• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/112

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

112 Cards in this Set

  • Front
  • Back
D. IPSeC.
Answer: C
D. Virus
Answer: A
D. Replay
Answer: B
D. By reviewing the written procedures
Answer: C
D. Network mapper
Answer: D
D. When the technician is war driving and trying to gain access
Answer: C
translates to the internal SMTP server. The administrator notices many sessions to the server
and
D. The public IP address is incorrect.
Answer: A
D. ECC algorithms
Answer: B
D. Session hijacking
Answer: B
D. Discovering the DNS name of a device from the IP address
Answer: C
D. A security template
Answer: D
5
000b
D. Data integrity
Answer: C
D. MD5
Answer: C
D. Closed network
Answer: B
D. 636
Answer: D
D. DHCP logs
Answer: B
D. Seven
Answer: B
D. Single point of failure
Answer: D
D. Honeynet
Answer: C
D. VLAN
Answer: C
D. L2TP
Answer: B
D. Proxy server
Answer: C
D. Change management
Answer: D
D. ACL
Answer: A
D. Larger key space
Answer: A
application server
which of the following processes should be followed?
D. Chain of custody
Answer: A
When deploying 50 new workstations on the network
which of following should be completed
D. Run OS updates.
Answer: C
D. Intranet
Answer: A
D. DNS poisoning
Answer: B
Sans
Answer: A
D. Antivirus logs
Answer: B
D. Trojan
Answer: C
D. Antivirus selection
Answer: B
D. Cross-site scripting
Answer: A
D. Cloning
Answer: B
D. Firewall
Answer: B
D. DoS
Answer: C
D. Logical tokens
Answer: B
B. A performance monitor indicates a recent and ongoing drop in speed
disk space or memory
rapidly.
Answer: B
D. DNS logs
Answer: B
D. Discretionary Access Control (DAC)
Answer: D
D. Role-Based Access Control (RBAC)
Answer: D
D. Separation of duties
Answer: A
D. Kerberos
Answer: D
D. Man-in-the-middle attack
Answer: C
D. Confidentiality
Answer: C
D. Virus
Answer: C
D. Certificate authority
Answer: A
D. VPN
Answer: A
D. Shoulder surfing
Answer: D
D. Rootkit
Answer: D
D. Virus
Answer: A
D. NAT
Answer: D
D. NIDS
Answer: B
D. Service pack
Answer: B
D. NIDS
Answer: A
D. Penetration test
Answer: B
If a certificate has been compromised
which of the following should be done?
D. Suspend the certificate for further investigation.
Answer: B
D. Behavior-based HIDS
Answer: D
D. RADIUS
Answer: D
D. MD5
Answer: C
D. Iris scan and proximity card
Answer: D
After implementing file auditing
which of the following logs would show unauthorized usage
D. Application
Answer: C
D. DNS poisoning
Answer: A
If a user attempts to go to a website and notices the URL has changed
which of the following
D. ARP poisoning
Answer: C
D. Man-in-the-middle
Answer: C
D. Run a ping against the wireless access point.
Answer: A
organization
but does not provide live data?
D. Cold site
Answer: C
During the implementation of LDAP
which of the following will typically be changed within the
D. Network protocol
Answer: B
D. System log
Answer: C
D. The cell phone should have data connection abilities disableD.
Answer: A
D. MD5
Answer: B
D. SHA-1
Answer: C
D. SHA-1
Answer: C
the body of the email
the executive wishes to encrypt the signature so that the assistant can verify
D. Hash
Answer: B
D. HIDS
Answer: A
D. Port scan
Answer: A
functions
but
D. Account management
Answer: B
D. Monitor
Answer: B
Taking into account personal safety
which of the following types of fire suppression substances
D. Water
Answer: B
D. Deleting
Answer: C
D. Role based
Answer: B
D. Biometrics
Answer: B
D. Read only access
Answer: B
D. Spam
Answer: A
D. Spyware
Answer: B
D. Privilege escalation
Answer: A
D. Spoofing
Answer: C
D. NAT
Answer: C
D. Use of default passwords
Answer: D
D. Default passwords
Answer: D
D. SSID broadcasts.
Answer: B
D. Network scanner
Answer: D
D. Security template
Answer: A
D. Public key recovery
Answer: B
D. sniff network passwords.
Answer: C
documentation on the weakness.
Answer: D
D. Acceptable usage policy
Answer: A
D. To control unauthorized DNS DoS
Answer: A