Annex H Security Plus Practice Exam
Which of the following refers to the ability to be reasonably certain that data is not disclosed to
unintended persons? - ✔✔D. Confidentiality
A user has received an email from a mo
...
Annex H Security Plus Practice Exam
Which of the following refers to the ability to be reasonably certain that data is not disclosed to
unintended persons? - ✔✔D. Confidentiality
A user has received an email from a mortgage company asking for personal information
including bank account numbers. This would BEST be described as: - ✔✔B. Phishing
Attempting to avoid detection by masking itself from applications or attaching itself to the boot
sector of the hard drive are characteristics of what type of virus? - ✔✔C. Stealth Virus
Attempting to infect the boot sector, infect executable files, or destroy applications are
characteristics of what type of virus? - ✔✔A. Multipartite Virus
Choose the statement that best details the difference between a worm and a Trojan horse? -
✔✔B. Worms self replicate while Trojan horses do not.
Choose the statement which best defines the characteristics of a computer virus. - ✔✔D. A
computer virus is a replication mechanism, activation mechanism and has an objective.
By which means do most network bound viruses spread? - ✔✔A. Email
Which of the following is a common type of attack on web servers? - ✔✔B. Buffer Overflow
After installing new software on a machine, what needs to be updated to the baseline? - ✔✔D.
Behavior-based HIDS
The concept that a web script is run in its own environment and cannot interfere with any other
process is known as a: - ✔✔D. Sandbox
Patch management must be combined with full-featured systems management to be effective.
Determining which patches are needed, applying the patches and which of the following are
three generally accepted activities of patch management? - ✔✔C. Auditing for the successful
application of the patches.
The MOST common exploits of Internet-exposed network services are due to: - ✔✔D. Buffer
Overflows
Which of the following is MOST effective in preventing adware? - ✔✔D. Pop-up Blocker
Which of the following definitions BEST suit Buffer Overflow? - ✔✔A. It receives more data
than it is programmed to accept.
John works as a network administrator for his company. He uses a tool to check SMTP, DNS,
POP3 and ICMP packets on the network. This is an example of which of the following? - ✔✔B.
A protocol analyzer
Which of the following protocols are not recommended due to them supplying passwords and
information over the network? - ✔✔B. Simple Network Management Protocol (SNMP)
Which of the following BEST describes an attempt to transfer DNS zone data? - ✔✔D.
Reconnaissance
Which item can be commonly programmed into an application for ease of administration? -
✔✔A. Back door
Choose the primary disadvantage of using a third party mail relay. - ✔✔A. Spammers can utilize
the third party mail relay.
Which one of the following is a
[Show More]