1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
vulnerability scanning
Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?
It can detect open TCP ports on network systems
How does network scanning help assess operations security?
It outlines the company's overall security goals for managers and technical staff
What is the objective of the governing policy in the security policy hierarchy structure?
procedure document
Which type of security policy document is it that includes implementation details that usually contain step-by-step instructions and graphics?
to focus the attention of employees on security issues
What is the purpose of a security awareness campaign?
determining the feasibility and the potential consequences of a successful attack
What is the goal of network penetration testing?
SIEM
What network security testing tool has the ability to provide details on the source of suspicious network activity?
Nmap
What network scanning tool has advanced features that allows it to use decoy hosts to mask the source of the scan?
Nmap
What network testing tool can be used to identify network layer protocols running on a host?
integrity checking
What type of network security test would be used by network administrators for detection and reporting of changes to network systems?
Zenmap
What testing tool is available for network administrators who need a GUI version of Nmap?
Isolate the infected system
Which initial step should be followed when a security breach is found on a corporate system?
Photograph the system
What step should be taken after data is collected, but before equipment is disconnected, if a security breach is found on a system?
awareness campaigns
Which security program is aimed at all levels of an organization, including end users and executive staff?
security awareness program
What is implemented by administration to instruct end users in how to effectively conduct business safely within an organization?
- awareness campaigns
- education and training
What are two major components of a security awareness program? (Choose two.)
procedure documents
Which type of documents include implementation details that usually contain step-by-step instructions and graphics?
standards
Which type of documents help an organization establish consistency in the operations of the network by specifying criteria that must be followed?
governing policy
Which policy outlines the overall security goals for managers and technical staff within a company?
technical policy
Which type of security policy includes network access standards and server security policies?
technical policy
Which type of security policy includes acceptable encryption methods?
the audience
What is the determining factor in the content of a security policy within an organization?
Chief Executive Officer
Which executive position is ultimately responsible for the success of an organization?
Nmap:
used for Layer 3 port scanning
Nessus:
used to scan systems for software vulnerabilities
Tripwire:
used to assess if network devices are compliant with network security policies
Match the network security testing tool with the correct function. (Not all options are used.)