multi test g

Card Set Information

Author:
johnnystevens
ID:
10953
Filename:
multi test g
Updated:
2010-03-17 13:01:18
Tags:
testing
Folders:

Description:
multiple choice upload test
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user johnnystevens on FreezingBlue Flashcards. What would you like to do?


  1. 601 A user ID, PIN, and a palm scan are all required to authenticate a system. Which of the following is this an example of?

    A. SSO
    B. Single-factor authentication
    C. Three-factor authentication
    D. Two-factor authentication
    D. Two-factor authentication
    (this multiple choice question has been scrambled)
  2. 602 Which of the following would be disabled to prevent SPIM?

    A. P2P
    B. ActiveX controls
    C. Instant messaging
    D. Internet mail
    C. Instant messaging
    (this multiple choice question has been scrambled)
  3. 603 A user sees an MD5 hash number beside a file that they wish to download. Which of the following BEST describes a hash?

    A. A hash is a unique number that is generated based upon the files contents and should be verified after download
    B. A hash is a unique number that is generated after the file has been encrypted and used as the SSL key during download
    C. A hash is a unique number that is generated based upon the TCP/IP transmission header and should be verified before download
    D. A hash is a unique number that is generated based upon the files contents and used as the SSL key during download
    A. A hash is a unique number that is generated based upon the files contents and should be verified after download
    (this multiple choice question has been scrambled)
  4. 604 According to a good disaster recovery plan, which of the following must happen during a power outage before an uninterruptible power supply (UPS) drains its battery?

    A. The PKI CA is relocated
    B. The backup generator activates
    C. The single point of failure is remedied
    D. Full electrical service is restored
    B. The backup generator activates
    (this multiple choice question has been scrambled)
  5. 605 Which of the following would give a technician the MOST information regarding an external attack on the network?

    A. NIDS
    B. Internet content filter
    C. Proxy server
    D. Firewall
    A. NIDS
    (this multiple choice question has been scrambled)
  6. 606 Which of the following would BEST prevent night shift workers from logging in with IDs and passwords stolen from the day shift workers?

    A. Time of day restriction
    B. Domain password policy
    C. Account expiration
    D. Account lockout
    A. Time of day restriction
    (this multiple choice question has been scrambled)
  7. 607 Which of the following would BEST ensure that users have complex passwords?

    A. Logical tokens
    B. ACL
    C. Domain password policy
    D. Time of day restrictions
    C. Domain password policy
    (this multiple choice question has been scrambled)
  8. 608 A technician finds that a malicious user has introduced an unidentified virus to a single file on the network. Which of the following would BEST allow for the user to be identified?

    A. Antivirus logs
    B. Firewall logs
    C. Access logs
    D. Performance log
    C. Access logs
    (this multiple choice question has been scrambled)
  9. 609 Which of the following would BEST allow an administrator to find the IP address of an external attacker?

    A. DNS logs
    B. Antivirus logs
    C. Performance logs
    D. Firewall logs
    D. Firewall logs
    (this multiple choice question has been scrambled)
  10. 610 After performing a vulnerability analysis and applying a security patch, which of the following non-intrusive actions should an administrator take to verify that the vulnerability was truly removed?

    A. Apply a security patch from the vendor
    B. Repeat the vulnerability scan
    C. Perform a penetration test
    D. Update the antivirus definition file
    B. Repeat the vulnerability scan
    (this multiple choice question has been scrambled)
  11. 611 Which of the following could be used by a technician needing to send data while ensuring that any data tampering is easily detectible?

    A. AES
    B. LANMAN
    C. NTLM
    D. SHA-1
    D. SHA-1
    (this multiple choice question has been scrambled)
  12. 612 Which of the following BEST allows for a high level of encryption?

    A. DES with SHA-1
    B. AES with ECC
    C. PGP with SHA-1
    D. 3DES with MD5
    B. AES with ECC
    (this multiple choice question has been scrambled)
  13. 613 Which of the following is the primary security risk associated with removable storage?

