Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Created by switches to logically segment a network without changing physical topology:

A.

LAN

B.

WAN

C.

VLAN

D.

MAN

Which type of software testing focuses on examining the source code for vulnerabilities and security issues?

A.

Black-box testing

B.

White-box testing

C.

Functional testing

D.

User acceptance testing

Derrick logs on to a system in order to read a file. In this example, Derrick is the ______?

A.

Subject

B.

Object

C.

Process

D.

Predicate

How do you distinguish authentication and identification?

A.

Both are the same

B.

Authentication verifies identity

C.

Authentication verifies identity; identification claims identity

D.

Identification verifies identity

A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?

A.

Metal detectors

B.

Security guards

C.

RFID scanners

D.

Baggage X-ray machines

What is the BEST defense against dumpster diving attacks?

A.

Anti-malware software

B.

Clean desk policy

C.

Data loss prevention tools

D.

Shredding

Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?

A.

RSA – Rivest-Shamir-Adleman

B.

GPG – GNU Privacy Guard

C.

ECC – Elliptic Curve Cryptosystem

D.

PGP – Pretty Good Privacy

Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:

A.

Zero Trust

B.

Defense in Depth

C.

Least Privilege

D.

All

A ________ creates an encrypted tunnel to protect your personal data and communications.

A.

HTTPS

B.

VPN

C.

Anti-virus

D.

IDS

Which of the following is the LEAST secure communications protocol?

A.

CHAP

B.

IPsec

C.

PAP

D.

EAP