Join the discussion
Question 1/43
You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month.
Which of the following is the most likely explanation for this problem?
Which of the following is the most likely explanation for this problem?
Correct Answer: B
Add Comments
- Other Question (43q)
- Q1. You purchased a network scanner six months ago. In spite of regularly conducting scans usi...
- Q2. You have been assigned to configure a DMZ that uses multiple firewall components. Specific...
- Q3. A security breach has occurred in which a third party was able to obtain and misuse legiti...
- Q4. You have just deployed an application that uses hash-based checksums to monitor changes in...
- Q5. You have been asked to encrypt a large file using a secure encryption algorithm so you can...
- Q6. You are using a PKI solution that is based on Secure Sockets Layer (SSL). Which of the fol...
- Q7. An effective way to prevent a user from becoming the victim of a malicious bot is to use a...
- Q8. Which choice lists typical firewall functions?...
- Q9. What is the term for a self-replicating program or algorithm that consumes system resource...
- Q10. Which of the following is a form of "what you know" authentication?...
- Q11. Which type of attack requires that the hacker be physically located between the two legiti...
- Q12. Irina has contracted with a company to provide Web design consulting services. The company...
- Q13. Which of the following is a typical target of a trojan on a Linux system?...
- Q14. Which algorithm can use a 128-bit key, and has been adopted as a standard by various gover...
- Q15. Which protocol uses cleartext communication by default?...
- Q16. Which of the following errors most commonly occurs when responding to a security breach?...
- Q17. Which of the following will best help you ensure a database server can withstand a recentl...
- Q18. Jason is attempting to gain unauthorized access to a corporate server by running a program...
- Q19. Why can instant messaging (IM) and peer-to-peer (P2P) applications be considered a threat ...
- Q20. Which term describes a dedicated system meant only to house firewall software?...
- Q21. What is the primary advantage of using a circuit-level proxy?...
- Q22. Which of the following causes problems with firewalls...
- Q23. Your firewall is configured to forbid all internal traffic from going out to the Internet....
- Q24. Which of the following describes the practice of stateful multi-layer inspection?...
- Q25. The best way to thwart a dictionary attack is by enforcing a:...
- Q26. What is the primary drawback of using symmetric-key encryption?...
- Q27. Which component works with an operating system to increase its security ability?...
- Q28. Consider the following diagram: Which of the following best describes the protocol activit...
- Q29. David has enabled auditing on the C, D and E drives of his Web server. This server runs Wi...
- Q30. A CGI application on the company's Web server has a bug written into it. This particular b...
- Q31. Which ICMP message type is used to synchronize time between two hosts?...
- Q32. What is the most common attack method against TCP?...
- Q33. Requests for Web-based resources have become unacceptably slow. You have been assigned to ...
- Q34. What distinguishes hash encryption from other forms of encryption?...
- Q35. All servers assume that a valid IP address belongs to the computer that sent it. Because T...
- Q36. You have been assigned to provide security measures for your office's reception area. Alth...
- Q37. Danielle was informed by her network administrator that an audit may be conducted during t...
- Q38. Which of the following accurately describes an aspect of an access control list (ACL)?...
- Q39. Which security standard consists of 11 titles that are designed to improve the accuracy an...
- Q40. Which tool is best suited for identifying applications and code on a Web server that can l...
- Q41. Which of the following security services, as defined by the ISO 7498-2 Security Architectu...
- Q42. You are creating an information security policy for your company. Which of the following a...
- Q43. Which choice lists the designated stages of a hacker attack in the correct order?...
