Which of the following describes the concept of feasible protection of an asset?
During a discussion of asset classification and protection with a coworker, you realize that your
coworker does not know the basic concepts of asset protection. You are asked to describe the
types of asset protection. Which of the following describes the concept of feasible protection of an
asset?
Which of the following organizations defines the current standards of risk analysis methodologies?
To manage the risk analysis of your organization you must first identify the method of analysis to
use.
Which of the following organizations defines the current standards of risk analysis methodologies?
which of the following?
You are running a Linux machine as a dedicated file server for your network. You are trying to use
Nmap to perform some security tests. On your Linux machine, in order to run TCP SYN scans
from a host using Nmap or NmapFE you must have which of the following?
What type of program is in the network?
One of your users calls to state the their computer is acting unusual. You go to investigate and find
there is an unauthorized program installed on this computer. You examine the network and find
that this program has replicated itself to other machines in the network, without the input of the
user. What type of program is in the network?
What are the possible consequences to the email server in the network?
If an attacker uses a program that sends thousands of email messages to every user of the
network, some of them with over 50MB attachments. What are the possible consequences to the
email server in the network?
What type of virus was in your network?
Your network has been hit by a virus that is infecting the MBR on many of the systems in the
network.
You are working to repair the damage this virus has done. After two days of non-stop work on the
problem, you get things under control. What type of virus was in your network?
Which of the following best identifies the type of virus that was in your network?
Your network has been hit by a very bad virus recently. As you tracked the virus through the
network, it was changing from system, to system. Each time it went to infect a system; it had
evolved slightly to have a different file size, or different file structure. After extensive work, you and
your team were able to isolate and remove the virus from the network. Which of the following best
identifies the type of virus that was in your network?
which of the following commands will identify the operating system of the computer using IP address 192.168.10
You are running some tests in your network, to see if you can remotely identify the operating
system of nodes in the network. Using the nmap tool, which of the following commands will identify
the operating system of the computer using IP address 192.168.10.1?
what will you use to write the plugin?
You are running Nessus in your organization to perform vulnerability assessments. If you wish to
write your own plugin, to scan for a custom vulnerability, what will you use to write the plugin?
What feature of Nessus allows you to perform this type of custom scanning?
You have recently started using Nessus to perform vulnerability scans on the systems in your
network.
You now wish to perform further testing, to ensure that passwords are the proper length in the
network.
What feature of Nessus allows you to perform this type of custom scanning?