Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?
A port scan returns an ‘open’ response. What does this mean?
Which of the following firewalls filters web content requests such as URLs and domain names?
Several @Apollo employees have reported that the network access is slow. After investigation, the network administrator has learned that one employee downloaded a third-party scanning program for the printer. What type of malware might have been introduced that is causing slow performance of the network?
What are the objectives of ensuring data integrity? (Choose two correct answers)
What action will an IDS take upon detection of malicious traffic?
What type of attack disrupts services by overwhelming network devices with bogus traffic?
What of the following are examples of cracking an encrypted password? (Choose four correct answers)
You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?
What tool is used to lure an attacker so that an administrator can capture, log and analyze the behavior of the attack?
Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?
Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?
Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?
. What is the best way to avoid getting spyware on a machine?
In networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?
Which of the following items are states of data? (Choose three correct answers)
What type of infiltration method allows attackers to quietly capture two-step verification SMS messages sent to users in a Man-in-the-Mobile (MITMO) attack?
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Which of the following firewalls filters traffic based on source and destination data ports and filtering based on connection states?
What type of infiltration method allows attackers to quietly capture two-step verification SMS messages sent to users in a Man-in-the-Mobile (MITMO) attack?
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
Which of the following firewalls filters ports and system service calls on a single computer operating system?
Which of the following are commonly used port scanning applications? (Select two correct answers)
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Which of the following firewalls filters traffic based on the user, device, role, application type and threat profile?
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
‘Data coming into a program should be sanitized, as it could have malicious content, designed to force the program to behave in an unintended way.’ This statement describes what security vulnerability?