SANS FOR578 QUETIONS AND ANSWERS LATEST UPDATED VERSION guaranteed a+
13 keer bekeken 1 keer verkocht
Vak
SANS FOR578
Instelling
SANS FOR578
SANS FOR578 QUETIONS AND ANSWERS LATEST
UPDATED VERSION guaranteed a+
s
1. What does the acronym SANS stand for?
o A) System and Network Security
o B) SysAdmin, Networking, and Security
o C) Security and Network Solutions
o D) Secure Administration Network System
Answer: B
Rationale: SANS...
SANS FOR578 QUETIONS
AND ANSWERS LATEST
UPDATED VERSION
guaranteed a+
,SANS FOR578 QUETIONS AND ANSWERS LATEST
UPDATED VERSION guaranteed a+
s
1. What does the acronym SANS stand for?
o A) System and Network Security
o B) SysAdmin, Networking, and Security
o C) Security and Network Solutions
o D) Secure Administration Network System
Answer: B
Rationale: SANS stands for SysAdmin, Networking, and Security, focusing on
various aspects of information security and administration.
2. What is the primary purpose of a firewall?
o A) To increase network speed
o B) To prevent unauthorized access to or from a private network
o C) To encrypt data
o D) To manage network traffic
Answer: B
Rationale: A firewall acts as a barrier between a trusted internal network and
untrusted external networks, controlling incoming and outgoing traffic based on
security rules.
3. What does VPN stand for?
o A) Virtual Private Network
o B) Verified Public Network
o C) Variable Protocol Network
o D) Virtual Public Network
Answer: A
Rationale: VPN stands for Virtual Private Network, which creates a secure
connection over the internet to protect private web traffic.
4. Which of the following is an example of a denial-of-service attack?
o A) Phishing
o B) Flooding a network with excessive requests
o C) Data theft
o D) Virus infection
Answer: B
Rationale: A denial-of-service attack aims to make a machine or network
resource unavailable to its intended users by overwhelming it with traffic.
5. What is a security policy?
o A) A guideline for network speed
o B) A document outlining the rules and practices for a system's security
o C) A hardware configuration setting
, o D) A type of encryption algorithm
Answer: B
Rationale: A security policy is a formal document that outlines an organization's
approach to protecting its information assets.
6. What does the principle of least privilege entail?
o A) Users have access to all system resources.
o B) Users have only the permissions necessary to perform their job functions.
o C) All users are treated equally.
o D) Permissions are assigned based on seniority.
Answer: B
Rationale: The principle of least privilege restricts user access to only those
resources necessary for their tasks, minimizing potential security risks.
7. Which of the following is used to detect vulnerabilities in a network?
o A) Firewall
o B) Antivirus software
o C) Vulnerability scanner
o D) Encryption
Answer: C
Rationale: A vulnerability scanner is a tool designed to identify weaknesses in a
system or network, providing insights for remediation.
8. What is the function of intrusion detection systems (IDS)?
o A) To block unauthorized access
o B) To monitor network traffic for suspicious activity
o C) To encrypt sensitive data
o D) To authenticate users
Answer: B
Rationale: An IDS monitors network traffic for suspicious activity and alerts
administrators to potential security breaches.
9. Which protocol is used for secure web browsing?
o A) HTTP
o B) FTP
o C) HTTPS
o D) SMTP
Answer: C
Rationale: HTTPS (Hypertext Transfer Protocol Secure) is the secure version of
HTTP, using encryption to protect data exchanged over the web.
10. What is a man-in-the-middle (MITM) attack?
o A) An attack where an attacker intercepts communication between two parties.
o B) An attack on a user's device.
o C) An attack that exploits software vulnerabilities.
o D) An attack that disrupts network traffic.
Answer: A
Rationale: A man-in-the-middle attack occurs when an attacker secretly
intercepts and relays messages between two parties, often without them knowing.
11. What does the term 'phishing' refer to?
o A) A method of data encryption
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper laurenjames. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €17,70. Je zit daarna nergens aan vast.