symmetric server
b.
asymmetric server
c.
asymmetric network
d.
symmetric network


Question 87

Not yet answered
Points out of 1.00
Flag question

Question text

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a:
Select one:
a.
challenge
b.
password
c.
token
d.
biometric detail


Question 88

Answer saved
Points out of 1.00
Flag question

Question text

In what type of cloud computing does the customer have some control over the operating systems, storage, and their installed applications?
Select one:
a.
Application as a Service
b.
Software as a Service
c.
Infrastructure as a Service
d.
System as a Service


Question 89

Answer saved
Points out of 1.00
Flag question

Question text

DNS poisoning can be prevented using the latest edition of what software below?
Select one:
a.
BIND
b.
WINS
c.
finger
d.
DHCP


Question 90

Not yet answered
Points out of 1.00
Flag question

Question text

What is the term for a network set up with intentional vulnerabilities?
Select one:
a.
honeypot
b.
honeycomb
c.
honey hole
d.
honeynet


Question 91

Not yet answered
Points out of 1.00
Flag question

Question text

What common method is used to ensure the security and integrity of a root CA?
Select one:
a.
Only use the root CA infrequently.
b.
Keep it in an offline state from the network.
c.
Password protect the root CA
d.
Keep it in an online state and encrypt it.


Question 92

Not yet answered
Points out of 1.00
Flag question

Question text

Select the proprietary wireless network technology that is used primarily by sensors for communicating data.
Select one:
a.
Bluetooth
b.
SCD
c.
USB
d.
ANT


Question 93

Not yet answered
Points out of 1.00
Flag question

Question text

An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be in?
Select one:
a.
secure port
b.
hardened port
c.
closed port
d.
open port


Question 94

Answer saved
Points out of 1.00
Flag question

Question text

How many different Microsoft Windows file types can be infected with a virus?
Select one:
a.
80
b.
50
c.
60
d.
70


Question 95

Not yet answered
Points out of 1.00
Flag question

Question text

A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?
Select one:
a.
Set up a proxy in front of the web server
b.
Install a VPN, configure host
c.
Configure a reduction point on a firewall
d.
Create a DMZ, add necessary hosts.



Question 96

Not yet answered
Points out of 1.00
Flag question

Question text

Mobile devices with global positioning system (GPS) abilities typically make use of:
Select one:
a.
location services
b.
weak passwords
c.
open networks
d.
anti-virus software


Question 97

Not yet answered
Points out of 1.00
Flag question

Question text

The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?
Select one:
a.
Create a subnet for each network switch in use
b.
Add all users to a single network segment
c.
Create additional subnets for the separate groups
d.
Create a VLAN and add the users' computers / ports to the correct VLAN


Question 98

Not yet answered
Points out of 1.00
Flag question

Question text

A snapshot of the current state of a computer that contains all current settings and data is known as what option below:
Select one:
a.
system standard
b.
system view
c.
system image
d.
system baseline


Question 99

Not yet answered
Points out of 1.00
Flag question

Question text

What encryption protocol is used for WPA2?
Select one:
a.
TKIP
b.
CCMP
c.
CBC-MAC
d.
TKIP MIC


Question 100

Not yet answered
Points out of 1.00
Flag question

Question text

What specific type of authentication can be based on where the user is located?
Select one:
a.
GPS
b.
geolocation
c.
somewhere locating
d.
geocache


Question 101

Not yet answered
Points out of 1.00
Flag question

Question text

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
Select one:
a.
A rootkit
b.
A macro
c.
A process
d.
A program


Question 102

Not yet answered
Points out of 1.00
Flag question

Question text

Due to the potential impact of changes that can affect all users in an organization, and considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?
Select one:
a.
change management team
b.
security control team
c.
compliance team
d.
incident response team


Question 103

Not yet answered
Points out of 1.00
Flag question

Question text

The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:
Select one:
a.
disaster planning
b.
enterprise disaster planning
c.
business management planning
d.
business continuity planning


Question 104

Not yet answered
Points out of 1.00
Flag question

Question text

Select the option that best describes an asset:
Select one:
a.
any item that is owned by an enterprise
b.
any item that is used by management
c.
any item that has a positive economic value
d.
any item that is used by all employees

