Which of the following is component of a risk assessment?
A.
Logical interface
B.
DMZ
C.
Administrative safeguards
D.
Physical security
Administrative safeguards
The purpose of a ____________ is to deny network access to local area networks and
other information assets by unauthorized wireless devices.
A.
Wireless Access Point
B.
Wireless Analyzer
C.
Wireless Access Control list
D.
Wireless Intrusion Prevention System
Wireless Intrusion Prevention System
An attacker gains access to a Web server’s database and display the contents of the table
that holds all of the names, passwords, and other user information. The attacker did this by
entering information into the Web site's user login page that the software's designers did
not expect to be entered. This is an example of what kind of software design problem?
A.
Insufficient security management
B.
Insufficient database hardening
C.
Insufficient exception handling
D.
Insufficient input validation
Insufficient input validation
You have successfully compromised a machine on the network and found a server that is
alive on the same network. You tried to ping but you didn’t get any response back. What is happening?
A.
TCP/IP doesn’t support ICMP.
B.
ICMP could be disabled on the target server.
C.
The ARP is disabled on the target server.
D.
You need to run the ping command with root privileges.
TCP/IP doesn’t support ICMP.
It is a short-range wireless communication technology intended to replace the cables
connecting portables of fixed deviceswhile maintaining high levels of security. It allows
mobile phones, computers and other devices to connect and communicate using a shortrange
wireless connection.
Which of the following terms best matches the definition?
A.
Bluetooth
B.
Radio-Frequency Identification
C.
WLAN
D.
InfraRed
Bluetooth
Page 1 out of 25 Pages |