Security |OA| Objective Assessment | Actual
Questions and Answers Latest Updated
(Graded A+)
Correct
Incorrect
C836 - Fundamentals of Information Security |OA
1 of 173
Term
Name the six main hardening categories
1. Removing unnecessary software
2. Removing or turning off unessential services
3. Making alterations to common accounts
4. Applying the principle of least privilege
5. Applying software updates in a timely manner
6. Making use of logging and auditing functions
,Give this one a try later!
Name the most common security awareness issues
Protecting data, passwords, social engineering, network usage, malware, the use of
personal equipment, clean desk, policy knowledge
C.Data in use
Wireshark: A graphical interface protocol analyzer capable of filtering, sorting, and
analyzing both wired and wireless network traffic.
1. Removing unnecessary software
2. Removing or turning off unessential services
3. Making alterations to common accounts
4. Applying the principle of least privilege
5. Applying software updates in a timely manner
6. Making use of logging and auditing functions
Don't know?
2 of 173
Term
A type of attack on the web server that can target vulnerabilities such
as lack of input validation, improper or inadequate permissions, or
extraneous files left on the server from the development process
Give this one a try later!
, Server-side attack Format string attack
Client-side attack Authentication attack
Don't know?
3 of 173
Term
A tool developed by Microsoft to find flaws in file-handling source
code
Give this one a try later!
B.BinScope Binary Analyzer All
SDL Regex Fuzzer MiniFuzz File Fuzzer
Don't know?
4 of 173
Term
Type of Attack on Integrity
A.Interception B.Interruption
C.Modification D.Fabrication
, 1. B,D and A
2. A and B
3. B,C and D
4. A, C and D
Give this one a try later!
Interruption
Modification Confidentiality
Fabrication
Interception
Cross-site request forgery (CSRF) Modification
Fabrication
Don't know?
5 of 173
Term
A program that seeks to make users aware of the risk they are
accepting through their current actions and attempts to change their
behavior through targeted efforts
Give this one a try later!
Threat Detection and Response (TDR)