SCOO certifiaction quiz for security plus test test and test some more
John the Ripper
Nessus
AirSnort
Wireshark
Rate this question:
Determine the business impact
Notify management
Contact law enforcement officials
Contain the problem
Rate this question:
VLAN
Honeynet
DMZ
Honeypot
Rate this question:
Honeypot
Protocol analyzer
HIDS
Content filter
Rate this question:
Apply a security patch from the vendor
Repeat the vulnerability scan
Update the antivirus definition file
Perform a penetration test
Rate this question:
Implementing a host based intrusion prevention system
Changing file level audit settings
Changing the user rights and security groups
Implementing a host based instruction detection system
Rate this question:
To assist with PKI implementation
To assist with protocol analyzing
To identify remove access policies
To identify open ports on a system
Rate this question:
Protocol analyzer
Password cracker
Vulnerability scanner
Port scanner
Rate this question:
The performance logs
The firewall logs
The DNS logs
The access logs
Rate this question:
AV server logs
Firewall logs
HIDS logs
Proxy logs
Rate this question:
Antivirus logs
DNS logs
Intrusion detection logs
Firewall logs
Rate this question:
CD-R
USB drive
Tape
Hard disk
Rate this question:
Half-duplex
Full-duplex
Auto
Promiscuous
Rate this question:
Application
Security
System
Performance
Rate this question:
Enterprise key management software
Enterprise antivirus software
Enterprise performance monitoring software
Enterprise resource planning software
Rate this question:
A vulnerability scan
A penetration test
A port scanner
A protocol analyzer
Rate this question:
Deny administrators all access to log files to prevent write failures
Copy or save the logs to a remote log server
Change security settings to avoid corruption
Log all failed and successful login attempts
Rate this question:
Firewall
Password cracker
Port scanner
Protocol analyzer
Rate this question:
DMZ
Honeynet
Honeypot
VLAN
Rate this question:
Simulating an actual attack on a network
Establishing a security baseline
Detecting active intrusions
Hacking into a network for malicious reasons
Rate this question:
Stop generating audit records
Overwrite the oldest audit records
Log off the user
Send an alert to the appropriate personnel
Rate this question:
Nessus
Cain _Abel
WireShark
John the Ripper
Rate this question:
TCP connect scan
TCP (Transmission Control Protocol) SYN (Synchronize) scan
TCP null scan
TCP fin scan
Rate this question:
Performance
Firewall
Mobile device
Transaction
Rate this question:
Nessus
AirSnort
John the Ripper
Cain _Abel
Rate this question:
Allow administrators a chance to observe an attack
Trap attackers in a false network
Provide an unauthorized u ser with a place to safely work
Give an unauthorized user time to complete an attack
Rate this question:
Many malformed or fragmented packets
Passive sniffing of local network traffic
Disabled network interface on a server
Decryption of encrypted network traffic
Rate this question:
Auditing every system event
Reviewing event logs regularly
Deciding what events to audit
Enabling auditing on the system
Rate this question:
Vulnerability assessment
Fingerprinting
Malware scan
Baselining
Rate this question:
Temporary Internet files
CPU performance
NIC performance
System files
Rate this question:
Run a port scan
Run a sniffer
Perform a vulnerability assessment
Install and monitor an IDS
Rate this question:
The files
The system’s memory
None of the above
The operating system
Rate this question:
A ping scanner
A share scanner
A port scanner
A map scanner
Rate this question:
NIDS
RADIUS
HIDS
OVAL
Rate this question:
Use a protocol analyzer to find the cause of the traffic
Check msconfig Start options to see what is running during startup
Install malware scanning software
Run performance monitor to evaluate the CPU usage
Rate this question:
Conducted from outside the organization’s security perimeter
Conducted from outside the building that hosts the organization’s servers
Conducted from outside the perimeter switch but inside the order router
Conducted from outside the perimeter switch but inside the firewall
Rate this question:
John the Ripper
Nessus
Cain _Abel
WireShark
Rate this question:
Implement session termination mechanism
Implement two-factor authentication
Implement session lock mechanism
Implement previous logon notification
Rate this question:
32 ports
16,777,216 ports
65,535 ports
1,024 ports
Rate this question:
Router ACL
Protocol analyzer
Performance monitor
Network scanner
Rate this question:
Application log
Systems monitor
Security log
Performance baseline
Rate this question:
The fingerprint of the operating system
Computer name
The physical cabling topology of a network
User IDs and passwords
Rate this question:
A complete list of all network vulnerabilities
Handling of information collected by the penetration testing team
A list of acceptable testing techniques and tools to be utilized
IP addresses of machines from which penetration testing will be executed
Rate this question:
A program that can locate and read a password file
A program that provides software registration passwords or keys
A program that performs comparative analysis
A program that obtains privileged access to the system
Rate this question:
Signature-based
Anomaly-based
Heuristic-based
Behavior-based
Rate this question:
The attacking computer’s audit logs
The target computer’s audit logs
The firewall’s logs
The domain controller’s logs
Rate this question:
DNS spoofing
Port scanning
PING sweep
ARP poisoning
Rate this question:
Signature
Statistical
Behavioral
Anomaly
Rate this question:
Quiz Review Timeline (Updated): Mar 15, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.