Security Test #8

Which functionality allows a DLP system to fulfill its role?

Content Inspection

Which of the answers listed below refer(s) to security solution(s) that can be implemented as a function of a DLP system?

1. USB Blocking2. Email Monitoring3. Cloud-based security

A type of computer security solution that allows to define and enforce network access policies is known as:

NAC (Network Access Control)

Which of the following answers refer to the implementations of NAC?

1. Mac Filter2. 802.1X

A company's security policy requires all employee devices to have a software installed that would run as a background service on each device and perform host security health checks before granting/denying it access to the corporate intranet. Based on the given description, which of the answers listed below can be used to describe the software's features?

1.Agent-based2. Permanent

What type of security measures can be implemented on an MX gateway?

1. Encryption2. DLP3. Spam Filter

What type of device would be the most convenient for interconnecting two or more physically separated network segments?

Wireless Bridge

SSL/TLS accelerators are used to decode secure communication links for the purpose of content inspection.

False

An SSL decryptor card is a type of dedicated hardware device that improves performance of a server by taking over computational tasks related to handling of encrypted network traffic.

False

A type of device that translates data between different communication formats is called

Media Gateway

Which of the answers listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic functions?

HSM (Hardware Security Module)

A software tool used for capturing and examining contents of the network traffic is known as

Protocol Analyzer

Which of the following is a GUI packet sniffer?

Wireshark

Which of the following is a CLI packet sniffer

tcpdump

What is Nmap?

Network Scanner

Which of the tools listed below would be used to detect a rogue AP?

Wireless Scanner

Which of the following tools would be used to perform a site survey?

Wireless Scanner

Examples of password cracking software include

1. John The Ripper2. Cain & Abel

Which of the tools listed below offers the functionality of a vulnerability scanner?

OpenVas

Which of the following tools offers the functionality of a configuration compliance scanner?

Nessus

Which of the answers listed below is an example of exploitation framework?

Metasploit

What is the name of a Linux distribution commonly used as a target system for practicing penetration testing techniques?

Metasploitable

Which of the terms listed below refers to a method for permanent and irreversible removal of data stored on a memory device?

Sanitization

What is the purpose of steganography?

Hiding data within another piece of data

A monitored host containing no valuable data specifically designed to detect unauthorized access attempts is known as

Honeypot