Reference no: EM132180616
At what layer of the OSI model does cabling play a part?
a. 1
b. 6
c. 2
d. 3
What is the application layer responsible for?
a. Physical addressing
b. Creating a pathway for data
c. Making sure all data is presentable
d. Computers that interact with the network
You are setting up a network storage area and want to connect your servers to it. You would like to use IP addresses. What is the best choice?
a. Network address translation
b. LAN device
c. Internet networks
d. Internet small computer system interface
What port does internal message access protocol use?
a. 143
b. 144
c. 443
d. 25
You have a user who needs to be secure while at a hotel. The user needs to be able to reach all services while on business trips. What should they use?
a. IPSEC
b. VPN
c. ICMP
d. DNS
You are a security professional at an organization and would like to implement a firewall that only check rules when a new communication session starts. What is the best type?
a. Stateful
b. Application
c. Firewall
d. Packet
When a user contacts a protected webpage and the browser then downloads software that connects them to a VPN and requires no advanced configurations. What is the user using?
a. SSL
b. PPTP
c. IPSec
d. VPN
Which is evidence of virus code activities?
a. Disk error messages
b. Boot file
c. Trojan
d. Worm
You find a virus on your system that replicates itself. What would you assume it is?
a. Retro virus
b. Slow virus
c. Stealth virus
d. Polymorphic virus
You notice a large amount of attacks on your system that are calling for money to have their information released. What type of attack is this?
a. Rootkits
b. Worms
c. Spam
d. Ransomware
A startup message appears indicating that new software has been installed. What type of virus are you dealing with?
a. Malicious add-ons
b. Trojan horse
c. Logic bombs
d. Multipartite virus
You notice a sudden increase in user response time across the network or sudden congestion at choke-points near server farms. What type of virus are you experiencing?
a. Spam
b. Rootkits
c. Worm
d. Virus
You are looking through your systems and notice that statements are being modified by an attacker run with the same permissions as the component that executed the command. What is happening?
a. SQL injection
b. XML injection
c. LDAP injection
d. XML injection
What stores information about a browser session?
a. Google Chrome
b. Spyware
c. Cookie
d. Internet Explorer
An attack is happening on a system in your network, and it seems there are three parties in the attacks - the attacks, the intermediary, and the victims. What type of attack is happening?
a. Spyware
b. Smurf attack
c. DDOS attack
d. SYN flood attack
You're experiencing an attack in which the alter intercepts network messages between a web server and a web browser. What is happening?
a. Session hijacking
b. Web defacement
c. Header manipulations
d. Web application
Name one way a malicious code can threaten business.
You are building out a larger server area, and want to deploy a virtual machine that will cause attackers to think that the server they're attacking is valid. What are you building?
a. Local computer
b. Basic machine
c. Trap
d. Honeypot
You are scanning and want to find a tool that provides extensive port scanning capabilities. What do you choose?
a. Rpcinfo
b. Ping
c. Nmap
d. Whois
You are looking for a solution for your company's VPN issues, because the VPN is not as secure as it should be. What would be the poorest choice?
a. IPSec
b. PPTP
c. EAP
d. SSL