45%(31)14 out of 31 people found this document helpful
This preview shows page 1 - 8 out of 51 pages.
Question 1 (1 point)Saving...You should place your intrusion detection system (IDS) in this location on the network (choose all that apply):Question 1 options:outside the firewallat the ISP locationinside the firewallDMZQuestion 2 (1 point)SavedThe following protocols often use clear text: Question 3 (1 point)SavedHow do you filter for FTP traffic in Wireshark?
Question 4 (1 point)SavedThe vulnerability assessment phase of the vulnerability management life cycle allows for: Question 5 (1 point)SavedThe autorun feature of removable disks and CD drives can be a threat to network security. What is the best course of action to remove autorun for removable disks and CD drives in Windows?Question 5 options:
remove the CD-ROM drive from the systemprovide users without administrative rightstape the USB portsuse group policyQuestion 6 (1 point)SavedThe following tool is primarily used for SQL injection: Question 7 (1 point)SavedAn organization can implement this cloud deployment model within the corporate firewall.
public cloudQuestion 8 (1 point)SavedAndroid includes media support for which of the following? (choose all that apply)Question 9 (1 point)SavedWith this cloud deployment model, the provider makes services available to the public over the internet.Question 9 options:community cloudhybrid cloudpublic cloudprivate cloudQuestion 10 (1 point)Saved
This type of database attack does not return error messages from the system.Question 11 (1 point)Identify the Nmap scan method that is often referred to as a half-open scan:ACK scanQuestion 12 (1 point)According to your text, which of the following are cloud deployment models? (choose all that apply)
community cloudprivate cloudQuestion 13 (1 point)Android options to save persistent application data include which of the following? (choose all that apply)Question 13 options:internal storageexternal storageSQLite databasesnetwork connectionQuestion 14 (1 point)Passive sniffing refers to:Question 15 (1 point)Rainbow tables are extremely effective for cracking:
Windows passwords Cisco passwords Linux passwords Salted passwords Question 16 (1 point)