    A. Availability
    B. Injection
    C. Confidentiality
    D. Integrity
    C. Confidentiality
    (this multiple choice question has been scrambled)
  14. 614 After reading about the vulnerability issues with open SMTP relays, a technician runs an application to see if port 25 is open. This would be considered a:

    A. port scan
    B. vulnerability scan
    C. network mapper
    D. protocol analyzer
    A. port scan
    (this multiple choice question has been scrambled)
  15. 615 A company?s accounting application requires users to be administrators for the software to function correctly. Because of the security implications of this, a network administrator builds a user profile which allows the user to still use the application but no longer requires them to have administrator permissions.
    Which of the following is this an example of?

    A. Privilege escalation
    B. Group policy
    C. Security template
    D. Configuration baseline
    C. Security template
    (this multiple choice question has been scrambled)
  16. 616 Which of the following backup techniques resets the archive bit and allows for the fastest recovery?

    A. Incremental backup
    B. Shadow copies
    C. Differential backup
    D. Full backup
    D. Full backup
    (this multiple choice question has been scrambled)
  17. 617 The company policy for availability requires full backups on Sunday and incremental backups each week night at 10 p.m. The file server crashes on Wednesday afternoon; how many tapes will the technician need to restore the data on the file server for Thursday morning?

    A. Three
    B. Four
    C. One
    D. Two
    A. Three
    (this multiple choice question has been scrambled)
  18. 618 A company is addressing backup and recovery issues. The company is looking for a compromise between speed of backup and speed of recovery. Which of the following is the BEST recommendation?

    A. Full backups weekly with differential backups daily
    B. Weekly differential with incremental backups daily
    C. Daily differential backups
    D. Full backups every day
    A. Full backups weekly with differential backups daily
    (this multiple choice question has been scrambled)
  19. 619 Which of the following would define document destruction requirements?

    A. User access and rights review policies
    B. Storage and retention policies
    C. ACL
    D. Group policy
    B. Storage and retention policies
    (this multiple choice question has been scrambled)
  20. 620 Part of a standard policy for hardening workstations and servers should include applying the company security template and:

    A. applying all updates, patches and hotfixes immediately
    B. installing the NIDS
    C. disabling SSID broadcast
    D. closing unnecessary network ports
    D. closing unnecessary network ports
    (this multiple choice question has been scrambled)
  21. 621 Setting a baseline is required in which of the following? (Select TWO)

    A. Anomaly-based monitoring
    B. NIDS
    C. Signature-based monitoring
    D. NIPS
    E. Behavior-based monitoring
    • A. Anomaly-based monitoring
    • E. Behavior-based monitoring
  22. 622 Which of the following hidden programs gathers information with or without the users knowledge with the primary purpose of advertising?

    A. Trojan
    B. Worm
    C. Virus
    D. Spyware
    D. Spyware
    (this multiple choice question has been scrambled)
  23. 623 Which of the following provides best practice with a wireless network?

    A. WPA
    B. 3DES with RADIUS
    C. WEP 128-bit
    D. WPA with RADIUS
    D. WPA with RADIUS
    (this multiple choice question has been scrambled)
  24. 624 Which of the following sites has the means (E. g. equipment, software, and communications) to facilitate a full recovery within minutes?

    A. Hot site
    B. Cold site
    C. Warm site
    D. Reciprocal site
    A. Hot site
    (this multiple choice question has been scrambled)
  25. 625 When conducting an environmental security assessment, which of the following items should be included in the assessment? (Select THREE)

    A. HVAC
    B. Card access system
    C. Off-site data storage
    D. Logical access
    E. Utilities
    F. Fire detection
    • A. HVAC
    • E. Utilities
    • F. Fire detection
  26. 626 Which of the following security steps must a user complete before access is given to the network?

    A. Authentication and password
    B. Identification and authentication
    C. Identification and authorization
    D. Authentication and authorization
    B. Identification and authentication
    (this multiple choice question has been scrambled)
  27. 627 When placing a NIDS onto the network, the NIC has to be placed in which of the following modes to monitor all network traffic?

