Zero Day - Answers A newly released bug without a known fix is a _______________?
(Basically the Vendor has just found out about it)
Sign In and (Preferably with an NDA) - Answers In terms of Premises Security, visitors should at the
least be required to ____________________. (Choose the Best Answer)
Data - Answers What is at the heart of the CIA triad ?
True - Answers Your company has failed to apply critical security patches to your servers for months,
this is increasing your overall vulnerabilities.
Intangible Assets - Answers With our connected world the most pressing concern of corporations in
regard to Information Security is protecting their:
Risk Management - Answers The Ultimate exercise in planning for security is essentially about?
False - Answers The most important asset that a company must protect is it's data, followed closely
by the safety of it's people.
True - Answers Your company has failed to apply critical security patches to your servers for months,
this is increasing your overall risk.
Risk - Answers ISO 27001 Helps Organizations Manage this:
Threat - Answers A rogue employee who was just fired, he/she is a:
Vulnerability - Answers A Broken Door Lock with Key Card Reader that forces the organization to
keep the door propped open is a:
Recover - Answers Restoring Data from backups is to:
Detect - Answers Monitoring Intrusion Detection Systems is to:
Prevent - Answers Applying Security Patches is to:
ARP - Answers Which service handles the mapping of an ip address to the physical address (MAC) of a
device?
- User Datagram Protocol (UDP)
- Transmission Control Protocol (TCP) - Answers Which two protocols function at the Transport Layer
of the OSI Model CHOOSE TWO
True - Answers The low order bits in an IP Address start would be represented by
8-4-2-1
Hop - Answers If you perform a traceroute from your computer to a website, the _________ count
that displays reflects the number of routers that your trace is passing through to get to the
destination.
11111111 (8 ones) - Answers Fill in the Blank with the exact answer required.
What is the Binary representation of decimal 255 ?
False - Answers The high order bits in an IP Address start at the first position (Highest) and would be
represented by
1 -2 - 4 -8
- MAC
- OUI - Answers A unique 48 or 64 bit identifier that is given to network interface equipment to
provide a unique connection is known as a _____________.
The first 24 bits identify the Manufacturer of the device and are referred to as the __________
255.255.255.0 - Answers A Class C Network would require a subnet mask of ?
Seven - Answers The OSI Model Consists of _______ Layers?
Switch - Answers A vendor is introducing a new Layer 2 device, what is the best possible answer as to
what that device's function is?
Protocol Data Unit (PDU) - Answers A networking unit that contains network addressing data, in the
Application layer of the OSI model and is referred to as (Data Stream).
Core - Answers This hierarchical networking model layer is responsible for the high speed routing and
switching functions, typically within the Data Center of an enterprise class network.
Hash - Answers A ___________________ is a mathematical function that creates a fixed length
unique output with any size or set of data. It is a one way function meaning that it cannot be
reversed.
Vulnerability - Answers A __________________ is a bug present in a system that has not been
patched that creates a risk.
Layer 4 - Answers It's PDU's consist of Segments
Layer 1 - Answers Deals in Bits