What is an SSO system?

What is an SSO system? a. Single sign-on b. Single secure opening c. Secure signal operation d. Single secure operation Answer: a. Single...

Alan is a security administrator responsible for the protection of his company's Web site. He's particularly worried about the potential that malicious individuals might conduct a defacement attack and replace text somewhere on his site with information that might damage his company's reputation. What tool can best assist Alan in the detection of defacement attack?

Alan is a security administrator responsible for the protection of his company's Web site. He's particularly worried about the potential that malicious...

What is a Windows domain?

What is a Windows domain? a. Trusted computers with exclusive user lists b. A logical grouping of directory objects that can share security information c....

What is a control?

What is a control? a. A physical device that authenticates users b. Any software that limits access to an object c. A policy that provides information...

What resources do operating systems manage?

What resources do operating systems manage? a. Encryption keys, storage devices, and network software b. Primary and secondary storage, software...

Which of the following statements are true?

Which of the following statements are true? a. Only hardware firewalls are capable of performing stateful inspection. b. Only software firewalls...

John is the security administrator for a network that has exclusive use of the 129.83.0.0 IP address range. The network is connected to a trusted network in another city that uses the 129.84.0.0 address range. He would like to configure egress filtering on his network. Which one of the following rules achieves that goal?

John is the security administrator for a network that has exclusive use of the 129.83.0.0 IP address range. The network is connected to a trusted network...

What is evidence?

What is evidence? a. Any hardware, software, or data that can be used to verify the identity or activity of an attacker b. Any hardware, software,...

What is malicious code?

What is malicious code? a. Executable code that contains hidden entry points for developers to use to bypass access controls b. Any program, procedure,...

What is a system compromise?

What is a system compromise? a. Any unauthorized access to a system b. Unauthorized access to a system that results in data modification c. Unauthorized...

What is a scanning incident?

What is a scanning incident? a. Systematically searching a computer system for installed software b. Systematically dialing telephone numbers to...

What is an incident?

What is an incident? a. Any violation of the security policy b. Any violation of a law or regulation that involves a computer c. Any attack that...

What is a computer crime?

What is a computer crime? a. Any violation of the security policy b. Any attack that results in losses exceeding $5,000 c. Any attack that involves...

What are the main goals of an attacker?

What are the main goals of an attacker? a. To bring about data confidentiality, integrity, and availability b. To bring about data disclosure, integrity,...

What is an attack?

What is an attack? a. An attempt to damage information system hardware b. An attempt to gain unauthorized access to a system or to deny authorized...

Which of the following is a default-deny rule?

Which of the following is a default-deny rule? A. TCP ANY ANY ANY ANY Deny B. TCP 192.168.42.0/24 ANY ANY ANY Deny C. TCP ANY 192.168.42.0/24 ANY...

The purpose of a security checklist is:

The purpose of a security checklist is: A. To keep an inventory of equipment in the event of a disaster B. To create a shopping list for replacement...

What is the only protection against data loss?

What is the only protection against data loss? A. Integrity checking B. Encryption C. Traffic filtering D. Backup and recovery E. Auditing ...

What is a primary benefit of system hardening?

What is a primary benefit of system hardening? A. It reduces user performance. B. It increases network throughput. C. It decreases the attack surface. D....

What is involved in key escrow?

What is involved in key escrow? Answer: The key is split in two halves, then encrypted by a third part...

Which of the following best describes TPM?

Which of the following best describes TPM? a. An asymmetric key b. Uses a 16-bit key c. An advanced algorithm d. A chip on a motherboard Answer: d....

OTPs were originally used by whom?

OTPs were originally used by whom? Answer: Resistance groups and operation teams during World War I...

How does SHA-1 differ from the MD4 algorithm?

How does SHA-1 differ from the MD4 algorithm? Answer: MD4 creates a digest length of 128 bit whereas SHA-1's digest length is 160 bit...

An organization has a legacy server within the DMZ. It is running older software that is not compatible with current patches, so it remains unpatched. Management accepts the risk on this system, but wants to know if attackers can access the internal network if they successfully compromise this server. Which of the following is the MOST appropriate test?

An organization has a legacy server within the DMZ. It is running older software that is not compatible with current patches, so it remains unpatched....

Your organization develops web application software, which it sells to other companies for commercial use. Your organization wants to ensure that the software isn't susceptible to common vulnerabilities, such as buffer overflow attacks and race conditions. What should the organization implement to ensure software meets this standard?

Your organization develops web application software, which it sells to other companies for commercial use. Your organization wants to ensure that the...