click below
click below
Normal Size Small Size show me how
Security Plus Notes
Notes
| Question | Answer |
|---|---|
| What is a cryptographic representation of non-repudiation? | Digital signature |
| What reduces the effectiveness of telephone social engineering? | Awareness training |
| What will execute malicious code at a pre-specified time? | Logic Bomb |
| What is a weakness of WEP? | Lack of integrity checking |
| What is LEAST likely to help reduce single points of failure? | Mandatory vacations |
| What reduces the attack surface of an operating system? | Diabling unused servicesWBerlin Sans |
| What is the LEAST effective when hardening an operating system? | Installing HIDS |
| What provides the MOST control when deploying patches? | Patch management |