1.
Which of the following security controls would be applied on individual hosts to monitor suspicious activities, by actively analyzing events occurring within that host,
and blocking any suspicious or abnormal activity?
2.
Jane, a security administrator, forgets his card to access the server room. Jane asks Matt if she could use his card for the day. Which of the following is Jane using
to gain access to the server room?
3.
During a forensic investigation, which of the following information is compared to verify the contents of a hard drive image match the original drive and have not
been changed by the imaging process?
4.
Jane brought a laptop in from home and connected the Ethernet interface on the laptop to a wall jack with a patch cable. Jane was unable to access any network
resources. Which of the following is the MOST likely cause?
5.
Matt, a new employee, installed an application on his workstation that allowed Internet users to have access to his workstation. Which of the following security
related training could have mitigated this action?
6.
Which of the following threats can result from a lack of controls for personal webmail?
7.
Which of the following is identified by the command: INSERT INTO users ("admin", "admin");'?
8.
Which of the following attacks is MOST likely to be performed against an FTP server?
9.
After performing a port scan, Sara, a network administrator, observes that port 443 is open. Which of the following services is MOST likely running?
10.
Establishing a published chart of roles, responsibilities, and chain of command to be used during a disaster is an example of which of the following?