DCOM 258 Mid-Term
DCOM 258 Mid-Term
DCOM 258 Mid-Term
Answers:
A.
Black hat
B.
White hat
C.
Gray hat
D.
Blue hat
Response Feedback:
Question 2
0.77 out of 0.77 points
A system can easily be completely secure.
Selected Answer:
False
True
Answers:
False
Response Feedback:
Question 3
0.77 out of 0.77 points
Which of the following is the greatest risk for removable storage?
Answers:
A.
Confidentiality of data
B.
Availability of data
C.
Integrity of data
D.
Accountability of data
Response Feedback:
Question 4
0.77 out of 0.77 points
1337 is a badge of honor associated with what group of cyber attackers?
Answers:
A.
Green hat hackers
B.
Blue hat hackers
C.
Skript Kiddies
D.
Elite
Question 5
0.77 out of 0.77 points
In information security the three main goals are known as Confidentiality, Integrity, and Availability.
Answers:
True
False
Response Feedback:
Question 6
0.77 out of 0.77 points
The possession of indisputable proof of something users have done and they cannot deny it.
Answers:
A.
Uninhibited
B.
Non-repudiation
C.
Non-contradiction
D.
Non-refudation
Question 7
0.77 out of 0.77 points
When creating a security plan, three categories of controls should be implemented:
Answers:
A.
Particians, Technicians, Administration (PTA).
B.
Physical, Technical, Administrative (PTA).
C.
Practical, Technical, Analytical (PTA).
D.
Parent, Teacher, Association (PTA).
Question 8
0 out of 0.77 points
According to my lecture a hot site, warm site, and cold site could be referenced as a:
Answers:
A.
Barnyard Coop
B.
COOP
C.
Ford Pinto flying in reverse down the highway.
D.
COUP Deville
Question 9
0.77 out of 0.77 points
The protection of data, information, and information systems from unauthorized access and prevention from
unapproved alteration, modification, disruption, or destruction of data is known as:
Selected Answer:
C.
Information Security
Answers:
A.
Information Integrity
B.
Security Compliance
C.
Information Security
D.
Data Procurement
Question 10
0 out of 0.77 points
When a user is permitted to access specific data or areas of a structure?
Answers:
A.
Accounting
B.
Availability
C.
Authentication
D.
Authorization
Question 11
0.77 out of 0.77 points
AAA of Computer Security is an acronym for which of the following: (Choose Three)
Answers:
A.
Authentication
B.
Authorization
C.
Ardvarks
D.
Armadillos
E.
Accounting
F.
Anchovies
Response Feedback:
Question 12
0.77 out of 0.77 points
Tom sends out many emails containing secure information to other companies. What concept should be
implemented to prove that Tom did indeed send the emails?
Answers:
A.
Integrity
B.
Authenticity
C.
Nonrepudiation
D.
Confidentiality
Response Feedback:
Question 13
0.77 out of 0.77 points
The establishment of an individual's identification with proof and confirmation is known as?
Answers:
A.
Accounting
B.
Authentication
C.
Availability
D.
Authorization
Question 14
0.77 out of 0.77 points
What security software protects a computer from various forms of malicious software?
Answers:
A.
Anti-virus
B.
Anti-Malware
C.
Non-Repudiation
D.
Data Removal
Question 15
0 out of 0.77 points
According to my lecture what would the beginer cyber attackers be called?
Answers:
A.
Chris Griffons of hackers
B.
Skript Kiddies
C.
The other guys
D.
Noobies
Question 16
0.77 out of 0.77 points
Encryption, authentication, and antimalware are all ways to protect against malicious threats.
Answers:
True
False
Response Feedback:
Question 17
0.77 out of 0.77 points
A.
Information
B.
Indigestion
C.
Integrity
D.
Insurrection
Response Feedback:
Question 18
0 out of 0.77 points
Social engineering includes viruses, worms, and Trojan horses.
Answers:
True
False
Response Feedback:
Question 19
0 out of 0.77 points
According to my lecture what is an algorithm used to make information unreadable.
Answers:
A.
A Message Digest (MD5) used to verify the integrity of the data.
B.
A mathmatical equation used to create a cypher.
C.
An engineering calculation used to create a cypher.
D.
An algebraic equation used to create a cypher.
Question 20
0.77 out of 0.77 points
Individuals who hack into systems at an organizations request but are not employed by the organization are
known as blue hats.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 21
0 out of 0.77 points
The strongest security plan that applies many of the best practice and/or security methods and combines them
into a single defense strategy is known as:
Answers:
A.
Defense in Depth (DID).
B.
Question 23
0.77 out of 0.77 points
Which of the following does the A in CIA stand for when it comes to IT security? Select the best answer.
Answers:
A.
Availability
B.
Accountability
C.
Auditing
D.
Assessment
Response Feedback:
Question 24
0 out of 0.77 points
A.
Are cyber attackers enlisted by a communist country.
B.
Are cyber attackers who prefer to wear red velvet fedoras.
C.
Are cyber attackers who facilitate attacks specifcially against Red Hat Linux operating systems (OS).
D.
Are cyber attackers who advocate for Red Hat Linux groups.
Question 25
0.77 out of 0.77 points
The tracking of data, computer usage, and network resources.
Answers:
A.
Accounting
B.
Availability
C.
Authorization
D.
Authentication
Question 26
0.77 out of 0.77 points
The possession of indisputable proof of something users have done and they cannot deny it.
Answers:
A.
Uninhibited
B.
Non-contradiction
C.
Non-repudiation
D.
Non-refudation
Question 27
0.77 out of 0.77 points
According to my lecture what is the number one insider threat to an organization's security portfolio?
Answers:
A.
Peter Griffin's crayon.
B.
Compliance
C.
Continuum
D.
Complacency
True
False
Question 2
0.77 out of 0.77 points
Which of the following occurs when an IDS identifies legitimate activity as something malicious?
Selected Answer:
C.
False-positive
Answers:
A.
Misidentification
B.
False-negative
C.
False-positive
D.
Monitoring positive
Response Feedback:
Question 3
0 out of 0.77 points
True
False
Response Feedback:
Question 4
0 out of 0.77 points
True
False
Response Feedback:
Question 5
A high level format would be all that is required to securely remove data from a storaged device, for example a
hard disk drive (HDD) or a USB flash drive?
Selected Answer:
False
Answers:
True
False
Response Feedback:
Question 6
0.385 out of 0.77 points
Which of the following can help to prevent spam? (Select the two best answers.)
Answers:
A.
Run a Trojan scan.
B.
Close open mail relays.
C.
Use a spam filter.
D.
Consider technologies that discouraged spyware.
Question 7
0 out of 0.77 points
Photos, videos, and text messages are just some of the multi media files that store location-specific information
known as:
Answers:
A.
Latitudal and Longitudal oreintation
B.
Geotagging
C.
Global Positioning System (GPS)
D.
Degrees, by minutes and seconds
Response Feedback:
Question 8
0.77 out of 0.77 points
D.
Windows Defender
Answers:
A.
Personal software firewall
B.
Whitelists
C.
Antivirus software
D.
Windows Defender
Question 9
0.77 out of 0.77 points
True
False
Response Feedback:
Question 10
0.77 out of 0.77 points
What are two ways of discouraging bluesnarfing? (Select the two best answers.)
Answers:
A.
Set the device to undiscoverable.
B.
Turn off the device.
C.
Select a difficult-to-guess pairing key.
D.
Use infrared
Response Feedback:
Question 11
0.77 out of 0.77 points
In the event that a mobile device is lost or stolen all data could be remotely deleted bit by bit through a process
called:
Answers:
A.
SIM Clone
B.
Full device encryption
C.
Lockout
D.
Sanatization
Response Feedback:
Question 12
0.77 out of 0.77 points
True
Answers:
True
False
Response Feedback:
Question 13
Malware is software designed to infiltrate a computer system without the users consent.
Selected Answer:
True
Answers:
True
False
Question 14
0.77 out of 0.77 points
False
Answers:
True
False
Response Feedback:
Question 15
0.77 out of 0.77 points
Security features built with in a web browser that have the ability to block external files, scripts, and/or image
from loading are known as:
Selected Answer:
C.
Content Filters
Answers:
A.
Ad Filters
B.
