1.
Which of the following is a malicious program used to capture information from an infected computer?
2.
The security administrator needs to make a change in the network to accommodate a new remote location. The new location will be connected by a serial interface, off the main router, through a commercial circuit. This remote site will also have traffic completely separated from all other traffic. Which of the following design elements will need to be implemented to accommodate the new location?
3.
Which of the following is the MOST secure authentication method?
4.
Mitigating security risks by updating and applying hot fixes is part of:
5.
When reviewing IDS logs, the security administrator notices many events pertaining to a "NOOP sled". Which of the following attacks is occurring?
6.
Which of the following is the MAIN difference between a hotfix and a patch?
7.
A vulnerability assessment was conducted against a network. One of the findings indicated an out-dated version of software. This is an example of weak:
8.
Which of the following tools can execute a ping sweep?
9.
Which of the following is a newer version of SSL?
10.
Which of the following is used when performing a qualitative risk analysis?