You are on page 1of 14

Question 1

Not yet answered Marked out of 1.00 Flag question

Question text
Sara, an IT administrator, wants to protect a cluster of ser ers in a !M" from #ero day attacks. $%ic% of t%e following would pro ide t%e &'ST le el of protection( Select one) a. *nti irus +. *,c. NI!S d. NI.S

Question 2
Not yet answered Marked out of 1.00 Flag question

Question text
/////////////////// are used to monitor a network for suspect acti ity. Select one) a. Internet detection system +. Intrusion detection system c. Internet deterrent system d. Intrusion deterrent system

Question 3
Not yet answered Marked out of 1.00 Flag question

Question text
T%is type of irus c%anges form in order to a oid detection Select one) a. .olymorp%ic

+. Multipartite c. 0etro irus d. *rmored

Question 4
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following descri+es common concerns w%en implementing I.S( Select one) a. False negati es will disrupt network t%roug%put +. Security alerts will +e minimal until adequate traffic is collected c. -egitimate traffic will +e incorrectly +locked d. Incompati+ilities wit% e1isting routers will result in a !oS

Question 5
Not yet answered Marked out of 1.00 Flag question

Question text
$%ile conducting a network audit, Sara, a security administrator, disco ers t%at most clients are routing t%eir network traffic t%roug% a desktop client instead of t%e company router. $%ic% of t%e following is t%is attack type( Select one) a. !NS poisoning +. Session %i2acking c. .%arming attack d. *0. poisoning

Question 6
Not yet answered Marked out of 1.00 Flag question

Question text
* 3 n 4 /////////////////// is a message from t%e analy#er indicating t%at an e ent of interest %as occurred. Select one) a. '5mail +. Sensor c. .age d. *lert

Question 7
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t% efollowing copies all traffic from all ports to a single port and disallows +idirectional traffic on t%at port( Select one) a. .ort spanning +. *malgamation c. Straddling d. Socket +lending

Question 8
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% met%od of attack against a password %appens w%en an attacker tries many different com+inations of alp%anumeric c%aracters until successful( Select one) a. &rute force +. *lp%anumeric c. !ictionary d. Mat%ematical

Question 9
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following malware types is M6ST likely to e1ecute its payload after 7ane, an employee, %as left t%e company( Select one) a. -ogic +om+ +. $orm c. &otnet d. 0ootkit

Question 10
Not yet answered

Marked out of 1.00 Flag question

Question text
$%ic% of t%e following is an attack w%ere a program or ser ice is placed on a ser er to +ypass normal security procedures( Select one) a. Social 'ngineering +. 0eplay c. !oS d. &ack !oor

Question 11
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following application attacks is identified +y use of t%e 8 S,0I.T 9 tag( Select one) a. !irectory tra ersal +. &uffer o erflow c. :SS d. "ero day

Question 12
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following malware types is M6ST commonly associated wit% command and control( Select one) a. 0ootkits +. &ackdoors c. -ogic +om+s d. &otnets

Question 13
Not yet answered Marked out of 1.00 Flag question

Question text
/////////////////// is a slang term for unwanted commercial e5mail. Select one) a. S.;,' +. IM*. c. S-I. d. S.*M

Question 14
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following is a type of attack t%at occurs w%en an attacker pretends to +e a legitimate client, using information it %as gained from a legitimate client 3like it<s I. address4. Select one) a. 0eplay +. Spoofing c. !oS d. Smurf

Question 15
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following malware types is &'ST descri+ed as protecting itself +y %ooking system processes and %iding its presence( Select one) a. &otnet +. 0ootkit c. -ogic &om+ d. =irus

Question 16
Not yet answered Marked out of 1.00 Flag question

Question text
.ete, a security administrator, %as o+ser ed repeated attempts to +reak into t%e network. $%ic% of t%e following is designed to stop an intrusion on t%e network(

Select one) a. NI!S +. >I!S c. >I.S d. NI.S

Question 17
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following is a passi e met%od of t%reat response( Select one) a. Terminating t%e connection +. -ogging t%e e ent c. ,%anging network configuration d. S%utting down t%e computer

