Deck 9: Hardware and Software Controls
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
العب
ملء الشاشة (f)
Deck 9: Hardware and Software Controls
1
Password cracking is
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
D
2
The merits of firewalls include all the following except
A) Costs
B) Complexity
C) Wide availability
D) Vulnerability to poor configuration
A) Costs
B) Complexity
C) Wide availability
D) Vulnerability to poor configuration
D
3
Password guessing is
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
C
4
In enterprise networks, power users can facilitate patch management by
A) Administering as much of the patch management themselves as possible
B) Setting automatic updates to as many services and software as possible
C) Using department funds to deploy local patch management systems to as many systems as possible
D) Allowing system administrators to controls as much of the patch management as possible
A) Administering as much of the patch management themselves as possible
B) Setting automatic updates to as many services and software as possible
C) Using department funds to deploy local patch management systems to as many systems as possible
D) Allowing system administrators to controls as much of the patch management as possible
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
A PIN is
A) A short numerical password
B) A sequences of words used as a password
C) An alpha-numeric phrase used for authentication
D) None of the above
A) A short numerical password
B) A sequences of words used as a password
C) An alpha-numeric phrase used for authentication
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Password capturing is
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Password management is
A) A list of permissions attached to specified objects
B) A form of protection that allows one network to connect to another network while maintaining some amount of protection
C) The process of defining, implementing, and maintaining password policies throughout an enterprise
D) Passwords on the system known to unauthorized users
A) A list of permissions attached to specified objects
B) A form of protection that allows one network to connect to another network while maintaining some amount of protection
C) The process of defining, implementing, and maintaining password policies throughout an enterprise
D) Passwords on the system known to unauthorized users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
An ACL is
A) The process of defining, implementing, and maintaining password policies throughout an enterprise
B) A list of permissions attached to specified objects
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
A) The process of defining, implementing, and maintaining password policies throughout an enterprise
B) A list of permissions attached to specified objects
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
PINs are useful in high security systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
Limitations of IDS include
A) Evasion
B) Passwords
C) Complexity
D) Access
A) Evasion
B) Passwords
C) Complexity
D) Access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
A firewall is
A) A list of permissions attached to specified objects
B) The process of defining, implementing, and maintaining password policies throughout an enterprise
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
A) A list of permissions attached to specified objects
B) The process of defining, implementing, and maintaining password policies throughout an enterprise
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Compromised passwords is/ are
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
The de-militarized zone in the context of information security refers to
A) The network that hosts external services such as email, web and DNS
B) The Internet
C) The internal corporate network
D) The organization's reception area
A) The network that hosts external services such as email, web and DNS
B) The Internet
C) The internal corporate network
D) The organization's reception area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
An IDS that compares observed events against defined activities for each protocol is a
A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
An IDS that compares observed activity with defined patterns is a
A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
A password policy is
A) A set of rules for using passwords
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
A) A set of rules for using passwords
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
Threats to passwords include
A) Password guessing
B) Password capturing
C) Password replacing
D) All of the above
A) Password guessing
B) Password capturing
C) Password replacing
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Considerations while prioritizing patches include all of the following except the
A) Importance of the vulnerability
B) Importance of the system to be patched
C) Licensing costs
D) Dependencies with other patches
A) Importance of the vulnerability
B) Importance of the system to be patched
C) Licensing costs
D) Dependencies with other patches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Patches should always be installed as soon as they become available
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
An IDS that looks for specific sequences of bytes is a
A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Assessing the safety of a file using scores calculated from its observable attributes is called
A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Examining byte sequences in incoming and outgoing data is called
A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
End-point protection defends against attacks on
A) Firewalls
B) Offices
C) Vehicles
D) Desktops
A) Firewalls
B) Offices
C) Vehicles
D) Desktops
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
End-point protection defends against attacks on
A) Firewalls
B) Offices
C) Vehicles
D) Desktops
A) Firewalls
B) Offices
C) Vehicles
D) Desktops
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
Methods used by endpoint security software for recognizing malware include
A) Reputations
B) Cracking
C) Certificates
D) Passwords
A) Reputations
B) Cracking
C) Certificates
D) Passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck