preview

Exam 1 Review

Satisfactory Essays

• Question 1 5 out of 5 points Which of the following files is edited to block a search engine’s bots from indexing an organizational Web site? Selected Answer: robots.txt Answers: lmhosts.txt robots.txt host.txt index.txt • Question 2 5 out of 5 points Web resources used to footprint a company include all but which one of the following? Selected Answer: Request for Comments (RFC) archive Answers: Internet archive SEC EDGAR Company Web site Request for Comments (RFC) archive • Question 3 5 out of 5 points What can be revealed from the information gathered from a company’s Web site, job postings, and employee blog? Selected Answer: Information that will help fine-tune scans or probes …show more content…

Selected Answer: iptables Answers: ipchains iptables ipconfig ip host • Question 1 7 out of 7 points Which of the following is associated with passive sniffing? Selected Answer: Promiscuous mode Answers: Promiscuous mode Packet injection Rogue access points Bluejacking • Question 2 6 out of 6 points When choosing between guards and dogs for physical, which of the following factors must be considered? Selected Answer: Discernment Answers: Liability Discernment Dual role Multifunction • Question 3 6 out of 6 points CCTV can be used as which of the following type of tools? Selected Answer: Detective only Answers: Detective only Preventive only Detective and reactive Reactive and preventative • Question 4 7 out of 7 points If an active fax machine is discovered during an assessment, which of the following is of the least concern? Selected Answer: The phone number is publicly available. Answers: The phone number is publicly available. The fax machine is in an open, unsecured area. Faxes frequently sit in the printer tray. The fax machine uses a ribbon. • Question 5 7 out of 7 points Which of the following lock grades should be selected in order to appropriately protect critical business assets? Selected

Get Access