SCOO certification quiz for security plus test test and retest
Contact Thawte or Versign and ask about the web page
Contact the web page’s web master
Right click on the lock at the bottom of the browser and check the certificate information
Ensure that the web URL starts with ‘https://’
Rate this question:
Pop-up blocker
Anti-spyware
Local firewall
Password expiration
Rate this question:
Hot site
Reciprocal agreement
Warm site
Cold site
Rate this question:
RADIUS because it encrypts client-server passwords
TACACS because it encrypts client-server negotiation dialogs
TACACS because it is a remote access authentication service
RADIUS because it is a remote access authentication service
Rate this question:
An intranet
The Internet
A network interface card
A modem
Rate this question:
Uses weak encryption
Communications are open and unprotected
Communications are a drain on bandwidth
Has no common protocol
Rate this question:
Single point of failure
Warm site
Proxy server
RAID
Rate this question:
A user in one building logs on to the server in the same building
A user on a metropolitan area network (MAN) accesses a host by entering a username and password pair while not connected to the LAN.
A user on a campus area network (CAN) connects to a server in another building and enters a username and password pair.
A user in one city logs onto a network in another city
Rate this question:
Trojan Horse
Repudiation Attack
Polymorphic Virus
Phage Virus
Rate this question:
Viruses
Spam
Adware
Spyware
Rate this question:
Offsite storage
Alternate sites
Fault tolerant systems
Disaster recovery plan
Rate this question:
By using software to recover deleted files
By reviewing the written procedure
By restoring part of the backup
By conducting another backup
Rate this question:
A third party mail relay limits access to specific users
Spammers can utilize the third party mail relay
A third party mail relay restricts spammers from gaining access
A third party mail relay restricts the types of email that may be sent
Rate this question:
S/MIME expedites the delivery of email messages
S/MIME allows users to send both encrypted an digitally signed email messages
S/MIME allows users to send email messages with a return receipt
S/MIME allows users to send anonymous email messages
Rate this question:
Remote authentication
Remote access policy
Virtual Private Networking (VPN)
Terminal access control
Rate this question:
PPP (Point-to-Point Protocol)
SLIP (Serial Line Internet Protocol)
L2TP (Layer Two Tunneling Protocol)
SMTP (Simple Mail Transfer Protocol
PPTP (Point-to-Point Tunneling Protocol)
Rate this question:
The administrator account was not secured
X.400 connectors have not been password protected
Anonymous relays have not been disabled
Remote access to the email application’s install directory has not been removed
Rate this question:
Web proxy
Trojan horse programs
Man in the middle attacks
Open relays
Rate this question:
Install an ACL on the firewall to block traffic from the sender and filter the IP address
Configure rules on the users host and restart the host
Install an anti-spam filter on the domain mail servers and filter the email address
Configure a rule in each users router and restart the router
Rate this question:
Sandbox
Honey pot
VLAN
Quarantine
Rate this question:
SSL
Access Control List (ACL)
Media Access Control (MAC)
TCP
Rate this question:
Recovery key
Public key
Keylogger
Session key
Rate this question:
Automatic updates
Signed applets
Nested loops
Input validation
Rate this question:
Data leakage
Cookies
Multiple streams
Licensing
Rate this question:
Spam
Brute force
Buffer overflow
Birthday
Rate this question:
Uninterruptible Power Supply (UPS)
RAID 5 drive array
Redundant ISP
Redundant servers
Rate this question:
The authentication information is a keyed hash based on all of the bytes in the packet.
The authentication information hash will remain the same if the bytes change on transfer
The authentication information may be the same on different packets if the integrity remains in place
The authentication information hash will increase by one if the bytes remain the same on transfer
Rate this question:
Security Tokens
Certificates
Kerberos
CHAP
Rate this question:
Application
Transport
Session
Network
Rate this question:
Block all Domain Name Service (DNS) requests coming into the server.
Apply the most recent manufacturer updates and patches to the server
Enable auditing on the web server and periodically review the audit logs.
Use packet sniffing software on all inbound communications
Rate this question:
Uninterruptible Power Supply (UPS) battery, UPS line conditioner, backup generator
UPS line conditioner, UPS battery, and backup generator
Backup generator, UPS line conditioner, UPS battery
Backup generator, UPS battery, UPS line conditioner
Rate this question:
PPTP
L2TP
PPPoE
IPSec
Rate this question:
Input validation
NIPS
Security template
HIDS
RADIUS (Remote Authentication Dial-In User Service)
SLIP (Serial Line Internet Protocol)
PPP (Point to Point Protocol)
VPN
Rate this question:
DNS
Web
FTP
Rate this question:
Tracking cookie
Persistent cookie
Web bug
Session cookie
Rate this question:
Delta
Full
Differential
Incremental
Rate this question:
3389
8080
636
53
Rate this question:
DNS
SOCKS
NAT
Private addressing
Rate this question:
Change the user’s subnet mask
Open the port on the user’s personal software firewall
Open the port on the company’s firewall
Open the port on the VLAN
Rate this question:
At the stage when the connection is established and when the connection is disconnected
At the stage when the connection is established and at which ever time after the connection has been established
At the stage when the connection is established
At the stage when the connection is disconnected
Rate this question:
110
143
194
3389
49
Rate this question:
RADIUS because it encrypts client-server passwords
TACACS because it encrypt client-server negotiation dialogs
TACACS because it is a remote access authentication service
RADIUS because it is a remote access authentication service
Rate this question:
Makes use of a port used specifically for messages to be sent through
Detect the viruses in the messages received from various sources and send warnings to the recipient to warn him/her of the risky mail
Forms a platform on which messages are sent
Notify you that a message carries a virus
Rate this question:
A user must trust the public key that is received
Weak encryption can be easily broken
Private keys can be compromised
It is subject to a man-in-the-middle attack
Rate this question:
Port 443 outbound
Port 80 inbound
Port 80 outbound
Port 443 inbound
Rate this question:
Diffie-Hellman
RSA
IKE
Blowfish
Rate this question:
Port 49
Port 161
Port 21
Port 53
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.