Question 105

Not yet answered
Points out of 1.00
Flag question

Question text

What option below represents an example of behavioral biometrics?
Select one:
a.
keystroke dynamics
b.
facial recognition
c.
user dynamics
d.
fingerprint recognition


Question 106

Not yet answered
Points out of 1.00
Flag question

Question text

A framework for all of the entities involved in digital certificates for digital certificate management is known as:
Select one:
a.
private key infrastructure
b.
shared key infrastructure
c.
public key infrastructure
d.
network key infrastructure


Question 107

Not yet answered
Points out of 1.00
Flag question

Question text

Select the item that is not considered to be a basic characteristic of mobile devices.
Select one:
a.
A small form factor.
b.
A mobile operating system.
c.
A removable media storage.
d.
A data synchronization capabilities.


Question 108

Not yet answered
Points out of 1.00
Flag question

Question text

Select the term used to describe tracking software that is deployed without the consent or control of the user.
Select one:
a.
malware
b.
botnet
c.
Trojan
d.
spyware


Question 109

Not yet answered
Points out of 1.00
Flag question

Question text

The goal of redundancy is to reduce what variable?
Select one:
a.
average time between failures
b.
median time to recovery
c.
mean time to recovery
d.
median time between failures


Question 110

Not yet answered
Points out of 1.00
Flag question

Question text

What monitors emails for spam and other unwanted content to prevent these messages from being delivered?
Select one:
a.
firewall
b.
mail gateway
c.
code emulation
d.
router gateway


Question 111

Not yet answered
Points out of 1.00
Flag question

Question text

What is the maximum number of characters that can exist within a SSID name?
Select one:
a.
26
b.
12
c.
32
d.
10


Question 112

Not yet answered
Points out of 1.00
Flag question

Question text

What criteria must be met for an XXS attack to occur on a specific website?
Select one:
a.
The website must accept user input while validating it and use that input in a response.
b.
The website must accept user input without validating it and use that input in a response.
c.
The website must accept user input while validating it and omit that input in a response.
d.
The website must not accept user input without validating it and use that input in a response.


Question 113

Not yet answered
Points out of 1.00
Flag question

Question text

What block cipher mode of operation uses the most basic approach where the plaintext is divided into blocks, and each block is then encrypted separately?
Select one:
a.
Electronic Code Book
b.
Galois/Counter
c.
Counter
d.
Cipher Block Chaining


Question 114

Not yet answered
Points out of 1.00
Flag question

Question text

What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?
Select one:
a.
FTP
b.
Kerberos
c.
RADIUS
d.
TACACS


Question 115

Not yet answered
Points out of 1.00
Flag question

Question text

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?
Select one:
a.
Advanced Persistent Threat
b.
Embedded Attacks
c.
Modified Threat
d.
Inside Attacks

Question 116

Not yet answered
Points out of 1.00
Flag question

Question text

The SHA-1 hashing algorithm creates a digest that is how many bits in length?
Select one:
a.
192 bits
b.
128 bits
c.
160 bits
d.
96 bits



Question 117

Not yet answered
Points out of 1.00
Flag question

Question text

A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called:
Select one:
a.
Common Access Card (CAC)
b.
Personal Credential Card (PCC)
c.
Credential Validation Card (CVC)
d.
Identity Validation Card (IVC)



Question 118

Not yet answered
Points out of 1.00
Flag question

Question text

A virus that infects an executable program file is known as?
Select one:
a.
macro virus
b.
program virus
c.
companion virus
d.
boot sector virus


Question 119

Not yet answered
Points out of 1.00
Flag question

Question text

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology?
Select one:
a.
Roller barrier
b.
Anti-climb
c.
Spiked barrier
d.
Rotating spikes


Question 120

Not yet answered
Points out of 1.00
Flag question

Question text

What data unit is associated with the Open Systems Interconnection layer two?
Select one:
a.
segment
b.
packet
c.
bit
d.
frame


Question 121

Not yet answered
Points out of 1.00
Flag question

Question text

A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n):
Select one:
a.
ACL
b.
DAC
c.
entity
d.
ACE


Question 122

Not yet answered
Points out of 1.00
Flag question

Question text

The process by which keys are managed by a third party, such as a trusted CA, is known as?
Select one:
a.
key renewal
b.
key destruction
c.
key management
d.
key escrow


