A) A man-in-the-middle attack
B) A brute-force attack
C) A connection-hijacking attackC.A connection-hijacking attack
D) A spoofing attackD.A spoofing attack
Correct Answer
verified
Multiple Choice
A) Layer 1
B) Layer 3
C) Layer 5
D) Layer 7
Correct Answer
verified
Multiple Choice
A) Man-in-the-middle attack
B) Trojan
C) Denial of service
D) Zero-day attack
Correct Answer
verified
Multiple Choice
A) Application layer
B) Network layer
C) Session layer
D) Transport layer
Correct Answer
verified
Multiple Choice
A) Individuals on remote networks will no longer be able to use SSH to control internal network resources.
B) Internal hosts will not be able to ping each other using ICMP.
C) Stateful multi-layer inspection has been enabled.
D) Individuals on remote networks will not be able to use ping to troubleshoot connections.
Correct Answer
verified
Multiple Choice
A) Shutting down network access using the firewall, rather than the network router
B) Adhering to the company policy rather than determining actions based on the IT manager's input
C) Making snap judgments based on emotions, as opposed to company policy
D) Taking too much time to document the attack
Correct Answer
verified
Multiple Choice
A) Authentication databases, including directory servers
B) Intrusion detection systems, especially those placed on sensitive networks
C) Log files on firewall systems
D) Firewall settings for desktop systems
Correct Answer
verified
Multiple Choice
A) Your ISP
B) Firewall logs
C) Router logs
D) Ping
Correct Answer
verified
Multiple Choice
A) It is slow because it requires extensive calculations by the computer.
B) It can lead to the corruption of encrypted data during network transfer.
C) It is reliant on the Secure Sockets Layer (SSL) standard, which has been compromised.
D) It is difficult to transfer any portion of an asymmetric key securely.
Correct Answer
verified
Multiple Choice
A) Determining the number of security associations
B) Negotiating the authentication method
C) Determining the network identification number
D) Negotiating the version of IP to be used
Correct Answer
verified
Multiple Choice
A) MARS
B) RC2
C) Advanced Encryption Standard (AES)
D) International Data Encryption Algorithm (IDEA)
Correct Answer
verified
Multiple Choice
A) Updating the company vulnerability scanner and conducting a new scan
B) Adding a buffer overflow rule to the intrusion detection system
C) Reconfiguring the firewall
D) Installing a system update
Correct Answer
verified
Multiple Choice
A) Auditing the firewall
B) Implementing non-repudiation
C) Logging users
D) Classifying systems
Correct Answer
verified
Multiple Choice
A) An overview of the security policy and suggestions for the next response plan
B) Estimates of how much the attack cost the company, and a list of the applications used by the attacker
C) The time and date of the attack, and the names of employees who were contacted during the response
D) The network resources involved in the attack, and recommendations for thwarting future attacks
Correct Answer
verified
Multiple Choice
A) Encrypting data files
B) Changing login accounts
C) Checking log files
D) Configuring the firewall
Correct Answer
verified
Multiple Choice
A) Creating a VLAN and configuring the intrusion-detection system
B) Issuing alerts and limiting host access
C) Logging traffic and creating a choke point
D) Implementing the security policy and scanning the internal network
Correct Answer
verified
Multiple Choice
A) A dictionary attack and a worm-based attackA.A dictionary attack and a worm-based attack
B) A syn flood attack and a spoofing attackB.A syn flood attack and a spoofing attack
C) A worm attack and a botnet attack C.A worm attack and a botnet attack
D) A SQL injection attack and a virus attackD.A SQL injection attack and a virus attack
Correct Answer
verified
Multiple Choice
A) Authentication
B) Encryption
C) Non-repudiation
D) Data integrity
Correct Answer
verified
Multiple Choice
A) The extra hard disk space required to store the database of checksums
B) The amount of memory remaining now that the checksum-based application is running
C) The possibility of a buffer overflow attack leading to a security breach
D) The security of the checksum database on a read-only media format
Correct Answer
verified
Multiple Choice
A) Configuring network intrusion-detection software to monitor end user activity
B) Conducting a training session at the time of hire
C) Reconfiguring the network firewall
D) Assembling a team of security professionals to monitor the network
Correct Answer
verified
Showing 1 - 20 of 48
Related Exams