Security+ Question of the Week: SPIM
What is SPIM? A. Serial Port Indicator Mechanism B. Unwanted junk e-mail messages C. A name resolver service D. SPAM over IM Reveal Answer The correct answer is D. Domain: 3.2. SPIM stands for SPAM...
View ArticleSecurity+ Question of the Week: Application Hardening
What is the first step in application hardening? A. Installing additional add-ons. B. Setting configurations. C. Disabling or removing unnecessary components. D. Application of updates or patches....
View ArticleSecurity+ Question of the Week: Website Redirect
What type of attack aims at redirecting traffic intended for a legitimate website to an illegitimate website? A. Phishing B. Pharming C. Fraggle D. SQL injection Reveal Answer The correct answer is B....
View ArticleSecurity+ Question of the Week: Screen Film
Screen film, used to reduce the angle of visibility on a monitor, protects against what form of attack? A. Phishing B. Shoulder surfing C. Vishing D. Spoofing Reveal Answer The correct answer is B....
View ArticleSecurity+ Question of the Week: Social Engineering Tactic
What social engineering tactic grants an unauthorized person access to a secured area without the consent of the authorized person? A. Tailgating B. War driving C. Phishing D. Piggybacking Reveal...
View ArticleSecurity+ Question of the Week: Vishing
What is vishing? A. Virtualization hijacking B. Phishing using a virus C. VLAN (Virtual Local Area Network) based DoS (Denial of Service) attacks D. VoIP (Voice over IP) based information gathering...
View ArticleSecurity+ Question of the Week: Wireless Network Technology
What technology can use either 2.4 GHz or 5 GHz frequency ranges and can support theoretical throughputs of 600 Mbps when using 802.11 wireless networks? A. WPA B. 802.11n C. MAC filtering D. Isolation...
View ArticleSecurity+ Question of the Week: Same Network Name
A hacker sets up a wireless access point in a vacant room next door to your office space. The wireless network supported by this unauthorized devices has the same network name and base station MAC...
View ArticleSecurity+ Question of the Week: Office Graffiti
When entering your office building from a side entrance, one which faces several outdoor restaurants, you notice circles with numbers and codes marked on the wall. What does this indicate? A. War...
View ArticleSecurity+ Question of the Week: Security Risk at Lunch
While away from the office for lunch, you connect your notebook to a free WiFi hotspot provided by the restaurant. You sit in a corner booth, latch the notebook to the table and orient the screen so as...
View ArticleSecurity+ Question of the Week: SPIM
What is SPIM? A. Serial Port Indicator Mechanism B. Unwanted junk e-mail messages C. A name resolver service D. SPAM over IM Reveal Answer The correct answer is D. Domain: 3.2. SPIM stands for SPAM...
View ArticleSecurity+ Question of the Week: Application Hardening
What is the first step in application hardening? A. Installing additional add-ons. B. Setting configurations. C. Disabling or removing unnecessary components. D. Application of updates or patches....
View ArticleSecurity+ Question of the Week: Website Redirect
What type of attack aims at redirecting traffic intended for a legitimate website to an illegitimate website? A. Phishing B. Pharming C. Fraggle D. SQL injection Reveal Answer The correct answer is B....
View ArticleSecurity+ Question of the Week: Screen Film
Screen film, used to reduce the angle of visibility on a monitor, protects against what form of attack? A. Phishing B. Shoulder surfing C. Vishing D. Spoofing Reveal Answer The correct answer is B....
View ArticleSecurity+ Question of the Week: Social Engineering Tactic
What social engineering tactic grants an unauthorized person access to a secured area without the consent of the authorized person? A. Tailgating B. War driving C. Phishing D. Piggybacking Reveal...
View ArticleSecurity+ Question of the Week: Vishing
What is vishing? A. Virtualization hijacking B. Phishing using a virus C. VLAN (Virtual Local Area Network) based DoS (Denial of Service) attacks D. VoIP (Voice over IP) based information gathering...
View ArticleSecurity+ Question of the Week: Wireless Network Technology
What technology can use either 2.4 GHz or 5 GHz frequency ranges and can support theoretical throughputs of 600 Mbps when using 802.11 wireless networks? A. WPA B. 802.11n C. MAC filtering D. Isolation...
View ArticleSecurity+ Question of the Week: Same Network Name
A hacker sets up a wireless access point in a vacant room next door to your office space. The wireless network supported by this unauthorized devices has the same network name and base station MAC...
View ArticleSecurity+ Question of the Week: Office Graffiti
When entering your office building from a side entrance, one which faces several outdoor restaurants, you notice circles with numbers and codes marked on the wall. What does this indicate? A. War...
View ArticleSecurity+ Question of the Week: Security Risk at Lunch
While away from the office for lunch, you connect your notebook to a free WiFi hotspot provided by the restaurant. You sit in a corner booth, latch the notebook to the table and orient the screen so as...
View Article
More Pages to Explore .....