Sec+ 2008 Study

Sec+  

20 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Which of the following attacks enabling logging for DNS aids?
Botnet attacks
Which of the following is the MOST important when implementing heuristic-based NIPS?
Ensure the network is secure when baseline is established.
Which of the following is MOST effective in preventing adware?
Pop-up blocker
Which of the following is a possible security risk associated with USB devices?
Bluesnarfing
Which of the following could be used to restore a private key in the event of a CA server crashing?
Recovery agent
When would it be appropriate to use time of day restrictions on an account?
As an added security measure if employees work set schedules
Which of the following is the strongest encryption form that can be used in all countries?
WEP
Applying a service pack could affect the baseline of which of the following?
Heuristic-based NIDS
Which of the following is the BEST security measure to use when implementing access control?
Password complexity requirements
Which of the following would be used to allow a server to shut itself down normally upon a loss of
power?
Uninterruptible Power Supply (UPS)
Which of the following would be used to push out additional security hotfixes?
Patch management
Which of the following must be used to setup a DMZ?
Router
Which of the following is a security limitation of virtualization technology?
If an attach occurs, it could possibly disrupt multiple servers.
Which of the following will be prevented by setting a BIOS password?
Changing the system boot order.
Which of the following has the ability to find a rootkit?
Malware scanner