Communication > QUESTIONS & ANSWERS > Annex H Security Plus Practice Exam (All)

Annex H Security Plus Practice Exam

Document Content and Description Below

Annex H Security Plus Practice Exam Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons? - ✔✔D. Confidentiality A user has rec... eived an email from a mortgage company asking for personal information including bank account numbers. This would BEST be described as: - ✔✔B. Phishing Attempting to avoid detection by masking itself from applications or attaching itself to the boot sector of the hard drive are characteristics of what type of virus? - ✔✔C. Stealth Virus Attempting to infect the boot sector, infect executable files, or destroy applications are characteristics of what type of virus? - ✔✔A. Multipartite Virus Choose the statement that best details the difference between a worm and a Trojan horse? - ✔✔B. Worms self replicate while Trojan horses do not. Choose the statement which best defines the characteristics of a computer virus. - ✔✔D. A computer virus is a replication mechanism, activation mechanism and has an objective. By which means do most network bound viruses spread? - ✔✔A. Email Which of the following is a common type of attack on web servers? - ✔✔B. Buffer Overflow After installing new software on a machine, what needs to be updated to the baseline? - ✔✔D. Behavior-based HIDS The concept that a web script is run in its own environment and cannot interfere with any other process is known as a: - ✔✔D. Sandbox Patch management must be combined with full-featured systems management to be effective. Determining which patches are needed, applying the patches and which of the following are three generally accepted activities of patch management? - ✔✔C. Auditing for the successful application of the patches. The MOST common exploits of Internet-exposed network services are due to: - ✔✔D. Buffer Overflows Which of the following is MOST effective in preventing adware? - ✔✔D. Pop-up Blocker Which of the following definitions BEST suit Buffer Overflow? - ✔✔A. It receives more data than it is programmed to accept. John works as a network administrator for his company. He uses a tool to check SMTP, DNS, POP3 and ICMP packets on the network. This is an example of which of the following? - ✔✔B. A protocol analyzer Which of the following protocols are not recommended due to them supplying passwords and information over the network? - ✔✔B. Simple Network Management Protocol (SNMP) Which of the following BEST describes an attempt to transfer DNS zone data? - ✔✔D. Reconnaissance Which item can be commonly programmed into an application for ease of administration? - ✔✔A. Back door Choose the primary disadvantage of using a third party mail relay. - ✔✔A. Spammers can utilize the third party mail relay. Which one of the following is a [Show More]

Last updated: 2 years ago

Preview 1 out of 8 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

101
0

Document information


Connected school, study & course


About the document


Uploaded On

Dec 15, 2022

Number of pages

8

Written in

Seller


seller-icon
Nutmegs

Member since 4 years

620 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Dec 15, 2022

Downloads

 0

Views

 101

Document Keyword Tags


$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·