This Security+ test covers chapters 2-6, assessing knowledge on security threats like Trojan Horses and viruses, and management of security via patch updates. It evaluates skills in identifying risks in devices and understanding different cybersecurity measures.
Input validation errors
SMTP open relays
Viruses
Logic Bombs
Rate this question:
Trojan
Botnet
Worm
Virus
Rate this question:
Patch Management
Vulnerability Scanning
Baseline Reporting
Penetration Testing
Rate this question:
Man-in-the-middle
SQL injection
Buffer overflow
Session hijacking
Rate this question:
Hotfixes follow a predetermined release schedule while patches do not
Hotfixes are smaller than patches
Hotfixes may be released at anytime and will later be included in a patch
Patches can only be applied after obtaining proper approval, hotfixes do not need management approval.
Rate this question:
Security policies
Patch management
Acceptable use policies
Configuration baselines
Rate this question:
Pop-up blocker
File integrity checker
Anti-spyware
Firewall
Rate this question:
Install manageable, centralized power and cooling system
Server virtualization
Different virtual machines on a local workstation
Centalize all blade servers and chassis within one or two racks
Rate this question:
Eavesdropping
Process hiding
Self-replication
Popup displays
Rate this question:
NIPS
HIDS
Firewall
Honeypot
Rate this question:
Domain name kiting
Removable storage
Input validation
Security templates
Rate this question:
Cookies
Logic bomb
Adware
Spam
Rate this question:
HIDS
Vulnerability scanner
Personal firewall
NIPS
Rate this question:
SQL injection
Redirection attack
Cross-site scripting
Data label challenges
Rate this question:
Software firewall
Hardware firewall
HIDS
NIDS
Rate this question:
Lowered cost of the host machine
Less overhead of software licensing
Streamline systems to a single OS
Fewer systems to monitor physical access
Rate this question:
Cookies
XSS
DOS
Buffer overflow
Rate this question:
Cross-site scripting
XML injection
Buffer overflow
SQL injection
Rate this question:
Encryption protocols
Firewall definitions
Patch management
Virus definitions
Rate this question:
A logic bomb has been installed by the former employee.
A man-in-the-middle attack is taking place
The PCs have downloaded adware
The PCs are being used in a botnet
Rate this question:
SDLM
Error handling
Data formatting
Input validation
Rate this question:
Device encryption
Voice encryption
GPS tracking
Sniffer
Rate this question:
Personal firewall
Complex passwords
Anti-spam software
OS patching
Rate this question:
Spyware
Virus
Rootkit
Spam
Rate this question:
Virus
Trojan
Spam
Adware
Rate this question:
Maintain configuration baseline
Implement OS hardening
Ensure integrity of the patch
Ensure patches are up-to-date
Rate this question:
On the local LAN
On the proxy server
Behind the firewall
In front of the mail relay server
Rate this question:
Increased anomaly detection
Stronger authentication
Stronger encryption
Increased availability
Rate this question:
Increase amount of spam
Input validation on web applications
Possible storage of illegal materials
Tracking cookies on the website
Rate this question:
Quiz Review Timeline (Updated): Apr 3, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.