    A. Full-duplex
    B. Half-duplex
    C. Promiscuous
    D. Auto
    C. Promiscuous
    (this multiple choice question has been scrambled)
  28. 628 An administrator wants to obtain a view of the type of attacks that are being targeted against the network perimeter. The recommended placement of a NIDS would be:

    A. inside the firewall
    B. outside the proxy
    C. inside the proxy
    D. outside the firewall
    E. inside the DMZ
    D. outside the firewall
    (this multiple choice question has been scrambled)
  29. 629 Once a system has been compromised, often the attacker will upload various tools that can be used at a later date. The attacker could use which of the following to hide these tools?

    A. Virus
    B. Trojan
    C. Rootkit
    D. Logic bomb
    C. Rootkit
    (this multiple choice question has been scrambled)
  30. 630 Which of the following is the perfect encryption scheme and is considered unbreakable when properly used?

    A. Concealment cipher
    B. Steganography
    C. One-time pad
    D. Running key cipher
    C. One-time pad
    (this multiple choice question has been scrambled)
  31. 631 When using a digital signature, the message digest is encrypted with which of the following keys?

    A. Receivers private key
    B. Senders private key
    C. Receivers public key
    D. Senders public key
    B. Senders private key
    (this multiple choice question has been scrambled)
  32. 632 Which of the following is the MOST basic form of IDS?

    A. Behavioral
    B. Statistical
    C. Signature
    D. Anomaly
    C. Signature
    (this multiple choice question has been scrambled)
  33. 633 Which of the following BEST applies to steganography?

    A. Algorithms are not used to encrypt data
    B. Keys are concealed in the data
    C. Algorithms are used to encrypt data
    D. Keys are used to encrypt data
    A. Algorithms are not used to encrypt data
    (this multiple choice question has been scrambled)
  34. 634 Which of the following can steganography be used for?

    A. Encrypt data in graphics
    B. Watermark graphics for copyright
    C. Encrypt a message in WAV files
    D. Decrypt data in graphics
    B. Watermark graphics for copyright
    (this multiple choice question has been scrambled)
  35. 635 Steganography could be used by attackers to:

    A. encrypt and conceal messages in microdots
    B. hide and conceal messages in WAV files
    C. encrypt and decrypt messages in graphics
    D. decrypt data stored in unused disk space
    B. hide and conceal messages in WAV files
    (this multiple choice question has been scrambled)
  36. 636 Which of the following BEST describes how steganography can be accomplished in graphic files?

    A. Replacing the most significant bit of each byte
    B. Replacing the least significant bit of each byte
    C. Replacing the least significant byte of each bit
    D. Replacing the most significant byte of each bit
    B. Replacing the least significant bit of each byte
    (this multiple choice question has been scrambled)
  37. 637 An application developer is looking for an encryption algorithm which is fast and hard to break if a large key size is used. Which of the following BEST meets these requirements?

    A. Transposition
    B. Substitution
    C. Asymmetric
    D. Symmetric
    D. Symmetric
    (this multiple choice question has been scrambled)
  38. 638 Which of the following if used incorrectly would be susceptible to frequency analysis?

    A. Symmetric algorithms
    B. Stream ciphers
    C. Asymmetric algorithms
    D. Transposition ciphers
    D. Transposition ciphers
    (this multiple choice question has been scrambled)
  39. 639 An administrator in an organization with 33,000 users would like to store six months of Internet proxy logs on a dedicated logging server for analysis and content reporting. The reports are not time critical, but are required by upper management for legal obligations. All of the following apply when determining the requirements for the logging server EXCEPT:

    A. time stamping and integrity of the logs
    B. log storage and backup requirements
    C. performance baseline and audit trails
    D. log details and level of verbose logging
    C. performance baseline and audit trails
    (this multiple choice question has been scrambled)
  40. 640 Which of the following BEST describes when a hashing algorithm generates the same hash for two different messages?

    A. A collision occurred
    B. A one-way hash occurred
    C. A hashing chain occurred
    D. A deviation occurred
    A. A collision occurred
    (this multiple choice question has been scrambled)
  41. 641 Which of the following is BEST known for self-replication in networks?

    A. Spyware
    B. Adware
    C. Spam
    D. Worm
    D. Worm
    (this multiple choice question has been scrambled)
  42. 642 Which of the following security threats affects PCs and can have its software updated remotely by a command and control center?

