5522594_1_final-exams.docx - Question 1(1 point Saving You should place your intrusion detection system(IDS in this location on the network(choose all

5522594_1_final-exams.docx - Question 1(1 point Saving You...

This preview shows page 1 - 8 out of 51 pages.

Question 1 (1 point)Saving...You should place your intrusion detection system (IDS) in this location on the network (choose all that apply):Question 1 options:outside the firewallat the ISP locationinside the firewallDMZQuestion 2 (1 point)SavedThe following protocols often use clear text: Question 3 (1 point)SavedHow do you filter for FTP traffic in Wireshark?
Background image
Question 4 (1 point)SavedThe vulnerability assessment phase of the vulnerability management life cycle allows for: Question 5 (1 point)SavedThe autorun feature of removable disks and CD drives can be a threat to network security. What is the best course of action to remove autorun for removable disks and CD drives in Windows?Question 5 options:
Background image
remove the CD-ROM drive from the systemprovide users without administrative rightstape the USB portsuse group policyQuestion 6 (1 point)SavedThe following tool is primarily used for SQL injection: Question 7 (1 point)SavedAn organization can implement this cloud deployment model within the corporate firewall.
Background image
public cloudQuestion 8 (1 point)SavedAndroid includes media support for which of the following? (choose all that apply)Question 9 (1 point)SavedWith this cloud deployment model, the provider makes services available to the public over the internet.Question 9 options:community cloudhybrid cloudpublic cloudprivate cloudQuestion 10 (1 point)Saved
Background image
This type of database attack does not return error messages from the system.Question 11 (1 point)Identify the Nmap scan method that is often referred to as a half-open scan:ACK scanQuestion 12 (1 point)According to your text, which of the following are cloud deployment models? (choose all that apply)
Background image
community cloudprivate cloudQuestion 13 (1 point)Android options to save persistent application data include which of the following? (choose all that apply)Question 13 options:internal storageexternal storageSQLite databasesnetwork connectionQuestion 14 (1 point)Passive sniffing refers to:Question 15 (1 point)Rainbow tables are extremely effective for cracking:
Background image
Windows passwords Cisco passwords Linux passwords Salted passwords Question 16 (1 point)
Background image
Image of page 8

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture