InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Instead Of The Web Server Asking The User For The Same Information Each Time She Visits That Site, The Server Can Store That User-specific Information In A File On The User's Local Computer And Then Retrieve It Later. This File Is Called A(n) ____? |
|
Answer» cookie cookie |
|
| 102. |
The Goal Of ____ Is To Make It Harder To Predict Where The Operating System Functionality Resides In Memory? |
|
Answer» ASLR ASLR |
|
| 103. |
Targeted Attacks Against Financial Networks, Unauthorized Access To Information, And The Theft Of Personal Information Is Sometimes Known As ____? |
|
Answer» cybercrime cybercrime |
|
| 104. |
____ Involves Using Someone's Personal Information, Such As Social Security Numbers, To Establish Bank Or Credit Card Accounts That Are Then Left Unpaid, Leaving The Victim With The Debts And Ruining Their Credit Rating? |
|
Answer» Identity theft |
|
| 105. |
The ____ Are The Operating System Settings That Impose How The Policy Will Be Enforced? |
|
Answer» configuration baselines |
|
| 106. |
Live Migration Can Be Used For ____; If The Demand For A Service Or Application Increases, Then Network Managers Can Quickly Move This High-demand Virtual Machine To Another Physical Server With More Ram Or Cpu Resources? |
|
Answer» load balancing |
|
| 107. |
The Single Most Expensive Malicious Attack Was The 2000 ____, Which Cost An Estimated $8.7 Billion? |
|
Answer» Love Bug. |
|
| 108. |
The _____ Act Is Designed To Broaden The Surveillance Of Law Enforcement Agencies So They Can Detect And Suppress Terrorism? |
|
Answer» USA Patriot |
|
| 109. |
The Plain Text To Be Transmitted Has A Cyclic Redundancy Check (crc) Value Calculated, Which Is A Check Sum Based On The Contents Of The Text. Wep Calls This The ____ And Append It To The End Of The Text? |
|
Answer» CORRECT ANSWER: integrity CHECK VALUE (ICV) Correct Answer: integrity check value (ICV) |
|
| 110. |
_____ Ensures That Information Is Correct And That No Unauthorized Person Or Malicious Software Has Altered That Data? |
|
Answer» Integrity Integrity |
|
| 111. |
What Is The Maximum Fine For Those Who Wrongfully Disclose Individually Identifiable Health Information With The Intent To Sell It? |
|
Answer» $250,000 $250,000 |
|
| 112. |
In A ____ Attack, Attackers Can Attackers Use Hundreds Or Thousands Of Computers In An Attack Against A Single Computer Or Network? |
|
Answer» distributed distributed |
|
| 113. |
A(n) ____ Is A Computer Programming Language That Is Typically Interpreted Into A Language The Computer Can Understand? |
|
Answer» scripting language |
|
| 114. |
____ Enables The Attacker's Computer To Forward Any Network Traffic It Receives From Computer A To The Actual Router? |
|
Answer» IP forwarding. |
|
| 115. |
While Most Attacks Take Advantage Of Vulnerabilities That Someone Has Already Uncovered, A(n) ____ Occurs When An Attacker Discovers And Exploits A Previously Unknown Flaw? |
|
Answer» zero day |
|
| 116. |
With Operating System Virtualization, A Virtual Machine Is Simulated As A Self-contained Software Environment By The ____ System (the Native Operating System To The Hardware)? |
|
Answer» host host |
|
| 117. |
What Is Administrator Privileges When Trying To Install A Download? |
|
Answer» Administrator privileges allows the USER full access to a program or NETWORK second only to the system account. If you don't have administrator privileges, you cannot do certain things You may be able USE a program, but not UPGRADE it. Administrator privileges allows the user full access to a program or network second only to the system account. If you don't have administrator privileges, you cannot do certain things You may be able use a program, but not upgrade it. |
|
| 118. |
A ____ Is A Single, Dedicated Hard Disk-based File Storage Device That Provides Centralized And Consolidated Disk Storage Available To Lan Users Through A Standard Network Connection? |
|
Answer» NAS NAS |
|
| 119. |
____ Are Portable Communication Devices That Function In A Manner That Is Unlike Wired Telephones? |
|
Answer» Cell phones |
|
| 120. |
____ Is A Windows Vista And Windows Xp Service Pack 2 (sp2) Feature That Prevents Attackers From Using Buffer Overflow To Execute Malware? |
|
Answer» DEP DEP |
|
| 121. |
The Goal Of ____ Is To Prevent Computers With Suboptimal Security From Potentially Infecting Other Computers Through The Network? |
|
Answer» NAC NAC |
|
| 122. |
A ____ Is A Cumulative Package Of All Security Updates Plus Additional Features. |