Question 123

Not yet answered
Points out of 1.00
Flag question

Question text

What process describes using technology as a basis for controlling the access and usage of sensitive data?
Select one:
a.
control diversity
b.
administrative controls
c.
technical controls
d.
vendor diversity

Question 124

Not yet answered
Points out of 1.00
Flag question

Question text

A collection of suggestions that should be implemented is referred to as a:
Select one:
a.
baseline
b.
security policy
c.
guideline
d.
security procedure


Question 125

Not yet answered
Points out of 1.00
Flag question

Question text

If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?
Select one:
a.
interface capture
b.
port identity
c.
port mirroring
d.
port snooping



Question 126

Not yet answered
Points out of 1.00
Flag question

Question text

What language below is used to view and manipulate data that is stored in a relational database?
Select one:
a.
C
b.
ISL
c.
DQL
d.
SQL

Question 127

Not yet answered
Points out of 1.00
Flag question

Question text

At what level of the OSI model does the IP protocol function?
Select one:
a.
Presentation Layer
b.
Network Layer
c.
Data link Layer
d.
Transport Layer


Question 128

Not yet answered
Points out of 1.00
Flag question

Question text

The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length?
Select one:
a.
32 bits
b.
64 bits
c.
24 bits
d.
48 bits

Question 129

Not yet answered
Points out of 1.00
Flag question

Question text

A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms?
Select one:
a.
Bluejacking
b.
Bluetalking
c.
Bluecracking
d.
Bluesnarfing


Question 130

Not yet answered
Points out of 1.00
Flag question

Question text

To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?
Select one:
a.
Slammer
b.
Code Red
c.
Nimda
d.
Love Bug


Question 131

Not yet answered
Points out of 1.00
Flag question

Question text

Choose the SQL injection statement example below that could be used to find specific users:
Select one:
a.
whatever' OR full_name equals '%Mia%'
b.
whatever' OR full_name = '%Mia%'
c.
whatever' OR full_name LIKE '%Mia%'
d.
whatever' OR full_name IS '%Mia%'


Question 132

Not yet answered
Points out of 1.00
Flag question

Question text

What federated identity management (FIM) relies on token credentials?
Select one:
a.
OpenPass
b.
Shibboleth
c.
OpenID
d.
OAuth


Question 133

Not yet answered
Points out of 1.00
Flag question

Question text

What is another term used for a security weakness?
Select one:
a.
risk
b.
opportunity
c.
threat
d.
vulnerability


Question 134

Not yet answered
Points out of 1.00
Flag question

Question text

What specific science discipline do most social engineering attacks rely on when they are being used?
Select one:
a.
psychology
b.
psychiatry
c.
criminology
d.
engineering

Question 135

Not yet answered
Points out of 1.00
Flag question

Question text

How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"
Select one:
a.
Cloud Application Management
b.
Extended Application Management
c.
Mobile Application Management
d.
Remote Application Management


Question 136

Not yet answered
Points out of 1.00
Flag question

Question text

To assist with controlling orphaned and dormant accounts, what can be used to indicate when an account is no longer active?
Select one:
a.
last login
b.
password expiration
c.
account expiration
d.
account last used


Question 137

Not yet answered
Points out of 1.00
Flag question

Question text

Select the term that best describes automated attack software?
Select one:
a.
open-source utility
b.
intrusion application
c.
open-source intelligence
d.
insider software


Question 138

Not yet answered
Points out of 1.00
Flag question

Question text

An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology?
Select one:
a.
top hat
b.
bollard
c.
roller barrier
d.
fence


Question 139

Not yet answered
Points out of 1.00
Flag question

Question text

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
Select one:
a.
Stateless packet filtering
b.
Stateful packet filtering
c.
Stateful frame filtering
d.
Stateless frame filtering


Question 140

Not yet answered
Points out of 1.00
Flag question

Question text

Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
Select one:
a.
NIS
b.
WINS
c.
DNS
d.
TACACS+


Question 141

Not yet answered
Points out of 1.00
Flag question

Question text

An attack that takes advantage of the procedures for initiating a session is known as what type of attack?
Select one:
a.
DNS amplification attack
b.
SYN flood attack
c.
smurf attack
d.
IP spoofing


