Which of the following network filtering devices will rely on signature updates to be effective?

How do you want to study today?

  • Learn

    Focus your studying with a path

  • Match

    Get faster at matching terms

Terms in this set (50)

Which of the following lists the software development phases in the correct order?
A. Development, Staging, Testing, Production
B. Production, Testing, Deployment, Staging
C. Development, Testing, Production, Staging
D. Development, Testing, Staging, Production

Sets with similar terms

Upgrade to remove ads

Only ₩37,125/year

How do you want to study today?

  • Flashcards

    Review terms and definitions

  • Learn

    Focus your studying with a path

  • Test

    Take a practice test

  • Match

    Get faster at matching terms

Terms in this set (57)

The MOST difficult security concern to detect when contractors enter a secured facility is which of the following?

Copying sensitive information with cellular phones

Which layer of the TCP/IP model is equivalent to the Session, Presentation, and Application layers of the OSI model?

...

Implementing screen filters would reduce which of the following risks?

Shoulder surfing

A device is being selected by an administrator to secure an internal network segment from external traffic. Which of the following devices could be selected to provide security to the network segment?

NIPS

If you were setting up an IDS with the desire to detect exploits for unknown or unreleased vulnerabilities which type of IDS would you use?

Anomaly Detection

Which of the following intrusion detection systems uses statistical analysis to detect intrusions?

Anomaly

Which of the following attacks would allow an attacker to capture HTTP requests and send back a spoofed page?

TCPIP hijacking

Which of the following protocols is used to ensure secure transmissions on port 443?

HTTPS

Which of the following is the MOST proficient for encrypting large amounts of data?

Symmetric key algorithms

Which of the following network filtering devices will rely on signature updates to be effective?

NIDS

The MOST secured hashing algorithm is which of the following?

...

Which of the following would you use to provide partners access to services without granting access to an organizations entire network?

Extranet

Which of the following is an example of the security mitigation technique of changing roles every couple of months?

Job Rotation

As a DMZ is a publicly accessible network containing servers with public information, strong security and monitoring are not required.

False

The antivirus software on a server repeatedly flags an approved application that the HR department has installed on their local computers as a threat. This is an example of:

...

Which of the following occurs when the same result is created by hashing two different files?

A collision

Packets from a computer outside the network are being dropped on the way to a computer inside the network. Which of the following would be MOST useful to determine the cause of this?

Firewall log

A possible security risk associated with mobile devices is which of the following?

bluesnarffing

Which of the following would explain the difference between a public key and a private key?

...

Which of the following describes when the claimed identity of a user is validated?

Authentication

The web camera of a system can be controlled by which of the following attacks?

ActiveX component

Which of the following provides the MOST comprehensive redundancy with the least amount of downtime for an entire site?

...

Which of the following is a vulnerability scanner?

Microsoft baseline

Which of the following is a true statement concerning NIDS?

A NIDS monitors and analyzes network traffic for possible intrusions.

When would it be appropriate to use time of day restrictions on an account?

...

The cloud computing delivery model that is owned, managed and operated by the organization is:

Private

The marketing staff wants to supply pens with attached USB drives to clients. In the past this client has been victimized by social engineering attacks that led to a loss of sensitive data. The security administrator instructs the marketing staff not to supply the USB pens due to which of the following?

The risks associated with the large capacity of USB drives and their concealable nature

An attacker can implant a rootkit into a picture by which of the following?

Steganography

Which of the following encryption algorithms relies on the inability to factor large prime numbers?

RSA

A design flaw in a new application was discovered by a software manufacturer. Company management decided to continue manufacturing the product with the flaw rather than recalling the software. Which of the following risk management strategies was adopted?

Risk acceptance

Which of the following types of file sets can be used to compare the characteristics of known instances of malware that the antivirus software detected?

Signature

An area of the network infrastructure that allows a technician to place public facing systems into it without compromising the entire infrastructure is which of the following?

DMZ

Which of the following would be a best practice to prevent users from being vulnerable to social engineering?

Provide thorough and frequent user awareness training

Which of the following tools can be used to confirm that multiple PCs are infected with a zombie?

Antivirus

Which of the following must be used when setting up a DMZ?

...

Which of the following contains hardware systems similar to the affected organization but does not host live data?

Warm site

Which of the following is responsible for the amount of residual risk?

...

Virtualized applications such as virtualized browsers are capable of protecting the underlying operating system from which of the following?

Malware installation from the Internet site of a suspect

Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?

DNS poisoning

Which of the following is a reason to use a Faraday cage?

To mitigate data emanation

A technique utilized by hackers to identify unsecured wireless network locations to other hackers is which of the following?

