Exam 9: Network Risk Management
Exam 1: Introduction to Networking50 Questions
Exam 2: Network Infrastructure and Documentation50 Questions
Exam 3: Addressing on Networks50 Questions
Exam 4: Network Protocols and Routing50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Virtualization and Cloud Computing50 Questions
Exam 8: Subnets and VLANs50 Questions
Exam 9: Network Risk Management50 Questions
Exam 10: Security in Network Design50 Questions
Exam 11: Network Performance and Recovery50 Questions
Exam 12: Wide Area Networks50 Questions
Select questions type
A variant of BYOD, what does CYOD allow employees or students to do?
(Multiple Choice)
4.9/5
(35)
Over a long-distance connection, using SSH keys is more secure than using passwords.
(True/False)
4.9/5
(33)
Different types of organizations have similar levels of network security risks.
(True/False)
4.9/5
(26)
It is ideal to use the same password for multiple different applications, provided the password is complex enough.
(True/False)
4.9/5
(37)
Which of the following scenarios represents a phishing attempt?
(Multiple Choice)
4.8/5
(33)
What statement regarding denial-of-service (DoS) attacks is accurate?
(Multiple Choice)
4.7/5
(32)
How often should you require users to change their passwords?
(Multiple Choice)
4.8/5
(35)
Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.
(True/False)
4.8/5
(37)
What is vulnerability scanning, and what are the two different types of vulnerability scans?
(Essay)
5.0/5
(34)
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?
(Multiple Choice)
4.9/5
(36)
Which of the following statements correctly describes the malware characteristic of polymorphism?
(Multiple Choice)
4.8/5
(32)
The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?
(Multiple Choice)
4.8/5
(29)
A hacker, in the original sense of the word, is someone with technical skill and malicious intent.
(True/False)
4.8/5
(30)
The term malware is derived from a combination of the words malicious and software.
(True/False)
4.9/5
(34)
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?
(Multiple Choice)
4.9/5
(35)
In the typical social engineering attack cycle, what occurs at Phase 3?
(Multiple Choice)
4.7/5
(32)
In a red team-blue team exercise, what is the purpose of the blue team?
(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)