LAB 1
CER
Speech recognition
PBKDF2
Cell Phones
Weight
LAB 2
DAC
MAC
RBAC
MAC
LAB 3
Playbook
Isolation
UAC
Administrator password
1.Which of the following is considered as the root of the Active Directory hierarchy?
Forest
2.Multi-factor authentication involves how many minimum methods to authenticate a user?
2
3.Which of the following type of scanner scans for features, such as the shape, size, and position of the ear, nose, and eyes?
Facial
4.Which of the following factor is critical in the Gait analysis?
Way of walking
5.Which of the following is required for two-factor authentication? [Choose all that apply]
Password key
Password
Smart card
6.Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply]
Encryption Keys Management
Key Exchange
Encryption and Decryption
Cryptographic function offloading from a server
7.Which of the following protocol uses port-based authentication?
802.1X
8.How many entities are involved in the 802.1x authentication process?
3
9.Which of the following authentication method can use location to authenticate a user?
Attribute-based Access Control (ABAC)
10.Which type of incident response team is made up of experts who have other duties?
Virtual Team
11.Which of the following refers to a duplicate of the organization’s current data center?
Hot Site
12.Which team is dedicated only to incident response?
Permanent Team
13.Which of the following contains all the required hardware and connectivity to restore services?
Warm Site
14.Which of the following provides the plan for systems, networks, and major application recovery after disruptions?
IT Contingency Plan
15.Which of the following identifies the individuals to communicate with external entities?
Crisis Communication Plan
16.Which of the following plan focuses on malware, hackers, intrusions, attacks, and other security issues?
Cyber Incident response plan
17.Which of the following tool would you use to scan a Web application for vulnerabilities?
Nikto
18.In a Syslog implementation, which of the following component is an agent that collects the information from various devices and servers on the network?
Syslog Forwarder
19.Which of the following tasks can be performed by the NXLog tool? [Choose all that apply]
Classify events
Forward events
Correlate events
Store events
20.In an Email, which of the following are metadata? [Choose all that apply]
Sender
Subject
Date
Recipient
21.Which of the following statements describes the core purpose of using Tcpdump?
Capture data packets on a network
22.Which of the following can be considered as Personally identifiable information? [Choose all that apply]
Driver’s license number
Health insurance information
Social Security number
Medical records
23.Which of the following hashing algorithm is the common standard used for generating digital signatures?
SHA
24.How many steps are involved in the forensic investigation process?
7
25.Which type of evidence collection methods can be used when litigation might be needed? [Choose all that apply]
Chain of custody
Legal hold
Other Links:
Statistics Quiz
Networking Quiz
See other websites for quiz:
Check on QUIZLET
Check on CHEGG