1.
An attacker uses an account that allows read-only access to the firewall for checking logs and configuration files to gain access to an account that gives full control over firewall configuration. This type of attack is BEST known as:
2.
Exploitation of the 5-day grace period for domain name registration is referred to as:
3.
Which of the following audit types would a security administrator perform on the network to ensure each workstation is standardized?
4.
Which of the following defines the process and accounting structure for handling system upgrades and modifications?
5.
Which of the following poses the GREATEST risk of data leakage?
6.
An administrator wants to make sure that network machines stay up-to-date with current solutions, which of the following should be done on a regular basis to help facilitate this need?
7.
A rainbow table is used for which of the following?
8.
Which of the following does an attacker with minimal rights need to accomplish to continue attacking a compromised system?
9.
Which of the following would MOST likely monitor user web traffic?
10.
Regression testing and deployment are part of the: