Practice Exam 1

The 100 multiple-choice questions provided here help you determine how prepared you are for the actual exam and which topics you need to review further. Write down your answers on a separate sheet of paper so that you can take this exam again if necessary. Compare your answers against the answer key that follows this exam.

1. Which of the following are architectural models for the arranging of certificate authorities? (Select all correct answers.)

image A. Bridge CA architecture

image B. Sub CA architecture

image C. Single CA architecture

image D. Hierarchical CA architecture

2. Your company is in the process of setting up a DMZ segment. You have to allow secure web traffic in the DMZ segment. Which TCP port do you have to open?

image A. 110

image B. 139

image C. 25

image D. 443

3. You are in sales and you receive an email telling you about an easy way to make money. The email instructs you to open the attached letter of intent, read it carefully, and then reply to the email. Which of the following should you do?

image A. Open the letter of intent, read it, and reply to the email.

image B. Forward this great offer to your friends and co-workers.

image C. Notify your system administrator of the email.

image D. Delete the email and reboot your computer.

4. You have an FTP server that needs to be accessed by both employees and external customers. What type of architecture should be implemented?

image A. Bastion host

image B. Screened subnet

image C. Screened host

image D. Bastion subnet

5. The main fan in your server died on Wednesday morning. It will be at least two days before it can be replaced. You decide to use another server instead, but need to restore the data from the dead one. You have been doing differential backups, and the last full backup was performed on Friday evening. The backup doesn’t run on weekends. How many backup tapes will you need to restore the data?

image A. Two

image B. Four

image C. One

image D. Three

6. You are planning to set up a network for remote users to use their own Internet connections to connect to shared folders on the network. Which technology would you implement?

image A. DMZ

image B. VPN

image C. VLAN

image D. NAT

7. What type of algorithm is SHA-1?

image A. Asymmetric encryption algorithm

image B. Digital signature

image C. Hashing algorithm

image D. Certificate authority

8. Which of the following is an effective way to get information in crowded places such as airports, conventions, or supermarkets?

image A. Social engineering

image B. Shoulder surfing

image C. Reverse social engineering

image D. Phishing

9. Which of the following are not methods for minimizing a threat to a web server? (Choose the two best answers.)

image A. Disable all non-web services.

image B. Ensure Telnet is running.

image C. Disable nonessential services.

image D. Enable logging.

10. Trusted Platform Module (TPM) provides for which of the following? (Select two correct answers.)

image A. Secure storage of keys

image B. Secure software-based authentication

image C. Secure storage of passwords

image D. Secure network data transfers

11. Separation of duties is designed to guard against which of the following?

image A. Social engineering

image B. Viruses

image C. Fraud

image D. Nonrepudiation

12. Which of the following describes a network of systems designed to lure an attacker away from another critical system?

image A. Bastion host

image B. Honeynet

image C. Vulnerability system

image D. Intrusion-detection system

13. Which of the following best describes false acceptance?

image A. The system recognizes an unauthorized person and accepts that person.

image B. The system detects a legitimate action as a possible intrusion.

image C. The system allows an intrusive action to pass as nonintrusive behavior.

image D. The system fails to recognize an authorized person and rejects that person.

14. Which of the following attacks is most likely to be successful, even if all devices are properly secured and configured?

image A. Trojan horse

image B. Mantrap

image C. Social engineering

image D. All the options are correct

15. When using CHAP, when can the challenge/response mechanism happen?

image A. Only at the beginning of the connection

image B. At the beginning and the end of the connection

image C. Only at the end of the connection

image D. At any time during the connection

16. With discretionary access control (DAC), how are access rights to resources determined?

image A. Roles

image B. Rules

image C. Owner discretion

image D. Security label

17. Which of the following best describes the difference between AH and ESP?

image A. ESP provides authentication, integrity, and nonrepudiation. AH provides authentication, encryption, confidentiality, and integrity protection.

image B. AH provides authentication only. ESP provides encryption only.

image C. AH provides authentication, integrity, and nonrepudiation. ESP provides authentication, encryption, confidentiality, and integrity protection.

image D. ESP provides authentication only. AH provides encryption only.

