Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

101.

Instead Of The Web Server Asking The User For The Same Information Each Time She Visits That Site, The Server Can Store That User-specific Information In A File On The User's Local Computer And Then Retrieve It Later. This File Is Called A(n) ____?

Answer»

cookie

cookie

102.

The Goal Of ____ Is To Make It Harder To Predict Where The Operating System Functionality Resides In Memory?

Answer»

ASLR

ASLR

103.

Targeted Attacks Against Financial Networks, Unauthorized Access To Information, And The Theft Of Personal Information Is Sometimes Known As ____?

Answer»

cybercrime

cybercrime

104.

____ Involves Using Someone's Personal Information, Such As Social Security Numbers, To Establish Bank Or Credit Card Accounts That Are Then Left Unpaid, Leaving The Victim With The Debts And Ruining Their Credit Rating?

Answer»

IDENTITY THEFT

Identity theft

105.

The ____ Are The Operating System Settings That Impose How The Policy Will Be Enforced?

Answer»

CONFIGURATION BASELINES

configuration baselines

106.

Live Migration Can Be Used For ____; If The Demand For A Service Or Application Increases, Then Network Managers Can Quickly Move This High-demand Virtual Machine To Another Physical Server With More Ram Or Cpu Resources?

Answer»

LOAD BALANCING

load balancing

107.

The Single Most Expensive Malicious Attack Was The 2000 ____, Which Cost An Estimated $8.7 Billion?

Answer»

LOVE BUG.

Love Bug.

108.

The _____ Act Is Designed To Broaden The Surveillance Of Law Enforcement Agencies So They Can Detect And Suppress Terrorism?

Answer»

USA PATRIOT

USA Patriot

109.

The Plain Text To Be Transmitted Has A Cyclic Redundancy Check (crc) Value Calculated, Which Is A Check Sum Based On The Contents Of The Text. Wep Calls This The ____ And Append It To The End Of The Text?

Answer»

CORRECT ANSWER: integrity CHECK VALUE (ICV)

Correct Answer: integrity check value (ICV)

110.

_____ Ensures That Information Is Correct And That No Unauthorized Person Or Malicious Software Has Altered That Data?

Answer»

Integrity

Integrity

111.

What Is The Maximum Fine For Those Who Wrongfully Disclose Individually Identifiable Health Information With The Intent To Sell It?

Answer»

$250,000

$250,000

112.

In A ____ Attack, Attackers Can Attackers Use Hundreds Or Thousands Of Computers In An Attack Against A Single Computer Or Network?

Answer»

distributed

distributed

113.

A(n) ____ Is A Computer Programming Language That Is Typically Interpreted Into A Language The Computer Can Understand?

Answer»

SCRIPTING LANGUAGE

scripting language

114.

____ Enables The Attacker's Computer To Forward Any Network Traffic It Receives From Computer A To The Actual Router?

Answer»

IP FORWARDING.

IP forwarding.

115.

While Most Attacks Take Advantage Of Vulnerabilities That Someone Has Already Uncovered, A(n) ____ Occurs When An Attacker Discovers And Exploits A Previously Unknown Flaw?

Answer»

ZERO DAY

zero day

116.

With Operating System Virtualization, A Virtual Machine Is Simulated As A Self-contained Software Environment By The ____ System (the Native Operating System To The Hardware)?

Answer»

host

host

117.

What Is Administrator Privileges When Trying To Install A Download?

Answer»

Administrator privileges allows the USER full access to a program or NETWORK second only to the system account. If you don't have administrator privileges, you cannot do certain things You may be able USE a program, but not UPGRADE it.

Administrator privileges allows the user full access to a program or network second only to the system account. If you don't have administrator privileges, you cannot do certain things You may be able use a program, but not upgrade it.

118.

A ____ Is A Single, Dedicated Hard Disk-based File Storage Device That Provides Centralized And Consolidated Disk Storage Available To Lan Users Through A Standard Network Connection?

Answer»

NAS

NAS

119.

____ Are Portable Communication Devices That Function In A Manner That Is Unlike Wired Telephones?

Answer»

CELL PHONES

Cell phones

120.

____ Is A Windows Vista And Windows Xp Service Pack 2 (sp2) Feature That Prevents Attackers From Using Buffer Overflow To Execute Malware?

Answer»

DEP

DEP

121.

The Goal Of ____ Is To Prevent Computers With Suboptimal Security From Potentially Infecting Other Computers Through The Network?

Answer»

NAC

NAC

122.

A ____ Is A Cumulative Package Of All Security Updates Plus Additional Features.

Answer»

SERVICE PACK

service pack

123.

