0
[{"id":412051,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which design concept limits access to systems from outside users while protecting\r\nusers and systems inside the LAN?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"Demilitarized zone (DMZ) structures act as a buffer zone between the Internet and\r\nan intranet, establishing a protected barrier. DMZs also allow for the placement of\r\npublicly accessible resources such as web servers in a semi-secure area.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412049,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"What type of exercise is conducted with full knowledge of the target environment?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"White-box testing is done with full knowledge of the target environment. Black-box\r\ntesting is done with very little or no information. Gray box is performed with limited\r\ninformation somewhere between black and white.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412052,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"In the key recovery process, which key must be recoverable?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"The escrow key is a key held by a third party used to perform cryptographic\r\noperations.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412047,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which of the following is a mechanism for managing digital certificates through a\r\nsystem of trust?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"Public-key infrastructure (PKI) is a system designed to control the distribution of\r\nkeys and management of digital certificates.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412053,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which kind of attack is designed to overload a system or resource, taking it\r\ntemporarily or permanently offline?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"SYN floods are a form of denial of service (DoS). Attacks of this type are designed to\r\noverwhelm a resource for a period of time.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412057,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which mechanism is used by PKI to allow immediate verification of a certificate\u2019s validity?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"The Online Certificate Status Protocol (OCSP) is used to allow immediate verification of certificates\u2019 validity as opposed to the older certificate revocation list (CRL) method, which allows for lags in detection.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412055,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"What is the process of making an operating system secure from attack called?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"Hardening is designed to remove nonessential services, applications, and other items from a system with the intent of making it fit a specific role as well as reducing its attack surface.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412056,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"The integrity component provides which feature of the CIA triad?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":"Integrity ensures that information is kept reliable and accurate and also allows a party to examine the information to detect a change.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412054,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which component of an NIDS collects data?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"Sensors can be placed in different locations around a network with the intention of collecting information and returning it to a central location for analysis and viewing.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412048,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which protocol is used to create a secure environment in a wireless network?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"Wi-Fi Protected Access (WPA) is designed to protect wireless transmissions.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412050,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"You want to establish a network connection between two LANs using the Internet.\r\nWhich technology would best accomplish that for you?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"Layer 2 Tunneling Protocol (L2TP) is a VPN technology used to establish secure\r\nconnections over an insecure medium such as the Internet.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412058,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which of the following is used to create a VLAN from a physical security perspective?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"A switch allows for the creation of VLANs.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412046,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"What kind of physical access device restricts access to a single individual at any one\r\ntime?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"Mantraps are phone booth\u2013sized devices designed to prevent activities such as\r\npiggybacking and tailgating.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412045,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"What is the focus of a security audit or vulnerability assessment?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":" A vulnerability assessment is focused on uncovering vulnerabilities or weaknesses\ufeff in an environment but by definition does not exploit those vulnerabilities","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412059,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was called account.doc. The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":"The file is a Microsoft Word file and as such can have VBA macros embedded into it that can be used to deliver macro viruses.","question_score_id":null,"lang":null,"questionAudioPath":null}]