What protocols do not provide authentication?
Copies of lost private encryption keys can be retrieved from a key database by:
A. Backup Operators
B. Recovery Agents
C. Power Users
D. End Users
What acronym refers to a firewall controlling access to a web server?
Which password is the most secure and complex?
What is the SCP protocol used for?
A. Secure File Transfer
B. Network Addressing
C. Sending Email Messages
D. Directory Access
What is the function of archive bit?
A. Generates A Copy Of The File
B. Setting File Attribute To Read-Only
C. Indicates Whether A File Has Been Modified Since Last Backup
D. Search Indexing
A fraudulent email requesting the recipient to reveal sensitive information such as username and password later used by a hacker for identity theft is known as:
A. Boot Virus
B. Macro Virus
C. File Infector
D. Logic Bomb
F. Social Engineering
What ensures the privacy of a VPN connection?
A. VPN Connector
B. VPN Concentrator
C. Load Balancer
D. Hardware Firewall
What functionality allows a DLP system to fulfil its role?
A. Content Inspection
B. Loop Protection
C. Environmental Monitoring
D. Loop Detection
What is the name of a storage solution used to retain copies of private encryption keys?
A. Key Generator
B. Key Escrow
C. Key Log
D. Key History
What port does DNS run on?
What port does Lightweight Directory Access Protocol (LDAP) run on?
Which answer lists an example method for passive test of security controls?
A. Cross Site Script
B. Vulnerability Scan
C. Key Generator
D. Penetration Test
A post it note with a password kept on sigh in a user’s cubicle is a violation of which policy?
A. Clean Desk Policy
B. Data Labelling Policy
C. User Account Policy
D. Acceptable Use Policy (AUP)
Which answers meets the requirement of multi-factor authentication?
A. Password & Biometric Scan
B. Fingerprint Scan
C. Username & Password
D. Identification Badge
Which of the following answers apply to a smurf attack?
A. IP Spoofing & DDoS
B. MITM Attack & Vulcanbot
C. Polymorphic Malware & Memory Resident virus
D. Overwrite Virus & Trojan
What two factors are considered important for creating strong passwords?
A. Password Age
B. Password History
C. Password Length
D. Password Complexity
A concept of effective security posture employing multiple tools and different techniques to slow down an attacker known as:
A. Access Driving
B. Password Recovery
C. Layered Security
D. Vulnerability Scanning
E. Defense In Depth
What type of system can be compromised through phreaking?
B. Web Server
What action(s) can be taken by a passive Intrusion Detection System (IDS)?
A. Closing Down Connection
B. Terminating Process
C. Sending An Alert
D. Firewall Reconfiguration
What is the practice of using a telephone system to manipulate the user into disclosing confidential information?
What is allowing a connection through as firewall known as creating?
B. Access Point (AP)
What refers to a privacy-related security risk connected with public sharing of pictures taken with smartphones?
A. Weak Passwords
C. Data Ownership
D. Embedded Geotag
What is a solution that allows you to make phone calls over a broadband Internet connection instead of typical analog telephone lines?
A. Web Server
What is an example order of volatility for a typical computer system?
A. Archival Media, Disk Files, Temporary Files, Memory Dump
B. Memory Dump, Disk Files, Temporary Files, Archival Media
C. Temporary Files, Memory Dump, Archival Media, Disk Files
D. Memory Dump, Temporary Files, Disk Files, Archival Media
Which answer(s) list the characteristic features of the Mandatory Access Control (MAC) model?
A. Access To Resources Based On User Identity
B. Users Are Not Allowed To Change Access Policies At Their Own Discretion
C. Every Resource Has A Sensitivity Label Matching A Clearance Level Assigned To A User
D. Labels And Clearance Levels Can Only Be Applied And Changed By An Administrator
What term relates closely to the concept of residual risk?
B. Risk Deterrence
C. Firewall Rules
D. Risk Acceptance
A path or tool allowing an attacker to gain unauthorized access to a system or network is known as:
C. Threat Vector
What software tool is used for monitoring and examining contents of the network traffic?
A. Port Scanner
B. Vulnerability Scanner
C. Protocol Analyzer
Block ciphers work by encrypting each plaintext digit one at a time:
Oops! You need to select an answer to continue.