18. What is a potential concern to weaker encryption algorithms as time goes on? (Choose the best answer.)

image A. Performance of the algorithm will worsen over time.

image B. Keys generated by users will start to repeat on other users’ systems.

image C. Hackers using distributed computing may be able to finally crack an algorithm.

image D. All options are correct.

19. Which of the following types of programs can be used to determine whether network resources are locked down correctly?

image A. Password sniffers

image B. Port scanners

image C. Keystroke loggers

image D. Cookies

20. You are the network administrator for a small company that has recently been the victim of several attacks. Upon rebuild of the server, which of the following should be the first step?

image A. Nonrepudiation

image B. Hardening

image C. Auditing

image D. Hashing

21. Which one of the following types of servers would be the target for an attack where a malicious individual attempts to change information by connecting to port 53?

image A. FTP server

image B. File server

image C. Web server

image D. DNS server

22. Ensuring that all data is sequenced, time-stamped, and numbered is a characteristic of which of the following?

image A. Data authentication

image B. Data integrity

image C. Data availability

image D. Data confidentiality

23. Which of the following programs can be used for vulnerability scanning to check the security of your servers? (Choose the two best answers.)

image A. John the Ripper

image B. SATAN

image C. L0phtCrack

image D. SAINT

24. Which of the following describes a type of algorithm where data is broken into several units of varying sizes (dependent on algorithm) and encryption is applied to those chunks of data?

image A. Symmetric encryption algorithm

image B. Elliptic curve

image C. Block cipher

image D. All the options are correct.

25. You are the administrator at a large university. You have received a Class A address from your ISP, and NAT is being used on your network. What range of addresses should you use on your internal network?

image A. 10.x.x.x

image B. 172.16.x.x

image C. 172.31.x.x

image D. 192.168.x.x

26. As the network administrator, you are implementing a policy for passwords. What is the best option for creating user passwords?

image A. Uppercase and lowercase letters combined with numbers and symbols

image B. A randomly generated password

image C. A word that is familiar to the user with a number attached to the end

image D. The user’s last name spelled backward

27. Which of the following is true of digital signatures? (Choose the two best answers.)

image A. They use the skipjack algorithm.

image B. They can be automatically time-stamped.

image C. They allow the sender to repudiate that the message was sent.

image D. They cannot be imitated by someone else.

28. Which of the following are parts of Kerberos authentication? (Choose the two best answers.)

image A. Authentication service

image B. Time-based induction

image C. Ticket-granting service

image D. TEMPEST

29. Which of the following must be provided for proper smart card authentication? (Choose the two best answers.)

image A. Something you have

image B. Something you know

image C. Something you are

image D. Something you do

30. Which of the following types of attacks can result from the length of variables not being properly checked in the code of a program?

image A. Buffer overflow

image B. Replay

image C. Spoofing

image D. Denial of service

31. Which of the following is a method of backup tape rotation based on a mathematical puzzle?

image A. Grandfather

image B. Tower of Hanoi

image C. Tower of Pisa

image D. Grandmother

32. Mocmex is considered to be which of the following?

image A. Virus

image B. Logic bomb

image C. Worm

image D. Trojan

33. Which of the following are methods used for securing email messages? (Choose the two best answers.)

image A. POP3

image B. S/MIME

image C. PGP

image D. SMTP

34. User groups that are built around business units and then have privileges assigned to these groups instead of individual users is an example of which type of management?

image A. Role-based privilege management

image B. User-based privilege management

image C. Group-based privilege management

image D. Individual-based privilege management

35. Which of the following statements is true about SSL?

image A. SSL provides security for both the connection and the data after it is received.

image B. SSL only provides security for the connection, not the data after it is received.

image C. SSL only provides security for the data once it is received, not the connection.

image D. SSL does not provide security for either the connection or the data after it is received.