    A. Virus
    B. Worm
    C. Zombie
    D. Adware
    C. Zombie
    (this multiple choice question has been scrambled)
  43. 643 Multiple web servers are fed from a load balancer. Which of the following is this an example of?

    A. RAID
    B. Hot site
    C. Redundant servers
    D. Backup generator
    C. Redundant servers
    (this multiple choice question has been scrambled)
  44. 644 An outside auditor has been contracted to determine if weak passwords are being used on the network.

    To do this, the auditor is running a password cracker against the master password file. Which of the following is this an example of?

    A. Malware scan
    B. Baselining
    C. Vulnerability assessment
    D. Fingerprinting
    C. Vulnerability assessment
    (this multiple choice question has been scrambled)
  45. 645 Password crackers:

    A. cannot exploit weaknesses in encryption algorithms
    B. are sometimes able to crack both passwords and physical tokens
    C. cannot be run remotely
    D. are sometimes able to crack both Windows and UNIX passwords
    D. are sometimes able to crack both Windows and UNIX passwords
    (this multiple choice question has been scrambled)
  46. 646 Logic bombs differ from worms in that:

    A. logic bombs always contain a Trojan component
    B. logic bombs cannot be sent through email
    C. logic bombs cannot spread from computer to computer
    D. logic bombs always have a date or time component
    D. logic bombs always have a date or time component
    (this multiple choice question has been scrambled)
  47. 647 A firewall differs from a NIDS in which of the following ways?

    A. A firewall operates on a rule list and a NIDS attempts to detect patterns
    B. A firewall attempts to detect patterns and a NIDS operates on a rule list
    C. A firewall prevents inside attacks and a NIDS prevents outside attacks
    D. A firewall prevents outside attacks and a NIDS prevents inside attacks
    A. A firewall operates on a rule list and a NIDS attempts to detect patterns
    (this multiple choice question has been scrambled)
  48. 648 A vulnerability has recently been identified for a servers OS. Which of the following describes the BEST course of action?

    A. Wait for an automatic update to be pushed out to the server from the manufacturer
    B. Visit a search engine and search for a possible patch
    C. Visit the operating system manufacturer?s website for a possible patch
    D. Shutdown all affected servers until management can be notified
    C. Visit the operating system manufacturer?s website for a possible patch
    (this multiple choice question has been scrambled)
  49. 649 Personal software firewalls can be updated automatically using:

    A. cookies
    B. corporate hardware firewalls
    C. cross-site scripting
    D. group policy
    D. group policy
    (this multiple choice question has been scrambled)
  50. 650 An accountant has logged onto the company?s external banking website. An administrator using a TCP/IP monitoring tool discovers that the accountant was actually using a spoofed banking website. Which of the following could have caused this attack? (Select TWO)

    A. Altered hosts file
    B. Network mapper
    C. Packet sniffing
    D. DNS poisoning
    E. Bluesnarfing
    • A. Altered hosts file
    • D. DNS poisoning
  51. 651 Which of the following tools would be BEST for monitoring changes to the approved system baseline?

    A. Enterprise resource planning software
    B. Enterprise performance monitoring software
    C. Enterprise antivirus software
    D. Enterprise key management software
    B. Enterprise performance monitoring software
    (this multiple choice question has been scrambled)
  52. 652 All of the following security applications can proactively detect workstation anomalies EXCEPT:

    A. antivirus software
    B. NIDS
    C. personal software firewall
    D. HIPS
    B. NIDS
    (this multiple choice question has been scrambled)
  53. 653 A periodic security audit of group policy can:

    A. show that PII data is being properly protected
    B. show that unnecessary services are blocked on workstations
    C. show that virus definitions are up to date on all workstations
    D. show that data is being correctly backed up
    B. show that unnecessary services are blocked on workstations
    (this multiple choice question has been scrambled)
  54. 654 Which of the following is the primary purpose of an audit trail?

    A. To detect when a user changes security permissions
    B. To detect the encryption algorithm used for files
    C. To prevent a user from changing security settings
    D. To prevent a user from changing security permissions
    A. To detect when a user changes security permissions
    (this multiple choice question has been scrambled)
  55. 655 Which of the following describes a characteristic of the session key in an SSL connection?

