Security

Is this your test? Login to manage it. If not, you can develop a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A firewall is classified as a ______ control.
2.
1 point
You receive a few packets but no connection gets established. When you look at the logs, you notice you received a few SYN packets, immediately followed by RST packets, but no ACK packets. Which of the following is the most likely cause?
3.
1 point
Which of the following security concepts limits a user's rights to the lowest possible level needed to perform his tasks?
4.
1 point
ten million dollar test centre in flood zone. Flood would destroy 90%. Floods occur once a decade. What is SLE from a flood?
5.
1 point
The ICMP protocol is specifically designed to:
6.
1 point
In security environments, Authentication means
7.
1 point
What is the most common type of computer crime seen by security professionals?
8.
1 point
A ____ spreads from computer to computer but unlike other malware, it has the ability to travel and replicate itself without any user intervention.
9.
1 point
The TCP/IP 3-way handshake for session initiation requires the use of which 2 TCP flags?
10.
1 point
Which of the following is not a characteristic of defence in depth?
11.
1 point
You make mistakes. Mistakes cost co workers 30 minutes to fix they are paid $20/hour. If you make 10 mistakes/day and work 250 days a year whats is ALE to your company as result of your errors?
12.
1 point
An interruptible power supply (UPS) is classified as a _____ control.
13.
1 point
In risk assessment which of the following estimates the frequency of an even?
14.
1 point
Microsoft’s Security Compliance Manager tool contains security baselines for applications such as Microsoft Office and Internet Explorer.
15.
1 point
Which of the following is an example of e-mail phishing?
16.
1 point
In risk assessment which of the following represents the expected loss from a single occurrence of a threat exploring a vulnerability?
17.
1 point
Which of the following software tools includes baseline templates derived from Microsoft’s security guide recommendations and industry best practices?
18.
1 point
In terms of security, social engineering is considered to be a form of:
19.
1 point
Which of the following tools will help you confirm which services are running on a port?
20.
1 point
An unethical hacker is also referred to s a ____.
21.
1 point
______ is the principle that you can never reduce a risk to zero
22.
1 point
Which of the following software tools can be used to configure system security?
23.
1 point
Which of the following software tools can determine if any security updates or service packs are missing from a Windows operating system?
24.
1 point
The loss or omission of one of the goals of security is known as:
25.
1 point
_____ controls are largely policies and procedures.
26.
1 point
A _____________ defines a set of basic security objectives which must be met by any given service or system.
27.
1 point
Over time, the amount of knowledge required to hack into computer systems has ____.
28.
1 point
Which of the following is not a criterion used to classify data?
29.
1 point
In risk assessment, an estimate of the degree of destruction that will occur is called the:
30.
1 point
What are the three primary objectives of security?
31.
1 point
From the perspective of risk management, security can be defines as:
32.
1 point
Which of the following is not an advantage of defence in depth?
33.
1 point
A phreaker is a _____
34.
1 point
Packet sniffing is considered to be a form of:
35.
1 point
What do you call an attack in which the attacker sends a continuous stream of packets from different sources toward the same destination?
36.
1 point
Which one of the tool's below can be used as an effective vulnerability scanner?
37.
1 point
Microsoft’s Baseline Security Analyzer does not support Windows 8.
38.
1 point
A typical Man-in-the-Middle attack attempts to exploit a ____ between computers.
39.
1 point
If you document that there is a risk but you take no action to mitigate that risk you are:
40.
1 point
Which of the following is not a technical policy?
41.
1 point
Which if the following does a designer not need to care about when designing network security?