36. Of the following, which is a characteristic of a hot site?

image A. The facility is equipped with plumbing, flooring, and electricity only.

image B. The facility resources are shared by mutual agreement.

image C. The facility and equipment are already set up and ready to occupy.

image D. The facility is equipped with some resources, but not computers.

37. Which of the following algorithms is not an example of a symmetric encryption algorithm?

image A. Rijndael

image B. Diffie-Hellman

image C. RC6

image D. AES

38. The RBAC model can use which of the following types of access? (Choose the three best answers.)

image A. Role-based

image B. Task-based

image C. Lattice-based

image D. Discretionary-based

39. You are having problems with access to the company website. When the users try to open the website, they receive an error saying that the site is not found. You go to one of the machines, open a DOS prompt, and type which command to find out what the problem is?

image A. Netstat

image B. Tracert

image C. Ipconfig

image D. Nslookup

40. Which of the following statements about Java and JavaScript is true?

image A. Java applets can be used to execute arbitrary instructions on the server.

image B. JavaScript code can continue running even after the applet is closed.

image C. JavaScript can provide access to files of a known name and path.

image D. Java applets can be used to send email as the user.

image E. Java applets allow access to cache information.

41. Which of the following statements best describes nonrepudiation?

image A. A set of mathematical rules used in encryption

image B. A means of proving that a transaction occurred

image C. A method of hiding data in another message

image D. A drive technology used for redundancy and performance improvement

42. LDAP connects by default to which of the following TCP ports?

image A. 139

image B. 389

image C. 110

image D. 443

43. Which of the following are not used to verify the status of a certificate? (Select two correct answers.)

image A. OCSP

image B. CRL

image C. OSPF

image D. ACL

44. Which of the following is the process of systematically looking for unprotected modems?

image A. Sniffing

image B. War driving

image C. War dialing

image D. Social engineering

45. Under mandatory access control, the category of a resource can be changed by whom?

image A. All managers

image B. Administrators only

image C. The owner/creator

image D. All users

46. Which of the following ports would be used to remotely access a system?

image A. 25

image B. 8080

image C. 139

image D. 3389

47. Which protocol is used to enable remote-access servers to communicate with a central server to authenticate and authorize access to resources?

image A. Kerberos

image B. IPsec

image C. RADIUS

image D. PPTP

48. Which of the following are common tools used to conduct vulnerability assessments? (Select all correct answers.)

image A. Port scanner

image B. Protocol analyzer

image C. Network mapper

image D. NetStat Performance Monitor

49. Which of the following is a hardware or software solution used to protect a network from unauthorized access?

image A. Intrusion-detection system

image B. Digital certificate

image C. Honeypot

image D. Firewall

50. Unauthorized access has been detected on the network. Someone had been logging in as one of the administrative assistants during off hours. Later, you find out she received an email from the network administrator asking her to supply her password so that he could make changes to her profile. What types of attacks have been executed? (Choose two correct answers.)

image A. Spoofing

image B. Man in the middle

image C. Replay

image D. Social engineering

51. Which of the following is not true regarding log files?

image A. They should be stored and protected on a machine that has been hardened.

image B. Log information traveling on the network must be encrypted, if possible.

image C. They should be stored in one location.

image D. They must be modifiable, and there should be no record of the modification.

52. A CA with multiple subordinate CAs would use which of the following PKI trust models?

image A. Cross-certified

image B. Hierarchical

image C. Bridge

image D. Linked

53. Which of the following are reasons why it is unsafe to allow signed code to run on your systems?

image A. The fact that the code is signed guarantees only that the code belongs to a certain entity, not that it is absolutely harmless.

image B. Malicious users are known to have attempted obtaining legitimate certificates to sign harmful code, with some succeeding.

image C. Scripts may be used to employ signed code that comes preinstalled and signed with the operating system.

image D. All the options are correct.

