|
Question |
Rating |
View Answer |
|
What is Exfiltration? |
|
View Answer |
|
What is the Chain of Custody? |
|
View Answer |
|
Why are internal threats oftentimes more successful than external threats? |
|
View Answer |
|
Why would you bring in an outside contractor to check the security issues? |
|
View Answer |
|
What is the Three-way handshake? How can it be used to create a DOS attack? |
|
View Answer |
|
What is the difference between closed-source and open-source? Which is better? |
|
View Answer |
|
How would you lock down a mobile device? |
|
View Answer |
|
What is the difference between Information Protection and Information Assurance? |
|
View Answer |
|
What's the difference between a White Box test and a Black Box test? |
|
View Answer |
|
What's better, a red team or a blue team, in penetration testing scenarios? |
|
View Answer |
|
What is worse in Firewall Detection, a false negative or a false positive? |
|
View Answer |
|
What is the difference between a Vulnerability and an Exploit? |
|
View Answer |
|
What is the difference between an HIDS (Host Intrusion Detection System) and a NIDS (Network Intrusion Detection System)? |
|
View Answer |
|
What is the CIA triangle? |
|
View Answer |
|
why is it easier to break into a Windows local account than an AD account? |
|
View Answer |
|
What is an easy way to configure a network to allow only a single computer to login on a particular jack? |
|
View Answer |
|
How do you protect your home Wireless Access Point? |
|
View Answer |
|
What is data protection in transit vs data protection at rest? |
|
View Answer |
|
How to judge if a remote server is running IIS or Apache? |
|
View Answer |
|
What are the three ways to authenticate a person? |
|
View Answer |