1.
You discover an infected email attachment that contains software code that attacks a known vulnerability in a popular social networking application. This type of software code belongs to which type of malware category?
2.
What is an example of a distance-vector routing protocol?
3.
Which type of firewall monitors traffic streams from beginning to end?
4.
Which network method securely connects two sites across a public network?
5.
When accessing an intranet website, a certificate error is received. What can be done to move past the certificate error and ensure that the error is not received the next time the website is accessed?
6.
Which option describes a characteristic of a distributed denial-of-service attack?
7.
What is a component of a public key infrastructure?
8.
What does a hypervisor enable?
9.
Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
10.
Which well-known port is associated with the Simple Mail Transfer Protocol?