I suggest using two different-colored pens: blue or black or answers that are easy for you to identify and a red or different-colored pen for answers that you are unsure of. This way, you can identify your strong and weak areas.
Place the answers into the relevant answer boxes in the following table, starting with the answers that you can easily identify. Make a list of those that you cannot answer on your first time through, as you need to revise those areas. Then use logic to answer the remaining questions.
Insert the phrases at the end of this section into the appropriate answer boxes in the following table. Each phrase can only be used once:
Description |
Answers |
Other than a firewall, what other device uses ACL? |
|
Setting up a non-secure remote session to your LAN. |
|
IPSec mode between two servers on your LAN. |
|
Add an application, EXE, or a DLL so it will run. |
|
The system does not detect an attack. |
|
What will you do if a mobile phone is lost or stolen? |
|
Prevent DNS poisoning by using DNSSEC. What records |
|
On a firewall, the result when the traffic is not on the |
|
Lets you monitor the attack methods used. |
|
Used to protect PII and sensitive information from |
|
A NIPS where all the traffic flows through it. |
|
How to keep personal and business data separate on a |
|
A tool that tells you the patch version of a web server. |
|
A firewall that can also perform malware inspection. |
|
IPSec mode in a site-to-site VPN. |
|
A passive device that works with a NIPS. |
|
A stolen Bluetooth phone used for texting your friends |
|
A tool that can be used for banner grabbing. |
|
Can be used instead of a motion sensor to detect motion. |
|
Adding a third-party application to your phone. |
|
How to protect a mobile telephone. |
|
The system detects a virus but manual inspection |
|
Secure remote access protocol that can use a GUI to |
|
How you could block unwanted applications. |
|
Used for secure transfer of data between two hosts. |
|
Use the following options to answer the preceding questions:
Camera |
Blacklist |
TLS |
False negative |
Sideloading |
DLP |
Router |
Remote wipe |
SSH |
Netcat |
False positive |
Implicit deny |
Policy violation |
Inline |
Bluejacking |
Tunnel mode |
Banner grabbing |
Honeypot |
FDE, screen locks |
Storage segmentation |
NIDS |
Transport mode |
UTM |
Whitelist |
RRSIG |