Parental Controls
C.
Content Filters
D.
Pop-up Blockers
Response Feedback:
Question 16
0.77 out of 0.77 points
True
False
Response Feedback:
Question 17
0.77 out of 0.77 points
Which of the following methods of malware delivery is used in computer programs to bypass normal
authentication?
Answers:
A.
Active interception
B.
Privilege escalation
C.
Backdoor
D.
Rootkit
Response Feedback:
Question 18
0.77 out of 0.77 points
Opening mail relays can decrease the amount of spam that an organization receives on its email server.
Answers:
True
False
Response Feedback:
Question 19
0.77 out of 0.77 points
D.
BitLocker
Answers:
A.
Bluesnarfing
B.
AES
C.
Windows Vista Ultimate
D.
BitLocker
Response Feedback:
Question 20
0.77 out of 0.77 points
Which of the following can help to secure the BIOS of a computer? (Select the two best answers.)
Answers:
A.
Use a BIOS supervisor password.
B.
Disable USB ports.
C.
Configure a user password.
D.
Use a case lock.
Question 21
0.77 out of 0.77 points
Which of the following type of virus can change every time it is executed in an attempt to avoid antivirus
detection?
Selected Answer:
B.
Polymorphic
Answers:
A.
Armored
B.
Polymorphic
C.
Macro
D.
Boot sector
Response Feedback:
Question 22
0.77 out of 0.77 points
True
Answers:
True
False
Response Feedback:
Question 23
0.77 out of 0.77 points
C.
Network intrusion detection system
Answers:
A.
Host-based intrusion detection system
B.
Statistical anomaly
C.
Network intrusion detection system
D.
Personal software firewall
Response Feedback:
Question 24
0.77 out of 0.77 points
True
Answers:
True
False
Response Feedback:
Question 26
0 out of 0.77 points
An array of hard drives connected directly to an Ethernet network that utilize between 2 and 32 hard drives is
known as:
Answers:
A.
Network Attached Storage (NAS)
B.
Redundant Array of Inexpensive Drives (Raid) 5
C.
Storage Area Network (SAN)
D.
Redundant Array of Inexpensive Drives (Raid) 0
Response Feedback:
Question 27
0 out of 0.77 points
What password has the ability to block unauthorized access to a computer system at boot up prior to loading the
host operating system?
Answers:
A.
BIOS password
B.
Firmware Password
C.
Whole Disk Encryption Password
D.
Power-on password
A.
Virtualization software
Answers:
A.
Virtualization software
B.
Network-based intrusion detection system
C.
Antivirus software
D.
Host-based intrusion detection system
Response Feedback:
Question 2
0.77 out of 0.77 points
False
True
False
Response Feedback:
Question 3
0 out of 0.77 points
A.
Host Operating System
B.
First instance of the guest Operating System
C.
Previous instance of the guest Operating System
D.
Actual Virtual Operating System
Response Feedback:
Question 4
0.77 out of 0.77 points
Every version of the Microsoft Windows environment uses what executable file to access the Windows Update
access window?
Selected Answer:
B.
WUAPP.EXE
Answers:
A.
SECSET.EXE
B.
WUAPP.EXE
C.
CONFIGMAN.EXE
D.
UPMAN.EXE
Response Feedback:
Question 5
0.77 out of 0.77 points
A service pack is a group of updates, bug fixes, updated drivers, and security fixes.
Selected
Answer:
Tru
e
Answers:
Tru
e
False
Response
Feedback:
Question 6
0 out of 0.77 points
A.
The installation of the Operating System (OS) and Service Pack (SP) at the same time
from the original distribution disc
B.
The installation of the Operating System (OS) and Service Pack (SP) at the same time
from a multicast network imaging process
C.
The installation of the hotfixes and/or patches and from the Operating System (OS)
developer's web site
D.
The installation of the Operating System (OS) and Service Pack (SP) at the same time
from a digital download from the OS developer's web site
Response Feedback:
Question 7
0 out of 0.77 points
To turn off services, you would access the Programs and Features section of the Control Panel.
Selected Answer:
Answers:
True
True
False
Response Feedback:
Question 8
0.77 out of 0.77 points
The systeminfo commands show a list of hot fixes that have been installed to the operating system.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 9
0 out of 0.77 points
A.