Question 142

Not yet answered
Points out of 1.00
Flag question

Question text

What specific process in application development removes a resource that is no longer needed?
Select one:
a.
deprovisioning
b.
change management
c.
baselining
d.
version control


Question 143

Not yet answered
Points out of 1.00
Flag question

Question text

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
Select one:
a.
adware
b.
spam
c.
Trojan
d.
keylogger


Question 144

Not yet answered
Points out of 1.00
Flag question

Question text

A user or a process functioning on behalf of the user that attempts to access an object is known as the:
Select one:
a.
reference monitor
b.
label
c.
subject
d.
entity


Question 145

Not yet answered
Points out of 1.00
Flag question

Question text

If a user has more than one type of authentication credential, what type of authentication is being used?
Select one:
a.
multifactor authentication
b.
pattern authentication
c.
token authentication
d.
verified authentication


Question 146

Not yet answered
Points out of 1.00
Flag question

Question text

Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:
Select one:
a.
penetration testing
b.
risk management
c.
vulnerability testing
d.
computer forensics


Question 147

Not yet answered
Points out of 1.00
Flag question

Question text

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
Select one:
a.
router
b.
hub
c.
firewall
d.
switch


Question 148

Not yet answered
Points out of 1.00
Flag question

Question text

In which type of encryption is the same key used to encrypt and decrypt data?
Select one:
a.
private
b.
public
c.
asymmetric
d.
symmetric


Question 149

Not yet answered
Points out of 1.00
Flag question

Question text

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
Select one:
a.
DNS marking
b.
DNS overloading
c.
Phishing
d.
DNS poisoning


Question 150

Not yet answered
Points out of 1.00
Flag question

Question text

The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following options?
Select one:
a.
DIB
b.
DAP
c.
DIT
d.
LDAP


Question 151

Not yet answered
Points out of 1.00
Flag question

Question text

Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for authentication using TLS.
Select one:
a.
EAP-FAST
b.
EAP-AKA
c.
EAP-TLS
d.
EAP-MSCHAPv2


Question 152

Not yet answered
Points out of 1.00
Flag question

Question text

A Wi-Fi enabled microSD card is an example of what type of device?
Select one:
a.
mobile card
b.
PCIe
c.
SDIO
d.
Secure Digital


Question 153

Not yet answered
Points out of 1.00
Flag question

Question text

What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents?
Select one:
a.
cybercriminal
b.
cyberterrorism
c.
hacking
d.
cracking


Question 154

Not yet answered
Points out of 1.00
Flag question

Question text

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?
Select one:
a.
distributed
b.
local
c.
centered
d.
remote



Question 155

Not yet answered
Points out of 1.00
Flag question

Question text

What kind of networking device forwards packets across different computer networks by reading destination addresses?
Select one:
a.
switch
b.
router
c.
bridge
d.
firewall


Question 156

Not yet answered
Points out of 1.00
Flag question

Question text

According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?
Select one:
a.
27
b.
10
c.
18
d.
15


Question 157

Not yet answered
Points out of 1.00
Flag question

Question text

What specific type of phishing attack uses the telephone to target a victim?
Select one:
a.
whaling
b.
target phishing
c.
vishing
d.
spear phishing


Question 158

Not yet answered
Points out of 1.00
Flag question

Question text

What information security position reports to the CISO and supervises technicians, administrators, and security staff?
Select one:
a.
security administrator
b.
security manager
c.
security auditor
d.
security engineer


Question 159

Not yet answered
Points out of 1.00
Flag question

Question text

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
Select one:
a.
identity
b.
integrity
c.
availability
d.
confidentiality


Question 160

Not yet answered
Points out of 1.00
Flag question

Question text

Select the email protocols that are not secure? (Choose all that apply.)
Select one or more:
a.
S/MIME
b.
IMAP
c.
TLS
d.
POP


Question 161

Not yet answered
Points out of 1.00
Flag question

Question text

If a user uses the operating system's "delete" command to erase data, what type of data removal procedure was used?
Select one:
a.
purging
b.
data sanitation
c.
degaussing
d.
wiping


Question 162

Not yet answered
Points out of 1.00
Flag question

Question text

What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?
Select one:
a.
Galois/Counter
b.
Counter
c.
Electronic Code Book
d.
Cipher Block Chaining


