You must be logged in to view this content.
Quiz Summary
0 of 7 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 7 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- Current
- Review
- Answered
- Correct
- Incorrect
- Question 1 of 7
1. Question
1 point(s)Management decided last year to allow employees to connect and use their personal mobile devices on the internal network. However, the organization is having problems with these devices including the following:
- Employees do not keep their devices updated.
- There is no standardization among the devices.
- The organization doesn’t have adequate control over the devices.
Management wants to implement a mobile device deployment model to overcome these problems, while still allowing employees to use their own devices. Which of the following is the BEST choice?
CorrectIncorrect - Question 2 of 7
2. Question
1 point(s)Your network includes dozens of servers. Administrators in your organization are having problems aggregating and correlating the logs from these servers. Which of the following provides the BEST solution for these problems?
CorrectIncorrect - Question 3 of 7
3. Question
1 point(s)You recently learned that attackers exploited the POODLE vulnerability on one of your organization’s web servers. What type of attack is this?
CorrectIncorrect - Question 4 of 7
4. Question
1 point(s)A coffee shop recently stopped broadcasting the SSID for their wireless network. Instead, paying customers can view it on their receipt and use it to connect to the coffee shop’s wireless network. Today, Lisa turned on her laptop computer and saw the SSID. Which of the following is the MOST likely reason why?
CorrectIncorrect - Question 5 of 7
5. Question
1 point(s)Lisa is setting up a secure web server. She needs the server’s cryptography to support perfect forward secrecy. Of the following choices, which cipher suite should she ensure is used by the server?
CorrectIncorrect - Question 6 of 7
6. Question
1 point(s)You are troubleshooting a computer that is displaying erratic behavior. You suspect that malicious software was installed when the user downloaded and installed a free software application. You want to identify the name of the malware and you run the following netstat command from the command prompt:
C:\WINDOWS\system32>netstat -nab > netstat.txt
After opening the text file you see the following information.
Based on the output, what type of malware was most likely installed on the user’s computer?
CorrectIncorrect - Question 7 of 7
7. Question
1 point(s)The new CIO at your organization has mandated the use of DMZ firewalls from different vendors as a method of implementing vendor diversity. Which of the following is a security advantage of this strategy?
CorrectIncorrect