Which of the following network filtering devices will rely on signature updates to be effective?Which of the following network filtering devices will rely on signature updates to be effective? Show A. B. C. D.
Focus your studying with a path
Get faster at matching terms Terms in this set (50)Which of the following lists the software development phases in the correct order? Sets with similar termsUpgrade to remove ads Only ₩37,125/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching terms Terms in this set (57)The MOST difficult security concern to detect when contractors enter a secured facility is which of the following? Copying sensitive information with cellular phones Which layer of the TCP/IP model is equivalent to the Session, Presentation, and Application layers of the OSI model? ... Implementing screen filters would reduce which of the following risks? Shoulder surfing A device is being selected by an administrator to secure an internal network segment from external traffic. Which of the following devices could be selected to provide security to the network segment? NIPS If you were setting up an IDS with the desire to detect exploits for unknown or unreleased vulnerabilities which type of IDS would you use? Anomaly Detection Which of the following intrusion detection systems uses statistical analysis to detect intrusions? Anomaly Which of the following attacks would allow an attacker to capture HTTP requests and send back a spoofed page? TCPIP hijacking Which of the following protocols is used to ensure secure transmissions on port 443? HTTPS Which of the following is the MOST proficient for encrypting large amounts of data? Symmetric key algorithms Which of the following network filtering devices will rely on signature updates to be effective? NIDS The MOST secured hashing algorithm is which of the following? ... Which of the following would you use to provide partners access to services without granting access to an organizations entire network? Extranet Which of the following is an example of the security mitigation technique of changing roles every couple of months? Job Rotation As a DMZ is a publicly accessible network containing servers with public information, strong security and monitoring are not required. False The antivirus software on a server repeatedly flags an approved application that the HR department has installed on their local computers as a threat. This is an example of: ... Which of the following occurs when the same result is created by hashing two different files? A collision Packets from a computer outside the network are being dropped on the way to a computer inside the network. Which of the following would be MOST useful to determine the cause of this? Firewall log A possible security risk associated with mobile devices is which of the following? bluesnarffing Which of the following would explain the difference between a public key and a private key? ... Which of the following describes when the claimed identity of a user is validated? Authentication The web camera of a system can be controlled by which of the following attacks? ActiveX component Which of the following provides the MOST comprehensive redundancy with the least amount of downtime for an entire site? ... Which of the following is a vulnerability scanner? Microsoft baseline Which of the following is a true statement concerning NIDS? A NIDS monitors and analyzes network traffic for possible intrusions. When would it be appropriate to use time of day restrictions on an account? ... The cloud computing delivery model that is owned, managed and operated by the organization is: Private The marketing staff wants to supply pens with attached USB drives to clients. In the past this client has been victimized by social engineering attacks that led to a loss of sensitive data. The security administrator instructs the marketing staff not to supply the USB pens due to which of the following? The risks associated with the large capacity of USB drives and their concealable nature An attacker can implant a rootkit into a picture by which of the following? Steganography Which of the following encryption algorithms relies on the inability to factor large prime numbers? RSA A design flaw in a new application was discovered by a software manufacturer. Company management decided to continue manufacturing the product with the flaw rather than recalling the software. Which of the following risk management strategies was adopted? Risk acceptance Which of the following types of file sets can be used to compare the characteristics of known instances of malware that the antivirus software detected? Signature An area of the network infrastructure that allows a technician to place public facing systems into it without compromising the entire infrastructure is which of the following? DMZ Which of the following would be a best practice to prevent users from being vulnerable to social engineering? Provide thorough and frequent user awareness training Which of the following tools can be used to confirm that multiple PCs are infected with a zombie? Antivirus Which of the following must be used when setting up a DMZ? ... Which of the following contains