|
Answer» service pack |
|
| 123. |
A ____ Is A Computer Program Or A Part Of A Program That Lies Dormant Until It Is Triggered By A Specific Logical Event? |
|
Answer» logic bomb |
|
| 124. |
____ Can Fully Decode Application-layer Network Protocols. Once These Protocols Are Decoded, The Different Parts Of The Protocol Can Be Analyzed For Any Suspicious Behavior? |
|
Answer» Protocol analyzers |
|
| 125. |
____, Also Called Add-ons, Represent A Specific Way Of Implementing Activex And Are Sometimes Called Activex Applications? |
|
Answer» ActiveX controls. |
|
| 126. |
According To The 2007 Fbi Computer Crime And Security Survey, The Loss Due To The Theft Of Confidential Data For 494 Respondents Was Approximately ____? |
|
Answer» $10 million. |
|
| 127. |
Encryption Under The Wpa2 Personal Security Model Is Accomplished By ____? |
|
Answer» AES-CCMP AES-CCMP |
|
| 128. |
____ Is A Software Program That Delivers Advertising Content In A Manner That Is Unexpected And Unwanted By The User? |
|
Answer» Adware Adware |
|
| 129. |
Can Police Track An Ip Address After It Has Been Changed? |
|
Answer» <P>Sometimes-for example, if the user has a dynamic IP address, and their IP address changes within this SYSTEM as usual, it can generally be TRACKED. If the user uses a proxy service to make their IP address appear as if it is located in some RANDOM other p Sometimes-for example, if the user has a dynamic IP address, and their IP address changes within this system as usual, it can generally be tracked. If the user uses a proxy service to make their IP address appear as if it is located in some random other p |
|
| 130. |
A ____ Virus Infects The Master Boot Record Of A Hard Disk Drive? |
|
Answer» boot boot |
|
| 131. |
A(n) ____ Finds Malicious Traffic And Deals With It Immediately? |
|
Answer» IPS IPS |
|
| 132. |
____ Technology Enables A Virtual Machine To Be Moved To A Different Physical Computer With No Impact To The Users? |
|
Answer» Live migration |
|
| 133. |
The ____ Is The Link Between The Cellular Network And The Wired Telephone World And Controls All Transmitters And Base Stations In The Cellular Network? |
|
Answer» MTSO MTSO |
|
| 134. |
What Is Another Name For Unsolicited E-mail Messages? |
|
Answer» spam spam |
|
| 135. |
____ Monitor Internet Traffic And Block Access To Preselected Web Sites And Files? |
|
Answer» Internet content filters. |
|
| 136. |
Business ____ Theft Involves Stealing Proprietary Business Information Such As Research For A New Drug Or A List Of Customers That Competitors Are Eager To Acquire? |
| Answer» | |
| 137. |
How Did Early Computer Security Work? |
|
Answer» It was pretty simple- just passwords to protect ONE's computer. With the INNOVATION of the internet, HOWEVER, computers have INCREASED security with firewalls and HUNDREDS of anti-virus programs. It was pretty simple- just passwords to protect one's computer. With the innovation of the internet, however, computers have increased security with firewalls and hundreds of anti-virus programs. |
|
| 138. |
Under The _____ , Healthcare Enterprises Must Guard Protected Health Information And Implement Policies And Procedures To Safeguard It, Whether It Be In Paper Or Electronic Format? |
| Answer» | |
| 139. |
A Security ____ Focuses On The Administration And Management Of Plans, Policies, And People? |
|
Answer» manager. manager. |
|
| 140. |
A Software-based ____ Attempt To Monitor And Possibly Prevent Attempts To Attack A Local System? |
|
Answer» HIDS HIDS |
|
| 141. |
According To The Research Group Postini, Over ____ Of Daily E-mail Messages Are Unsolicited And Could Be Carrying A Malicious Payload? |
|
Answer» ANSWER :two-thirds. |
|
| 142. |
In A Company Of 500 Employees, It Is Estimated That _____ Employees Would Be Required To Combat A Virus Attack? |
|
Answer» five employees. |
|
| 143. |
____ Typically Involves Using Client-side Scripts Written In Javascript That Are Designed To Extract Information From The Victim And Then Pass The Information To The Attacker? |
|
Answer» CORRECT ANSWER: CROSS site scripting (XSS) Correct Answer: Cross site scripting (XSS) |
|
| 144. |
Why Is Ripv1 Insecure In A Network? |
|
Answer» RIPv1 does not use a PASSWORD for authentication as with RIPV2. This makes it possible to attackers to SEND rogue RIP PACKETS and corrupt the routing table. RIPv1 does not use a password for authentication as with RIPv2. This makes it possible to attackers to send rogue RIP packets and corrupt the routing table. |
|