SANS FOR578 QUETIONS AND ANSWERS LATEST UPDATED VERSION guaranteed a+
12 vues 1 fois vendu
Cours
SANS FOR578
Établissement
SANS FOR578
SANS FOR578 QUETIONS AND ANSWERS LATEST
UPDATED VERSION guaranteed a+
s
1. What does the acronym SANS stand for?
o A) System and Network Security
o B) SysAdmin, Networking, and Security
o C) Security and Network Solutions
o D) Secure Administration Network System
Answer: B
Rationale: SANS...
SANS FOR578 QUETIONS
AND ANSWERS LATEST
UPDATED VERSION
guaranteed a+
,SANS FOR578 QUETIONS AND ANSWERS LATEST
UPDATED VERSION guaranteed a+
s
1. What does the acronym SANS stand for?
o A) System and Network Security
o B) SysAdmin, Networking, and Security
o C) Security and Network Solutions
o D) Secure Administration Network System
Answer: B
Rationale: SANS stands for SysAdmin, Networking, and Security, focusing on
various aspects of information security and administration.
2. What is the primary purpose of a firewall?
o A) To increase network speed
o B) To prevent unauthorized access to or from a private network
o C) To encrypt data
o D) To manage network traffic
Answer: B
Rationale: A firewall acts as a barrier between a trusted internal network and
untrusted external networks, controlling incoming and outgoing traffic based on
security rules.
3. What does VPN stand for?
o A) Virtual Private Network
o B) Verified Public Network
o C) Variable Protocol Network
o D) Virtual Public Network
Answer: A
Rationale: VPN stands for Virtual Private Network, which creates a secure
connection over the internet to protect private web traffic.
4. Which of the following is an example of a denial-of-service attack?
o A) Phishing
o B) Flooding a network with excessive requests
o C) Data theft
o D) Virus infection
Answer: B
Rationale: A denial-of-service attack aims to make a machine or network
resource unavailable to its intended users by overwhelming it with traffic.
5. What is a security policy?
o A) A guideline for network speed
o B) A document outlining the rules and practices for a system's security
o C) A hardware configuration setting
, o D) A type of encryption algorithm
Answer: B
Rationale: A security policy is a formal document that outlines an organization's
approach to protecting its information assets.
6. What does the principle of least privilege entail?
o A) Users have access to all system resources.
o B) Users have only the permissions necessary to perform their job functions.
o C) All users are treated equally.
o D) Permissions are assigned based on seniority.
Answer: B
Rationale: The principle of least privilege restricts user access to only those
resources necessary for their tasks, minimizing potential security risks.
7. Which of the following is used to detect vulnerabilities in a network?
o A) Firewall
o B) Antivirus software
o C) Vulnerability scanner
o D) Encryption
Answer: C
Rationale: A vulnerability scanner is a tool designed to identify weaknesses in a
system or network, providing insights for remediation.
8. What is the function of intrusion detection systems (IDS)?
o A) To block unauthorized access
o B) To monitor network traffic for suspicious activity
o C) To encrypt sensitive data
o D) To authenticate users
Answer: B
Rationale: An IDS monitors network traffic for suspicious activity and alerts
administrators to potential security breaches.
9. Which protocol is used for secure web browsing?
o A) HTTP
o B) FTP
o C) HTTPS
o D) SMTP
Answer: C
Rationale: HTTPS (Hypertext Transfer Protocol Secure) is the secure version of
HTTP, using encryption to protect data exchanged over the web.
10. What is a man-in-the-middle (MITM) attack?
o A) An attack where an attacker intercepts communication between two parties.
o B) An attack on a user's device.
o C) An attack that exploits software vulnerabilities.
o D) An attack that disrupts network traffic.
Answer: A
Rationale: A man-in-the-middle attack occurs when an attacker secretly
intercepts and relays messages between two parties, often without them knowing.
11. What does the term 'phishing' refer to?
o A) A method of data encryption
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur laurenjames. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €17,47. Vous n'êtes lié à rien après votre achat.