Deck 12: Apps - Data - Host
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/15
Play
Full screen (f)
Deck 12: Apps - Data - Host
1
John wants to implement a firewall which monitors only TCP ports and allows all traffic to be passed once a connection is established. Which type of firewall should he use?
A)Stateful Inspection Firewalls
B)Application filtering
C)Packet Filtering Firewall
D)Circuit-Level Firewall
A)Stateful Inspection Firewalls
B)Application filtering
C)Packet Filtering Firewall
D)Circuit-Level Firewall
Circuit-Level Firewall
2
You are a security administrator at your organization. Which of the following should you do when a new patch is released for a server?
A)Ignore the patch.
B)Immediately install the patch on the production server.
C)Review discussion forums for the usefulness of this patch.
D)Test the patch on a test server and then install the patch on the production server.
A)Ignore the patch.
B)Immediately install the patch on the production server.
C)Review discussion forums for the usefulness of this patch.
D)Test the patch on a test server and then install the patch on the production server.
Test the patch on a test server and then install the patch on the production server.
3
What is the process of applying manual changes to a program called?
A)Hot fixing
B)Patching
C)Service packing
D)Updating
A)Hot fixing
B)Patching
C)Service packing
D)Updating
Patching
4
John is using IE version 6.0 as his browser. He wants to enable ActiveX controls and he also wants a high level of security set for the Internet zone. How can he accomplish this?
A)Re-install the browser.
B)Upgrade to IE 7.0.
C)He cannot accomplish this.
D)If the security level for Internet is high, the ActiveX controls are automatically disabled. Modify the ActiveX controls in Custom Level tab.
A)Re-install the browser.
B)Upgrade to IE 7.0.
C)He cannot accomplish this.
D)If the security level for Internet is high, the ActiveX controls are automatically disabled. Modify the ActiveX controls in Custom Level tab.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements are true about ActiveX controls?
A)ActiveX downloads on the computer cannot be stopped.
B)ActiveX runs on the server.
C)Web browsers can be configured so that they require confirmation to accept an ActiveX control.
D)ActiveX uses Authenticode for encryption.
A)ActiveX downloads on the computer cannot be stopped.
B)ActiveX runs on the server.
C)Web browsers can be configured so that they require confirmation to accept an ActiveX control.
D)ActiveX uses Authenticode for encryption.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
6
John is working as a security advisor. Of late, he is going nuts with the number of virus infected computers reported to the IT department every day. A common cause of this seems to be virus infection while using web browsers. Which of the following should John advise the IT department to do to resolve the problem?
A)Disable unauthorized ActiveX controls
B)Implement a VPN
C)Install a firewall
D)Re-install the OS
A)Disable unauthorized ActiveX controls
B)Implement a VPN
C)Install a firewall
D)Re-install the OS
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
7
John is getting frequent complaints from users about receiving unsolicited e-mails from an e-mail address. What should he do to prevent this from occurring?
A)Configure Outlook to block these e-mails.
B)Configure a rule in each user's router and restart the router.
C)Configure the firewall to block e-mails.
D)Install an anti-spam filter for the domain mail servers and filter out the offending e-mail address.
A)Configure Outlook to block these e-mails.
B)Configure a rule in each user's router and restart the router.
C)Configure the firewall to block e-mails.
D)Install an anti-spam filter for the domain mail servers and filter out the offending e-mail address.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
8
What is a testing technique that involves finding bugs in software by using malformed data injection called?
A)SQL injection
B)Fuzzing test
C)Penetration test
D)Social engineering
A)SQL injection
B)Fuzzing test
C)Penetration test
D)Social engineering
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
9
What is Application Patch Management?
A)A strategy that involves what patches can be applied to various systems at differing times.
B)Applying only one patch every day.
C)Patching a Server only.
D)A way to track attacks on systems network wide.
A)A strategy that involves what patches can be applied to various systems at differing times.
B)Applying only one patch every day.
C)Patching a Server only.
D)A way to track attacks on systems network wide.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
10
What would be the advantage of cloud computing in regards to security?
A)More servers to resist attacks
B)An invisible place to hide from attackers
C)Files are accessible from anywhere.
D)Data is centralized and thus easier to protect and manage
A)More servers to resist attacks
B)An invisible place to hide from attackers
C)Files are accessible from anywhere.
D)Data is centralized and thus easier to protect and manage
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
11
Anti-malware is software that can protect against all of the following except:
A)Viruses
B)Spam
C)Phishing
D)Spyware
A)Viruses
B)Spam
C)Phishing
D)Spyware
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is not a best practice for securing a mobile device?
A)Screen lock
B)Device encryption
C)Social networking
D)Remote wipe
A)Screen lock
B)Device encryption
C)Social networking
D)Remote wipe
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
13
A business implements a system in which, in case of a disaster, they have a site that is already online and ready to take over operation with little to no down time. What has this business implemented?
A)Hot Site
B)Warm Site
C)Lukewarm Site
D)Cold Site
A)Hot Site
B)Warm Site
C)Lukewarm Site
D)Cold Site
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is an application layer protocol used to alter directory information over a network?
A)LDAP
B)TFPT
C)SSH
D)HTTP
A)LDAP
B)TFPT
C)SSH
D)HTTP
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
15
An operating system that has enough multilevel security that it meets government requirements is called:
A)Windows
B)MAC OS
C)Trusted Operating System
D)Secure Operating System
A)Windows
B)MAC OS
C)Trusted Operating System
D)Secure Operating System
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck