Exam 12: Appendix: Managing the Security Process
Exam 1: Core Network Concepts and Terminology68 Questions
Exam 2: Network Standards112 Questions
Exam 3: Network Management66 Questions
Exam 4: Network Security106 Questions
Exam 5: Ethernet 802.3switched Lans91 Questions
Exam 6: Wireless Lans I92 Questions
Exam 7: Wireless Lans II73 Questions
Exam 8: TCP/IP Internetworking I86 Questions
Exam 9: TCP/IP Internetworking II81 Questions
Exam 10: Carrier Wide Area Networks Wans81 Questions
Exam 11: Networked Applications84 Questions
Exam 12: Appendix: Managing the Security Process69 Questions
Select questions type
CSIRTs rehearse an incident by talking about what should be done without actually doing it in ________.
Free
(Multiple Choice)
4.9/5
(44)
Correct Answer:
C
Companies should ________ single points of takeover.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
The goal of security is to eliminate risk.
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
Allowing a user access to edit files in a specific directory is an example of ________.
(Multiple Choice)
4.8/5
(26)
An attacker must break through two firewalls to get to a host.This most specifically illustrates the ________ principle.
(Multiple Choice)
4.8/5
(31)
Live rehearsals are important because they ________ compared to desktop rehearsals.
(Multiple Choice)
4.8/5
(27)
Device IDSs typically send log files to the central IDS log file using the ________ protocol.
(Multiple Choice)
4.8/5
(39)
The Target attackers probably first broke into Target using the credentials of a(n)________.
(Multiple Choice)
4.8/5
(32)
Which department will almost always be involved in a CSIRT?
(Multiple Choice)
4.8/5
(36)
Servers in the Demilitarized Zone (DMZ)are rarely attacked by clients on the Internet.
(True/False)
4.8/5
(29)
To address uniformity of credentials verification throughout a large company,credentials verification information is usually stored in a single ________.
(Multiple Choice)
4.8/5
(38)
A building with some unlocked exterior doors most specifically violates the principle of ________.
(Multiple Choice)
4.9/5
(33)
Errors in assigning permission are reduced if assignments are based on ________.
(Multiple Choice)
5.0/5
(40)
Showing 1 - 20 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)