Question 18
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following &'ST allows .ete, a security administrator, to determine t%e type, source, and flags of t%e packet tra ersing a network for trou+les%ooting purposes( Select one) a. Switc%es +. 0outers c. .rotocol analy#ers d. $e+ security gateways

Question 19
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following is 7ane, a security administrator, M6ST likely implementing w%en deleting all t%e unneeded files and modules of a newly installed application( Select one) a. System file cleanup +. .atc% management c. '1ception %andling

d. *pplication %ardening

Question 20
Not yet answered Marked out of 1.00 Flag question

Question text
Sara, an administrator, suspects a denial of ser ice attack on t%e network, +ut does not know w%ere t%e network traffic is coming from or w%at type of traffic it is. $%ic% of t%e following would %elp Sara furt%er assess t%e situation( Select one) a. .ort scanner +. .enetration testing c. >TT. interceptor d. .rotocol analy#er

Question 21
Not yet answered Marked out of 1.00 Flag question

Question text
Matt, a user, finds a flas% dri e in t%e parking lot and decides to see w%at is on it +y using %is company laptop. * few days later Matt reports %is laptop is running slow and is una+le to perform simple tasks. T%e security administrator notices se eral unaut%ori#ed applications %a e +een installed. ,.; usage is unusually %ig%, and a collection of screens%ots of Matts recent acti ity %as +een transmitted o er t%e network .T%is is an e1ample of w%ic% of t%e following( Select one) a. Spyware +. -ogic &om+ c. &ackdoor d. 0ootkit

Question 22
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following protocols is M6ST closely linked wit% SS-( Select one) a. SNM. +. T-S c. FT.

d. I,M.

Question 23
Not yet answered Marked out of 1.00 Flag question

Question text
Sara, a security analyst, suspects t%at a rogue we+ ser er is running on t%e network. $%ic% of t%e following would M6ST likely +e used to identify t%e ser ers I. address( Select one) a. Traceroute +. Telnet c. >oneypot d. .ort scanner

Question 24
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following is an e1ample of a false negati e( Select one) a. T%e I!S does not identify a +uffer o erflow +. *nti5 irus protection interferes wit% t%e normal operation of an application. c. *nti5 irus identifies a +enign application as malware. d. * user account is locked out after t%e user mistypes t%e password too many times.

Question 25
Not yet answered Marked out of 1.00 Flag question

Question text
* /////////////////// is a system designed to fool attackers into t%inking a system is unsecured so t%ey will attack it. T%en t%e ? ictim@ will learn t%eir attack met%ods wit%out compromising a li e system. Select one) a. 6pen !oor +. >oney .ot c. 'nticenet d. &lack %ole

Question 26
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following de ices can Sara, an administrator, implement to detect and stop known attacks( Select one) a. Signature5+ased NI.S +. Signature5+ased NI!S c. *nomaly5+ased NI.S d. *nomaly5+ased NI!S

Question 27
Not yet answered Marked out of 1.00 Flag question

Question text
Software running on #om+ie computers is often known as a /// Select one) a. &otnet +. !!oS c. 0etro irus d. Modification attack

Question 28
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following utili#es t%e ',>6 function of Internet ,ontrol Message .rotocol 3I,M.4 to o erw%elm a ictims system( Select one) a. Smurf attack +. Man5in5t%e5middle c. $%aling d. -ogic +om+

Question 29
Not yet answered Marked out of 1.00

Flag question

Question text
$%ic% of t%e following is responsi+le for masking t%e acti ity of an on5going attack from t%e administrators operating system monitoring tools( Select one) a. &otnet +. 0ootkit c. Spyware d. Tro2an

Question 30
Not yet answered Marked out of 1.00 Flag question

Question text
T%is type of malware is capa+le of reproducing itself. Select one) a. Macro irus +. Spam c. $orm d. -ogic &om+

Question 31
Not yet answered Marked out of 1.00 Flag question

Question text
7ane, a user, %as reported an increase in email p%is%ing attempts. $%ic% of t%e following can +e implemented to mitigate t%e attacks( Select one) a. *nti5adware +. *nti5spam c. *nti5 irus d. *nti5spyware

Question 32
Not yet answered Marked out of 1.00 Flag question

Question text
In order to run ?sniffer@ software properly, t%e NI, in t%e computer running t%e software must +e set to) Select one) a. -ink Mode +. 10A100 Mode c. .romiscuous Mode d. 't%ernet listening mode

Question 33
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following would Sara, a security administrator, implement to di ert and analy#e attacks( Select one) a. .ort scanner +. >oneypot c. .rotocol analy#er d. !M"

Question 34
Not yet answered Marked out of 1.00 Flag question

Question text
T%e corporate NI.S requires a daily download from its endor wit% updated definitions in order to +lock t%e latest attacks. $%ic% of t%e following descri+es %ow t%e NI.S is functioning( Select one) a. &e%a ior +ased +. Signature +ased c. *nomaly +ased d. >euristics

Question 35
Not yet answered Marked out of 1.00 Flag question

Question text
Bou are t%e administrator of t%e sy+e1.com we+site. Bou are working w%en suddenly we+ ser er and network utili#ation spikes to 100C and stays t%ere for se eral minutes and users start reporting ?Ser er

not a aila+le@ errors. Bou may %a e +een t%e ictim of w%at kind of attack( Select one) a. =irus +. 0eplay *ttack c. !oS d. Man in t%e Middle

Question 36
Not yet answered Marked out of 1.00 Flag question

Question text
7ane, an attacker, compromises a payroll system and replaces a commonly e1ecuted application wit% a modified ersion w%ic% appears to run as normal +ut also e1ecutes additional functions. $%ic% of t%e following would &'ST descri+e t%e slig%tly modified application( Select one) a. Tro2an +. *dware c. 0ootkit d. Spyware

Question 37
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following descri+es t%e process of remo ing unnecessary accounts and ser ices from an application to reduce risk e1posure( Select one) a. *pplication patc% management +. *pplication %ardening c. 'rror and e1ception %andling d. ,ross5site script pre ention

Question 38
Not yet answered Marked out of 1.00 Flag question

Question text
$%ic% of t%e following attacks is manifested as an em+edded >TM- image o+2ect or 7a aScript image tag in an email( Select one)

a. ,ross5site scripting +. '1ception %andling c. *dware d. ,ross5site forgery

Question 39
Not yet answered Marked out of 1.00 Flag question

Question text
T%is type of irus is most common in $ord and '1cel documents. Select one) a. Macro +. .olymorp%ic c. Stealt% d. Multipartite

Question 40
Not yet answered Marked out of 1.00 Flag question

Question text
Sockets are a com+ination of t%e I. address and w%ic% of t%e following( Select one) a. .ort +. NI, settings c. M*, address d. Net&I6S I! Skip Dui# na igation

Quiz navigation
Duestion 1 T%is page Duestion E T%is page Duestion F T%is page Duestion G T%is page Duestion H T%is page Duestion I T%is page Duestion J T%is page Duestion K T%is page Duestion L T%is page Duestion 10 T%is page Duestion 11 T%is page Duestion 1E T%is page Duestion 1F T%is page Duestion 1G T%is page Duestion 1H T%is page Duestion 1I T%is page Duestion 1J T%is page Duestion 1K T%is page Duestion 1L T%is page Duestion E0 T%is page Duestion E1 T%is page Duestion EE T%is page Duestion EF T%is page Duestion EG T%is page Duestion EH T%is page Duestion EI T%is page Duestion EJ T%is page Duestion EK T%is page Duestion EL T%is page Duestion F0 T%is page Duestion F1 T%is page Duestion FE T%is page Duestion FF T%is page Duestion FG T%is page Duestion FH T%is page Duestion FI T%is page Duestion FJ T%is page Duestion FK T%is page Duestion FL T%is page Duestion G0 T%is page Finis% attempt ... Time left 0)HF)F0

You might also like