20 Questions, when you are completed click submit to see your score

Results

#1. What DOS attack is a reflected attack using ICMP packets?

#2. How will I discover incorrectly configured devices that deviate from the baseline?

#3. How can I ensure my enterprise employees are able to authenticate only whilst present on the secure site?

#4. How can I block a ping attack from generating unnecessary traffic on my intranets?

#5. How can I BEST reduce operation risk when I support BYOD?

#6. My Financial corporation is risk averse. If a risk is seen as too great, what is the recommended risk action?

#7. CISA post an advisory on a recently discovered zero day for providers of critical infrastructure, how will we best discover if we have been affected?

#8. Which of the following BIA OBJECTIVES deals with restoration of data?

#9. What are CPE, CVE and OVAL used for?

#10. Which of the following BIA OBJECTIVES deals with a returning system to an operational state?

#11. What would be a good source of information for a red team, aiming to test the responsiveness of the staff to an APT actor?

#12. A CSP needs to ensure customers will be assured that the services on offer meet industry expectations and follow best practices. What framework should the CSP adopt?

#13. Security Architects are defining a baseline set of security protocols for all web application servers. The goal is to ensure historic data and future sessions cannot be compromised by a long term key being exposed. What algorithm would ensure Perfect Forward Secrecy (PFS)?

#14. A forensic analyst must take a local copy of a laptop hard drive as part of an investigation. What command would allow the evidence to be copied to a 2nd hard drive?

#15. An organization is preparing to upgrade their firewalls at five locations around the United States. Each of the three vendor's RFP responses is in-line with the security and other requirements. Which of the following should the security administrator do to ensure the firewall platform is appropriate for the Organization?

#16. An audit at a popular on-line shopping site reveals that a flaw in the website allows customers to purchase goods at a discounted rate. To improve security the Chief Information Security Officer (CISO) has requested that the web based shopping cart application undergo testing to validate user input in both free form text fields and drop down boxes. Which of the following is the BEST combination of tools and / or methods to use?

#17. A Company's SAN is nearing capacity, and will cause costly downtimes if servers run out disk space. Which of the following is a more cost effective alternative to buying a new SAN?

#18. A Linux security administrator is attempting to resolve performance issues with new software installed on several baselined user systems. After investigating, the security administrator determines that the software is not initializing or executing correctly. For security reasons, the company has implemented trusted operating systems with the goal of preventing unauthorized changes to the configuration baseline. The MOST likely cause of this problem is that SE Linux is set to:

#19. A company's user community is being adversely affected by various types of emails whose authenticity cannot be trusted. The Chief Information Security Officer (CISO) must address the problem. Which of the following solutions would BEST support trustworthy communication solutions?

#20. A security administrator is investigating an incident involving suspicious word processing documents on an employee's computer, which was found powered off in the employee's office. Which of the following tools is BEST suited for extracting full or partial word processing documents from unallocated disk space?

Finish