Sec+ study test
RAID
Backup generator
Hot site
Redundant servers
Vulnerability assessment
Fingerprinting
Malware scan
Baselining
Are sometimes able to crack both passwords and physical tokens.
Cannot exploit weaknesses in encryption algorithms.
Cannot be run remotely.
Are sometimes able to crack both Windows and UNIX passwords.
Logic bombs cannot be sent through email.
Logic bombs cannot spread from computer to computer.
Logic bombs always contain a Trojan component.
Logic bombs always have a date or time component.
A firewall attempts to detect patterns and a NIDS operates on a rule list.
A firewall operates on a rule list and a NIDS attempts to detect patterns.
A firewall prevents inside attacks and a NIDS prevents outside attacks.
A firewall prevents outside attacks and a NIDS prevents inside attacks.
Shutdown all affected servers until management can be notified.
Visit a search engine and search for a possible patch.
Wait for an automatic update to be pushed out to the server from the manufacturer.
Visit the operating system manufacturers website for a possible patch.
Group policy.
Cookies.
Cross-site scripting.
Corporate hardware firewalls.
Altered hosts file
Network mapper
Packet sniffing
DNS poisoning
Bluesnarfing
Enterprise resource planning software
Enterprise performance monitoring software
Enterprise antivirus software
Enterprise key management software
Antivirus software.
NIDS.
Personal software firewall.
HIPS.
Show that data is being correctly backed up.
Show that PII data is being properly protected.
Show that virus definitions are up to date on all workstations.
Show that unnecessary services are blocked on workstations.
To detect when a user changes security permissions
To prevent a user from changing security permissions
To prevent a user from changing security settings
To detect the encryption algorithm used for files
It is symmetric.
It is a hash value.
It is asymmetric.
It is an elliptical curve.
RSA
Diffie-Hellman
Blowfish
IKE
The client compares the actual DNS name of the server to the DNS name on the certificate.
The client relies on the MD5 value sent by the server.
The client compares the server certificate with the certificate listed on the CRL.
The client relies on the MAC value sent by the server.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.