Web Server Quiz

15 Questions | Attempts: 201
Please wait...
Question 1 / 16
🏆 Rank #--
Score 0/100

1. An outside auditor has been contracted to determine if weak passwords are being used on the
network. To do this, the auditor is running a password cracker against the master password file. Which of the following is this an example of?

Submit
Please wait...
About This Quiz
Web Server Quiz - Quiz

Sec+ study test

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Multiple web servers are fed from a load balancer. Which of the following is this an example of?

Submit

3. Personal software firewalls can be updated automatically using:

Submit

4. Which of the following is the primary purpose of an audit trail?

Submit

5. All of the following security applications can proactively detect workstation anomalies EXCEPT:

Submit

6. Password crackers:

Submit

7. Which of the following tools would be BEST for monitoring changes to the approved system
baseline?

Submit

8. Which of the following describes the cryptographic algorithm employed by TLS to establish a
session key?

Submit

9. Which of the following describes how TLS protects against man-in-the-middle attacks?

Submit

10. Which of the following describes a characteristic of the session key in an SSL connection?

Submit

11. A vulnerability has recently been identified for a servers OS. Which of the following describes the BEST course of action?

Submit

12. A firewall differs from a NIDS in which of the following ways?

Submit

13. An accountant has logged onto the companys external banking website. An administrator using a TCP/IP monitoring tool discovers that the accountant was actually using a spoofed banking website. Which of the following could have caused this attack? (Select TWO).

Submit

14. Logic bombs differ from worms in that:

Submit

15. A periodic security audit of group policy can:

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
An outside auditor has been contracted to determine if weak passwords...
Multiple web servers are fed from a load balancer. Which of the...
Personal software firewalls can be updated automatically using:
Which of the following is the primary purpose of an audit trail?
All of the following security applications can proactively detect...
Password crackers:
Which of the following tools would be BEST for monitoring changes to...
Which of the following describes the cryptographic algorithm employed...
Which of the following describes how TLS protects against...
Which of the following describes a characteristic of the session key...
A vulnerability has recently been identified for a servers OS. Which...
A firewall differs from a NIDS in which of the following ways?
An accountant has logged onto the companys external banking website....
Logic bombs differ from worms in that:
A periodic security audit of group policy can:
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!