0 of 7 questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 7 questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
|Table is loading|
|No data available|
- Question 1 of 7
1. Question1 point(s)
Management decided last year to allow employees to connect and use their personal mobile devices on the internal network. However, the organization is having problems with these devices including the following:
- Employees do not keep their devices updated.
- There is no standardization among the devices.
- The organization doesn’t have adequate control over the devices.
Management wants to implement a mobile device deployment model to overcome these problems, while still allowing employees to use their own devices. Which of the following is the BEST choice?CorrectIncorrect
- Question 2 of 7
2. Question1 point(s)
Your network includes dozens of servers. Administrators in your organization are having problems aggregating and correlating the logs from these servers. Which of the following provides the BEST solution for these problems?CorrectIncorrect
- Question 3 of 7
3. Question1 point(s)
You recently learned that attackers exploited the POODLE vulnerability on one of your organization’s web servers. What type of attack is this?CorrectIncorrect
- Question 4 of 7
4. Question1 point(s)
A coffee shop recently stopped broadcasting the SSID for their wireless network. Instead, paying customers can view it on their receipt and use it to connect to the coffee shop’s wireless network. Today, Lisa turned on her laptop computer and saw the SSID. Which of the following is the MOST likely reason why?CorrectIncorrect
- Question 5 of 7
5. Question1 point(s)
Lisa is setting up a secure web server. She needs the server’s cryptography to support perfect forward secrecy. Of the following choices, which cipher suite should she ensure is used by the server?CorrectIncorrect
- Question 6 of 7
6. Question1 point(s)
You are troubleshooting a computer that is displaying erratic behavior. You suspect that malicious software was installed when the user downloaded and installed a free software application. You want to identify the name of the malware and you run the following netstat command from the command prompt:
C:\WINDOWS\system32>netstat -nab > netstat.txt
After opening the text file you see the following information.
Based on the output, what type of malware was most likely installed on the user’s computer?CorrectIncorrect
- Question 7 of 7
7. Question1 point(s)
The new CIO at your organization has mandated the use of DMZ firewalls from different vendors as a method of implementing vendor diversity. Which of the following is a security advantage of this strategy?CorrectIncorrect