NCS 181

Is this your test? Login to manage it. If not, you can develop a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
In an environment in which administrators, the accounting department, and the marketing department all have different levels of access, which of the following access control models is used?
2.
1 point
Which layer of the OSI model is where SSL provides encryption?
3.
1 point
What is a definition of implicit deny?
4.
1 point
Which of the following details one of the primary benefits of using S/MIME?
5.
1 point
Employees in the accounting department are forced to take time off from their duties on a regular basis. What would direct this?
6.
1 point
Which layer of the OSI model does IPSec operate at?
7.
1 point
In an attempt to collect information about a user's activities, which of the following will be used by spyware?
8.
1 point
For a remote tech to log in to and remotely control a user's computer in another state, what inbound port must be open on the user’s computer?
9.
1 point
Which type of key is usually first applied to a message digest to provide nonrepudiation when using asymmetric cryptography?
10.
1 point
An administrator wants to reduce the size of the attack surface of Windows server 2003. Which of the following is the best answer to accomplish this?
11.
1 point
Of the following, which statement correctly describes the difference between a secure cipher and a secure hash?
12.
1 point
Which of the following is a security reason to implement virtualization in your network?
13.
1 point
What is it known as when a Web script runs in its own environment and does not interfere with other processes?
14.
1 point
What is the most effective method of preventing computer viruses from spreading through the network?
15.
1 point
When encrypting credit card data, which would be the most secure algorithm with the least CPU utilization?
16.
1 point
A user is issued a token with a number displayed in an LCD. What does this provide?
17.
1 point
When users in your company attempt to access a particular website, the attempts are redirected to a spoofed website. What are two possible reasons for this?
18.
1 point
What type of malware do users inadvertently install with USB thumb drives?
19.
1 point
Which of the following is when a biometric system identifies a legitimate user as unauthorized?
20.
1 point
Which of the following enables or denies access to resources through the use of ports?
21.
1 point
What kind of attack is it when the packets sent do not require a synchronization process and are not connection-oriented?
22.
1 point
To mitigate risks when users access company e-mail with their cell phone, what security policy should be implemented on the cell phone?
23.
1 point
Of the following, which is not a logical method of access control?
24.
1 point
How many of the TCP/IP ports can be attacked?
25.
1 point
Which of the following is used by PGP to encrypt data.
26.
1 point
Of the following choices, what is the best choice for a device to filter and cache content from web pages?
27.
1 point
Sally encrypted a project file with her public key. Later, an administrator accidentally deleted her account that had exclusive access to her private key. Can this project file be retrieved?
28.
1 point
Which of the following encryption algorithms can encrypt and decrypt data?
29.
1 point
A DDoS attack can be best defined as what?
30.
1 point
You finished installing the operating system for a home user. What are three good methods to implement to secure that operating system? (Select the three best answers.)
31.
1 point
An attacker is entering incorrect data into a form on a web page. The result shows the attacker the type of database used by the website and provides hints on what SQL statements the database accepts. What can prevent this?