A post it note with a password kept on sigh in a user’s cubicle is a violation of which policy?
A. Clean Desk Policy
B. Data Labelling Policy
C. User Account Policy
D. Acceptable Use Policy (AUP)
What ensures the privacy of a VPN connection?
A. VPN Connector
B. VPN Concentrator
C. Load Balancer
D. Hardware Firewall
What protocols do not provide authentication?
A. ICMP
B. SSH
C. IPv6
D. HPTT
What port does Lightweight Directory Access Protocol (LDAP) run on?
A. 52
B. 40
C. 389
D. 695
What software tool is used for monitoring and examining contents of the network traffic?
A. Port Scanner
B. Vulnerability Scanner
C. Protocol Analyzer
D. NetworkMiner
What port does DNS run on?
A. 53
B. 230
C. 442
D. 52
What acronym refers to a firewall controlling access to a web server?
A. WAF
B. DNS
C. MoR
D. WAP
What refers to a privacy-related security risk connected with public sharing of pictures taken with smartphones?
A. Weak Passwords
B. Cryptovirology
C. Data Ownership
D. Embedded Geotag
A fraudulent email requesting the recipient to reveal sensitive information such as username and password later used by a hacker for identity theft is known as:
A. Boot Virus
B. Macro Virus
C. File Infector
D. Logic Bomb
E. Phishing
F. Social Engineering
What two factors are considered important for creating strong passwords?
A. Password Age
B. Password History
C. Password Length
D. Password Complexity
What term relates closely to the concept of residual risk?
A. Virtualization
B. Risk Deterrence
C. Firewall Rules
D. Risk Acceptance
Block ciphers work by encrypting each plaintext digit one at a time:
A. True
B. False
What type of system can be compromised through phreaking?
A. ATX
B. Web Server
C. BIOS
D. PBX
Which answers meets the requirement of multi-factor authentication?
A. Password & Biometric Scan
B. Fingerprint Scan
C. Username & Password
D. Identification Badge
What is a security stance whereby a host is being granted/denied permissions based on its actions after it has been provided with the access to the network?
A. Quarantine
B. Network Separation
C. Post-Admission NAC
D. Pre-Admission NAC
A concept of effective security posture employing multiple tools and different techniques to slow down an attacker known as:
A. Access Driving
B. Password Recovery
C. Layered Security
D. Vulnerability Scanning
E. Defense In Depth
What is the practice of using a telephone system to manipulate the user into disclosing confidential information?
A. Pretexting
B. Baiting
C. Vishing
D. Tailgating
E. Whaling
Which answer lists an example method for passive test of security controls?
A. Cross Site Script
B. Vulnerability Scan
C. Key Generator
D. Penetration Test
What is allowing a connection through as firewall known as creating?
A. Tunnel
B. Access Point (AP)
C. Entry
D. Exception
What is the function of archive bit?
A. Generates A Copy Of The File
B. Setting File Attribute To Read-Only
C. Indicates Whether A File Has Been Modified Since Last Backup
D. Search Indexing
What action(s) can be taken by a passive Intrusion Detection System (IDS)?
A. Closing Down Connection
B. Terminating Process
C. Sending An Alert
D. Firewall Reconfiguration
E. Logging
Which answer(s) list the characteristic features of the Mandatory Access Control (MAC) model?
A. Access To Resources Based On User Identity
B. Users Are Not Allowed To Change Access Policies At Their Own Discretion
C. Every Resource Has A Sensitivity Label Matching A Clearance Level Assigned To A User
D. Labels And Clearance Levels Can Only Be Applied And Changed By An Administrator
Copies of lost private encryption keys can be retrieved from a key database by:
A. Backup Operators
B. Recovery Agents
C. Power Users
D. End Users
Which password is the most secure and complex?
A.19$s7@2Rb0y@
B. C65108XjwDE
C. GO1Y7C6DXM
D.k3Qdo3tk66l!
What is the SCP protocol used for?
A. Secure File Transfer
B. Network Addressing
C. Sending Email Messages
D. Directory Access
A path or tool allowing an attacker to gain unauthorized access to a system or network is known as:
A. Rootkit
B. Nmap
C. Threat Vector
D. ClickJack
What is a solution that allows you to make phone calls over a broadband Internet connection instead of typical analog telephone lines?
A. Web Server
B. VoIP
D. DNS
What is an example order of volatility for a typical computer system?
A. Archival Media, Disk Files, Temporary Files, Memory Dump
B. Memory Dump, Disk Files, Temporary Files, Archival Media
C. Temporary Files, Memory Dump, Archival Media, Disk Files
D. Memory Dump, Temporary Files, Disk Files, Archival Media
Which of the following answers apply to a smurf attack?
A. IP Spoofing & DDoS
B. MITM Attack & Vulcanbot
C. Polymorphic Malware & Memory Resident virus
D. Overwrite Virus & Trojan
What functionality allows a DLP system to fulfil its role?
A. Content Inspection
B. Loop Protection
C. Environmental Monitoring
D. Loop Detection
Oops! You need to select an answer to continue.