Exam Prep Questions

1.

Which of the following constitutes the elements in the C-I-A triad?

Exam Prep Questions

A.

Consolidation, Integration, Authentication

Exam Prep Questions

B.

Confidentiality, Integrity, Availability

Exam Prep Questions

C.

Confusion, Impact, Animosity

Exam Prep Questions

D.

Central, Intelligence, Agency

Exam Prep Questions

E.

None of the above.

2.

Cisco says that there are two major categories of threats to network security. Pick them from the following list:

Exam Prep Questions

A.

External threats

Exam Prep Questions

B.

Viruses

Exam Prep Questions

C.

Social engineering

Exam Prep Questions

D.

Internal threats

Exam Prep Questions

E.

Unauthorized access

Exam Prep Questions

F.

Network misuse

3.

Which of the following is the best definition for integrity safeguards? (Choose one):

Exam Prep Questions

A.

Ensuring that only authorized users have access to sensitive data.

Exam Prep Questions

B.

Ensuring that only authorized entities can change sensitive data.

Exam Prep Questions

C.

Ensuring that systems and the data that they provide access to remain available for authorized users.

Exam Prep Questions

D.

Ensuring that only legitimate users can access the network subject to time of day (ToD) controls.

Exam Prep Questions

E.

Configuring access control lists (ACLs), such that only specified protocols are allowed through the perimeter.

4.

Match the following data classification levels for the public sector with their definitions:

Image    Unclassified:

_____

Image    Secret:

_____

Image    Confidential:

_____

Image    Sensitive but Unclassified (SBU):

_____

Image    Top Secret:

_____

Definitions:

A. Data with minimum confidentiality, integrity, or availability requirements; thus, little effort is made to secure it.

B. Data that would cause some embarrassment if revealed, but not enough to constitute a security breach.

C. First level of classified data. This data must comply with confidentiality requirements.

D. Data that requires concerted effort to keep secure. Typically, only a limited number of people are authorized to access this data, certainly fewer than those who are authorized to access confidential data.

E. The greatest effort is used to secure this data and to ensure its secrecy. Only those people with a “need to know” typically have access to data classified at this level.

5.

Which of the following are not considered categories of security controls? (Choose all that apply.)

Exam Prep Questions

A.

Preventative control

Exam Prep Questions

B.

Physical control

Exam Prep Questions

C.

Deterrent control

Exam Prep Questions

D.

Administrative control

Exam Prep Questions

E.

Technical control

Exam Prep Questions

F.

Detective control

6.

Match the three types of laws found in most countries with their definitions:

Types of Law:

Image    Civil:

_____

Image    Criminal:

_____

Image    Administrative:

_____

Definitions:

A. Concerned with crimes. Penalties usually involve possible fines (paid to the court) and/or imprisonment of the offender.

B. Concerned with righting wrongs that do not involve crimes or criminal intent. Penalties are typically monetary and paid to the party who wins the lawsuit.

C. Typically government agencies in the course of enforcing regulations. Monetary awards are divided between the government agency and the victim (if any) of the contravened regulation.

7.

True or false: An exploit is the likelihood that a vulnerability might be exploited by a specific attack.

8.

Put the following seven steps for compromising targets and applications in the correct order:

Exam Prep Questions

A.

Install back doors.

Exam Prep Questions

B.

Escalate privileges.

Exam Prep Questions

C.

Perform footprint analysis.

Exam Prep Questions

D.

Manipulate users to gain access.

Exam Prep Questions

E.

Enumerate applications and operating systems.

Exam Prep Questions

F.

Gather additional passwords and secrets.

Exam Prep Questions

G.

Leverage the compromised system.

9.

Fill in the blank for the following definition with the letter corresponding to the correct answer below:

If an attacker were simply guessing at sequence numbers—essentially using tools to calculate them—then the attack would be called _________ spoofing. Physical access to your network is not required.

Choices:

Exam Prep Questions

A.

Statistical

Exam Prep Questions

B.

Invasive

Exam Prep Questions

C.

Blind

Exam Prep Questions

D.

Nonblind

Exam Prep Questions

E.

Stochastic

9.

The answer is C. Blind spoofing is often done at a distance from your network and does not require physical network access.

10.

True or false: Man-in-the-Middle (MiM) attacks attack a network or system’s availability.

11.

Which of the following strategies help mitigate against trust exploits?

Exam Prep Questions

A.

Installing a firewall or IPS that can examine inbound traffic to ensure that it is protocol compliant, block traffic that isn’t, and also alert a custodian.

Exam Prep Questions

B.

Installing Host Intrusion Protection System (HIPS) software on inside hosts.

Exam Prep Questions

C.

Using ACLs on an IOS firewall.

Exam Prep Questions

D.

All of the above.

Answers to Exam Prep Questions

1.

Answer B is the correct answer. This is pretty much industry-wide.

2.

Answers A and D are correct. This is a trick question because the other answers are sub-categories of external and internal threats. Viruses and social engineering are examples of external threats and unauthorized access and network misuse are examples of internal threats.

3.

Answer B is the correct answer. Answer A is a definition for confidentiality. Answer C is a definition of availability. Answers D and E are trick answers.

4.

The answers are:

Image    Unclassified:

A

Image    Secret:

D

Image    Confidential:

C

Image    Sensitive but Unclassified (SBU):

B

Image    Top Secret:

E

5.

Answers A, C, and F are not categories of controls. Controls can be divided into three broad categories: physical, administrative, and technical. Remember the acronym PAT! Also recall that they can be further subdivided by type. Preventative, deterrent, and detective are examples of types of controls and not categories of controls.

6.

The correct answers are:

Image    Civil:

B

Image    Criminal (also called “tort”):

A

Image    Administrative:

C

7.

False. An exploit is an attack that takes advantage of a vulnerability. The definition given is that for a “risk.”

8.

The correct order is C, E, D, B, F, A, G. In other words:

  1. Perform footprint analysis (reconnaissance).

  2. Enumerate applications and operating systems.

  3. Manipulate users to gain access.

  4. Escalate privileges.

  5. Gather additional passwords and secrets.

  6. Install back doors.

  7. Leverage the compromised system.

10.

False. DoS and DDoS attacks attack the network’s availability. MiM attacks attack a network’s confidentiality and integrity.

11.

The correct answer is D. Cisco recommends all strategies in mitigating against the possibility of a trust exploit.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset