A) Misconfigured firewall
B) Clear text credentials
C) Implicit deny
D) Default configuration
Correct Answer
verified
Multiple Choice
A) Separation of duties
B) Permission auditing
C) Least privilege
D) Standard naming conversation
Correct Answer
verified
Multiple Choice
A) Build an online intermediate CA.
B) Implement a key escrow.
C) Implement stapling.
D) Install a CRL.
Correct Answer
verified
Multiple Choice
A) Passive reconnaissance
B) Persistence
C) Escalation of privileges
D) Exploiting the switch
Correct Answer
verified
Multiple Choice
A) Utilize exhaust fans.
B) Use hot and cold aisles.
C) Airgap the racks.
D) Use a secondary AC unit.
Correct Answer
verified
Multiple Choice
A) pivoting.
B) persistence.
C) active reconnaissance.
D) a backdoor.
Correct Answer
verified
Multiple Choice
A) It ensures consistency of configuration for initial system implementation.
B) It enables system rollback to a last known-good state if patches break functionality.
C) It facilitates fault tolerance since applications can be migrated across templates.
D) It improves vulnerability scanning efficiency across multiple systems.
Correct Answer
verified
Multiple Choice
A) Iris scan
B) Handwriting
C) CAC card
D) Gait
E) PIN
F) Fingerprint
Correct Answer
verified
Multiple Choice
A) Time of day restrictions
B) Principle of least privilege
C) Role-based access control
D) Separation of duties
Correct Answer
verified
Multiple Choice
A) Principle of least privilege
B) External intruder
C) Conflict of interest
D) Fraud
Correct Answer
verified
Multiple Choice
A) the current internal key management system.
B) a third-party key management system that will reduce operating costs.
C) risk benefits analysis results to make a determination.
D) a software solution including secure key escrow capabilities.
Correct Answer
verified
Multiple Choice
A) ALE
B) MTTR
C) MTBF
D) MTTF
Correct Answer
verified
Multiple Choice
A) Logic bomb
B) Trojan
C) Backdoor
D) Ransomware
E) Rootkit
Correct Answer
verified
Multiple Choice
A) The server is under a DDoS attack from multiple geographic locations.
B) The server is compromised, and is attacking multiple hosts on the Internet.
C) The server is under an IP spoofing resource exhaustion attack.
D) The server is unable to complete the TCP three-way handshake and send the last ACK.
Correct Answer
verified
Multiple Choice
A) Vulnerability scanner
B) Protocol analyzer
C) Network mapper
D) Web inspector
Correct Answer
verified
Multiple Choice
A) Code signing
B) Stored procedures
C) Access violations
D) Unencrypted credentials
Correct Answer
verified
Multiple Choice
A) Traceroute
B) Nslookup
C) Ipconfig
D) Netstat
Correct Answer
verified
Multiple Choice
A) Perform a non-credentialed scan.
B) Conduct an intrusive scan.
C) Attempt escalation of privilege.
D) Execute a credentialed scan.
Correct Answer
verified
Multiple Choice
A) Logic bomb
B) Backdoor
C) Keylogger
D) Netstat
E) Tracert
F) Ping
Correct Answer
verified
Multiple Choice
A) Weak cipher suites
B) Improper input handling
C) DLL injection
D) Certificate signing flaws
Correct Answer
verified
Showing 1081 - 1100 of 1164
Related Exams