Podcast
Questions and Answers
Which utility can be used to edit the Windows registry?
Which utility can be used to edit the Windows registry?
- Regedit.exe (correct)
- Resplendent registrar
- EventCombMT
- Reg.exe
Which step is NOT a valid measure for securing routers?
Which step is NOT a valid measure for securing routers?
- Keep routers updated with the latest security patches.
- Use a password that is easy to remember for a router's administrative console. (correct)
- Configure access list entries to prevent unauthorized connections and traffic routing.
- Use a complex password for a router's administrative console.
Which attack involves the insertion of an intermediary software between two communicating hosts?
Which attack involves the insertion of an intermediary software between two communicating hosts?
- Session hijacking
- Denial-of-Service
- Buffer overflow
- Man-in-the-middle (correct)
Which protocol provides the highest level of VPN security?
Which protocol provides the highest level of VPN security?
What protocol do hosts use to retrieve IP address assignments and configuration information?
What protocol do hosts use to retrieve IP address assignments and configuration information?
In which attack did Adam, the malicious hacker, manage to steal a secure cookie through an XSS vulnerability?
In which attack did Adam, the malicious hacker, manage to steal a secure cookie through an XSS vulnerability?
Which of the following management processes focuses on promoting quick recovery and an effective response to protect brand, reputation, and stakeholders?
Which of the following management processes focuses on promoting quick recovery and an effective response to protect brand, reputation, and stakeholders?
In the CSMA/CA method, what does a device or computer need to do before transmitting data?
In the CSMA/CA method, what does a device or computer need to do before transmitting data?
Which organization is responsible for managing the assignment of domain names and IP addresses?
Which organization is responsible for managing the assignment of domain names and IP addresses?
What type of recovery plan includes strategies to address specific variations in assumptions that lead to security issues or emergencies?
What type of recovery plan includes strategies to address specific variations in assumptions that lead to security issues or emergencies?
Which process aims to identify threats like DDoS attacks and policy violations by examining network traffic?
Which process aims to identify threats like DDoS attacks and policy violations by examining network traffic?
What concept involves providing actions to deal with specific variances in assumptions leading to security problems or emergencies?
What concept involves providing actions to deal with specific variances in assumptions leading to security problems or emergencies?
What type of encryption is performed at the network layer?
What type of encryption is performed at the network layer?
Which tool is capable of intercepting traffic on a network segment and capturing usernames and passwords in Unix and Windows environments?
Which tool is capable of intercepting traffic on a network segment and capturing usernames and passwords in Unix and Windows environments?
Which proposed enhancement to wireless LAN specifications offers quality of service (QoS) features and prioritization of data, voice, and video transmissions?
Which proposed enhancement to wireless LAN specifications offers quality of service (QoS) features and prioritization of data, voice, and video transmissions?
What key feature is used by TCP to regulate the amount of data sent between hosts on a network?
What key feature is used by TCP to regulate the amount of data sent between hosts on a network?
Which team members are typically included in the incident response team as part of the incident response process?
Which team members are typically included in the incident response team as part of the incident response process?
What does a security policy document describe within an organization?
What does a security policy document describe within an organization?
Which authentication method is NOT a WEP authentication method?
Which authentication method is NOT a WEP authentication method?
What technology helps in blocking all unauthorized inbound and/or outbound traffic?
What technology helps in blocking all unauthorized inbound and/or outbound traffic?
Which type of firewall is also known as a stateful firewall?
Which type of firewall is also known as a stateful firewall?
What is a centralized collection of honeypots and analysis tools called?
What is a centralized collection of honeypots and analysis tools called?
Which routing metric is defined as the sum of the costs associated with each link traversed?
Which routing metric is defined as the sum of the costs associated with each link traversed?
Which honeypot is described as a useful burglar alarm?
Which honeypot is described as a useful burglar alarm?
Which protocol provides a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and offers tunneling, address assignment, and authentication?
Which protocol provides a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and offers tunneling, address assignment, and authentication?
What is the purpose of syslog-ng in Unix systems?
What is the purpose of syslog-ng in Unix systems?
Which incident response practice set is recommended by the CERT/CC?
Which incident response practice set is recommended by the CERT/CC?
What is the function of a Honeyfarm in cybersecurity systems?
What is the function of a Honeyfarm in cybersecurity systems?
In a system examination for known vulnerabilities, which tool would typically alert the administrator?
In a system examination for known vulnerabilities, which tool would typically alert the administrator?
Which layer of the OSI model is closest to the end user in network communications?
Which layer of the OSI model is closest to the end user in network communications?