If one virtual machine is compromised, none of the other virtual machines can be
compromised.
Answers:
A.
If one virtual machine is compromised, none of the other virtual machines can be
compromised.
B.
If a virtual machine is compromised, the adverse effects can be compartmentalized.
C.
Patching a computer patches all virtual machines running on the computer.
D.
Virtual machines cannot be affected by hacking techniques.
Response Feedback:
Question 10
0 out of 0.77 points
To open the Local Group Policy Editor console window, a user should type MMC in the Run prompt.
Answers:
True
False
Response Feedback:
Question 11
0 out of 0.77 points
True
False
Response Feedback:
Question 12
0.77 out of 0.77 points
The Windows Update program can be accessed by clicking Start > All Programs.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 13
0.77 out of 0.77 points
A.
cmd.exe
B.
sc config
C.
gpedit.msc
D.
systeminfo
Response Feedback:
Question 14
0.77 out of 0.77 points
Which one of the following navigational paths shows the current service pack level to the user?
Answers:
A.
Click Start, right-click Computer, and select Manage.
B.
Click Start, right-click Network, and select Manage.
C.
Click Start, right-click Computer, and select Properties.
D.
Click Start, right-click Network, and select Properties.
Response Feedback:
Question 15
0.77 out of 0.77 points
A.
sc config
B.
net stop
C.
net start
D.
net disable
Response Feedback:
Question 16
0.77 out of 0.77 points
A.
NTFS
B.
FAT32
C.
FAT16
D.
FAT
Response Feedback:
Question 17
0 out of 0.77 points
True
False
Response Feedback:
0.77 points
B.
Access Control List
Answers:
A.
Another Crazy Lunatic
B.
Question 20
0.77 out of 0.77 points
Which of the following should you implement to keep a well-maintained computer? (Select the three best
answers.)
Answers:
A.
Update the firewall.
B.
Update the BIOS.
C.
Remove the unnecessary firewall.
D.
Use a surge protector.
Response Feedback:
Question 21
0.77 out of 0.77 points
What is baselining?
Selected Answer:
B.
The process of measuring changes in networking devices, hardware, and software
Answers:
A.
A type of patch management
B.
The process of measuring changes in networking devices, hardware, and software
C.
The act of securing an operating system and updating it
D.
A group of updates, bug fixes, and security fixes
Response Feedback:
Question 22
0 out of 0.77 points
The key stroke combination of Alt + T performs what function in a Microsoft Windows environment?
Answers:
A.
Swap to another open web browser tab
B.
Accesses the "View" tab
C.
Question 23
0.77 out of 0.77 points
A.
Teacher Over Shoulder
B.
The Original Series
C.
Terms of Service
D.
Trusted Operating System
Response Feedback:
Question 24
0.77 out of 0.77 points
Answers:
True
False
Response Feedback:
Question 25
0.77 out of 0.77 points
Hardening is the act of configuring an OS securely, updating it, and removing unnecessary applications.
Answers:
True
False
Response Feedback:
Question 26
0.77 out of 0.77 points
Which of the following should be done to maintain and harden a hard disk? (Select the two best answers.)
Answers:
A.
Install third-party applications.
B.
Defragment the drive.
C.
Consider a whole disk encryption.
D.
Sanitize the drive.
Response Feedback:
Question 27
0.77 out of 0.77 points
Which of the following are examples of virtualization? (Select the three best answers.)
Answers:
A.
Microsoft Virtual PC
B.
VMware
C.
Microsoft Visio
D.
Microsoft Virtual Server
UAC keeps every user in standard mode instead of in administrator mode by default.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 2
1 out of 1 points
Timothy complains about a lot of pop-up Windows when he uses Internet Explorer. Which key combination
should you tell him to use to close the pop-up Windows?
Selected Answer:
B.
Alt+F4
Answers:
A.
Windows key
B.
Alt+F4
C.
Ctrl+Alt+Del
D.
Ctrl+Shift+Esc
Response Feedback:
Question 3
0 out of 1 points
Which of the following can run on any platform?
Selected Answer:
A.
Sandbox
Answers:
A.
