Exam 11: Network Scanning and Vulnerability Scanning
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
A good password has at least ______ characters.
Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
B
A password policy for a 90- or 180-day replacement schedule is called password ________.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
A
Any _________ you do not explicitly need should be shut down.
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
B
The first rule of computer security is to check ___________.
(Multiple Choice)
4.8/5
(37)
A _________ involves setting up two firewalls: an outer and an inner firewall.
(Multiple Choice)
4.8/5
(31)
Probing your network for security flaws should occur once a quarter,and a complete audit of your security should be completed ________ per year.
(Multiple Choice)
4.9/5
(37)
The process to make a system as secure as it can be without adding on specialized software or equipment is _______________
(Multiple Choice)
4.9/5
(35)
For an individual machine that is not running firewall software,you do not directly close ports.You shut down the _________ using that port.
(Multiple Choice)
4.7/5
(37)
Every open port on a router is a possible avenue of entry for a malware or intruder.
(True/False)
4.8/5
(28)
The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.
(Multiple Choice)
4.9/5
(34)
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password.This is particularly important if your password policy has a history depth of five.
(Multiple Choice)
4.9/5
(34)
CNE,MCITP,CISSP,and CCNA are examples of industry certifications.
(True/False)
4.9/5
(39)
A good rule of thumb for a password history policy is a history depth of five.
(True/False)
4.9/5
(33)
Experience is the most important factor when looking for a security professional.
(True/False)
4.8/5
(39)
On a server,you should create your own accounts with ________ that do not reflect their level of permission.
(Multiple Choice)
4.9/5
(33)
Microsoft Baseline Security Analyzer (MBSA)checks one or more Windows machines to see if they have basic security in place.
(True/False)
4.9/5
(32)
There should be a firewall between your network and the outside world.
(True/False)
4.9/5
(30)
Showing 1 - 20 of 21
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)