Cybersecurity for Technical Staff Course Test
A device is being selected by an administrator to secure an internal network segment from external traffic. Which of the following devices could be selected to provide security to the network segment? A. DMZ B. HIDS C. NIPS D. Internet content filter - C. NIPS A new wireless network is being implemented by a technician for an organization. All of the following wireless vulnerabilities should be considered by the technician EXCEPT: A. Weak encryption B. Rogue access points C. SSID broadcasts D. 802.11 mode - D. 802.11 mode A possible security risk associated with mobile devices is which of the following? A. Bluesnarfing B. Domain kiting C. Cross site scripting D. Input validation - A technique utilized by hackers to identify unsecured wireless network locations to other hackers is which of the following? A. War chalking B. Bluesnarfing C. War driving D. War dialing - An attacker can implant a rootkit into a picture by which of the following? A. Virus B. Steganography C. Worm D. Trojan Horse - B. Steganography An isolated, virtualized environment used for testing new software is known as a: A. Virtualbox B. Sandbox C. Testbox D. Evalbox - B. Sandbox
Written for
- Institution
- Cybersecurity for Technical Staff Courset
- Course
- Cybersecurity for Technical Staff Courset
Document information
- Uploaded on
- May 4, 2024
- Number of pages
- 16
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cybersecurity for technical staff course test