Sandbox
B.
ActiveX controls
C.
Internet Explorer
D.
Java applets
Response Feedback:
Question 4
3 out of 3 points (Extra Credit)
Question 5
1 out of 1 points
The Network tab in Firefox is used to connect to a proxy server.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 6
0 out of 1 points
Which of the following is placed in an application by programmers either knowingly or inadvertently to bypass
normal authentication?
Selected Answer:
D.
Input validation
Answers:
A.
Sandbox
B.
Back door
C.
Virus
D.
Input validation
Question 7
1 out of 1 points
Adblock Plus is an add-on to FireFox used to block third-party advertisement pop-ups.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 8
1 out of 1 points
Which tab in the Internet options dialog box of Internet Explorer enables a person to make secure connections
through a VPN?
Selected Answer:
A.
Connections tab
Answers:
A.
Connections tab
B.
Programs tab
C.
Content tab
D.
Advanced tab
Response Feedback:
Question 9
1 out of 1 points
Your boss wants you to make changes to 20 computers Internet Explorer programs. To do this quickly what is the
best solution?
Selected Answer:
B.
Create and use a template.
Answers:
A.
Use a proxy server.
B.
Create and use a template.
C.
Create an organizational unit.
D.
Create a script.
Response Feedback:
Question 10
1 out of 1 points
To make changes to Internet Explorer policies that correspond to an OU, you need a domain controller.
Selected Answer:
Answers:
True
True
False
Response Feedback:
Question 11
1 out of 1 points
Input validation is a process that ensures the correct usage of data.
Selected Answer:
Answers:
True
True
False
Response Feedback:
Question 12
1 out of 1 points
What is the most common port used when connecting an Internet Explorer browser to a proxy server for use with
HTTP connections?
Selected Answer:
D.
80
Answers:
A.
53
B.
21
C.
443
D.
80
Response Feedback:
Question 13
1 out of 1 points
A proxy server acts as a go-between of a client computers web browser and the web server.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 14
1 out of 1 points
How can Internet Explorer be centrally managed for several computers?
Selected Answer:
A.
By way of a group policy
Answers:
A.
By way of a group policy
B.
By creating an organizational unit
C.
In the Advanced tab of the Internet options dialog box
D.
In the Registry
Response Feedback:
Question 15
1 out of 1 points
Alt+F8 is the key combination that closes pop-up windows.
Selected Answer:
False
True
Answers:
False
Response Feedback:
Question 16
1 out of 1 points
Which of the following should you include as general browser security practices? (Select the two best answers.)
C.
Train your users.
Answers:
D.
Use a proxy server.
A.
Use multiple web browsers.
B.
Use the latest browser.
C.
Train your users.
D.
Use a proxy server.
Response Feedback:
Question 17
1 out of 1 points
To accept fewer cookies, you would add them to the Restricted Sites zone.
Selected Answer:
False
True
Answers:
False
Response Feedback:
Question 18
1 out of 1 points
Of the following, what are three ways to increase the security of Microsoft Outlook? (Select the three best
answers.)
Selected Answers:
A.
Install the latest service pack.
B.
Password protect .PST files.
D.
Increase the junk email security level.
Answers:
A.
Install the latest service pack.
B.
Password protect .PST files.
C.
Set macro security levels.
D.
Increase the junk email security level.
Response Feedback:
Question 19
1 out of 1 points
One way of protecting Microsoft Outlook is to use a password for opening or modifying documents.
Selected Answer:
False
True
Answers:
False
Response Feedback:
Question 20
1 out of 1 points
ActiveX controls can run on any browser platform.
Selected Answer:
Answers:
False
True
False
Response Feedback:
Question 21
1 out of 1 points
James doesn't want people to see where he browsed to on the Internet. What is a good way to clear his Internet
browsing history?
Selected Answer:
A.
Checkmark the Empty Temporary Internet Files Folder When the Browser Is
Closed check box.
Answers:
A.
Checkmark the Empty Temporary Internet Files Folder When the Browser Is
Closed check box.
B.
Use the disk defragmenter.
C.
Clear all cookies in the Advanced Privacy Settings dialog box.
D.
Use cross-site scripting.
