What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)
What are two attributes that an email message may contain that should cause a user to question whether the message is a phishing attempt? (Choose two.)A . An image contained in the messageB . Spelling and grammar errorsC . Threats of losing serviceD . Use of bold and italicsView AnswerAnswer:...
A digitally signed e-mail message:
A digitally signed e-mail message:A . Validates the recipientB . Validates the senderC . Is encryptedD . Is virus-freeView AnswerAnswer: B Explanation: By digitally signing a message, you apply your unique digital mark to the message. The digital signature includes your certificate and public key. This information proves to the...
Which server is best to use as a web server, considering the security and performance concerns?
Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one. Which server is best to use as a web server, considering the security and performance concerns?A...
Passwords that contain recognizable words are vulnerable to a:
Passwords that contain recognizable words are vulnerable to a:A . Denial of Service attackB . Hashing attackC . Dictionary attackD . Replay attackView AnswerAnswer: C Explanation: A dictionary attack is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a...
Physically securing servers prevents:
Physically securing servers prevents:A . TheftB . Compromise of the certificate chainC . Man-in-the middle attacksD . Denial of Service attacksView AnswerAnswer: A
Keeping a server updated:
Keeping a server updated:A . Maximizes network efficiencyB . Fixes security holesC . Speeds up folder accessD . Synchronizes the serverView AnswerAnswer: B
Account lockout policies are used to prevent which type of security attack?
Account lockout policies are used to prevent which type of security attack?A . Brute force attacksB . Users sharing passwordsC . Social engineeringD . Passwords being reused immediatelyView AnswerAnswer: A
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:
Role separation improves server security by:
Role separation improves server security by:A . Enforcing principle of least privilege.B . Installing applications on separate hard disks.C . Physically separating high security servers from other servers.D . Placing servers on separate VLANs.View AnswerAnswer: A
How should you secure these passwords?
Many Internet sites that you visit require a user name and password. How should you secure these passwords?A . Save them to a text fileB . Enable session cachingC . Configure the browser to save passwordsD . Save them to an encrypted fileE . Reuse the same passwordView AnswerAnswer: D