hardware systems similar to the affected organization but does not host live data? Warm site Which of the following is responsible for the amount of residual risk? ... Virtualized applications such as virtualized browsers are capable of protecting the underlying operating system from which of the following? Malware installation from the Internet site of a suspect Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed? DNS poisoning Which of the following is a reason to use a Faraday cage? To mitigate data emanation A technique utilized by hackers to identify unsecured wireless network locations to other hackers is which of the following? War Chalking Which of the following should be implemented when there is a period of high employee turnover? ... At what layer of the TCP/IP model do devices such as ATM, switches, and bridges operate, as well as protocols PPP and ARP? Data Link Administrators should always investigate or refer to which of the following to block the use of previously issued PKI credentials that have expired or otherwise become invalid? CRL Which type of intrusion detection may terminate processes or redirect traffic upon detection of a possible intrusion? Active The company policy for availability requires full backups on Sunday and incremental backups each week night at 10 p.m. The file server crashes on Thursday afternoon. How many tapes will the technician need to restore the data on the file server for Friday morning? Four Someone that is dumpster diving would be
MOST interested in which of the following? B. Receipts from the supply store C. User education manual D. Business card of computer contractor Business card of computer contractor The IP address and MAC address of a rogue device within the local network might best be revealed by which of the following logs? B. Security logs C. DHCP logs D. DNS logs DHCP logs Which of the following will not reduce EMI? A. Humidity control B. Physical shielding C. Overhauling worn motors D. Physical location Humidity control Which of the following describes a tool used by organizations to verify whether or not a staff member has been participating in malicious activity? A. Implicit deny B. Time of day restrictions C. Mandatory vacations D. Implicit allow Mandatory vacations Which of the following creates separate logical networks? A. Subnetting B. NAC C. NAT D. DMZ Subnetting Which procedure should
be done first if a remote attack on a system is detected by a technician? B. Disconnect the system from the network C. Contain the attack D. Respond to the attacker Follow the incident management procedure in place A new wireless network is being implemented by a technician for an organization. All of the following wireless
vulnerabilities should be considered by the technician EXCEPT: B. Rogue access points C. SSID broadcasts D. 802.11 mode ... Which cloud computing service model is described as utilizing virtualization and a pay for what you use model? B. Platform as a Service (PaaS) C. Software as a Service (SaaS) D. Virtualization as a Service (VaaS) ... Which of the following is an example of restricting access to files based on the identity of the user or group? B. Discretionary Access Control C. Certificate Revocation List D. Public Key Infrastructure ... Which of the following
should risk assessments be based upon as a best practice? B. An absolute measurement of threats C. A qualitative measurement of risk and impact D. A survey of annual loss and potential threats and asset value A quantitative measurement of risk and impact and asset value Which of the following could adversely impact an entire
network if it were unavailable when using single signon? B. Authentication server C. Biometrics D. Workstation Authentication server Sets with similar termsSecurity +57 terms schmittie01 Security Plus (Part 2)118 terms anuanes CompTIA SY0-301 Exam288 terms JayErryday Security+ 151-20050 terms Jessinia Sets found in the same folderSEC +546 terms oosunjayPLUS Module 6 S433150 terms tjpaton8 Sec+ remember this361 terms oosunjayPLUS 5.5.5 Testout Firewalls27 terms Julianne-Mar Other sets by this creatorCDC 3DX7X Vol 1100 terms VENOM22 CDC 3DX7X Vol270 terms VENOM22 Security + SY0-401358 terms VENOM22 CDC 3D151 Volume 1 Multiple Choice100 terms VENOM22 Other Quizlet setsNet e -12111 terms tishanz Security + Cert - Merged RM536 terms SimplyRoz Lesson 4 - Understanding Network Security22 terms mengland324 NET+ CERT PREP122 terms sweetjess Related questionsQUESTION Text files created on the server each time a click takes place, capturing all activity on the Web site best describes: 8 answers QUESTION An advertiser that uses ad scheduling has a custom bid adjustment for 9pm-12am on weeknights. The normal bid is USD $0.40 and the bid multiplier is 75%. How much is the advertiser bidding between 9pm-12am on weeknights? 13 answers QUESTION Which administrative tool allows you to designate a domain controller as a Global Catalog server? 2 answers QUESTION Which generation of wireless communication is based on the initiative of International Telecommunication Union (ITU), also known as IMT-2000, and seemed to evolve from different incompatible systems of earlier generations? 15 answers |