Exam 12: Assessing a System
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
What is the greatest threat to most networks?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
Although often considered nonessential by some security experts,a(n)____________ is the only way to know of impending attacks.
Free
(Short Answer)
4.9/5
(36)
Correct Answer:
IDS
What port numbers are assigned and used by well-known protocols?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
C
To ensure that the appropriate level of security is being maintained,periodic ____________ should be conducted.
(Short Answer)
4.8/5
(37)
____________ is a free Unix scanner originally used by hackers to learn about target systems.
(Short Answer)
4.9/5
(32)
Which is a Windows application that displays detailed listings of TCP and UDP endpoints on a system including remote addresses connection state?
(Multiple Choice)
4.8/5
(29)
To provide protection for data when connecting from outside the network,all external connections should be made via a(n)____________.
(Short Answer)
4.8/5
(37)
What does the author consider the absolute minimum patching frequency for any organization?
(Multiple Choice)
4.9/5
(39)
In evaluating security aspects to arrive at a numeric score,which is NOT an aspect the author included?
(Multiple Choice)
4.8/5
(33)
Which is NOT an advantage to an organization provided by a proxy server?
(Multiple Choice)
5.0/5
(39)
An organization must consider the impact of data being made ____________ in order to evaluate the actual value of the data.
(Short Answer)
4.8/5
(37)
Perhaps the most critical first step in assessing network security is to:
(Multiple Choice)
4.9/5
(31)
Using three or four port scanners can increase the chances of identifying all possible ____________.
(Short Answer)
4.9/5
(36)
Having ____________ to evaluate threat levels provides a quantifiable method for evaluating system security.
(Short Answer)
4.8/5
(40)
Which is a scanner that can provide reports on registry entries,shared drives,services running,and operating system flaws?
(Multiple Choice)
4.9/5
(44)
____________ is one of the most popular protocol monitors in part because it is included with Windows.
(Short Answer)
4.7/5
(35)
When should a security audit report be filed and maintained?
(Multiple Choice)
4.8/5
(37)
The only way to know of impending attacks is by installation and use of which of the following?
(Multiple Choice)
4.8/5
(33)
Which does the author suggest is perhaps the most fundamental part of security?
(Multiple Choice)
4.8/5
(34)
Which is NOT one of the "Six P's" the author refers to in the stages of assessing a system's security?
(Multiple Choice)
4.8/5
(27)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)