True or False. The US Dept of Defense has produced a number of Security Technical Implementation Guides to show the most secure ways to deploy common software packages such as operation systems, open source software, and network devices. These guides are restricted to use by US military agencies only.

Q:

Which of these is identified by a basic port scanner?

Q:

Port numbers 0 through 1023 are known as what?

Q:

If a port is blocked, what response will be sent to the port scanner?

Q:

Which type of scan notes the connection but leaves the target hanging, i.e. does not reveal any information to the target about the host that initiated the scan?

Q:

Which two (2) of these are other names for a protocol analyzer? (Select 2)

Q:

True or False. Packet sniffers are used by hackers but have no legitimate place in legitimate network management.

Q:

Which component of a vulnerability scanner provides high-level graphs and trend reports for executive leadership?

Q:

How does a vulnerability scanner detect external threats?

Q:

What are the three (3) components that make up the overall Common Vulnerability Score (CVSS)? (Select 3)

Q:

In which component of a Common Vulnerability Score (CVSS) would attack complexity be reflected?

Q:

In which component of a Common Vulnerability Score (CVSS) would integrity be reflected?

Q:

In which component of a Common Vulnerability Score (CVSS) would remediation level be reflected?

Q:

In which component of a Common Vulnerability Score (CVSS) would impact subscore be reflected?

Q:

True or False. The US Dept of Defense has produced a number of Security Technical Implementation Guides to show the most secure ways to deploy common software packages such as operation systems, open source software, and network devices. These guides are restricted to use by US military agencies only.

Q:

The Center for Internet Security (CIS) has implementation groups that rank from the least secure to the most secure. Which of these are required to meet the middle level of security?

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments