Tech QOTD – Password Security (Security+)

password-security

Take a look at the figure. Here we have an Cisco SG200 Switch What are the security issues that you can see? (Click the image to enlarge.)

(see answer below and video response)

This is just one of hundreds of questions and answers included with my Security+ Cert Guide.

 

[…] read more

Tech QOTD – Topic: ACLs (Security+)

ACLs

Answer the multiple choice question below. (Click the image to enlarge.)

(see answer below and video response)

This is just one of hundreds of questions and answers included with my Security+ Cert Guide.

 

[…] read more

Tech QOTD – Topic: All-in-one Device Security (Security+)

security-appliances2

Answer the multiple choice question below. (Click the image to enlarge.) (Text version below.)

(see answer below and video response)

This is just one of hundreds of questions and answers included with my Security+ Cert Guide.

Text version:

A small organization can only afford to purchase an all-in-one wireless router/switch. The organization has three wireless BYOD users and two wired web servers.

Which […] read more

Tech QOTD – Security Appliances (Security+)

security-appliances

Answer the multiple choice question below. (Click the image to enlarge.)

(see answer below and video response)

This is just one of hundreds of questions and answers included with my Security+ Cert Guide.

[…] read more

Tech QOTD – Topic: Proximity Security (Security+)

proxkeyiii

You have decided to install technology that will allow you to identify who enters and exits your datacenter. You are using tags like the one shown in the figure. What type of technology have you decided upon? Bonus: What frequency range does this device most likely use?

(see answer below)

This is just one of hundreds of questions and answers included with my […] read more

Tech QOTD – Topic: Application Updates (Security+)

application-updates

Answer the multiple choice question below. (Click the image to enlarge.)

(see answer below and video response)

This is just one of hundreds of questions and answers included with my Security+ Cert Guide.

[…] read more

Tech QOTD – Topic: Identifying Social Engineering Attacks (Security+)

social-engineering

Do you know your attacks? Match the type of attack on the right to the appropriate description. (One attack per description.)

This is just one of 31 simulations included with my Security+ Cert Guide.

(Click the image to enlarge.)

(see answer below and video response)

[…] read more

Tech QOTD – Topic: Sign-on Security (Security+)

sign-on-security

Tech question of the day (Security+): Examine the netstat results in the figure. What protocol is this computer running for sign-on security? Bonus: What type of operating system is running here, and what is its primary role?

(see answer below and video response)

[…] read more

Tech QOTD – Topic: E-mail Security

e-mail-security

Tech question of the day (Security+): Your organization is concerned about spear phishing. The CEO wants to improve the overall security posture by proving where e-mail originates from – for all e-mail messages. Examine the figure (click to enlarge). What two things have to be performed in order to implement this security control? (This image is from Outlook 2016.)

(see answer below and video response)

[…] read more

Tech QOTD – It’s outdated, just like some IT budgets… (Topic: Wireless Security)

security2

Tech question of the day (Security+): Examine the figure. What four potential security issues can you identify in the configuration?

(see answer below and video response)

[…] read more

Tech QOTD: Mind your insecurities. (Security+)

security1

Tech question of the day (Security+): Examine the figure. What two insecure configurations can you identify? (Disregard any ALG implications…)

(see answer below and video response)

[…] read more

Tech Question of the Day (Security+) – Please pass the salt…

pbkdf2

Tech question of the day (Security+): Examine the figure (click to enlarge).

Questions: 1. What did I encrypt? 2. How many iterations (or rounds) were performed?

(see answer below and video response)

[…] read more

Tech Question of the Day (Security+) – Is chance predetermined?

prng1

Tech question of the day (Security+ SY0-401): Examine the figure. We are collecting noise to increase entropy. What type of algorithm are we developing here? (see answer below and video response.)

[…] read more

Security+ QOTD: This request begins privately…

csr

Security+ Question of the day: What are we attempting to accomplish using the syntax that was typed in the figure? (see answer below and video response.)

[…] read more

Security+ QOTD: Don’t eat stale cookies…

xss

Security+ Question of the day: What are we seeing in the code shown in the figure? (see answer below and video response.)

[…] read more

Security+ QOTD: Are you sure of your directory access protection?

house-lock

Security+ Question of the day: What port number does LDAPS use? (Bonus: What protocol(s) is used to secure it?) (see answer below and video response.)

[…] read more

Security+ QOTD: preservation is our first priority…

secplus-tiny

Security+ Question of the day: When dealing with OOV, which should be preserved first, RAM or the hard drive? (see answer below and video response.)

[…] read more

Security+ QOTD: It’s a serviceable issue…

service

Security+ Question of the day: What is the conventional name for the service that has been stopped and disabled in the figure? (see answer below and video response.)

[…] read more

                      
About Dave Testimonials FAQ Site Map Contact
Copyright © David L. Prowse – Official Website - All Rights Reserved