Scoo quiz for security plus test test and test some more
To minimize weak encryption
To allow wireless usage
To find rogue access points
To mitigate data emanation
Rate this question:
Grounded wiring frame
TEMPEST
Faraday cage
Mantrap
Rate this question:
DMX
Turnstile
Mantrap
Anti-pass back
Rate this question:
CO2
Halon
Water
Foam
Rate this question:
Uninterruptible Power Supply (UPS)
Cell phone
USB key
Storage drive
Rate this question:
Deluge sprinkler
Hydrogen peroxide
Wet pipe sprinkler
Carbon dioxide
Rate this question:
VPN
VLAN
DMZ
NAT
Rate this question:
Switch
IDS
Hub
Firewall
Rate this question:
Switch
Firewall
Hub
Router
Rate this question:
Data emanation from the core
Refraction of the signal
Crosstalk between the wire pairs
Diffusion of the core light source
Rate this question:
A static NAT uses a one to many mapping
A static NAT uses a many to many mapping
A static NAT uses a many to one mapping
A static NAT uses a one to one mapping
Rate this question:
Demilitarized zone (DMZ)
VLAN
Extranet
Intranet
Rate this question:
Coaxial
UTP
Fiber
STP
Rate this question:
Can be run for a longer distance
Is hard to tap into
Is made of glass rather than copper
Is more difficult o install
Is not susceptible to interference
Rate this question:
Stateful inspection
Packet filters
Application-proxy
Network address translation (NAT)
Rate this question:
Honeypot
Packet sniffer
Anti-virus program
Firewall
Rate this question:
URLs
Content
CRLs
Certificate
Rate this question:
ARP poisoning
MAC flooding
DNS poisoning
DNS spoofing
Rate this question:
Create an in-depth defense
Address internal threats
Keep the solution simple
Use a device as intended
Rate this question:
A static NAT uses a many to one mapping
A static NAT uses a one to one mapping
A static NAT uses a many to many mapping
A static NAT uses a one to many mapping
Rate this question:
Introduce crosstalk
Install a zombie
Remove a vampire tap
Remove a terminator
Rate this question:
Extranet
Scatternet
Intranet
VON
Rate this question:
Filter router
Demilitarized zone (DMZ)
Workstation
IDS
Rate this question:
Buffer overflows
Active content (e.g. Java Applets)
Trojan horse programs
Illicit servers
Rate this question:
MAC addresses can be spoofed and DTP allow only authenticated users
MAC addresses are a secure authentication mechanism and DTP allows rogue network devices to configure ports
MAC addresses can be spoofed and DTP allows rogue network devices to configure ports
MAC addresses are a secure authentication mechanism and DTP allows only authenticated users
Rate this question:
Proxy
ACL
NIDS
HIDS
Rate this question:
Intranet
Demilitarized zone (DMZ)
Extranet
VLAN
Rate this question:
SNMP (Simple Network Management Protocol)
Internet Control Message Protocol (ICMP)
Domain Name Service (DNS)
Network News Transfer Protocol (NNTP)
Rate this question:
TPM
CA
PGP
Digital signature
Rate this question:
802.1x
802.11g
802.11a
802.11n
Rate this question:
Blue jacking
Discovery mode
A smurf attack
Bluesnarfing
Rate this question:
Change the SSID name
Activate the SSID password
Turn off the SSID broadcast
Leave the SSID default
Rate this question:
WPA
WAN
WEP
IPX
Rate this question:
Implement an identification system and WPA2
Implement an authentication system and WEP
Implement a biometric system and WEP
Implement an authentication system and WPA
Rate this question:
Define the encryption protocols used
Protect the client
Secure the WAP
Identify the network
Rate this question:
Password policy enforcement
Group policy implementation
Use of logical tokens
Access control lists
Rate this question:
False acceptance
False negative
False positive
False rejection
Rate this question:
The technician should perform penetration testing on all the virtual servers to monitor performance
The technician should verify that the virtual servers and the host have the latest service packs and patches applied
The technician should verify that the virtual servers are dual homed so that traffic is securely separated
The technician should subnet the network so each virtual server is on a different network segment
Rate this question:
A patch
A service pack
Patch management
Configuration baseline
Rate this question:
Configuration baselines
Limiting administrative privileges
Installing HIDS
Install a software firewall
Rate this question:
System state
Operating system
System files
User date
Rate this question:
A news group or forum
A CD-ROM
An email from the vendor
The manufacturer’s website
Rate this question:
389
443
636
53
Rate this question:
Check the logs regularly
Install only needed software
Report all security incidents
Log on only as the administrator
Rate this question:
Configuration baseline
Security template
Group policy
Patch management
Rate this question:
Service pack
Hotfix
Patch rollup
Patch template
Rate this question:
88
139
23
443
Rate this question:
Are not visible to an IDS
Consume less bandwidth
Sustain attacks that go unnoticed
Provide root level access
Are not typically configured correctly
Rate this question:
Quiz Review Timeline (Updated): Aug 8, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.