Skip to main content

Posts

Showing posts with the label era

Client System Administration, Endpoint Protection and Patching

  1 . Question 1 Which three (3) are common Endpoint attack types? Ad Network Correct Partially correct SQL Injection Whale hunting Correct Partially correct Spear Phishing Correct Partially correct 2 . Question 2 Endpoint detection and response includes which three (3) of these key technologies? Automatic policy creation for endpoints. Correct Partially correct One-Time patching process. Continuous monitoring. Correct Partially correct Zero-day OS updates. Correct Partially correct 3 . Question 3 Which common endpoint attack is targeted at supply chain infiltration? Water Hole Spear Phishing Ransomware Island Hopping Incorrect Incorrect 4 . Question 4 What two windows security updates do most organizations always patch? critical and high important and moderate critical and important high and important Correct Correct 5 . Question 5 How frequent will most organizations distribute patches? Monthly Weekly Annually As soon as patches are released Correct Correct #cybersecurity #quiz #...

Wireless Security - Course-era (Google IT Professional Course)

  Wireless Security TOTAL POINTS 4 1 . Question  1 Defense against digital dark arts Video link: https://youtu.be/Ug5DZcF2NvY What are some of the weaknesses of the WEP scheme? Check all that apply. 1 / 1 point Its use of ASCII characters for passphrases Its use of the RC4 stream cipher Correct You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure. Its poor key generation methods Correct You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was insecure. Its small IV pool size Correct You nailed it! The RC4 stream cipher had a number of design flaws and weaknesses. WEP also used a small IV value, causing frequent IV reuse. Lastly, the way that the encryption keys were generated was i...