Topic 1: Exam Pool A
The Payment Card Industry Data Security Standard (PCI DSS) contains six different
categories of control objectives. Each objective contains one or more requirements, which
must be followed in order to achieve compliance. Which of the following requirements
would best fit under the objective, "Implement strong access control measures"?
A.
Regularly test security systems and processes.
B.
Encrypt transmission of cardholder data across open, public networks.
C.
Assign a unique ID to each person with computer access.
D.
Use and regularly update anti-virus software on all systems commonly affected by
malware.
Assign a unique ID to each person with computer access.
What is the purpose of a demilitarized zone on a network?
A.
To scan all traffic coming through the DMZ to the internal network
B.
To only provide direct access to the nodes within the DMZ and protect the network
behind it
C.
To provide a place to put the honeypot
D.
To contain the network devices you wish to protect
To only provide direct access to the nodes within the DMZ and protect the network
behind it
Which is the first step followed by Vulnerability Scanners for scanning a network?
A.
TCP/UDP Port scanning
B.
Firewall detection
C.
OS Detection
D.
Checking if the remote host is alive
Checking if the remote host is alive
What does the option * indicate?
A.
s
B.
t
C.
n
D.
a
n
These hackers have limited or no training and know how to use only basic techniques or
tools.
What kind of hackers are we talking about?
A.
Black-Hat Hackers A
B.
Script Kiddies
C.
White-Hat Hackers
D.
Gray-Hat Hacker
White-Hat Hackers
Page 13 out of 147 Pages |
Previous |