1.
Which of the following biometric devices is used to take impressions of the friction ridges of the skin on the underside of the tip of the fingers?
2.
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
3.
Which of the following layers of TCP/IP model is used to move packets between the Internet Layer interfaces of two different hosts on the same link?
4.
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?
5.
Which of the following techniques uses a modem in order to automatically scan a list of telephone numbers?
6.
Which of the following policies is used to add additional information about the overall security posture and serves to protect employees and organizations from inefficiency or ambiguity?
7.
Which of the following statements best describes the consequences of the disaster recovery plan test?
8.
Which of the following topologies is a type of physical network design where each computer in the network is connected to a central device through an unshielded twisted-pair (UTP) wire?
9.
Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?
10.
In which of the following types of port scans does the scanner attempt to connect to all 65,535 ports?