    A. It is a hash value
    B. It is an elliptical curve
    C. It is asymmetric
    D. It is symmetric
    D. It is symmetric
    (this multiple choice question has been scrambled)
  56. 656 Which of the following describes the cryptographic algorithm employed by TLS to establish a session key?

    A. Blowfish
    B. RSA
    C. Diffie-Hellman
    D. IKE
    C. Diffie-Hellman
    (this multiple choice question has been scrambled)
  57. 657 Which of the following describes how TLS protects against man-in-the-middle attacks?

    A. The client relies on the MD5 value sent by the server
    B. The client compares the server certificate with the certificate listed on the CRL
    C. The client compares the actual DNS name of the server to the DNS name on the certificate
    D. The client relies on the MAC value sent by the server
    C. The client compares the actual DNS name of the server to the DNS name on the certificate
    (this multiple choice question has been scrambled)
  58. 658 Which of the following is the primary purpose of removing audit logs from a server?

    A. To protect against the log file being changed
    B. To reduce network latency
    C. To demonstrate least privilege to management
    D. To improve the server performance
    A. To protect against the log file being changed
    (this multiple choice question has been scrambled)
  59. 659 Which of the following describes a common problem encountered when conducting audit log reviews?

    A. The audit logs cannot be imported into a spreadsheet
    B. The timestamp for the servers are not synchronized
    C. The servers are not synchronized with the clients
    D. The audit logs are pulled from servers on different days
    B. The timestamp for the servers are not synchronized
    (this multiple choice question has been scrambled)
  60. 660 A technician is conducting a web server audit and discovers that SSLv2 is implemented. The technician wants to recommend that the organization consider using TLS. Which of the following reasons could the technician use to support the recommendation?

    A. SSLv2 reduces server performance
    B. SSLv2 only uses message authentication code values
    C. SSLv2 is susceptible to network sniffing
    D. SSLv2 is susceptible to man-in-the-middle attacks
    D. SSLv2 is susceptible to man-in-the-middle attacks
    (this multiple choice question has been scrambled)
  61. 661 A technician is conducting a password audit using a password cracking tool. Which of the following describes a BEST business practice when conducting a password audit?

    A. Reveal the password
    B. Single out the accounts to crack
    C. Use password masking
    D. Use hybrid mode
    C. Use password masking
    (this multiple choice question has been scrambled)
  62. 662 Which of the following is a security risk when using peer-to-peer software?

    A. Data leakage
    B. Cookies
    C. Licensing
    D. Multiple streams
    A. Data leakage
    (this multiple choice question has been scrambled)
  63. 663 Which of the following overwrites the return address within a program to execute malicious code?

    A. Logic bomb
    B. Privilege escalation
    C. Buffer overflow
    D. Rootkit
    C. Buffer overflow
    (this multiple choice question has been scrambled)
  64. 664 Heaps and stacks are susceptible to which of the following?

    A. Rootkits
    B. Cross-site scripting
    C. Buffer overflows
    D. SQL injection
    C. Buffer overflows
    (this multiple choice question has been scrambled)
  65. 665 All of the following are inline devices EXCEPT:

    A. HIDS
    B. routers
    C. NIPS
    D. firewalls
    A. HIDS
    (this multiple choice question has been scrambled)
  66. 666 Which of the following would a technician use to validate whether specific network traffic is indeed an attack?

    A. Honeypot
    B. NIDS
    C. Firewall
    D. Protocol analyzer
    D. Protocol analyzer
    (this multiple choice question has been scrambled)
  67. 667 Which of the following creates an emulated or virtual environment to detect and monitor malicious activity?

    A. Firewall
    B. Honeypot
    C. NAC
    D. NIDS
    B. Honeypot
    (this multiple choice question has been scrambled)
  68. 668 A technician wants better insight into the websites that employees are visiting. Which of the following is BEST suited to accomplish this?

