1. Which of the following should be used to implement voice encryption?
A) SSLv3 B) SRTP C) VoIP D) VDSL
2. Which of the following works by implanting software on systems but delays execution until a specific set of conditions is met?
A) Ransomware B) Scareware C) Logic bomb D) Trojan
3. Which of the following threat actors is MOST likely to steal a company - s proprietary information to gain a market edge and reduce time to market?
A) Hacktivist B) Organized crime. C) Insider D) Competitor
4. Which of the following is the appropriate network structure used to protect servers and services that must be provided to external clients without completely eliminating access for internal users?
A) NAC B) DMZ C) Subnet D) VLAN
5. Which of the following uses precomputed hashes to guess passwords?
A) Rainbow tables B) ARP tables C) Iptables D) NAT tables
Leave a comment