Setup Menus in Admin Panel

Practice

1. During a Fagan code inspection, which process can redirect to the planning stage?

Correct! Wrong!

2. Who is the best facilitator for a post-incident lessons-learned session?

Correct! Wrong!

3. A cross-site scripting attack is an example of what type of threat vector?

Correct! Wrong!

4. Which of the following is a switch attack?

Correct! Wrong!

5. Susan has been asked to identify the applications that start when a Windows system does. Where should she look first?

Correct! Wrong!

6. What organization manages the global IP address space?

Correct! Wrong!

7. How many phases does the Spiral model cycle through?

Correct! Wrong!

8. Which one of the following is an example of a computer security incident?

Correct! Wrong!

9. Using the Agile sprint process, what step will occur at step 2 in the previous

Correct! Wrong!

10. The Dirty COW attack is an example of what type of vulnerability?

Correct! Wrong!

11. What is the key difference between an intrusion detection system (IDS) and an intrusion prevention system (IPS)?

Correct! Wrong!

12. Which of the following transmissions is not provided by the NetFlow network protocol?

Correct! Wrong!

13. Which kind of packet capture technique is preferred for a resource-limited environment?

Correct! Wrong!

14. Why might it be useful to analyze individual system logs in addition to network traffic?

Correct! Wrong!

15. When performing a capture for wireless analysis, what mode must the wireless card support?

Correct! Wrong!

16. The largest unit of data that traverses a network in a single exchange is referred to as what?

Correct! Wrong!

17. What is the total size, in bytes, of the packet’s payload?

Correct! Wrong!

18. Roughly how much time elapsed between the first ping request and reply?

Correct! Wrong!

19. What is the name of the Windows utility that allows you to easily monitor various program, security, and system activity logs on your computer?

Correct! Wrong!

20. Which of the following is the correct term for a network device designed to deflect attempts to compromise the security of an information system?

Correct! Wrong!

January 16, 2020

0 responses on "Practice"

Leave a Message

Your email address will not be published.

All Rights Reserved 2020 postgresqlcert