A ____ Is A Computer Program Or A Part Of A Program That Lies Dormant Until It Is Triggered By A Specific Logical Event?

Answer»

LOGIC BOMB

logic bomb

124.

____ Can Fully Decode Application-layer Network Protocols. Once These Protocols Are Decoded, The Different Parts Of The Protocol Can Be Analyzed For Any Suspicious Behavior?

Answer»

PROTOCOL ANALYZERS

Protocol analyzers

125.

____, Also Called Add-ons, Represent A Specific Way Of Implementing Activex And Are Sometimes Called Activex Applications?

Answer»

ACTIVEX CONTROLS.

ActiveX controls.

126.

According To The 2007 Fbi Computer Crime And Security Survey, The Loss Due To The Theft Of Confidential Data For 494 Respondents Was Approximately ____?

Answer»

$10 MILLION.

$10 million.

127.

Encryption Under The Wpa2 Personal Security Model Is Accomplished By ____?

Answer»

AES-CCMP

AES-CCMP

128.

____ Is A Software Program That Delivers Advertising Content In A Manner That Is Unexpected And Unwanted By The User?

Answer»

Adware

Adware

129.

Can Police Track An Ip Address After It Has Been Changed?

Answer»

<P>Sometimes-for example, if the user has a dynamic IP address, and their IP address changes within this SYSTEM as usual, it can generally be TRACKED. If the user uses a proxy service to make their IP address appear as if it is located in some RANDOM other p

Sometimes-for example, if the user has a dynamic IP address, and their IP address changes within this system as usual, it can generally be tracked. If the user uses a proxy service to make their IP address appear as if it is located in some random other p

130.

A ____ Virus Infects The Master Boot Record Of A Hard Disk Drive?

Answer»

boot

boot

131.

A(n) ____ Finds Malicious Traffic And Deals With It Immediately?

Answer»

IPS

IPS

132.

____ Technology Enables A Virtual Machine To Be Moved To A Different Physical Computer With No Impact To The Users?

Answer»

LIVE MIGRATION

Live migration

133.

The ____ Is The Link Between The Cellular Network And The Wired Telephone World And Controls All Transmitters And Base Stations In The Cellular Network?

Answer»

MTSO

MTSO

134.

What Is Another Name For Unsolicited E-mail Messages?

Answer»

spam

spam

135.

____ Monitor Internet Traffic And Block Access To Preselected Web Sites And Files?

Answer»

INTERNET CONTENT FILTERS.

Internet content filters.

136.

Business ____ Theft Involves Stealing Proprietary Business Information Such As Research For A New Drug Or A List Of Customers That Competitors Are Eager To Acquire?

Answer»

ANSWER :DATA.

137.

How Did Early Computer Security Work?

Answer»

It was pretty simple- just passwords to protect ONE's computer. With the INNOVATION of the internet, HOWEVER, computers have INCREASED security with firewalls and HUNDREDS of anti-virus programs.

It was pretty simple- just passwords to protect one's computer. With the innovation of the internet, however, computers have increased security with firewalls and hundreds of anti-virus programs.

138.

Under The _____ , Healthcare Enterprises Must Guard Protected Health Information And Implement Policies And Procedures To Safeguard It, Whether It Be In Paper Or Electronic Format?

Answer»

ANSWER :HIPAA.

139.

A Security ____ Focuses On The Administration And Management Of Plans, Policies, And People?

Answer»

manager.

manager.

140.

A Software-based ____ Attempt To Monitor And Possibly Prevent Attempts To Attack A Local System?

Answer»

HIDS

HIDS

141.

According To The Research Group Postini, Over ____ Of Daily E-mail Messages Are Unsolicited And Could Be Carrying A Malicious Payload?

Answer»

ANSWER :two-thirds.

142.

In A Company Of 500 Employees, It Is Estimated That _____ Employees Would Be Required To Combat A Virus Attack?

Answer»

FIVE EMPLOYEES.

five employees.

143.

____ Typically Involves Using Client-side Scripts Written In Javascript That Are Designed To Extract Information From The Victim And Then Pass The Information To The Attacker?

Answer»

CORRECT ANSWER: CROSS site scripting (XSS)

Correct Answer: Cross site scripting (XSS)

144.

Why Is Ripv1 Insecure In A Network?

Answer»

RIPv1 does not use a PASSWORD for authentication as with RIPV2. This makes it possible to attackers to SEND rogue RIP PACKETS and corrupt the routing table.

RIPv1 does not use a password for authentication as with RIPv2. This makes it possible to attackers to send rogue RIP packets and corrupt the routing table.