Exam 13: Vulnerability Assessment and Data Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What type of reconnaissance is a penetration tester performing if they are using tools that do not raise any alarms?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
B
What process does a penetration tester rely on to access an ever higher level of resources?
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
C
In white box and gray box testing,the first task of the tester is to perform preliminary information gathering on their own from outside the organization,sometimes called open source intelligence (OSINT).
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
If a penetration tester has gained access to a network and then tries to move around inside the network to other resources,what procedure is the tester performing?
(Multiple Choice)
4.8/5
(31)
What is the name of the process that basically takes a snapshot of the current security of an organization?
(Multiple Choice)
4.9/5
(30)
The second step in a vulnerability assessment is to determine the assets that need to be protected.
(True/False)
4.7/5
(36)
What term is defined as the state or condition of being free from public attention to the degree that you determine?
(Multiple Choice)
4.7/5
(34)
Which item below is the standard security checklist against which systems are evaluated for a security posture?
(Multiple Choice)
4.9/5
(33)
An administrator needs to view packets and decode and analyze their contents.What type of application should the administrator use?
(Multiple Choice)
4.8/5
(34)
Which of the following is the goal of a vulnerability scan? (Choose all that apply. )
(Multiple Choice)
4.7/5
(28)
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound traffic?
(Multiple Choice)
5.0/5
(30)
Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic,yet they are imitations of real data files?
(Multiple Choice)
5.0/5
(40)
List and describe the three categories that TCP/IP divides port numbers into.
(Essay)
4.9/5
(38)
Which of the following groups categorize the risks associated with the use of private data? (Choose all that apply. )
(Multiple Choice)
4.9/5
(36)
During a vulnerability assessment,what type of software can be used to search a system for port vulnerabilities?
(Multiple Choice)
4.9/5
(42)
What process addresses how long data must be kept and how it is to be secured?
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)