Communication > QUESTIONS & ANSWERS > Annex H Security Plus Practice Exam (All)
Annex H Security Plus Practice Exam Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons? - ✔✔D. Confidentiality A user has rec... eived an email from a mortgage company asking for personal information including bank account numbers. This would BEST be described as: - ✔✔B. Phishing Attempting to avoid detection by masking itself from applications or attaching itself to the boot sector of the hard drive are characteristics of what type of virus? - ✔✔C. Stealth Virus Attempting to infect the boot sector, infect executable files, or destroy applications are characteristics of what type of virus? - ✔✔A. Multipartite Virus Choose the statement that best details the difference between a worm and a Trojan horse? - ✔✔B. Worms self replicate while Trojan horses do not. Choose the statement which best defines the characteristics of a computer virus. - ✔✔D. A computer virus is a replication mechanism, activation mechanism and has an objective. By which means do most network bound viruses spread? - ✔✔A. Email Which of the following is a common type of attack on web servers? - ✔✔B. Buffer Overflow After installing new software on a machine, what needs to be updated to the baseline? - ✔✔D. Behavior-based HIDS The concept that a web script is run in its own environment and cannot interfere with any other process is known as a: - ✔✔D. Sandbox Patch management must be combined with full-featured systems management to be effective. Determining which patches are needed, applying the patches and which of the following are three generally accepted activities of patch management? - ✔✔C. Auditing for the successful application of the patches. The MOST common exploits of Internet-exposed network services are due to: - ✔✔D. Buffer Overflows Which of the following is MOST effective in preventing adware? - ✔✔D. Pop-up Blocker Which of the following definitions BEST suit Buffer Overflow? - ✔✔A. It receives more data than it is programmed to accept. John works as a network administrator for his company. He uses a tool to check SMTP, DNS, POP3 and ICMP packets on the network. This is an example of which of the following? - ✔✔B. A protocol analyzer Which of the following protocols are not recommended due to them supplying passwords and information over the network? - ✔✔B. Simple Network Management Protocol (SNMP) Which of the following BEST describes an attempt to transfer DNS zone data? - ✔✔D. Reconnaissance Which item can be commonly programmed into an application for ease of administration? - ✔✔A. Back door Choose the primary disadvantage of using a third party mail relay. - ✔✔A. Spammers can utilize the third party mail relay. Which one of the following is a [Show More]
Last updated: 2 years ago
Preview 1 out of 8 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Dec 15, 2022
Number of pages
8
Written in
This document has been written for:
Uploaded
Dec 15, 2022
Downloads
0
Views
101
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·