Assessment

Exit

Question 1 of 1

  Time Left


0 [{"id":412045,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"What is the focus of a security audit or vulnerability assessment?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":" A vulnerability assessment is focused on uncovering vulnerabilities or weaknesses\ufeff in an environment but by definition does not exploit those vulnerabilities","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412053,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which kind of attack is designed to overload a system or resource, taking it\r\ntemporarily or permanently offline?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"SYN floods are a form of denial of service (DoS). Attacks of this type are designed to\r\noverwhelm a resource for a period of time.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412057,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which mechanism is used by PKI to allow immediate verification of a certificate\u2019s validity?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"The Online Certificate Status Protocol (OCSP) is used to allow immediate verification of certificates\u2019 validity as opposed to the older certificate revocation list (CRL) method, which allows for lags in detection.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412058,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which of the following is used to create a VLAN from a physical security perspective?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"A switch allows for the creation of VLANs.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412056,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"The integrity component provides which feature of the CIA triad?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":"Integrity ensures that information is kept reliable and accurate and also allows a party to examine the information to detect a change.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412049,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"What type of exercise is conducted with full knowledge of the target environment?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"White-box testing is done with full knowledge of the target environment. Black-box\r\ntesting is done with very little or no information. Gray box is performed with limited\r\ninformation somewhere between black and white.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412059,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was called account.doc. The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":"The file is a Microsoft Word file and as such can have VBA macros embedded into it that can be used to deliver macro viruses.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412046,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"What kind of physical access device restricts access to a single individual at any one\r\ntime?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"Mantraps are phone booth\u2013sized devices designed to prevent activities such as\r\npiggybacking and tailgating.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412055,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"What is the process of making an operating system secure from attack called?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"Hardening is designed to remove nonessential services, applications, and other items from a system with the intent of making it fit a specific role as well as reducing its attack surface.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412051,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which design concept limits access to systems from outside users while protecting\r\nusers and systems inside the LAN?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"Demilitarized zone (DMZ) structures act as a buffer zone between the Internet and\r\nan intranet, establishing a protected barrier. DMZs also allow for the placement of\r\npublicly accessible resources such as web servers in a semi-secure area.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412052,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"In the key recovery process, which key must be recoverable?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"The escrow key is a key held by a third party used to perform cryptographic\r\noperations.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412047,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which of the following is a mechanism for managing digital certificates through a\r\nsystem of trust?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"Public-key infrastructure (PKI) is a system designed to control the distribution of\r\nkeys and management of digital certificates.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412050,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"You want to establish a network connection between two LANs using the Internet.\r\nWhich technology would best accomplish that for you?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"Layer 2 Tunneling Protocol (L2TP) is a VPN technology used to establish secure\r\nconnections over an insecure medium such as the Internet.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412054,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which component of an NIDS collects data?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"Sensors can be placed in different locations around a network with the intention of collecting information and returning it to a central location for analysis and viewing.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412048,"quiz_id":"20924","answer_id":null,"answerType_id":"0","created_at":"2018-03-20 20:19:00","updated_at":"2018-03-20 22:11:11","questionName":"Which protocol is used to create a secure environment in a wireless network?\r","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"Wi-Fi Protected Access (WPA) is designed to protect wireless transmissions.","question_score_id":null,"lang":null,"questionAudioPath":null}]
412045
0
60
block

What is the focus of a security audit or vulnerability assessment?

Select the Correct Answers  

(0/0)












412053
0
60
none
412057
0
120
none
412058
0
120
none
412056
0
120
none
412049
0
60
none
412059
0
120
none
412046
0
60
none
412055
0
120
none
412051
0
60
none
412052
0
60
none
412047
0
60
none
412050
0
60
none
412054
0
120
none
412048
0
60
none