Deck 9: Hardware and Software Controls

ملء الشاشة (f)
exit full mode
سؤال
Password cracking is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The merits of firewalls include all the following except

A) Costs
B) Complexity
C) Wide availability
D) Vulnerability to poor configuration
سؤال
Password guessing is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
سؤال
In enterprise networks, power users can facilitate patch management by

A) Administering as much of the patch management themselves as possible
B) Setting automatic updates to as many services and software as possible
C) Using department funds to deploy local patch management systems to as many systems as possible
D) Allowing system administrators to controls as much of the patch management as possible
سؤال
A PIN is

A) A short numerical password
B) A sequences of words used as a password
C) An alpha-numeric phrase used for authentication
D) None of the above
سؤال
Password capturing is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
سؤال
Password management is

A) A list of permissions attached to specified objects
B) A form of protection that allows one network to connect to another network while maintaining some amount of protection
C) The process of defining, implementing, and maintaining password policies throughout an enterprise
D) Passwords on the system known to unauthorized users
سؤال
An ACL is

A) The process of defining, implementing, and maintaining password policies throughout an enterprise
B) A list of permissions attached to specified objects
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
سؤال
PINs are useful in high security systems
سؤال
Limitations of IDS include

A) Evasion
B) Passwords
C) Complexity
D) Access
سؤال
A firewall is

A) A list of permissions attached to specified objects
B) The process of defining, implementing, and maintaining password policies throughout an enterprise
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
سؤال
Compromised passwords is/ are

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
سؤال
The de-militarized zone in the context of information security refers to

A) The network that hosts external services such as email, web and DNS
B) The Internet
C) The internal corporate network
D) The organization's reception area
سؤال
An IDS that compares observed events against defined activities for each protocol is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
سؤال
An IDS that compares observed activity with defined patterns is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
سؤال
A password policy is

A) A set of rules for using passwords
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
سؤال
Threats to passwords include

A) Password guessing
B) Password capturing
C) Password replacing
D) All of the above
سؤال
Considerations while prioritizing patches include all of the following except the

A) Importance of the vulnerability
B) Importance of the system to be patched
C) Licensing costs
D) Dependencies with other patches
سؤال
Patches should always be installed as soon as they become available
سؤال
An IDS that looks for specific sequences of bytes is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
سؤال
Assessing the safety of a file using scores calculated from its observable attributes is called

A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
سؤال
Examining byte sequences in incoming and outgoing data is called

A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
سؤال
End-point protection defends against attacks on

A) Firewalls
B) Offices
C) Vehicles
D) Desktops
سؤال
End-point protection defends against attacks on

A) Firewalls
B) Offices
C) Vehicles
D) Desktops
سؤال
Methods used by endpoint security software for recognizing malware include

A) Reputations
B) Cracking
C) Certificates
D) Passwords
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Hardware and Software Controls
1
Password cracking is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
D
2
The merits of firewalls include all the following except

A) Costs
B) Complexity
C) Wide availability
D) Vulnerability to poor configuration
D
3
Password guessing is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
C
4
In enterprise networks, power users can facilitate patch management by

A) Administering as much of the patch management themselves as possible
B) Setting automatic updates to as many services and software as possible
C) Using department funds to deploy local patch management systems to as many systems as possible
D) Allowing system administrators to controls as much of the patch management as possible
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
A PIN is

A) A short numerical password
B) A sequences of words used as a password
C) An alpha-numeric phrase used for authentication
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Password capturing is

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Password management is

A) A list of permissions attached to specified objects
B) A form of protection that allows one network to connect to another network while maintaining some amount of protection
C) The process of defining, implementing, and maintaining password policies throughout an enterprise
D) Passwords on the system known to unauthorized users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
An ACL is

A) The process of defining, implementing, and maintaining password policies throughout an enterprise
B) A list of permissions attached to specified objects
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
PINs are useful in high security systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
Limitations of IDS include

A) Evasion
B) Passwords
C) Complexity
D) Access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
A firewall is

A) A list of permissions attached to specified objects
B) The process of defining, implementing, and maintaining password policies throughout an enterprise
C) A form of protection that allows one network to connect to another network while maintaining some amount of protection
D) Passwords on the system known to unauthorized users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Compromised passwords is/ are

A) Passwords on the system known to unauthorized users
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
The de-militarized zone in the context of information security refers to

A) The network that hosts external services such as email, web and DNS
B) The Internet
C) The internal corporate network
D) The organization's reception area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
An IDS that compares observed events against defined activities for each protocol is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
An IDS that compares observed activity with defined patterns is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
A password policy is

A) A set of rules for using passwords
B) Acquiring passwords from storage, network transmission or user knowledge
C) Repeated attempts to authenticate using possible passwords
D) Generating character strings to match existing passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
Threats to passwords include

A) Password guessing
B) Password capturing
C) Password replacing
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Considerations while prioritizing patches include all of the following except the

A) Importance of the vulnerability
B) Importance of the system to be patched
C) Licensing costs
D) Dependencies with other patches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Patches should always be installed as soon as they become available
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
An IDS that looks for specific sequences of bytes is a

A) Firewall
B) Signature-based IDS
C) Anomaly-based IDS
D) Protocol-state IDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Assessing the safety of a file using scores calculated from its observable attributes is called

A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Examining byte sequences in incoming and outgoing data is called

A) Reputation based end-point protection
B) Protocol-based end-point protection
C) Anomaly-based end-point protection
D) Signature-based end-point protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
End-point protection defends against attacks on

A) Firewalls
B) Offices
C) Vehicles
D) Desktops
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
End-point protection defends against attacks on

A) Firewalls
B) Offices
C) Vehicles
D) Desktops
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
Methods used by endpoint security software for recognizing malware include

A) Reputations
B) Cracking
C) Certificates
D) Passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.