War Chalking

Which of the following should be implemented when there is a period of high employee turnover?

...

At what layer of the TCP/IP model do devices such as ATM, switches, and bridges operate, as well as protocols PPP and ARP?

Data Link

Administrators should always investigate or refer to which of the following to block the use of previously issued PKI credentials that have expired or otherwise become invalid?

CRL

Which type of intrusion detection may terminate processes or redirect traffic upon detection of a possible intrusion?

Active

The company policy for availability requires full backups on Sunday and incremental backups each week night at 10 p.m. The file server crashes on Thursday afternoon. How many tapes will the technician need to restore the data on the file server for Friday morning?

Four

Someone that is dumpster diving would be MOST interested in which of the following?
A. List of expired usernames

B. Receipts from the supply store

C. User education manual

D. Business card of computer contractor

Business card of computer contractor

The IP address and MAC address of a rogue device within the local network might best be revealed by which of the following logs?
A. Antivirus logs

B. Security logs

C. DHCP logs

D. DNS logs

DHCP logs

Which of the following will not reduce EMI?

A. Humidity control

B. Physical shielding

C. Overhauling worn motors

D. Physical location

Humidity control

Which of the following describes a tool used by organizations to verify whether or not a staff member has been participating in malicious activity?

A. Implicit deny

B. Time of day restrictions

C. Mandatory vacations

D. Implicit allow

Mandatory vacations

Which of the following creates separate logical networks?

A. Subnetting

B. NAC

C. NAT

D. DMZ

Subnetting

Which procedure should be done first if a remote attack on a system is detected by a technician?
A. Follow the incident management procedure in place

B. Disconnect the system from the network

C. Contain the attack

D. Respond to the attacker

Follow the incident management procedure in place

A new wireless network is being implemented by a technician for an organization. All of the following wireless vulnerabilities should be considered by the technician EXCEPT:
A. Weak encryption

B. Rogue access points

C. SSID broadcasts

D. 802.11 mode

...

Which cloud computing service model is described as utilizing virtualization and a pay for what you use model?
A. Infrastructure as a Service (IaaS)

B. Platform as a Service (PaaS)

C. Software as a Service (SaaS)

D. Virtualization as a Service (VaaS)

...

Which of the following is an example of restricting access to files based on the identity of the user or group?
A. Mandatory Access Control

B. Discretionary Access Control

C. Certificate Revocation List

D. Public Key Infrastructure

...

Which of the following should risk assessments be based upon as a best practice?
A. A quantitative measurement of risk and impact and asset value

B. An absolute measurement of threats

C. A qualitative measurement of risk and impact

D. A survey of annual loss and potential threats and asset value

A quantitative measurement of risk and impact and asset value

Which of the following could adversely impact an entire network if it were unavailable when using single signon?
A. Web server

B. Authentication server

C. Biometrics

D. Workstation

Authentication server

Sets with similar terms

Security +

57 terms

schmittie01

Security Plus (Part 2)

118 terms

anuanes

CompTIA SY0-301 Exam

288 terms

JayErryday

Security+ 151-200

50 terms

Jessinia

Sets found in the same folder

SEC +

546 terms

oosunjayPLUS

Module 6 S433

150 terms

tjpaton8

Sec+ remember this

361 terms

oosunjayPLUS

5.5.5 Testout Firewalls

27 terms

Julianne-Mar

Other sets by this creator

CDC 3DX7X Vol 1

100 terms

VENOM22

CDC 3DX7X Vol2

70 terms

VENOM22

Security + SY0-401

358 terms

VENOM22

CDC 3D151 Volume 1 Multiple Choice

100 terms

VENOM22

Other Quizlet sets

Net e -121

11 terms

tishanz

Security + Cert - Merged RM

536 terms

SimplyRoz

Lesson 4 - Understanding Network Security

22 terms

mengland324

NET+ CERT PREP1

22 terms

sweetjess

Related questions

QUESTION

Text files created on the server each time a click takes place, capturing all activity on the Web site best describes:

8 answers

QUESTION

An advertiser that uses ad scheduling has a custom bid adjustment for 9pm-12am on weeknights. The normal bid is USD $0.40 and the bid multiplier is 75%. How much is the advertiser bidding between 9pm-12am on weeknights?

13 answers

QUESTION

Which administrative tool allows you to designate a domain controller as a Global Catalog server?

2 answers

QUESTION

Which generation of wireless communication is based on the initiative of International Telecommunication Union (ITU), also known as IMT-2000, and seemed to evolve from different incompatible systems of earlier generations?

15 answers