What is the focus of a security audit or vulnerability assessment?
What kind of physical access device restricts access to a single individual at any one time?
Which of the following is a mechanism for managing digital certificates through a system of trust?
Which protocol is used to create a secure environment in a wireless network?
What type of exercise is conducted with full knowledge of the target environment?
You want to establish a network connection between two LANs using the Internet. Which technology would best accomplish that for you?
Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?
In the key recovery process, which key must be recoverable?
Which kind of attack is designed to overload a system or resource, taking it temporarily or permanently offline?
Which component of an NIDS collects data?
What is the process of making an operating system secure from attack called?
The integrity objective addresses which characteristic of the CIA triad?
Which mechanism is used by PKI to allow immediate verification of a certificate’s validity?
Which of the following is used to create a VLAN from a physical security perspective?
A user has just reported that he downloaded a file from a prospective client using
IM. The user indicates that the file was called account.doc
. The system has been behaving unusually since he downloaded the file. What is the
most likely event that occurred?
Which mechanism or process is used to enable or disable access to a network resource based on attacks that have been detected?
Which of the following would provide additional security to an Internet web server?
What type of program exists primarily to propagate and spread itself to other systems and can do so without interaction from users?
An individual presents herself at your office claiming to be a service technician. She is attempting to discuss technical details of your environment such as applications, hardware, and personnel used to manage it. This may be an example of what type of attack?
Which of the following is a major security problem with the FTP protocol?
Which system would you install to provide detective capabilities within a network?
The process of maintaining the integrity of evidence and ensuring no gaps in possession occur is known as?
What encryption process uses one piece of information as a carrier for another?
Which policy dictates how assets can be used by employees of a company?
Which algorithm is an asymmetric encryption protocol?
Which of the following is an example of a hashing algorithm?
Which of the following creates a fixed-length output from a variable-length input?
Granting access to a system based on a factor such as an individual’s retina during a scan is an example of what type of authentication method?
What item is also referred to as a physical address to a computer system?
What is the process of investigating a computer system for information relating to a security incident?
Which of the following is seen as a replacement for protocols such as telnet and FTP?
Which of the following is commonly used to create thumbprints for digital certificates?
Granting access to a system based on a factor such as a password is an example of?
What item is also referred to as a logical address to a computer system?
How many bits are in an IPv6 address?