Practice Exam 1 Questions
- After running a vulnerability scan on a server containing sensitive information, Mitch discovers the results shown here. What should be Mitch's highest priority?
A. Modifying encryption settings
B. Disabling the guest account
C. Disabling cached logins
D. Patching and updating software
- Gary is configuring a wireless access point that supports the WPS service. What risk exists in all implementations of WPS that he should consider?
A. Weak encryption
B. Physical access to the device
C. An offline brute force attack
D. Impossible to disable WPS
- Alan is a software developer working on a new security patch for one of his organization's products. What environment should he use when actively working on the code?
A. Production
B. Test
C. Development
D. Staging
- Bill suspects that an attacker is exploiting a zero-day vulnerability against his organization. Which one of the following attacker types is most likely to engage in this type of activity...