Front | Back |
Which of the following attacks enabling logging for DNS aids?
|
Botnet attacks
|
Which of the following is the MOST important when implementing heuristic-based NIPS?
|
Ensure the network is secure when baseline is established.
|
Which of the following is MOST effective in preventing adware?
|
Pop-up blocker
|
Which of the following is a possible security risk associated with USB devices?
|
Bluesnarfing
|
Which of the following could be used to restore a private key in the event of a CA server crashing?
|
Recovery agent
|
When would it be appropriate to use time of day restrictions on an account?
|
As an added security measure if employees work set schedules
|
Which of the following is the strongest encryption form that can be used in all countries?
|
WEP
|
Applying a service pack could affect the baseline of which of the following?
|
Heuristic-based NIDS
|
Which of the following is the BEST security measure to use when implementing access control?
|
Password complexity requirements
|
Which of the following would be used to allow a server to shut itself down normally upon a loss of
power? |
Uninterruptible Power Supply (UPS)
|
Which of the following would be used to push out additional security hotfixes?
|
Patch management
|
Which of the following must be used to setup a DMZ?
|
Router
|
Which of the following is a security limitation of virtualization technology?
|
If an attach occurs, it could possibly disrupt multiple servers.
|
Which of the following will be prevented by setting a BIOS password?
|
Changing the system boot order.
|
Which of the following has the ability to find a rootkit?
|
Malware scanner
|