A security policy is important for all of the following
reasons except which one?
With it, you cannot trust the network's security.
When conducting an
... [Show More] audit, the auditor should be
which of the following?
An external person who is independent of the organization
under audit
Which of the following characteristics relates to a
demilitarized zone (DMZ)?
A type of perimeter network used to host resources
designated as accessible by the public from the Internet
Which term describes an object, computer, program,
piece of data, or other logical or physical component
you use in a business process to accomplish a
business task?
Asset
Which of the following refers to a form of encryption
also known as point-to-point or host-to-host
encryption?
Transport mode encryption
Which of the following is not a consideration when
placing firewalls on the network?
Where hackers are located
Which of the following is a malicious software
program distributed by a hacker to take control of a
victim's computers?
Agent
Which name is given to a VPN created between a
client and a server either within the same local
network or across a WAN link or intermediary network
to support secure client interaction with the services
of a resource host?
Client-to-server VPN
Which of the following characteristics relates to the
term algorithm?
A set of rules and procedures—usually mathematical in
nature—that can define how the encryption and decryption
processes operate
Which term describes the process of converting
ciphertext back into plain text?
Decryption
Which of the following terms describes hiding
information from unauthorized third parties?
Cryptography
Which term is a form of exploitation in which an
unauthorized or rogue DNS server responds to DNS
queries with false resolutions?
DNS spoofing
Which term describes a form of security defense that
focuses on discouraging a perpetrator with physical
harm, social disgrace, and legal consequences?
Deterrent
Which of the following refers to the malicious
insertion of scripting code onto a vulnerable Web
site?
Cross-site scripting (XSS)
Which of the following is not a type of malware?
Chip creep
Which of the following refers to the end user's
desktop devices such as a desktop computer, laptop,
VoIP telephone, or other endpoint device?
Workstation Domain
Which of the following describes a BYOD?
A policy allowing or encouraging employees, contractors,
and others to connect their own computers, smartphones,
and other devices to their organization's networks
What attack cracks a password or encryption key by
trying all possible valid combinations from a defined
set of possibilities (a set of characters or hex values)?
Brute-force attack
Which of the following is not a step in an incident
response solution?
Evasion
Which of the following is a form of security protection
that protects individual files by scrambling the
contents in such a way as to render them unusable by
unauthorized third parties?
File encryption
Which of the following describes separation of
duties?
An administrative rule whereby no single individual
possesses sufficient rights to perform certain actions
Which of the following is described as the maximum
communication or transmission capability of a
network segment?
Wirespeed
T/F?
DOS attacks cannot be detected by a firewall
???
Which of the following describes authentication?
The process of confirming the identity of a user
Define CIA Triangle
Confidentiality - deals with keeping information, networks,
and systems secure from unauthorized access
Integrity - the consistency, accuracy, and validity of data or
information
Availability - a characteristic of a resource being
accessible to a user, application, or computer system
when required; a system is usable for its intended purpose
Which term is used to describe a network security
device or host software that filters communications,
usually network traffic, based on a set of predefined
rules?
Firewall Know the benefits of having a firewall
T/F?
When conducting an inventory, you don't need to
include protocols in use or the port(s) in use. You just
need to include the likely source and destination
addresses.
TRUE
Know a firewall policy does not need to be short! It
must be setup properly to use the least number of
rules.
???
T/F?
You should consider placing rules related to more
common traffic earlier in the set rather than later
TRUE
Which of the following is a network mapper, port
scanner, and OS fingerprinting tool that checks the
state of ports, identifies targets, and probes services? [Show Less]