54. You have installed a custom monitoring service that reviews logs to watch for the URLs used by the Nimda worm to propagate itself. When the service detects an attack, it sends an email alert. Which of the following types of IDS solutions are you using? (Select two correct answers.)

image A. Knowledge-based IDS

image B. Behavior-based IDS

image C. Network-based IDS

image D. Host-based IDS

55. Which of the following is true about fire-suppression systems?

image A. A dry-pipe system uses air to suppress fire, whereas a wet-pipe system uses water.

image B. A dry-pipe system uses dry chemicals, whereas a wet-pipe system uses wet chemicals.

image C. A wet-pipe system has water in the pipe at all times, whereas in a dry-pipe system, water is used but is held back by a valve until a certain temperature is reached.

image D. A wet-pipe system uses wet chemicals that deploy after the pipe loses air pressure, whereas a dry-pipe system uses dry chemicals that deploy before the pipe loses air pressure.

56. You’re the security administrator for a credit union. The users are complaining about the network being slow. It is not a particularly busy time of the day. You capture network packets and discover that there have been hundreds of ICMP packets being sent to the host. What type of attack is likely being executed against your network?

image A. Spoofing

image B. Man in the middle

image C. Denial of service

image D. Worm

57. Which of the following PKI functions do SSL/TLS protocols currently support? (Choose the two best answers.)

image A. Authentication

image B. Certificate revocation lists

image C. Encryption

image D. Attribute certificates

58. Which of the following is true in regard to the principle of least privilege?

image A. It ensures that all members of the user community are given the same privileges as long as they do not have administrator or root access to systems.

image B. It requires that a user be given no more privilege than necessary to perform a job.

image C. It is a control enforced through written security policies.

image D. It assumes that job functions will be rotated frequently.

59. Which of the following is true regarding expiration dates of certificates? (Select all correct answers.)

image A. Certificates may be issued for a week.

image B. Certificates are only issued at yearly intervals.

image C. Certificates may be issued for 20 years.

image D. Certificates must always have an expiration date.

60. You have found that someone has been running a program to crack passwords. This has been successful enough that many of the users’ passwords have been compromised. You suspect that several user files have been altered. Which of the following techniques can be implemented to help protect against this type of attack?

image A. Increase the value of the password history to 8.

image B. Have users present proper identification before being granted a password.

image C. Lock the account after three unsuccessful password entry attempts.

image D. Require password resets every 60 days.

61. Which of the following best describes a behavior-based IDS?

image A. Detects anomalies from normal patterns of operation

image B. Identifies signatures within the network packets

image C. Relies on the identification of known attack signatures

image D. Monitors middleware transactions, such as those between a database and a web user application

62. You need to provide your users with the capability to log on once and retrieve any resource to which they have been granted access, regardless of where the resource is stored. Which configuration will you deploy?

image A. Role-based access control (RBAC)

image B. Multifactor

image C. Biometric

image D. Single sign-on (SSO)

63. Which of the following describes the process of documenting how evidence was collected, preserved, and analyzed?

image A. Incident response

image B. Due diligence

image C. Chain of custody

image D. Due process

64. You are a consultant for a company that wants to secure its web services and provide a guarantee to its online customers that all credit card information is securely transferred. Which technology would you recommend?

image A. S/MIME

image B. VPN

image C. SSL/TLS

image D. SSH

65. You are configuring a security policy for your company. Which of the following components make up the security triad? (Choose the three best answers.)

image A. Encryption

image B. Confidentiality

image C. Integrity

image D. Authorization

image E. Availability

66. Which of the following is used to check the validity of a digital certificate?

image A. Certificate policy

image B. Certificate revocation list

image C. Corporate security policy

image D. Trust model

67. Which of the following statements are true when discussing physical security? (Select all correct answers.)

image A. Physical security attempts to control access to data from Internet users.

image B. Physical security attempts to control unwanted access to specified areas of a building.

image C. Physical security attempts to control the impact of natural disasters on facilities and equipment.

image D. Physical security attempts to control internal employee access into secure areas.

