The is the URE's from vol 2, edit code 02 which became active after 4 April 2013
Category I.
Category II.
Category III.
Category IV.
Rate this question:
Category I.
Category II.
Category III.
Category IV.
Rate this question:
Category I.
Category II.
Category III.
Category IV.
Rate this question:
One.
Two.
Three.
Four.
Rate this question:
12 hours.
24 hours.
48 hours.
72 hours.
Rate this question:
Firewall.
Proxy server.
Intrusion detection system (IDS) software.
Automated security incident measurement (ASIM).
Rate this question:
Switches.
Firewalls.
Routers.
Servers.
Rate this question:
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
Rate this question:
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
Rate this question:
Deploy one IDS for the entire network.
Deploy IDS on 50 percent of the network segments.
Consider using only a network-based IDS or host-based IDS.
Use a centralized management console for system management.
Rate this question:
Can analyze any encrypted data if it is decrypted before reaching the target host
Consumes resources on the host it resides on and slows that device down.
Monitors log files for inadvisable settings or passwords.
Monitors traffic on the host on which it is installed.
Rate this question:
Can decrypt data
Uses very few network resources
Monitors logs for policy violations.
Can analyze encrypted network traffic.
Rate this question:
Host-based IDS.
Network-based IDS.
Hardware-based IDS.
Application-based IDS.
Rate this question:
Active only.
Passive only.
Passive and active.
Neither passive nor active.
Rate this question:
Entrance point.
Service point.
Protocol.
Port.
Rate this question:
Presentation.
Transport.
Network.
Session.
Rate this question:
File transfer protocol (FTP).
Domain name service (DNS).
Hypertext transfer protocol (HTTP).
Open system interconnection (OSI).
Rate this question:
0–1023.
1024–23535.
23536–49151.
49152–65535.
Rate this question:
7
20
23
53
Rate this question:
21
22
60
80
Rate this question:
Sweep scan.
Vanilla scan.
Fragment packet scan.
File transfer protocol (FTP) bounce scan.
Rate this question:
Fragment packets.
Synchronous (SYN) scan.
User datagram protocol (UDP) scan.
Transmission control protocol (TCP) scan.
Rate this question:
Monitor ports.
Keep ports open.
Keep ports closed.
Ensure all ports are used.
Rate this question:
Maintain the AF PPS database.
Develop AF PPS policies and procedures.
Develop countermeasures on threats associated with PPS traversing the AF enclave boundaries.
Provide information on threats and vulnerabilities associated with PPS traversing the AF enclave boundaries.
Rate this question:
Layer 2.
Layer 3.
Layer 4.
Layer 5.
Rate this question:
Network layer.
Transport layer.
Application layer.
Presentation layer.
Rate this question:
SECURE.
PUBLIC.
PRIVATE.
UNSECURE.
Rate this question:
Keep devices requiring SNMP together with those that do not pass through virtual local area networks (VLAN).
Use access control lists on SNMP agents to accept SNMP messages from all SNMP managers.
Disable all SNMP devices/services if not required.
Enable the set community strings if possible.
Rate this question:
30 days.
60 days.
90 days.
120 days.
Rate this question:
SNMPutil.
SolarWinds.
WU_PingProPack.
Security mapper (SMAP).
Rate this question:
Reporting incidents to security administrators.
Reconfiguring equipment after an incident.
Identifying possible incidents.
Attempting to stop incidents.
Rate this question:
Snort.
Intruder alert (ITA).
Open source security (OSSEC).
Open source security (OSSEC).
Rate this question:
Secret
Sensitive
Confidential
For Official Use Only (FOUO)
Rate this question:
Other scans are cheaper to run.
The increasing costs of using ISS.
It can place patients at risk and interrupt medical services.
It is not compatible with medical equipment software.
Rate this question:
User
Agent
Manager
Administrator
Rate this question:
100
150
200
250
Rate this question:
ITA agent.
ITA event viewer.
ITA administrator
ITA privileged user
Rate this question:
ESM agent.
ESM manager.
ESM administrator.
ESM graphical user interface (GUI) console.
Rate this question:
A mindset.
Configuring firewalls
Activation of host-based intrusion detection system (HIDS).
Activation of network-based intrusion detection system (NIDS).
Rate this question:
Firewalls.
Security tools.
Defense-in-depth.
Information condition (INFOCON).
Rate this question:
IP telephony.
Network telephony.
Voice protection system.
Voice over Internet Protocol (VoIP).
Rate this question:
Enabling access control lists (ACL) on firewalls, routers, and switches.
Deploying protection from dynamic host configuration protocol (DHCP) spoofing.
Consolidating your voice with your data using virtual local area networks (VLAN).
Enabling port security access to only allow the required devices needed by the client.
Rate this question:
2
3
4
5
Rate this question:
Network-level.
Application-level.
Corporate/enterprise.
Personal/small office home office (SOHO).
Rate this question:
4
5
6
7
Rate this question:
Network-level.
Application-level.
Corporate/enterprise.
Personal/small office home office (SOHO).
Rate this question:
Base-level.
Major command (MAJCOM).
Air Force Network Operating Center (AFNOC).
Integrated Network Operation and Security Center (INOSC).
Rate this question:
Control center.
Admin console.
Configuration center.
Command line interface
Rate this question:
Quiz Review Timeline (Updated): Mar 15, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.