-
What is a good way to encrypt an entire hard drive?
symmetric algorithm
-
Is “vampire tap” or “crosstalk” a problem most-often associated with UTP cable?
crosstalk
-
What is a business impact assessment?
Something which will provide management with a prioritized list of time critical business processes
-
What does the AH provide you?
it provides integrity
-
When you log onto a network using a smartcard, you are using a ___ key.
private
-
Is a smurf attack a “Bluetooth” threat?
no
-
Doing an audit by running a password cracker to see of weak passwords are being used, is part of a ___.
vulnerability assessment
-
A KDC is used by ___.
Kerberos
-
The two most important security considerations for selecting an antivirus product are: ___.
frequency of signature updates; the number of viruses the software can detect
-
The ___ is an area of the network infrastructure that allows a technician to place public-facing systems into it, without compromising the entire infrastructure.
the DMZ
-
What is a smurf attack?
a DoS attack that floods a target server with pings
-
What is a KDC?
key distribution center
-
Your system needs to support ___, if you want to receive digitally signed and encrypted email messages from a remote office.
S/MIME
-
A security administrator recommends the network owner take actions to prevent future security incidents. These actions are called ___.
risk mitigation
-
It is best to use ___ when monitoring application activity and modification.
HIDS
-
What can be used to assist in the recovery of a crashed hard drive?
forensics software
-
Which redundancy solution does not provide live data: “hot site” or “warm site”?
warm site
-
A ___ is placed in promiscuous mode, in line with the data flow, to allow NIDS to monitor the traffic.
sensor
-
Is it “service pack management” or “change management” to manage OS updates?
change management
-
How can you block users from accessing a few inappropriate websites as soon as possible, assuming the firewall already allows blocking by IP address?
upgrade to a URL-based filter
-
If you want notification when a hacking attempt is discovered, you can use ___.
NIDS
-
To avoid allowing spammers free access to their resources -- and to help stem the Internet's flow of spam -- administrators are urged to ___.
turn off the relay option on their servers
|
|