Exam 11: Network Scanning and Vulnerability Scanning

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A good password has at least ______ characters.

Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
Verified

B

A password policy for a 90- or 180-day replacement schedule is called password ________.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

A

Any _________ you do not explicitly need should be shut down.

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

B

The first rule of computer security is to check ___________.

(Multiple Choice)
4.8/5
(37)

A _________ involves setting up two firewalls: an outer and an inner firewall.

(Multiple Choice)
4.8/5
(31)

Probing your network for security flaws should occur once a quarter,and a complete audit of your security should be completed ________ per year.

(Multiple Choice)
4.9/5
(37)

Nessus is the premiere network vulnerability scanner.

(True/False)
4.9/5
(31)

The process to make a system as secure as it can be without adding on specialized software or equipment is _______________

(Multiple Choice)
4.9/5
(35)

For an individual machine that is not running firewall software,you do not directly close ports.You shut down the _________ using that port.

(Multiple Choice)
4.7/5
(37)

Every open port on a router is a possible avenue of entry for a malware or intruder.

(True/False)
4.8/5
(28)

The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.

(Multiple Choice)
4.9/5
(34)

You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password.This is particularly important if your password policy has a history depth of five.

(Multiple Choice)
4.9/5
(34)

CNE,MCITP,CISSP,and CCNA are examples of industry certifications.

(True/False)
4.9/5
(39)

Windows has a built in firewall,but Linux does not.

(True/False)
4.9/5
(38)

A good rule of thumb for a password history policy is a history depth of five.

(True/False)
4.9/5
(33)

Experience is the most important factor when looking for a security professional.

(True/False)
4.8/5
(39)

A good password should contain only letters and numbers.

(True/False)
4.9/5
(39)

On a server,you should create your own accounts with ________ that do not reflect their level of permission.

(Multiple Choice)
4.9/5
(33)

Microsoft Baseline Security Analyzer (MBSA)checks one or more Windows machines to see if they have basic security in place.

(True/False)
4.9/5
(32)

There should be a firewall between your network and the outside world.

(True/False)
4.9/5
(30)
Showing 1 - 20 of 21
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)