802.11a operates in the __________ spectrum 5GHz
using orthogonal frequency division
multiplexing (OFDM).
5GHz
7.5GHz
60GHz
150GHz
Access tokens are defined as "something False
you know."
True
False
An advantage of Wired Equivalent Privacy False
(WEP) is that it can be trusted alone to
provide confidentiality.
True
False
, CYBER-2600 : Final Exam Questions and Answers
After a penetration test is planned, reconnaissance
______________ is the first step in performing that
test; the objective is to obtain an
understanding of the system and its
components that someone wants to attack.
authentication
routing
pining
reconnaissance
Alerts are the primary method of True
communication between the SIEM system
and operators.
True
False
All data is equally important, and thus False
equally damaging in the event of loss.
True
False
All mail servers support spam URI Real- False
time Block Lists (SURBLs) technology.
True
False
, CYBER-2600 : Final Exam Questions and Answers
All risks need to be mitigated or controlled. False
True
False
All versions of SSL have been shown to be True
vulnerable to breach.
True
False
Always analyze a seized system directly on False
the device.
True
False
A(n) _______________ is a low-level program that hypervisor
allows multiple operating systems to run
concurrently on a single host computer.
cipher
hypervisor
subnet
escrow
Another term for defense in depth is True
layered security.
True
False
, CYBER-2600 : Final Exam Questions and Answers
Application blacklisting is essentially noting False
which applications should be allowed to
run on the machine.
True
False
Application programs called __________ are cookie cutters
designed to prevent the transfer of cookies
between browsers and web servers.
botnets
card clones
cookie cutters
beacon frames
Application whitelisting can improve True
security by preventing unapproved
applications from being installed and run
on the device.
True
False