An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of a false negative error.
False
If you were implementing an Enterprise network that requires remote users connecting to the Intranet, which of the following services would be most important?
Discuss
A.
DNS
B.
DHCP
C.
RAS
D.
None of the above
DHCP
LDAPS is an example of:
Secure directory access protocol
A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389 are in a `listening’ state. No other ports are open. Which of the following services should be disabled to ensure secure communications?
A. HTTPS
B. HTTP
C. RDP
D. TELNET
HTTP
A collection of zombies is known as:
Botnet
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called:
Zombie
You are planning on hosting an eCommerce Web server. You are intent on making the server secure against all external attacks possible. Which of the following would be the best way to test your server for its weaknesses? Choose the best answer.
Discuss
A.
Ping to the server
B.
Simulate a DDoS attack on that server
C.
Simulate a DoS attack on the server
D.
Check if all the patches and required antivirus software has been loaded o the server.
Simulate a DoS attack on the server
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malicious code are known as:
Signature files
While responding to an incident on a new Windows server, the administrator needs to disable unused services. Which of the following commands can be used to see processes that are listening on a TCP port?
A. IPCONFIG
B. Netstat
C. PSINFO
D. Net session
Netstat
What are salted hashes?
A hashed value that is masked with extra characters to increase encryption
Which of the following answers refers to a technique used by certain types of malware to cause an error in a program and make it easier to run malicious code?
Buffer overflow
Which of the following statements about the SHA (Security Hash Algorithm) are true?
A. SHA is a security hash algorithm that is used with encryption protocols
B. Its latest version is SHA-1
C. SHA is built on the downsides of RES
A) SHA is a security hash algorithm that is used with encryption protocols
Which security measure is in place when a client is denied access to the network due to outdated antivirus software?
NAC
You need to record packet data being sent to and from a server running a Linux operating system. After recording the network traffic you want to view the data in a visualization tool like Wireshark. What command line tool is best suited for this task?
A) Tracert
B) Tcpdump
C) Nmap
D) Netstat
TCPDUMP
DAILY DOUBLE:
Which protocol enables secure, real-time delivery of audio and video over an IP network?
Which type of computer virus takes advantage of the capability for creating and embedding simple scripts in popular office applications?
B) Macro virus
Which of the following terms refers to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and pose security risk?
Grayware
State differences between encoding, hashing, encryption?
Encoding - Convert data into the format required to exchange between different systems
Hashing - Maintains integrity of data, changes in data can be detected by generating and comparing hashes (MD5)
Encryption- Ensure data is secure and confidential cannot be consumed by unauthorized person (AES)
What’s the syntax for using ssh to connect to 192.168.1.1?
A) ssh -f . 192.168.1.1
B) ssh -username root -ip 192.168.1.1
C) ssh root@192.168.1.1
D) ssh -ri root 192.168.1.1
C) ssh root@192.168.1.1
DAILY DOUBLE:
Which of the answers listed below refers to an XML-based markup language for exchanging authentication and authorization data?
SAML
OpenID Connect
Shibboleth
OAUTH
SAML
Which type of Trojan enables unauthorized remote access to a compromised system?
RAT
DOUBLE POINTS
Describe each layer of the OSI Model and what it does?
Presentation
Session
Transport
Network
Data Link
Physical
DOUBLE POINTS
Which version(s) of the SNMP protocol offer(s) authentication based on community strings sent in an unencrypted form? (Select all that apply)
What’s the syntax for grepping for “Test123” in all subdirectories, ignoring case:
A) grep -isf . “Test123"
B) grep -irb . “\TEST123\”
C) grep -sb “test123*”
D) grep -ri "test123"
D) grep -ri "test123" .
Which port is ICMP?
1) 7
2) 14
3) 223
4) 8685
ITS NONE YOU FOOLS