Sample Questions:
Anne, Executive Director (CEO), announced that he received some phone calls from someone who claim to be of customer service. The subscriber requests to verify its network credentials, because your computer transmits on the network. Which of the following types of attacks is the most likely?
VISHING.
interpretation
Spim
Scareware.
None
The administrator detects the following registry entry on the server: November 2013 00:23:45 httpd [2342]: Get /app2/prod/proc/process.php?input=change; /. ./etc; CAT 20SHADOW Which of these attacks was an attempt?
Injection equipment
Password attack
Buffer overflow
Cross-Site scripts
None
The security team wants to develop an incident response plan. The team has never experienced an incident. Which of the following options would be the best way to help them develop plans and procedures?
Table exercises
learned lessons
Climbing procedures
Recovery procedure
None
Which of the following to verify that there is a threat to safety and control can be easily avoided without active application tests?
Protocol analyzer
Vulnerability scan
Penetration MEC.
port scanner.
None
Which of the following technologies would be more appropriate to use when trying the new software patch to implement the entire company?
Cloud Computing
Virtualization
redundancy
Application control
None
The system administrator must deploy 802.1x at the same time, when a user enters the network, the authentication server communicates with the network switch and assigns the appropriate VLAN to the user. Which of the following protocols should be used?
RADIO
Kerberos.
LDAP.
Mschap.
None
Security would like to hide confidential data in a file so that you can spend without awakening suspicion. Which of the following techniques can be more appropriate to achieve this goal?
Transport encryption
Transmission encryption
Digital signatures
STEANGRAPHY.
None
The supervisor in his organization was removed on Friday afternoon. The supervisor has the ability to change the contents of the confidential database, as well as other administrative authorities. On Monday morning, the administrator of the database said the log files indicated that some records were missing any of the following risk reduction strategies, the database should be implemented when the leader was degraded?
Incident Administration
Routine audits
IT Management
Monthly review of user rights.
None