0 of 21 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 21 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
| Average score |
|
| Your score |
|
Which of the following is true regarding a screened subnet (demilitarized zone)?
Which of the following certification types has the lowest level of certificate assurance?
Which of the following malware detection methods establishes a baseline for a system and then alerts the user if any suspicious changes occur? (This method cannot distinguish if a change is from malware, a system failure, or another cause.)

As a security technician who is in charge of physical security for computer and network resources, you are responsible for ensuring a quick recovery should an event occur. A physical storage device controlling data backups has failed, causing corruption for a weekly full backup. It failed on Saturday. On Monday, you noticed the errors and have since run a restore of needed data and a full backup to ensure continuity. The failed device has been replaced. Since each work day creates unique data to be backed up, which type of backup would be the preferred method to make certain each day’s data was properly maintained while ensuring efficiency?
(The time required for backup is not a primary concern, but the time needed to restore data is, as is backup data storage space.)
Tokenization is another effective tool in data loss prevention. Which of the following does tokenization do? (Select two.)
Which of the following honeypot interaction levels can’t be compromised completely and is generally set to collect information about attacks, like network probes and worms?
Members of the executive team have asked for an explanation as to why the bit size of an encryption key needs to be higher than the 56-bit RC4 they are using. They show you a screenshot of the research they’ve done on the powerful desktop computer they run, saying that none of the keys they are using will be in production for more than a year. They want to just keep using the smaller keys.
How would you answer them?

What is the name of a computer on which a hypervisor runs to provide one or more virtual machines?
Which software facilitates communication between different virtual machines by checking data packets before moving them to a destination?
An older technique for defeating honeypots is to use tarpits, which sometimes operate at different levels of the OSI model, depending on their function. Which of the following layers of the OSI model do tarpits work at?
Ann has a corner office that looks out on a patio frequently occupied by tourists. She likes the convenience of her Bluetooth headset paired to her smartphone, but she is concerned that her conversations could be intercepted by an attacker sitting on the patio. Which of the following countermeasures would be the most effective for protecting her conversations?
Which of the following is a benefit of microservices?
You are a cybersecurity specialist. ACME, Inc. has hired you to install and configure their wireless network. As part of your installation, you have decided to use Wi-Fi Protected Access 2 (WPA2) security on all of your wireless access points. You want to ensure that the highest level of security is used. Which of the following encryption protocols should you use to provide the highest level of security?
Which of the following works with IDS software to detour suspected malicious traffic to a honeypot that mirrors the real network without alerting the attacker?
Which of the following HTTP response messages would you receive if additional action needs to be taken to complete the request?
What does a router use to protect a network from attacks and to control which types of communications are allowed on a network?
User-Mode-Linux (UML) is an open-source tool used to create virtual machines. It’s efficient for deploying honeypots. One of the big issues with UML is that it doesn’t use a real hard disk but a fake IDE device called /dev/ubd* instead. How can an attacker find a UML system?
You have outlined a new approach to IT security in your organization, pushing heavily for an active defense design. Which of the following tools and methods should you use? (Select two.)
Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn’t want to sign out of his computer each time he leaves. Which of the following is the BEST solution for securing Joe’s workstation?
Taylor is a manager who is trying to find a way to get computers with different operating systems to easily interact with each other. Which of the following should she use to accomplish this?
WhatsApp us