cable are true?
Each correct answer represents a complete solution. Choose three.
AIt is immune to electromagnetic interference (EMI).
BIt can transmit undistorted signals over great distances.
CIt has eight wires twisted into four pairs.
DIt uses light pulses for signal transmission.
Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.
AIt filters traffic based on IP addresses.
BIt forwards broadcast packets.
CIt assigns a different network address per port.
DIt filters traffic based on MAC addresses.
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?
AProxy server
BSecurity
CCookies
DCertificate
Which of the following are used to suppress paper or wood fires?
Each correct answer represents a complete solution. Choose two.
AWater
BKerosene
CCO2
DSoda acid
Question 6
Asset Security
0
Question 7
Communications and Network Security
Question 8
Security Assessment and Testing
Question 9
Communications and Network Security
Question 10
Asset Security
Question 11
Security Operation
Question 12
Security and Risk Management
Question 13
Security Assessment and Testing
Question 14
Asset Security
Question 15
Security Assessment and Testing
Question 16
Security Assessment and Testing
Question 17
Communications and Network Security
Question 18
Identity and Access Management
Question 19
Communications and Network Security
Question 20
Communications and Network Security
Question 21
Identity and Access Management
Question 22
Communications and Network Security
Question 23
Communications and Network Security
Question 24
Security Assessment and Testing
Question 25
Security Operation
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which of the following steps can be taken to protect laptops and data they hold?
Each correct answer represents a complete solution. Choose all that apply.
AUse slot locks with cable to connect the laptop to a stationary object.
BKeep inventory of all laptops including serial numbers.
CHarden the operating system.
DEncrypt all sensitive data.
Which of the following attacks involves multiple compromised systems to attack a single target?
ABrute force attack
BDDoS attack
CDictionary attack
DReplay attack
are true?
Each correct answer represents a complete solution. Choose two.
AIt is an anti-virus software that scans the incoming traffic on an internal network.
BIt is the boundary between the Internet and a private network.
CIt contains company resources that are available on the Internet, such as Web servers and FTP servers.
DIt contains an access control list (ACL).
Which of the following protocols is used to establish a secure TELNET session over TCP/IP?
ASSL
BPGP
CIPSEC
DSSH
Which methods help you to recover your data in the event of a system or hard disk failure?
Each correct answer represents a complete solution. Choose two.
AInstall a RAID system
BUse data encryption
CInstall and use a tape backup unit
DInstall UPS systems on all important devices
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
AFalse positive
BFalse negative
CTrue negative
DTrue positive
Which of the following policies is set by a network administrator to allow users to keep their emails and documents for a fixed period of time?
ARetention policy
BPassword policy
CAudit policy
DBackup policy
are true?
Each correct answer represents a complete solution. Choose two.
AIt is a logical connection between two devices.
BIt uses fixed-length (53-byte) packets to transmit information.
CIt supports speeds of 1.544 Mbps over Digital Signal level 1 (DS-1) transmission facilities.
DIt is a high-speed WAN networking technology used for communication over public data networks
Which of the following terms refers to the protection of data against unauthorized access?
AAuditing
BRecovery
CConfidentiality
DIntegrity
?
Each correct answer represents a complete solution. Choose all that apply.
AIt hides vulnerable computers that are exposed to the Internet.
BIt logs traffic to and from the private network.
CIt enhances security through various methods, including packet filtering, circuit-level filtering, and application filtering.
DIt blocks unwanted traffic.
are true?
Each correct answer represents a complete solution. Choose two.
AIn Digest authentication, passwords are sent across a network as clear text, rather than as a has value.
BDigest authentication is used by wireless LANs, which follow the IEEE 802.11 standard.
CIn Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.
DDigest authentication is a more secure authentication method as compared to Basic authentication.
Which of the following types of attacks slows down or stops a server by overloading it with requests?
AVulnerability attack
BImpersonation attack
CNetwork attack
DDoS attack
Which of the following is the most secure authentication method?
ACertificate-based authentication
BBasic authentication
CDigest authentication
DIntegrated Windows authentication
Which of the following practices come in the category of denial of service attack?
Each correct answer represents a complete solution. Choose three.
ASending lots of ICMP packets to an IP address
BDisrupting services to a specific computer
CPerforming Back door attack on a system
DSending thousands of malformed packets to a network for bandwidth consumption
stand for?
ARivest-Shamir-Adleman
BRead System Authority
CRivest-System-Adleman
DRemote System Authority
Which of the following authentication methods support mutual authentication?
Each correct answer represents a complete solution. Choose two.
AMS-CHAP v2
BEAP-TLS
CEAP-MD5
DNTLM
SIMULATION -
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the _______________ layer of the TCP/IP model.
Which of the following are the application layer protocols for security?
Each correct answer represents a complete solution. Choose three.
ASecure Hypertext Transfer Protocol (S-HTTP)
BSecure Sockets Layer (SSL)
CSecure Electronic Transaction (SET)
DSecure Shell (SSH)
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?
ASession splicing attack
BEvasion attack
CInsertion attack
DPolymorphic shell code attack
Which of the following types of attacks is only intended to make a computer resource unavailable to its users?