Question 163

Not yet answered
Points out of 1.00
Flag question

Question text

What allows an application to implement an encryption algorithm for execution?
Select one:
a.
crypto service providers
b.
counters
c.
crypto modules
d.
initialization vectors


Question 164

Not yet answered
Points out of 1.00
Flag question

Question text

Select below the type of malware that appears to have a legitimate use, but contains something malicious:
Select one:
a.
script
b.
Trojan
c.
worm
d.
virus


Question 165

Not yet answered
Points out of 1.00
Flag question

Question text

What level of security access should a computer user have to do their job?
Select one:
a.
limiting amount
b.
password protected
c.
least amount
d.
authorized access


Question 166

Not yet answered
Points out of 1.00
Flag question

Question text

What is the main weakness associated with the use of passwords?
Select one:
a.
handshake technology
b.
encryption technology
c.
human memory
d.
human reliability


Question 167

Not yet answered
Points out of 1.00
Flag question

Question text

What is the name of the process that basically takes a snapshot of the current security of an organization?
Select one:
a.
threat analysis
b.
vulnerability appraisal
c.
risk assessment
d.
threat assessment


Question 168

Not yet answered
Points out of 1.00
Flag question

Question text

A QR code can't contain which of the following items directly?
Select one:
a.
A phone number.
b.
A video.
c.
A URL.
d.
An e-mail address.


Question 169

Not yet answered
Points out of 1.00
Flag question

Question text

Anti-virus products typically utilize what type of virus scanning analysis?
Select one:
a.
Static analysis
b.
Wildcard scanning analysis
c.
Heuristic detection analysis
d.
String scanning analysis


Question 170

Not yet answered
Points out of 1.00
Flag question

Question text

What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?
Select one:
a.
Enable a smart card
b.
Enable a sleep time setting
c.
Enable a challenge-response screen
d.
Enable a lock screen


Question 171

Not yet answered
Points out of 1.00
Flag question

Question text

Select the specific type of interview that is usually conducted when an employee leaves the company?
Select one:
a.
post interview
b.
last interview
c.
initial interview
d.
exit interview


Question 172

Not yet answered
Points out of 1.00
Flag question

Question text

Bluetooth is an example of what type of technology below?
Select one:
a.
Personal Area Network
b.
Limited Area Network
c.
Private Area Network
d.
Small Area Network


Question 173

Not yet answered
Points out of 1.00
Flag question

Question text

How can an area be made secure from a non-secured area via two interlocking doors to a small room?
Select one:
a.
Using a pit
b.
Using a mantrap
c.
Using a closet
d.
Using a lockout



Question 174

Not yet answered
Points out of 1.00
Flag question

Question text

An administrator needs to examine FTP commands that are being passed to a server. What port should the administrator be monitoring?
Select one:
a.
22
b.
21
c.
19
d.
20


Question 175

Not yet answered
Points out of 1.00
Flag question

Question text

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?
Select one:
a.
phreaking
b.
social engineering
c.
reverse engineering
d.
hacking


Question 176

Not yet answered
Points out of 1.00
Flag question

Question text

What is the U.S. federal government standard for digital signatures?
Select one:
a.
Digital Signature Algorithm
b.
Data Encryption Standard
c.
Advanced Encryption Standard
d.
Elliptic Curve Cryptography


Question 177

Not yet answered
Points out of 1.00
Flag question

Question text

An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point?
Select one:
a.
sanctioned
b.
rogue
c.
legitimate
d.
random


Question 178

Not yet answered
Points out of 1.00
Flag question

Question text

Select below the type of cluster where standby server exists only to take over for another server in the event of its failure.
Select one:
a.
symmetric network
b.
asymmetric server
c.
symmetric server
d.
asymmetric network


Question 179

Not yet answered
Points out of 1.00
Flag question

Question text

What cryptographic transport algorithm is considered to be significantly more secure than SSL?
Select one:
a.
AES
b.
ESSL
c.
HTTPS
d.
TLS


Question 180

Not yet answered
Points out of 1.00
Flag question

Question text

A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as which of the following?
Select one:
a.
mandatory splitting
b.
separation of duties
c.
role reversal
d.
process sharing


