1.
How can a rootkit bypass Windows 7 operating system's kernel mode, code signing policy?
2.
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
3.
A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?
4.
How is sniffing broadly categorized?
5.
A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?
6.
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?
7.
The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?
8.
Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?
9.
Which of the statements concerning proxy firewalls is correct?
10.
Which of the following is an example of two factor authentication?