Exam 4: Vulnerability Assessment and Mitigating Attacks
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
List and describe the three categories that TCP/IP divides port numbers into.
(Essay)
4.8/5
(33)
A ____ is a network set up with intentional vulnerabilities.
(Multiple Choice)
5.0/5
(36)
While the code for a program is being written, it is being analyzed by a ____.
(Multiple Choice)
4.9/5
(28)
A(n) ____ means that the application or service assigned to that port is listening for any instructions.
(Multiple Choice)
4.8/5
(27)
A(n) ____ is hardware or software that captures packets to decode and analyze its contents.
(Multiple Choice)
4.8/5
(35)
____________________ for organizations are intended to identify vulnerabilities and alert network administrators to these problems.
(Short Answer)
4.8/5
(45)
A ____ tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.
(Multiple Choice)
4.8/5
(39)
____ is a means by which an organization can transfer the risk to a third party who can demonstrate a higher capability at managing or reducing risks.
(Multiple Choice)
4.9/5
(36)
The end product of a penetration test is the penetration ____.
(Multiple Choice)
4.8/5
(31)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(35)
A(n) ____________________ scan uses various techniques to avoid detection.
(Short Answer)
4.9/5
(31)
A(n) ____ examines the current security in a passive method.
(Multiple Choice)
4.9/5
(38)
A(n) ____ indicates that no process is listening at this port.
(Multiple Choice)
4.8/5
(33)
The ____ for software is the code that can be executed by unauthorized users.
(Multiple Choice)
4.9/5
(32)
The first step in a vulnerability assessment is to determine the assets that need to be protected.
(True/False)
4.8/5
(33)
A(n) ____________________ box test is one in which some limited information has been provided to the tester.
(Short Answer)
4.9/5
(30)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)