Exam 15: Vulnerability Assessment and Third Party Integration
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Match the following terms to the appropriate definitions.
-A penetration test where some limited information has been provided to the tester.
(Multiple Choice)
4.9/5
(34)
The comparison of the present state of a system to its baseline is known as what?
(Multiple Choice)
4.7/5
(36)
During a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?
(Multiple Choice)
4.8/5
(37)
When a security hardware device fails or a program aborts, which state should it go into?
(Essay)
4.9/5
(30)
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as a:
(Multiple Choice)
4.8/5
(37)
Vulnerability scans are usually performed from outside the security perimeter.
(True/False)
4.9/5
(50)
____________________ for organizations are intended to identify vulnerabilities and alert network administrators to these problems.
Matching
a.Architectural design
b.Attack surface
c.Baseline reporting
d.Code review
e.Gray box
(Short Answer)
4.9/5
(36)
What term below describes the start-up relationship between partners?
(Multiple Choice)
4.8/5
(39)
Which item below is an imaginary line by which an element is measured or compared, and can be seen as the standard?
(Multiple Choice)
4.8/5
(33)
What is the name for the code that can be executed by unauthorized users within a software product?
(Multiple Choice)
4.9/5
(39)
The goal of what type of threat evaluation is to better understand who the attackers are, why they attack, and what types of attacks might occur?
(Multiple Choice)
4.9/5
(41)
Match the following terms to the appropriate definitions.
-The start-up relationship agreement between parties.
(Multiple Choice)
4.7/5
(38)
An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be in?
(Multiple Choice)
5.0/5
(36)
Match the following terms to the appropriate definitions.
-The code that can be executed by unauthorized users in a software program
(Multiple Choice)
4.8/5
(29)
A port in what state below implies that an application or service assigned to that port is listening for any instructions?
(Multiple Choice)
4.8/5
(42)
What security goal do the following common controls address: hashing, digital signatures, certificates, nonrepudiation tools?
(Multiple Choice)
5.0/5
(32)
In a __________ test, the tester has no prior knowledge of the network infrastructure that is being tested.
(Short Answer)
4.8/5
(37)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)