Communication  >  QUESTIONS & ANSWERS  >  Annex H Security Plus Practice Exam (All)

Annex H Security Plus Practice Exam

Document Content and Description Below

Annex H Security Plus Practice Exam Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons? - ✔✔D. Confidentiality A user has rec ... eived an email from a mortgage company asking for personal information including bank account numbers. This would BEST be described as: - ✔✔B. Phishing Attempting to avoid detection by masking itself from applications or attaching itself to the boot sector of the hard drive are characteristics of what type of virus? - ✔✔C. Stealth Virus Attempting to infect the boot sector, infect executable files, or destroy applications are characteristics of what type of virus? - ✔✔A. Multipartite Virus Choose the statement that best details the difference between a worm and a Trojan horse? - ✔✔B. Worms self replicate while Trojan horses do not. Choose the statement which best defines the characteristics of a computer virus. - ✔✔D. A computer virus is a replication mechanism, activation mechanism and has an objective. By which means do most network bound viruses spread? - ✔✔A. Email Which of the following is a common type of attack on web servers? - ✔✔B. Buffer Overflow After installing new software on a machine, what needs to be updated to the baseline? - ✔✔D. Behavior-based HIDS The concept that a web script is run in its own environment and cannot interfere with any other process is known as a: - ✔✔D. Sandbox Patch management must be combined with full-featured systems management to be effective. Determining which patches are needed, applying the patches and which of the following are three generally accepted activities of patch management? - ✔✔C. Auditing for the successful application of the patches. The MOST common exploits of Internet-exposed network services are due to: - ✔✔D. Buffer Overflows Which of the following is MOST effective in preventing adware? - ✔✔D. Pop-up Blocker Which of the following definitions BEST suit Buffer Overflow? - ✔✔A. It receives more data than it is programmed to accept. John works as a network administrator for his company. He uses a tool to check SMTP, DNS, POP3 and ICMP packets on the network. This is an example of which of the following? - ✔✔B. A protocol analyzer Which of the following protocols are not recommended due to them supplying passwords and information over the network? - ✔✔B. Simple Network Management Protocol (SNMP) Which of the following BEST describes an attempt to transfer DNS zone data? - ✔✔D. Reconnaissance Which item can be commonly programmed into an application for ease of administration? - ✔✔A. Back door Choose the primary disadvantage of using a third party mail relay. - ✔✔A. Spammers can utilize the third party mail relay. Which one of the following is a [Show More]

Last updated: 3 years ago

Preview 1 out of 8 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of Annex H Security Plus Practice Exam document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$10.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

114
0

Document information


Connected school, study & course


About the document


Uploaded On

Dec 15, 2022

Number of pages

8

Written in

All

Seller


Profile illustration for Nutmegs
Nutmegs

Member since 4 years

607 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Dec 15, 2022

Downloads

 0

Views

 114

Document Keyword Tags


$10.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·