Question 181

Not yet answered
Points out of 1.00
Flag question

Question text

What is the name for an image that consists of an evidence-grade backup because its accuracy meets evidence standards?
Select one:
a.
mirror image
b.
baseline
c.
thin image
d.
logical image


Question 182

Not yet answered
Points out of 1.00
Flag question

Question text

An administrator needs to view packets and decode and analyze their contents. What type of application should the administrator use?
Select one:
a.
protocol analyzer
b.
application analyzer
c.
threat profiler
d.
system analyzer


Question 183

Not yet answered
Points out of 1.00
Flag question

Question text

The exchange of information among DNS servers regarding configured zones is known as:
Select one:
a.
zone transfer
b.
zone sharing
c.
zone removal
d.
resource request


Question 184

Not yet answered
Points out of 1.00
Flag question

Question text

An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?
Select one:
a.
Load balancing
b.
stateful packet filtering
c.
proxy servers
d.
failover servers


Question 185

Not yet answered
Points out of 1.00
Flag question

Question text

What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
Select one:
a.
forward proxy server
b.
telnet server
c.
DNS server
d.
VPN server


Question 186

Not yet answered
Points out of 1.00
Flag question

Question text

Select the option that represents a wearable technology.
Select one:
a.
Google Glass
b.
Android
c.
iPhone
d.
Google Chromebook


Question 187

Not yet answered
Points out of 1.00
Flag question

Question text

In information security, what can constitute a loss?
Select one:
a.
theft of information
b.
a delay in transmitting information that results in a financial penalty
c.
the loss of good will or a reputation
d.
all of the above


Question 188

Not yet answered
Points out of 1.00
Flag question

Question text

Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:
Select one:
a.
cable lock
b.
shield lock
c.
U-lock
d.
safe lock


Question 189

Not yet answered
Points out of 1.00
Flag question

Question text

Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.
Select one:
a.
web-based
b.
netbook
c.
notebook
d.
tablet


Question 190

Not yet answered
Points out of 1.00
Flag question

Question text

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income, what type of attack are they using?
Select one:
a.
URL hijacking
b.
Web squatting
c.
typo hijacking
d.
spoofing


Question 191

Answer saved
Points out of 1.00
Flag question

Question text

What is the maximum range of most Bluetooth 5 devices?
Select one:
a.
800 ft
b.
60 meters
c.
150 meters
d.
200 ft


Question 192

Not yet answered
Points out of 1.00
Flag question

Question text

What specific ways can a session token be transmitted? (Choose all that apply.)
Select one or more:
a.
In the header of the HTTP requisition.
b.
In the trailer of a frame.
c.
In the URL.
d.
In the header of a packet.



Question 193

Not yet answered
Points out of 1.00
Flag question

Question text

Select the secure alternative to the telnet protocol:
Select one:
a.
SSH
b.
IPsec
c.
HTTPS
d.
TLS


Question 194

Not yet answered
Points out of 1.00
Flag question

Question text

How can an administrator keep devices powered when power is interrupted?
Select one:
a.
uninterruptible power supply
b.
redundant power supply
c.
replica power supply
d.
uninterruptible system supply


Question 195

Not yet answered
Points out of 1.00
Flag question

Question text

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
Select one:
a.
watering hole
b.
adware
c.
typo Squatting
d.
spam


Question 196

Not yet answered
Points out of 1.00
Flag question

Question text

A written document that states how an organization plans to protect the company's information technology assets is a:
Select one:
a.
standard
b.
security procedure
c.
guideline
d.
security policy


Question 197

Not yet answered
Points out of 1.00
Flag question

Question text

What technology uses a chip on the motherboard of the computer to provide cryptographic services?
Select one:
a.
TPM
b.
HSM
c.
FDE
d.
SEDs


Question 198

Not yet answered
Points out of 1.00
Flag question

Question text

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
Select one:
a.
lock
b.
loop
c.
substitution
d.
shift


Question 199

Not yet answered
Points out of 1.00
Flag question

Question text

Authentication for WPA Personal is accomplished by using what type of key?
Select one:
a.
MIC
b.
IV
c.
PSK
d.
TKIP


Question 200

Not yet answered
Points out of 1.00
Flag question

Question text

What security standard was introduced in conjunction with UEFI?
Select one:
a.
Unified Boot
b.
Firmware Interface
c.
BIOS
d.
Secure Boot











Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh