Which of the following is the MOST effective social engineering defensive strategy?
Which of the following is the MOST effective social engineering defensive strategy?
From the list below, choose the exploit that can be considered a DoS attack because more traffic than what the
From the list below, choose the exploit that can be considered a DoS attack because more traffic
than what the node can handle is flooded to that node.
This is BEST described as:
An organization has a hierarchical-based concept of privilege management with administrators
having full access, human resources personnel having slightly less access and managers having
access to their own department files only. This is BEST described as:
Which of the following types of IDS should be implemented to monitor traffic on a switch?
Which of the following types of IDS should be implemented to monitor traffic on a switch? (Select
TWO).
Which of the following is considered by some HIDS tools to detect system security related anomalies?
Which of the following is considered by some HIDS tools to detect system security related
anomalies?
Which of the following is the MOST efficient way to force a large number of users to change their passwords on
Which of the following is the MOST efficient way to force a large number of users to change their
passwords on logon?
The MOST important security issue to address when using instant messaging is that instant messaging:
The employees at a company are using instant messaging on company networked computers.
The MOST important security issue to address when using instant messaging is that instant
messaging:
Which of the following is a reason to use a vulnerability scanner?
Which of the following is a reason to use a vulnerability scanner?
How will you accomplish the task?
You work as the security administrator at Certpaper.com. You must ensure that internal access to
other parts of the network is controlled and restricted. The solution which you implement to restrict
network access must be hardware based. You also want to use the least amount of administrative
effort to accomplish your task.
How will you accomplish the task?
Choose the option that correctly details the greatest vulnerability of using Instant Messaging clients.
Choose the option that correctly details the greatest vulnerability of using Instant Messaging
clients.