1. Various devices are connecting and authenticating to a single evil twin within the network. Which of the following are MOST likely being targeted?
A) VPNs B) Wired SCADA devices C) Network infrastructure D) Mobile devices E) All endpoints
2. An HR employee began having issues with a device becoming unresponsive after attempting to open an email attachment. When informed, the security analystbecame suspicious of the situation, even though there was not any unusual behavior on the IDS or any alerts from the antivirus software. Which of the followingBEST describes the type of threat in this situation?
A) Packet of death B) Zero-day malware C) PII exfiltration D) Known virus
3. Which of the following stakeholders would need to be aware of an e-discovery notice received by the security office about an ongoing case within the manufacturingdepartment?
A) Marketing B) Human resources C) Board of trustees D) Legal
4. A database administrator contacts a security administrator to request firewall changes for a connection to a new internal application.The security administrator notices that the new application uses a port typically monopolized by a virus.The security administrator denies the request and suggests a new port or service be used to complete the applications task.Which of the following is the security administrator practicing in this example?
A) Port security B) Access control lists C) Implicit deny D) Explicit deny
5. As part of the SDLC, software developers are testing the security of a new web application by inputting large amounts of random data. Which of the following typesof testing is being performed?
A) Fuzzing B) Stress testing C) Input validation D) Regression testing
1. Right Answer: D Explanation: Reference: http://www.corecom.com/external/livesecurity/eviltwin1.htm
Leave a comment