Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
112 Cards in this Set
- Front
- Back
D. IPSeC.
|
Answer: C
|
|
D. Virus
|
Answer: A
|
|
D. Replay
|
Answer: B
|
|
D. By reviewing the written procedures
|
Answer: C
|
|
D. Network mapper
|
Answer: D
|
|
D. When the technician is war driving and trying to gain access
|
Answer: C
|
|
translates to the internal SMTP server. The administrator notices many sessions to the server
|
and
|
|
D. The public IP address is incorrect.
|
Answer: A
|
|
D. ECC algorithms
|
Answer: B
|
|
D. Session hijacking
|
Answer: B
|
|
D. Discovering the DNS name of a device from the IP address
|
Answer: C
|
|
D. A security template
|
Answer: D
|
|
5
|
000b
|
|
D. Data integrity
|
Answer: C
|
|
D. MD5
|
Answer: C
|
|
D. Closed network
|
Answer: B
|
|
D. 636
|
Answer: D
|
|
D. DHCP logs
|
Answer: B
|
|
D. Seven
|
Answer: B
|
|
D. Single point of failure
|
Answer: D
|
|
D. Honeynet
|
Answer: C
|
|
D. VLAN
|
Answer: C
|
|
D. L2TP
|
Answer: B
|
|
D. Proxy server
|
Answer: C
|
|
D. Change management
|
Answer: D
|
|
D. ACL
|
Answer: A
|
|
D. Larger key space
|
Answer: A
|
|
application server
|
which of the following processes should be followed?
|
|
D. Chain of custody
|
Answer: A
|
|
When deploying 50 new workstations on the network
|
which of following should be completed
|
|
D. Run OS updates.
|
Answer: C
|
|
D. Intranet
|
Answer: A
|
|
D. DNS poisoning
|
Answer: B
|
|
Sans
|
Answer: A
|
|
D. Antivirus logs
|
Answer: B
|
|
D. Trojan
|
Answer: C
|
|
D. Antivirus selection
|
Answer: B
|
|
D. Cross-site scripting
|
Answer: A
|
|
D. Cloning
|
Answer: B
|
|
D. Firewall
|
Answer: B
|
|
D. DoS
|
Answer: C
|
|
D. Logical tokens
|
Answer: B
|
|
B. A performance monitor indicates a recent and ongoing drop in speed
|
disk space or memory
|
|
rapidly.
|
Answer: B
|
|
D. DNS logs
|
Answer: B
|
|
D. Discretionary Access Control (DAC)
|
Answer: D
|
|
D. Role-Based Access Control (RBAC)
|
Answer: D
|
|
D. Separation of duties
|
Answer: A
|
|
D. Kerberos
|
Answer: D
|
|
D. Man-in-the-middle attack
|
Answer: C
|
|
D. Confidentiality
|
Answer: C
|
|
D. Virus
|
Answer: C
|
|
D. Certificate authority
|
Answer: A
|
|
D. VPN
|
Answer: A
|
|
D. Shoulder surfing
|
Answer: D
|
|
D. Rootkit
|
Answer: D
|
|
D. Virus
|
Answer: A
|
|
D. NAT
|
Answer: D
|
|
D. NIDS
|
Answer: B
|
|
D. Service pack
|
Answer: B
|
|
D. NIDS
|
Answer: A
|
|
D. Penetration test
|
Answer: B
|
|
If a certificate has been compromised
|
which of the following should be done?
|
|
D. Suspend the certificate for further investigation.
|
Answer: B
|
|
D. Behavior-based HIDS
|
Answer: D
|
|
D. RADIUS
|
Answer: D
|
|
D. MD5
|
Answer: C
|
|
D. Iris scan and proximity card
|
Answer: D
|
|
After implementing file auditing
|
which of the following logs would show unauthorized usage
|
|
D. Application
|
Answer: C
|
|
D. DNS poisoning
|
Answer: A
|
|
If a user attempts to go to a website and notices the URL has changed
|
which of the following
|
|
D. ARP poisoning
|
Answer: C
|
|
D. Man-in-the-middle
|
Answer: C
|
|
D. Run a ping against the wireless access point.
|
Answer: A
|
|
organization
|
but does not provide live data?
|
|
D. Cold site
|
Answer: C
|
|
During the implementation of LDAP
|
which of the following will typically be changed within the
|
|
D. Network protocol
|
Answer: B
|
|
D. System log
|
Answer: C
|
|
D. The cell phone should have data connection abilities disableD.
|
Answer: A
|
|
D. MD5
|
Answer: B
|
|
D. SHA-1
|
Answer: C
|
|
D. SHA-1
|
Answer: C
|
|
the body of the email
|
the executive wishes to encrypt the signature so that the assistant can verify
|
|
D. Hash
|
Answer: B
|
|
D. HIDS
|
Answer: A
|
|
D. Port scan
|
Answer: A
|
|
functions
|
but
|
|
D. Account management
|
Answer: B
|
|
D. Monitor
|
Answer: B
|
|
Taking into account personal safety
|
which of the following types of fire suppression substances
|
|
D. Water
|
Answer: B
|
|
D. Deleting
|
Answer: C
|
|
D. Role based
|
Answer: B
|
|
D. Biometrics
|
Answer: B
|
|
D. Read only access
|
Answer: B
|
|
D. Spam
|
Answer: A
|
|
D. Spyware
|
Answer: B
|
|
D. Privilege escalation
|
Answer: A
|
|
D. Spoofing
|
Answer: C
|
|
D. NAT
|
Answer: C
|
|
D. Use of default passwords
|
Answer: D
|
|
D. Default passwords
|
Answer: D
|
|
D. SSID broadcasts.
|
Answer: B
|
|
D. Network scanner
|
Answer: D
|
|
D. Security template
|
Answer: A
|
|
D. Public key recovery
|
Answer: B
|
|
D. sniff network passwords.
|
Answer: C
|
|
documentation on the weakness.
|
Answer: D
|
|
D. Acceptable usage policy
|
Answer: A
|
|
D. To control unauthorized DNS DoS
|
Answer: A
|