Exam 15: Vulnerability Assessment and Third Party Integration
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
A port scanner can be used to search a system for port vulnerabilities. The RADMIN port scanner is an example of this type of software.
Free
(True/False)
4.8/5
(40)
Correct Answer:
True
A(n) ____________________ box test is one in which some limited information has been provided to the tester.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
gray
Describe the purpose of a honeypot.
Free
(Essay)
4.8/5
(28)
Correct Answer:
A honeypot can also direct an attacker's attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server.
Match the following terms to the appropriate definitions.
-In software development, the process of defining a collection of hardware and software components along with their interfaces in order to create the framework for software development.
(Multiple Choice)
4.8/5
(34)
An administrator needs to view packets and decode and analyze their contents. What type of application should the administrator use?
(Multiple Choice)
4.8/5
(33)
What term below describes a prearranged purchase or sale agreement between a government agency and a business?
(Multiple Choice)
4.8/5
(26)
A healthy security posture results from a sound and workable strategy toward managing risks.
(True/False)
4.8/5
(34)
When using a black box test, many testers use ____________________ tricks to learn about the network infrastructure from inside employees.
(Short Answer)
4.8/5
(33)
If TCP port 20 is open, then an attacker can assume that FTP is being used.
(True/False)
5.0/5
(34)
Match the following terms to the appropriate definitions.
-In software development, presenting the code to multiple reviewers in order to reach agreement about its security.
(Multiple Choice)
4.8/5
(38)
List and describe the three categories that TCP/IP divides port numbers into.
(Essay)
4.8/5
(40)
Match the following terms to the appropriate definitions.
-A computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, but are actually imitations of real data files, to trick attackers into revealing their attack techniques.
(Multiple Choice)
4.8/5
(36)
Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.
(Short Answer)
4.9/5
(41)
Match the following terms to the appropriate definitions.
-A comparison of the present state of a system to its baseline.
(Multiple Choice)
4.8/5
(38)
The first step in a vulnerability assessment is to determine the assets that need to be protected.
(True/False)
4.8/5
(34)
What is the name of the process that takes a snapshot of the current security of an organization?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)