False
Answers:
True
False
Response Feedback:
Question 2
1.34 out of 1.34 points
Which of the following ways can help secure a modem? (Select the two best
answers.)
Selected Answers:
A.
A.
C.
Use telnet.
D.
Question 3
1.34 out of 1.34 points
False
True
False
Response Feedback:
Question 4
1.34 out of 1.34 points
Access control lists enable or deny traffic and can be configured to help secure a
router.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 5
1.34 out of 1.34 points
True
Answers:
True
False
Response Feedback:
Question 6
1.34 out of 1.34 points
B.
01023
Answers:
A.
10.0.0.010.255.255.255
B.
01023
C.
102449,151
D.
49,15265,535
Response Feedback:
Question 7
1.34 out of 1.34 points
One way to protect a WAN is to place all the computers behind a router.
Selected Answer:
Answers:
False
True
False
Response Feedback:
Question 8
1.34 out of 1.34 points
True
Answers:
True
False
Response Feedback:
Question 9
1.34 out of 1.34 points
Selected Answer:
C.
SaaS
Answers:
A.
PaaS
B.
IaaS
C.
SaaS
D.
Private cloud
Response Feedback:
Question 10
1.34 out of 1.34 points
Which of the following is used to house FTP servers, mail servers, and web
servers so that people on the Internet can access them, but cannot access any
other of the organizations servers?
Selected Answer:
A.
DMZ
Answers:
A.
DMZ
B.
Intranet
C.
Subnet
D.
VLAN
Response Feedback:
Question 11
1.34 out of 1.34 points
True
False
Response Feedback:
Question 12
1.34 out of 1.34 points
False
True
False
Response Feedback:
Question 13
0 out of 1.34 points
A.
Encryption
B.
8 character passwords
C.
Question 14
3 out of 3 points (Extra Credit)
Question 15
1.34 out of 1.34 points
Network access control sets rules by which network connections are governed.
Selected Answer:
True
Answers:
True
False
Response Feedback:
Question 16
1.34 out of 1.34 points
A MAC flood is when a person accesses a single port of a switch that was not
physically secured.
Selected Answer:
False
Answers:
True
False
True
Answers:
True
False
Response Feedback:
Question 2
3 out of 3 points (Extra Credit)
[None]
Question 3
1.54 out of 1.54 points
B.
A.
Kerberos
D.
Question 4
1.54 out of 1.54 points
To use the Lightweight Directory Access Protocol (LDAP) in a secure fashion, what
port should be used?
Selected Answer:
A.
636
Answers:
A.
636
B.
443
C.
3389
D.
389
Response Feedback:
Question 5
1.54 out of 1.54 points
Selected Answer:
D.
Replay attack
Answers:
A.
Fork bomb
B.
Smurf attack
C.
Teardrop attack
D.
Replay attack
Response Feedback:
Question 6
1.54 out of 1.54 points
False
True
Answers:
False
Response Feedback:
Question 7
0 out of 1.54 points
True
True
Answers:
False
Response Feedback:
Question 8
1.02667 out of 1.54 points
Which of the following are ways to help defend against distributed denial of
service attacks? (Select the three best answers).
Selected Answers:
A.
Update firewalls.
C.
A.
Update firewalls.
B.
Response Feedback:
Question 9
1.54 out of 1.54 points
A.
Sc config
B.
Net stop
D.
Net start
Response Feedback:
Question 10
0 out of 1.54 points
True
False
Response Feedback:
Question 11
1.54 out of 1.54 points
D.
19
Answers:
A.
53
B.
21
C.
D.
19
Response Feedback:
Question 12
1.54 out of 1.54 points
A.
Session hijacking
B.
Null session
C.
DoS
Response Feedback:
Question 13
1.54 out of 1.54 points
Your boss wants you to secure your Web server's transactions. Which protocol
and port number should you use to accomplish this?
Answers:
A.
RDP3389
B.
HTTPS443
C.
LDAP389
D.
POP3110
Response Feedback:
Question 14
1.54 out of 1.54 points
True
Answers:
True
False
Which of the following devices should you use to keep machines behind it anonymous?
(Select the best answer.)
Selected Answer:
A.
IP proxy
Answers:
A.
IP proxy
B.
