Solutions
Save
Terms in this set (132)
While waiting in the lobby of your Tailgating
building for guest, you notice a man in
a red shirt standing close to a locked
door with a large box in his hands. He
waits for someone else to come along
and open the locked door, then
proceeds to follow her inside. What
type of social engineering attach have
you just witnessed?
A. Impersonation
B. Phishing
C. Boxing
D. Tailgating
Which of the following is a weakness Less availability in rural areas
of cellular technology?
A. Multiple vendors in a nationwide
network
B. Less availability in rural areas
C. Multiple cell towers in close
proximity in urban areas
D. Strong signals in areas of
reasonable population
,Your friend in another department protect the transfer of authorizing credentials
asks you to help him understand some between computer systems from unauthorized
fundamental principles about observation
encryption and clear text. Identify
three important principles about the
risk incurred by unencrypted
credentials and clear text.
What is the purpose of the Secure It provides monitoring capabilities on IP networks.
Sockets Layer (SSL) protocol?
A. It provides monitoring capabilities
on IP networks.
B. It provides static network address
translation.
C. It supports the implementation of a
private cloud.
D. It provides encryption for
transport-layer protocols across the
Web.
Which of the following is the term Attack
generally used to refer to the act of
deliberately accessing computer
systems and network without
authorization?
What kind of tool is Wireshark? Protocol analyzer
A. Scanner
B. Steganography
C. Malware
D. Protocol analyzer
,After you implement a new firewall on Blocked by policy, Telnet not considered secure
your corporate network, a coworker
comes to you and asks why he can no
longer connect to a Telnet server he
has installed on his home DSL line. This
failure to connect is likely due to:
A. Network Address Translation (NAT)
B. Basic packet filtering
C. Blocked by policy, Telnet not
considered secure
D. A denial-of-service
You've been asked to perform an Black box testing
assessment of new software
application. Your client wants you to
perform the assessment without
providing you any information about
how the software was developed or
how data is processed by the
application. This is an example of what
type of testing?
A. White Box Testing
B. Passive testing
C. Black box testing
D. Active testing
You're reviewing a custom web Improper error handling
application and accidentally type a
number in a text field. The application
returns an error message containing
variable names, filenames, and the full
path of the application. This is an
example of which of the following?
A. Resource exhaustion
B. Improper error handling
C. Generic error message
D. Common misconfiguration
, There are reports of a worm going Network scanner
through your company that
communicates to other nodes on port
TCP/ 1337. What tool would you use to
find infected nodes on your network?
A. Protocol analyzer
B. Advanced malware tool
C. Network scanner
D. Password cracker
Which of the following accurately They act as a common language to allow different
describes the purpose of computer components to communicate.
protocols?
A. They provide security and
scalability
B. They allow developers to use any
programming language on any
platform.
C. They define the state of a virtual
machine at a point in time.
D. They act as a common language to
allow different components to
communicate.
What frequency spectrum does Wi-Fi 5 GHz
use?
A. 1.9
B. 2.7 GHi
C. 5 GHz
D. 5.4 GHz