in terms of premises security, visitors should at least be required to correct answers sign in,
preferably with a NDA
one drawback of endpoint protections solutions like SCCM is that they can't protect mobile
devices correct answers false
pen testing agreements are casual and based on goof faith correct answers false
specify the scan of all computers on the 10.98.200.0 network correct answers 10.98.200.0/24
network routes that change and modify rules are static correct answers false
network technology that allows a virtual network to be created over a physical network correct
answers VLAN
function that creates a fixed length, unique output with analysis of data, also a one way function
correct answers hash
the practical network model with 4 layers is the OSI model correct answers false
replaced classful IP addressing schemes correct answers CIDR
the ultimate exercise in planning for security is essentially about correct answers risk
management
what are the two most important things to protect in an enterprise correct answers 1. people
2. data
, ISO/IEC 27001 is a leading risk management guideline correct answers true
a zero day bug is one that has no patch from the vendor correct answers true
example of high order bits in an IPv4 address correct answers 128-64-32-16
method that would ensure email traffic gets priority on the corporate network correct answers
QOS - quality of service
what is the most urgent port to block from this list: 443, 22, 80, 23 correct answers 23
Nikto is a good tool to scan network ports correct answers false
what is the equivalent of a firewall rule on a router correct answers ACL
using sparta, how would you specify a scan of all computers on the 172.168.0.0 network correct
answers 172.168.0.0/24
what command will show network connections related to port numbers when run on a local host
correct answers netstat -an
the dyn attack would have been prevented if the company patched their Apache web servers
properly to avoid SQL injection correct answers true
a CRC errors check would occur with the UDP protocol running on the transport layer of the
TCP/IP stack correct answers false