Exam 13: Vulnerability Assessment and Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Determining vulnerabilities often depends on the background and experience of the assessor.

(True/False)
4.8/5
(32)

Each packet/datagram contains a source port and destination port.

(True/False)
4.8/5
(35)

What is the end result of a penetration test?

(Multiple Choice)
4.7/5
(24)

An administrator running a port scan wants to ensure that no processes are listening on port 23.What state should the port be in?

(Multiple Choice)
4.9/5
(31)

What type of penetration testing technique is used if the tester has no prior knowledge of the network infrastructure that is being tested?

(Multiple Choice)
4.8/5
(26)

What is the term for a network set up with intentional vulnerabilities?

(Multiple Choice)
4.8/5
(31)

Nslookup displays detailed information about how a device is communicating with other network devices.

(True/False)
4.8/5
(32)

Vulnerability scanning should be conducted on existing systems and particularly as new technology equipment is deployed.

(True/False)
4.8/5
(33)

Which data erasing method will permanently destroy a magnetic-based hard disk by reducing or eliminating the magnetic field?

(Multiple Choice)
4.8/5
(37)

Netstat displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP)and DNS settings.

(True/False)
4.9/5
(27)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)