Firewall
D.
Caching proxy
Response Feedback:
Question 2
1 out of 1 points
Which of the following are examples of protocol analyzers? (Select the two best
answers.)
B.
Wireshark
D.
Network Monitor
Answers:
A.
HTTP proxy
B.
Wireshark
C.
NAT filter
D.
Network Monitor
Response Feedback:
Question 3
1 out of 1 points
B.
Firewall logs
Answers:
A.
Event Viewer
B.
Firewall logs
C.
Performance logs
D.
DNS Logs
Response Feedback:
Question 4
1 out of 1 points
Which of the following can detect malicious packets and discard them?
Selected Answer:
B.
NIPS
Answers:
A.
PAT
B.
NIPS
C.
Proxy server
D.
NIDS
Response Feedback:
Question 5
1 out of 1 points
True
Answers:
True
False
Question 6
1 out of 1 points
True
Answers:
True
False
Response Feedback:
Question 7
1 out of 1 points
A NIDS can inspect traffic and possibly remove, detain, or redirect malicious
traffic.
Selected Answer:
False
Answers:
True
False
Response Feedback:
Question 8
1 out of 1 points
True
False
Response Feedback:
Question 9
1 out of 1 points
False
Answers:
True
False
Response Feedback:
Question 10
1 out of 1 points
True
Answers:
True
False
person searches for wireless networks from their car. What is this an example of?
Selected Answer:
D.
Wardriving
Answers:
A.
Bluejacking
B.
DDoS
C.
Replay attack
D.
Wardriving
Response Feedback:
Question 2
1 out of 1 points
True
Answers:
True
False
Response Feedback:
Question 3
1 out of 1 points
B.
Default account
Answers:
A.
Wireless encryption
B.
Default account
C.
PNAC
D.
NAT firewall
Response Feedback:
Question 4
1 out of 1 points
You find a rogue access point on your network. What should you do with
it? (Select the best answer.)
Selected Answer:
D.
Remove it.
Answers:
A.
Use PNAC.
B.
Remove it.
Response Feedback:
Question 5
1 out of 1 points
RFI is a disturbance that can affect electrical circuits, devices, and cables due to
electromagnetic conduction or radiation.
Selected Answer:
Answers:
False
True
False
Response Feedback:
Question 6
1 out of 1 points
C.
WPA2
Answers:
A.
WAP
B.
WEP
C.
WPA2
D.
WPA
Question 7
1 out of 1 points
False
Answers:
True
False
Response Feedback:
Question 8
1 out of 1 points
C.
MAC filtering.
Answers:
A.
IP spoofing.
C.
MAC filtering.
D.
Remove repeaters.
Response Feedback:
Question 9
1 out of 1 points
One way to secure the administration interface of a WAP is to turn it off when not
in use.
Selected Answer:
False
Answers:
True
False
Response Feedback:
Question 10
1 out of 1 points
A.
Bluesnarfing
Answers:
A.
Bluesnarfing
B.
Bluejacking
C.
The blues
D.
Bluebeard
Response Feedback:
Question 11
1 out of 1 points
A.
Wiretapping
Answers:
A.
Wiretapping
B.
Wardriving
C.
Data emanation
D.
Spectral analyzing
Response Feedback:
Question 12
1 out of 1 points
C.
Privilege escalation
Answers:
A.
Backdoor
B.
Weak password
C.
Privilege escalation
D.
DDoS
Response Feedback:
Question 13
1 out of 1 points
True
Answers:
True
False
Response Feedback:
Question 14
1 out of 1 points
False
True
False
Response Feedback:
Question 15
1 out of 1 points
True
Answers:
True
False
Response Feedback:
Question 16
1 out of 1 points
A.
Coaxial
C.
Twisted-pair
Answers:
A.
Coaxial
B.
Fiber-optic
C.
Twisted-pair
D.
Data emanation
Response Feedback:
Question 17
1 out of 1 points
D.
A.
NAT filtering
C.
Use PNAC
D.
Question 19
1 out of 1 points
True
Answers:
True
False
Response Feedback:
Question 20
1 out of 1 points
False
True
False
Response Feedback:
Question 21
1 out of 1 points
True
Answers:
True
False