Scoo quiz for security plus test test and test some more
Coaxial
UTP
Fiber
STP
Rate this question:
A news group or forum
A CD-ROM
An email from the vendor
The manufacturer’s website
Rate this question:
Deluge sprinkler
Hydrogen peroxide
Wet pipe sprinkler
Carbon dioxide
Rate this question:
Filter router
Demilitarized zone (DMZ)
Workstation
IDS
Rate this question:
A static NAT uses a many to one mapping
A static NAT uses a one to one mapping
A static NAT uses a many to many mapping
A static NAT uses a one to many mapping
Rate this question:
Grounded wiring frame
TEMPEST
Faraday cage
Mantrap
Rate this question:
Uninterruptible Power Supply (UPS)
Cell phone
USB key
Storage drive
Rate this question:
WPA
WAN
WEP
IPX
Rate this question:
Define the encryption protocols used
Protect the client
Secure the WAP
Identify the network
Rate this question:
Reformatting
Sanitization
Deleting
Destruction
Rate this question:
Token access
Security badges
Hardware locks
Mantrap
Rate this question:
Honeypot
Packet sniffer
Anti-virus program
Firewall
Rate this question:
Change the SSID name
Activate the SSID password
Turn off the SSID broadcast
Leave the SSID default
Rate this question:
A patch
A service pack
Patch management
Configuration baseline
Rate this question:
Service pack
Hotfix
Patch rollup
Patch template
Rate this question:
Pass phrases
Six digit PINs
Elliptic curve
Fingerprint scanner
Rate this question:
Adding users to the administrator group
Disabling unnecessary services
Removing a user’s access to the user’s data
Applying patches
Configuring the Start menu and Desktop
Rate this question:
Vulnerability assessment
Configuration baseline
Imaging software
Patch management
Rate this question:
Enumerating
Passive detection
Active prevention
Hardening
Rate this question:
Data emanation from the core
Refraction of the signal
Crosstalk between the wire pairs
Diffusion of the core light source
Rate this question:
Can be run for a longer distance
Is hard to tap into
Is made of glass rather than copper
Is more difficult o install
Is not susceptible to interference
Rate this question:
User of logical token
Group policy implementation
Access control lists
password policy enforcement
Rate this question:
DMX
Turnstile
Mantrap
Anti-pass back
Rate this question:
Check the logs regularly
Install only needed software
Report all security incidents
Log on only as the administrator
Rate this question:
CO2
Halon
Water
Foam
Rate this question:
Introduce crosstalk
Install a zombie
Remove a vampire tap
Remove a terminator
Rate this question:
Extranet
Scatternet
Intranet
VON
Rate this question:
Blue jacking
Discovery mode
A smurf attack
Bluesnarfing
Rate this question:
A portion of the malware may have been removed by the IDS
The malware may be running at a more privileged level than the antivirus software
The malware may be using a Trojan to infect the system
The malware may be implementing a proxy server for command and control
Rate this question:
Once each month
If a threat becomes known
When the hardware or software is turned on
When the vendor requires it
Rate this question:
Stateful inspection
Packet filters
Application-proxy
Network address translation (NAT)
Rate this question:
LANMAN
NTLM
NTLMv2
VLAN
Rate this question:
Apply all system patches
Apply all service packs
Install remote control software
Use a strong firewall
Rate this question:
802.1x
802.11g
802.11a
802.11n
Rate this question:
The technician should perform penetration testing on all the virtual servers to monitor performance
The technician should verify that the virtual servers and the host have the latest service packs and patches applied
The technician should verify that the virtual servers are dual homed so that traffic is securely separated
The technician should subnet the network so each virtual server is on a different network segment
Rate this question:
Security Tokens
CHAP
Certificates
Kerberos
Rate this question:
VPN
VLAN
DMZ
NAT
Rate this question:
Configuration baseline
Security template
Group policy
Patch management
Rate this question:
Are not visible to an IDS
Consume less bandwidth
Sustain attacks that go unnoticed
Provide root level access
Are not typically configured correctly
Rate this question:
Intrusion detection
Cloning
Virtualization
Kiting
Rate this question:
Clocks are used to generate the seed value for the encryption keys
Clocks are used to ensure proper connections
Clocks are used to ensure that tickets expire correctly
Clocks are used to both benchmark and specify the optimal encryption algorithm.
Rate this question:
False acceptance
False negative
False positive
False rejection
Rate this question:
Account lockout threshold
Password complexity requirements
Account lockout duration
Key distribution center
Rate this question:
Reformatting
Sanitization
Degaussing
Destruction
Rate this question:
Switch
Firewall
Hub
Router
Rate this question:
Create an in-depth defense
Address internal threats
Keep the solution simple
Use a device as intended
Rate this question:
Use of default passwords
Denial of Service (DoS)
Installation of a back door
Attacker privilege escalation
Rate this question:
URLs
Content
CRLs
Certificate
Rate this question:
Quiz Review Timeline (Updated): Aug 8, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.