    A. DNS server
    B. Firewall
    C. DHCP server
    D. Proxy server
    D. Proxy server
    (this multiple choice question has been scrambled)
  69. 669 Bluetooth discover mode is similar to which of the following?

    A. Data emanation
    B. RF analysis
    C. Fuzzing
    D. SSID broadcast
    D. SSID broadcast
    (this multiple choice question has been scrambled)
  70. 670 All of the following are Bluetooth threats EXCEPT:

    A. blue jacking
    B. a smurf attack
    C. bluesnarfing
    D. discovery mode
    B. a smurf attack
    (this multiple choice question has been scrambled)
  71. 671 Which of the following is the BEST approach when reducing firewall logs?

    A. Discard known traffic first
    B. Review chronologically
    C. Search for encrypted protocol usage
    D. Review each protocol one at a time
    A. Discard known traffic first
    (this multiple choice question has been scrambled)
  72. 672 In which of the following logs would notation of a quarantined file appear?

    A. Firewall
    B. Antivirus
    C. NAC
    D. Router
    B. Antivirus
    (this multiple choice question has been scrambled)
  73. 673 Which of the following provides the MOST mathematically secure encryption for a file?

    A. 3DES
    B. AES256
    C. Elliptic curve
    D. One-time pad
    B. AES256
    (this multiple choice question has been scrambled)
  74. 674 Which of the following encryption algorithms relies on the inability to factor large prime numbers?

    A. SHA-1
    B. RSA
    C. Elliptic Curve
    D. AES256
    B. RSA
    (this multiple choice question has been scrambled)
  75. 675 All of the following provide a host active protection EXCEPT:

    A. host-based firewall
    B. antivirus
    C. HIDS
    D. HIPS
    C. HIDS
    (this multiple choice question has been scrambled)
  76. 676 Which of the following simplifies user and computer security administration?

    A. Encrypted file system (EFS)
    B. Printing policies
    C. Directory services
    D. Data retention
    C. Directory services
    (this multiple choice question has been scrambled)
  77. 677 Which of the following is MOST likely to cause pop-ups?

    A. Spam
    B. Botnets
    C. Adware
    D. Rootkit
    C. Adware
    (this multiple choice question has been scrambled)
  78. 678 Which of the following is MOST likely to open a backdoor on a system?

    A. Worm
    B. Logic bomb
    C. Trojan
    D. Botnet
    C. Trojan
    (this multiple choice question has been scrambled)
  79. 679 If a company has a distributed IT staff, each being responsible for separate facilities, which of the following would be the BEST way to structure a directory information tree?

    A. By name
    B. By location
    C. By role
    D. By department
    B. By location
    (this multiple choice question has been scrambled)
  80. 680 A technician wants to be able to add new users to a few key groups by default, which of the following would allow this?

    A. Inheritance
    B. Template
    C. Auto-population
    D. Default ACL
    B. Template
    (this multiple choice question has been scrambled)
  81. 681 Which of the following is a reason to use digital signatures?

    A. Hardware token
    B. Access control list
    C. Non-repudiation
    D. Logical token
    C. Non-repudiation
    (this multiple choice question has been scrambled)
  82. 682 All of the following are logical access control methods EXCEPT:

    A. biometrics
    B. software token
    C. group policy
    D. ACL
    A. biometrics
    (this multiple choice question has been scrambled)
  83. 683 Using the same initial computer image for all systems is similar to which of the following?

    A. Group policy
    B. Patch management
    C. Virtual machine
    D. Configuration baseline
    D. Configuration baseline
    (this multiple choice question has been scrambled)
  84. 684

    Which of the following has the LEAST amount of issues when inspecting encrypted traffic?

    A. Firewall
    B. NIPS
    C. NIDS
    D. Antivirus
    D. Antivirus
    (this multiple choice question has been scrambled)
  85. 685 A technician has come across content on a server that is illegal. Which of the following should the technician do?

    A. Stop and immediately perform a full system backup and contact the owner of the data
    B. Stop and immediately make a backup of the account and contact the owner of the data
    C. Stop and immediately follow company approved incident response procedures
    D. Stop and immediately copy the system files and contact the ISP
    C. Stop and immediately follow company approved incident response procedures
    (this multiple choice question has been scrambled)
  86. 686 Which of the following is a true statement in regards to incident response?

    A. The first thing a technician should do is call in law enforcement
    B. If a technician finds illegal content, the first thing a technician should do is unplug the machine and back it up
    C. If a technician finds illegal content, they should follow company incident response procedures
    D. The first thing a technician should perform is a file system backup
    C. If a technician finds illegal content, they should follow company incident response procedures
    (this multiple choice question has been scrambled)
  87. 687 If a technician is unable to get to a website by its address but the technician can get there by the IP address, which of the following is MOST likely the issue?

    A. DNS server
    B. Proxy server
    C. DHCP server
    D. Firewall
    A. DNS server
    (this multiple choice question has been scrambled)
  88. 688 Which of the following is placed in promiscuous mode, in line with the data flow, to allow a NIDS to monitor the traffic?

    A. Sensor
    B. Appliance
    C. Console
    D. Filter
    A. Sensor
    (this multiple choice question has been scrambled)
  89. 689 In a NIDS, which of the following provides a user interface?

    A. Screen
    B. Console
    C. Appliance
    D. Filter
    B. Console
    (this multiple choice question has been scrambled)
  90. 690 An instance where an IDS identifies legitimate traffic as malicious activity is called which of the following?

    A. True negative
    B. False positive
    C. False negative
    D. True positive
    B. False positive
    (this multiple choice question has been scrambled)
  91. 691 An instance where a biometric system identifies legitimate users as being unauthorized is called which of the following?

    A. False negative
    B. False positive
    C. False rejection
    D. False acceptance
    C. False rejection
    (this multiple choice question has been scrambled)
  92. 692 An instance where a biometric system identifies users that are authorized and allows them access is called which of the following?

    A. False negative
    B. True positive
    C. False positive
    D. True negative
    B. True positive
    (this multiple choice question has been scrambled)
  93. 693 An instance where an IDS identifies malicious activity as being legitimate activity is called which of the following?

    A. False rejection
    B. False acceptance
    C. False positive
    D. False negative
    D. False negative
    (this multiple choice question has been scrambled)
  94. 694 An instance where a biometric system identifies unauthorized users and allows them access is called:

    A. false negative
    B. false acceptance
    C. false rejection
    D. false positive
    B. false acceptance
    (this multiple choice question has been scrambled)
  95. 695 When executing a disaster recovery plan the MOST important thing to consider is:

    A. safety and welfare of personnel
    B. legal and financial responsibilities
    C. data backups and recovery tapes
    D. financial obligations to stockholders
    A. safety and welfare of personnel
    (this multiple choice question has been scrambled)
  96. 696 When choosing a disaster recovery site, which of the following is the MOST important consideration?

    A. The amount of emergency rescue personnel
    B. The distance and size of the facility
    C. The amount of data that will be stored
    D. The cost to rebuild the existing facility
    B. The distance and size of the facility
    (this multiple choice question has been scrambled)
  97. 697 Who should be notified FIRST before testing the disaster recovery plan?

    A. The physical security department
    B. Senior management
    C. All employees and key staff
    D. Human resources
    B. Senior management
    (this multiple choice question has been scrambled)
  98. 698 Which of the following BEST describes the disaster recovery plan?

    A. An emergency plan that will allow the company to recover financially
    B. A plan that is mandated by law to ensure liability issues are addressed in a catastrophic event
    C. A plan that is put in place to recover the company assets in an emergency
    D. A detailed process of recovering information or IT systems after a catastrophic event
    D. A detailed process of recovering information or IT systems after a catastrophic event
    (this multiple choice question has been scrambled)
  99. 699 Which of the following is the MOST important consideration when developing a disaster recovery plan?

    A. The amount of personnel
    B. The planning team
    C. The cost of the project
    D. Management buy-in
    D. Management buy-in
    (this multiple choice question has been scrambled)
  100. 700 In order to provide management with a prioritized list of time critical business processes, an administrator would assist in conducting a:

    A. business impact assessment
    B. continuity of operations plan
    C. disaster recovery plan
    D. risk management matrix
    A. business impact assessment
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview