Which of the following tools is the most appropriate choice?

You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?A . FirewallB . Intrusion-detection systemC . CameraD . Security guardView AnswerAnswer: C

August 4, 2024 No Comments READ MORE +

What would be the result if you were the recipient of a SYN flood or malformed packet?

What would be the result if you were the recipient of a SYN flood or malformed packet?A . You would be unable to access a legitimate service, such as establishing a network connection.B . The files on your boot sector would be replaced with infected code.C . A virus would...

August 3, 2024 No Comments READ MORE +

Which protocol uses cleartext communication by default?

Which protocol uses cleartext communication by default?A . HTTPB . IPSECC . SSLD . POP3View AnswerAnswer: A

August 2, 2024 No Comments READ MORE +

Which type of attack is this?

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?A . Brute forceB . Denial of serviceC . BotnetD . Buffer overflowView AnswerAnswer: A

July 31, 2024 No Comments READ MORE +

The best way to thwart a dictionary attack is by enforcing a:

The best way to thwart a dictionary attack is by enforcing a:A . strong password policy.B . restricted access policy.C . firewall configuration policy.D . proxy server policy.View AnswerAnswer: A

July 31, 2024 No Comments READ MORE +

Which of the following causes problems with firewalls

Which of the following causes problems with firewallsA . Control FTPB . Data FTPC . Active FTPD . Passive FTPView AnswerAnswer: C

July 31, 2024 No Comments READ MORE +

Which of the following is the most effective way to respond to this attack?

You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way...

July 31, 2024 No Comments READ MORE +

Which security management concept is the ability for a department to accurately determine the costs of using various networking security services?

Which security management concept is the ability for a department to accurately determine the costs of using various networking security services?A . Performance managementB . ChargebackC . Capacity forecastingD . AmortizationView AnswerAnswer: B

July 30, 2024 No Comments READ MORE +

What type of attack is being described?

A flaw is discovered in an application. Before a patch is available, this vulnerability is used to gain access to sensitive data. What type of attack is being described?A . Social engineeringB . DictionaryC . Zero dayD . Zero dayView AnswerAnswer: C

July 30, 2024 No Comments READ MORE +

Which component works with an operating system to increase its security ability?

Which component works with an operating system to increase its security ability?A . Network scannerB . Operating system add-onC . Log analysis toolD . Port scannerView AnswerAnswer: B

July 30, 2024 No Comments READ MORE +