SCOO certifiaction quiz for security plus test test and test some more
A ping scanner
A share scanner
A port scanner
A map scanner
Nessus
Cain _Abel
WireShark
John the Ripper
NIPS
Anomaly-based monitoring
Signature-based monitoring
Behavior-based monitoring
Honeypot
Protocol analyzer
HIDS
Content filter
Application
Security
System
Performance
A program that can locate and read a password file
A program that provides software registration passwords or keys
A program that performs comparative analysis
A program that obtains privileged access to the system
Allow administrators a chance to observe an attack
Trap attackers in a false network
Provide an unauthorized u ser with a place to safely work
Give an unauthorized user time to complete an attack
Security
System
Application
DHCP
Behavior
Anomaly
Signature
Protocol
To assist with PKI implementation
To assist with protocol analyzing
To identify remove access policies
To identify open ports on a system
John the Ripper
Nessus
AirSnort
Wireshark
NIDS
RADIUS
HIDS
OVAL
Half-duplex
Full-duplex
Auto
Promiscuous
Vulnerability scanner
Port scanner
Protocol analyzer
Penetration test
AV server logs
Firewall logs
HIDS logs
Proxy logs
DMZ
Honeynet
Honeypot
VLAN
The files
The system’s memory
None of the above
The operating system
Implement session termination mechanism
Implement two-factor authentication
Implement session lock mechanism
Implement previous logon notification
Protocol analyzer
Password cracker
Vulnerability scanner
Port scanner
To detect integrity degradations to network attached storage
To detect availability degradations caused by attackers
To detect host intrusions from external networks
To detect network intrusions from external attackers
NIDS
Antivirus software
HIPS
Personal software firewall
Many malformed or fragmented packets
Passive sniffing of local network traffic
Disabled network interface on a server
Decryption of encrypted network traffic
The information that is needed to reconstruct events
The virtual memory allocated on the log server
The password requirements for user accounts
The amount of disk space required
A vulnerability scan
A penetration test
A port scanner
A protocol analyzer
TCP connect scan
TCP (Transmission Control Protocol) SYN (Synchronize) scan
TCP null scan
TCP fin scan
Wait!
Here's an interesting quiz for you.