Exam 12: Assessing a System

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the greatest threat to most networks?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

Although often considered nonessential by some security experts,a(n)____________ is the only way to know of impending attacks.

Free
(Short Answer)
4.9/5
(36)
Correct Answer:
Verified

IDS

What port numbers are assigned and used by well-known protocols?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

To ensure that the appropriate level of security is being maintained,periodic ____________ should be conducted.

(Short Answer)
4.8/5
(37)

____________ is a free Unix scanner originally used by hackers to learn about target systems.

(Short Answer)
4.9/5
(32)

Which is a Windows application that displays detailed listings of TCP and UDP endpoints on a system including remote addresses connection state?

(Multiple Choice)
4.8/5
(29)

To provide protection for data when connecting from outside the network,all external connections should be made via a(n)____________.

(Short Answer)
4.8/5
(37)

What does the author consider the absolute minimum patching frequency for any organization?

(Multiple Choice)
4.9/5
(39)

In evaluating security aspects to arrive at a numeric score,which is NOT an aspect the author included?

(Multiple Choice)
4.8/5
(33)

Which is NOT an advantage to an organization provided by a proxy server?

(Multiple Choice)
5.0/5
(39)

An organization must consider the impact of data being made ____________ in order to evaluate the actual value of the data.

(Short Answer)
4.8/5
(37)

Perhaps the most critical first step in assessing network security is to:

(Multiple Choice)
4.9/5
(31)

Using three or four port scanners can increase the chances of identifying all possible ____________.

(Short Answer)
4.9/5
(36)

Having ____________ to evaluate threat levels provides a quantifiable method for evaluating system security.

(Short Answer)
4.8/5
(40)

Which is a scanner that can provide reports on registry entries,shared drives,services running,and operating system flaws?

(Multiple Choice)
4.9/5
(44)

____________ is one of the most popular protocol monitors in part because it is included with Windows.

(Short Answer)
4.7/5
(35)

When should a security audit report be filed and maintained?

(Multiple Choice)
4.8/5
(37)

The only way to know of impending attacks is by installation and use of which of the following?

(Multiple Choice)
4.8/5
(33)

Which does the author suggest is perhaps the most fundamental part of security?

(Multiple Choice)
4.8/5
(34)

Which is NOT one of the "Six P's" the author refers to in the stages of assessing a system's security?

(Multiple Choice)
4.8/5
(27)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)