Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.
A. Water
B. Kerosene
C. CO2
D. Soda acid
Which of the following statements about Due Care policy is true?
A. It provides information about new viruses.
B. It is a method used to authenticate users on a network.
C. It identifies the level of confidentiality of information.
D. It is a method for securing database servers.
Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?
A. Type II
B. Type I
C. Type III
D. Type IV
Which of the following Windows RRAS authentication protocols uses completely unencrypted passwords?
A. PAP
B. MS-CHAP
C. CHAP
D. MS-CHAP v2
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
A. Employees
B. Hackers
C. Visitors
D. Customers
Which of the following tools is used to flood the local network with random MAC addresses?
A. NETSH
B. NMAP
C. Port scanner
D. Macof
Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.
A. Blackbox testing
B. Port redirection
C. Firewalking
D. Brainstorming
This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.
A. File virus
B. Polymorphic virus
C. Stealth virus
D. Multipartite virus
E. Boot sector virus
Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.
A. Sensitive
B. Private
C. Public
D. Unclassified
E. Confidential
F. Secret
How many layers does the TCP/IP model consist of?
A. Seven
B. Four
C. Six
D. Five
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
A. The transport layer
B. The session layer
C. The application layer
D. The presentation layer
Which of the following statements best describes VeriSign?
A. It is an authentication server.
B. It is a certification authority.
C. It is an encryption technology.
D. It is a signature verification utility.
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
A. Visitors
B. Customers
C. Employees
D. Hackers
Which of the following terms is used for a router that filters traffic before it is passed to the firewall?
A. Screened host
B. Demilitarized zone (DMZ)
C. Bastion host
D. Honey pot
In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?
A. Remote network
B. Remote dial-up network
C. Stolen equipment
D. Local network