Quantcast
Channel: security+ exam – Global Knowledge Blog
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: SPIM

What is SPIM? A. Serial Port Indicator Mechanism B. Unwanted junk e-mail messages C. A name resolver service D. SPAM over IM Reveal Answer The correct answer is D. Domain: 3.2. SPIM stands for SPAM...

View Article



Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Application Hardening

What is the first step in application hardening? A. Installing additional add-ons. B. Setting configurations. C. Disabling or removing unnecessary components. D. Application of updates or patches....

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Website Redirect

What type of attack aims at redirecting traffic intended for a legitimate website to an illegitimate website? A. Phishing B. Pharming C. Fraggle D. SQL injection Reveal Answer The correct answer is B....

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Screen Film

Screen film, used to reduce the angle of visibility on a monitor, protects against what form of attack? A. Phishing B. Shoulder surfing C. Vishing D. Spoofing Reveal Answer The correct answer is B....

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Social Engineering Tactic

What social engineering tactic grants an unauthorized person access to a secured area without the consent of the authorized person? A. Tailgating B. War driving C. Phishing D. Piggybacking Reveal...

View Article


Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Vishing

What is vishing? A. Virtualization hijacking B. Phishing using a virus C. VLAN (Virtual Local Area Network) based DoS (Denial of Service) attacks D. VoIP (Voice over IP) based information gathering...

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Wireless Network Technology

What technology can use either 2.4 GHz or 5 GHz frequency ranges and can support theoretical throughputs of 600 Mbps when using 802.11 wireless networks? A. WPA B. 802.11n C. MAC filtering D. Isolation...

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Same Network Name

A hacker sets up a wireless access point in a vacant room next door to your office space. The wireless network supported by this unauthorized devices has the same network name and base station MAC...

View Article


Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Office Graffiti

When entering your office building from a side entrance, one which faces several outdoor restaurants, you notice circles with numbers and codes marked on the wall. What does this indicate? A. War...

View Article


Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Security Risk at Lunch

While away from the office for lunch, you connect your notebook to a free WiFi hotspot provided by the restaurant. You sit in a corner booth, latch the notebook to the table and orient the screen so as...

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: SPIM

What is SPIM? A. Serial Port Indicator Mechanism B. Unwanted junk e-mail messages C. A name resolver service D. SPAM over IM Reveal Answer The correct answer is D. Domain: 3.2. SPIM stands for SPAM...

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Application Hardening

What is the first step in application hardening? A. Installing additional add-ons. B. Setting configurations. C. Disabling or removing unnecessary components. D. Application of updates or patches....

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Website Redirect

What type of attack aims at redirecting traffic intended for a legitimate website to an illegitimate website? A. Phishing B. Pharming C. Fraggle D. SQL injection Reveal Answer The correct answer is B....

View Article


Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Screen Film

Screen film, used to reduce the angle of visibility on a monitor, protects against what form of attack? A. Phishing B. Shoulder surfing C. Vishing D. Spoofing Reveal Answer The correct answer is B....

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Social Engineering Tactic

What social engineering tactic grants an unauthorized person access to a secured area without the consent of the authorized person? A. Tailgating B. War driving C. Phishing D. Piggybacking Reveal...

View Article


Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Vishing

What is vishing? A. Virtualization hijacking B. Phishing using a virus C. VLAN (Virtual Local Area Network) based DoS (Denial of Service) attacks D. VoIP (Voice over IP) based information gathering...

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Wireless Network Technology

What technology can use either 2.4 GHz or 5 GHz frequency ranges and can support theoretical throughputs of 600 Mbps when using 802.11 wireless networks? A. WPA B. 802.11n C. MAC filtering D. Isolation...

View Article


Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Same Network Name

A hacker sets up a wireless access point in a vacant room next door to your office space. The wireless network supported by this unauthorized devices has the same network name and base station MAC...

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Office Graffiti

When entering your office building from a side entrance, one which faces several outdoor restaurants, you notice circles with numbers and codes marked on the wall. What does this indicate? A. War...

View Article

Image may be NSFW.
Clik here to view.

Security+ Question of the Week: Security Risk at Lunch

While away from the office for lunch, you connect your notebook to a free WiFi hotspot provided by the restaurant. You sit in a corner booth, latch the notebook to the table and orient the screen so as...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images