Exam 9: Network Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

(Multiple Choice)
4.8/5
(36)

What are some of the characteristics of malware that make it difficult to detect?

(Essay)
4.8/5
(34)

What is the Nmap utility used for?

(Multiple Choice)
4.7/5
(33)

List and describe the four different locations in which anti-malware can be installed.

(Essay)
5.0/5
(37)

Which command can be used on a Windows system to create a hash of a file?

(Multiple Choice)
4.7/5
(33)

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?

(Multiple Choice)
4.8/5
(32)

What statement regarding the different versions of the SHA hashing algorithm is accurate?

(Multiple Choice)
4.7/5
(37)

Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

(Multiple Choice)
4.7/5
(31)

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

(Multiple Choice)
4.8/5
(26)

Which of the following scenarios would necessitate the use of a non-disclosure agreement?

(Multiple Choice)
4.9/5
(43)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)