SCOO certifiaction quiz for security plus test test and test some more
Nessus
Cain _Abel
WireShark
John the Ripper
Rate this question:
NIPS
Anomaly-based monitoring
Signature-based monitoring
Behavior-based monitoring
Rate this question:
Honeypot
Protocol analyzer
HIDS
Content filter
Rate this question:
Application
Security
System
Performance
Rate this question:
A program that can locate and read a password file
A program that provides software registration passwords or keys
A program that performs comparative analysis
A program that obtains privileged access to the system
Rate this question:
Allow administrators a chance to observe an attack
Trap attackers in a false network
Provide an unauthorized u ser with a place to safely work
Give an unauthorized user time to complete an attack
Rate this question:
Security
System
Application
DHCP
Rate this question:
Behavior
Anomaly
Signature
Protocol
Rate this question:
To assist with PKI implementation
To assist with protocol analyzing
To identify remove access policies
To identify open ports on a system
Rate this question:
John the Ripper
Nessus
AirSnort
Wireshark
Rate this question:
NIDS
RADIUS
HIDS
OVAL
Rate this question:
Half-duplex
Full-duplex
Auto
Promiscuous
Rate this question:
Vulnerability scanner
Port scanner
Protocol analyzer
Penetration test
Rate this question:
AV server logs
Firewall logs
HIDS logs
Proxy logs
Rate this question:
DMZ
Honeynet
Honeypot
VLAN
Rate this question:
The files
The system’s memory
None of the above
The operating system
Rate this question:
Implement session termination mechanism
Implement two-factor authentication
Implement session lock mechanism
Implement previous logon notification
Rate this question:
Protocol analyzer
Password cracker
Vulnerability scanner
Port scanner
Rate this question:
To detect integrity degradations to network attached storage
To detect availability degradations caused by attackers
To detect host intrusions from external networks
To detect network intrusions from external attackers
Rate this question:
NIDS
Antivirus software
HIPS
Personal software firewall
Many malformed or fragmented packets
Passive sniffing of local network traffic
Disabled network interface on a server
Decryption of encrypted network traffic
Rate this question:
The information that is needed to reconstruct events
The virtual memory allocated on the log server
The password requirements for user accounts
The amount of disk space required
Rate this question:
A vulnerability scan
A penetration test
A port scanner
A protocol analyzer
Rate this question:
TCP connect scan
TCP (Transmission Control Protocol) SYN (Synchronize) scan
TCP null scan
TCP fin scan
Rate this question:
Using a VPN
Recording to write-once media
An intrusion prevention system (IPS)
A firewall that creates an enclave
Access controls that restrict usage
Rate this question:
Temporary Internet files
CPU performance
NIC performance
System files
Rate this question:
Performance baseline and audit trails
Log storage and backup requirements
Log details and level of verbose logging
Time stamping and integrity of the logs
Rate this question:
Simulating an actual attack on a network
Establishing a security baseline
Detecting active intrusions
Hacking into a network for malicious reasons
Rate this question:
Application log
Systems monitor
Security log
Performance baseline
Rate this question:
Apply a security patch from the vendor
Repeat the vulnerability scan
Update the antivirus definition file
Perform a penetration test
Rate this question:
Determine the business impact
Notify management
Contact law enforcement officials
Contain the problem
Rate this question:
Signature-based
Anomaly-based
Heuristic-based
Behavior-based
Rate this question:
Antivirus logs
DNS logs
Intrusion detection logs
Firewall logs
Rate this question:
Auditing every system event
Reviewing event logs regularly
Deciding what events to audit
Enabling auditing on the system
Rate this question:
Enterprise key management software
Enterprise antivirus software
Enterprise performance monitoring software
Enterprise resource planning software
Rate this question:
The attacking computer’s audit logs
The target computer’s audit logs
The firewall’s logs
The domain controller’s logs
Rate this question:
DNS spoofing
Port scanning
PING sweep
ARP poisoning
Rate this question:
Signature
Statistical
Behavioral
Anomaly
Rate this question:
Implementing a host based intrusion prevention system
Changing file level audit settings
Changing the user rights and security groups
Implementing a host based instruction detection system
Rate this question:
Perform CRC checks
Collect system temporary files
Perform hashing of the log files
Apply retention policies on the log files
Rate this question:
Stop generating audit records
Overwrite the oldest audit records
Log off the user
Send an alert to the appropriate personnel
Rate this question:
Many HIDS are not good at detecting attacks on database servers
Many HIDS only offer a low level of detection granularity
Many HIDS have a negative impact on system performance
Many HIDS are not able to detect network attacks
Rate this question:
CD-R
USB drive
Tape
Hard disk
Rate this question:
Vulnerability assessment
Fingerprinting
Malware scan
Baselining
Rate this question:
Performance
Firewall
Mobile device
Transaction
Rate this question:
Router ACL
Protocol analyzer
Performance monitor
Network scanner
Rate this question:
VLAN
Honeynet
DMZ
Honeypot
Rate this question:
Host-based
Signature-based
Anomaly-based
Behavior-based
Rate this question:
Quiz Review Timeline (Updated): Mar 15, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.