Professional Documents
Culture Documents
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
32
33
34
35
36
37
38
39
A
A r A user
replies
to an I
A user replies
to
IM in
A ran
Observing
when
a
A r Athwart
Business
recovery
A r Athwart
Data that is
transferred
A r- TCP/IP is
networkA
IPv6 is
impervious
to
A
C Enforcing
a strong
A
C TCP is
slower than
DNS
B
C
D
8 r An a mpl C C An
As Ina rnael
cryee
automated
that
look s
An
An
An e-mail
employee
automated
looks
Falsifying
Taking a hard that
Lurking
in like
the
i..entry
in
a
disk
that's
vicinity
of
an
3 c Spyware
c Backdoor
C Logic bomb
Backups that Unscheduled Management
enable
downtime
to
3 c Spyware
c Backdoorto controls
C Logic bomb
Data
An active
Secure
classification
malicious
update
B r TCP/IP is C r The
D r The
anIPv6
integrated
transport
network
B
is less C
IPvG
D
IPv4
vulnerable
to C
addresses
addressesa
B
C Creating
Running
Creating
a
scanning
document
TCP
doesn't use
C NAC
UDP policy
is less reUDP
sequences
FTP
SSH
AAP
FTP
SSH
IMAP
B Packet
C r Sniffing is Port scanning
sniffers
performed
B r Use a
C C Use a by is
D rinitialized
Use a
traffic
filter
that
proxy
server
B C Prevent C C Monitor D I n&al
I one
spam
from
network
device
that
Enable
Enable
Use default
features
such
unused
ports
administrativ
B r SARA C
C
D IBM ISS
QualysGuard
C Security log Internet
B System
r Applicata)
log
:
log
B Targeted
C Doubletesting
blind
test
B C System
C C Security
Applicalion
kg
kg
log
B C'
C Inform all
D r Document
Familiarize
network
13 r Targeted r nntihle-blind every
testing
test
B
System log C'
Security
Applicalion
C C Job
log
log
B
C
r
C
Least
rotalion
Acceptable
privileges
B
r- Job policy C
Acceptable C
Least
rotation
poky C
use
policy
privileges
B
r Disable
r Disable
D
r Refrain
account
account
from
locking
B Use
C Preform
separate
annual
Br
C Create
D C Refrain
Implement
multiple
from
13 r Mace
C r Install
detection
B Enable SSID shielded
C Enable any D r Ensure
broadcasting
proper
B Implement unused
C C Avoid
a
B patch
Implement using
Avoid using
a
patch
transitive
Extend the
C Connect
network
using
using
B Keyspace
C
D Entity
Cryptosystem
authenticatio
B Keyspace
C
D Entity
Cryptosystem
authenticatio
B Uses a form C Uses 14
D r- Uses 48
of RSA
block
rounds
of
B
C Knapsack rounds of
merkieB Keyspace C C
D C Entity
Cryptosystern
B C Key
A
key should authenticatio
lengths
be preserved
40 40. What is a
characertistic of digital
41 41. Which best practice
should you implement
What
type ofa secure
42 42.
when
deploying
application
attack
virtualized
environment?
What type
of is a
43 43.
attack isrisk
44. Which security
44 application
method
45. As a security
45 mitigation
you need to
46. Which statement
46 specialist,
applies
to
47. Which type
of cloud
47 accurately
48. Which offers
stage the
of the
48 computer
tisk
assessment
process
49 49. Which stage of the
assessment
process
50 Which
of the fillowing
50 risk
is NOT a key
A re They are
based
on
A r Disable
sandboxing 3
A r Session
hijadcing
A C Session
hijacking
A C Layered
security
AC
Implement
A C They
prevent
A r Pubicdata
A r- Control
analysis
A C Control
analysis
A r Keep an
inventory of