68. SMTP relay is a common exploit used among hackers for what purpose?

image A. DNS zone transfers

image B. Spamming

image C. Port scanning

image D. Man-in-the-middle attacks

69. CGI scripts can present vulnerabilities in which of the following ways? (Choose the two best answers.)

image A. They can be used to relay email.

image B. They can be tricked into executing commands.

image C. They may expose system information.

image D. They store the IP address of your computer.

70. Your company has decided to deploy a hardware token system along with usernames and passwords. This technique of using more than one type of authentication is known as which of the following?

image A. Parallel authentication

image B. Factored authentication

image C. Mutual authentication

image D. Multifactor authentication

71. Which of the following algorithms is now known as the Advanced Encryption Standard?

image A. Rijndael

image B. 3DES

image C. RC6

image D. Twofish

image E. CAST

72. What should you do upon finding out an employee is terminated?

image A. Disable the user account and have the data kept for a specified period of time.

image B. Maintain the user account and have the data kept for a specified period of time.

image C. Disable the user account and delete the user’s home directory.

image D. Do nothing until the employee has cleaned out her desk and you get written notification.

73. Which of the following statements best describes the difference between authentication and identification?

image A. Authentication is the same as identification.

image B. Authentication is a means to verify who you are, whereas identification is what you are authorized to perform.

image C. Authentication is the byproduct of identification.

image D. Authentication is what you are authorized to perform, whereas identification is a means to verify who you are.

74. Which of the following best describes the process of encrypting and decrypting data using an asymmetric encryption algorithm?

image A. Only the public key is used to encrypt, and only the private key is used to decrypt.

image B. The public key is used to either encrypt or decrypt.

image C. Only the private key is used to encrypt, and only the public key is used to decrypt.

image D. The private key is used to decrypt data encrypted with the public key.

75. Which of the following pieces of information are used by a cookie? (Select all correct answers.)

image A. The operating system you are running

image B. The type of browser you are using

image C. Your network login and password

image D. The name and IP address of your computer

76. The organization requires a segmented, switched network to separate users based on roles. Which of the following technologies satisfies this requirement?

image A. DMZ

image B. VPN

image C. VLAN

image D. NAT

77. Your company is in the process of setting up an application that tracks open shares on your network. Which ports would need to accessible? (Choose two correct answers.)

image A. 161

image B. 139

image C. 138

image D. 162

78. Which of the following best describes FTP communications? (Choose the two best answers.)

image A. Authentication credentials are sent in clear text.

image B. Authentication credentials are encrypted.

image C. It is vulnerable to sniffing and eavesdropping.

image D. It is very secure and not vulnerable to either sniffing or eavesdropping.

79. Which of the following best describes the relationship between centralized and decentralized security?

image A. Centralized is more secure but less scalable, whereas decentralized security is less secure but more scalable.

image B. Decentralized security is more scalable and more secure than centralized.

image C. Centralized security is more scalable and less secure than decentralized.

image D. Centralized and decentralized have about the same security, but centralized is more scalable.

80. You are establishing a secured command-line connection to a remote server. Which of the following utilities would you use?

image A. rlogin

image B. slogin

image C. rsh

image D. rcp

image E. scp

81. Which of the following components are methods of addressing risk? (Choose the three best answers.)

image A. Transferring the risk

image B. Mitigating the risk

image C. Vetting the risk

image D. Accepting the risk

82. Which of the following is an exposed device used as the foundation for firewall software?

image A. Bastion host

image B. Screened subnet

image C. Screened host

image D. Bastion subnet

83. Which of the following best describes the process whereby a user is able to perform administrator functions by exploiting a known weakness in the operating system code?

image A. Privilege management

image B. Trojan horse

image C. Privilege escalation

image D. Single sign-on

84. Which of the following best describes a vulnerability?

image A. A weakness in the configuration of software or hardware that could allow a threat to damage the network

image B. Any agent that could do harm to your network or its components

image C. The likelihood of a particular event happening given an asset and a threat

image D. Measures the cost of a threat attacking your network

85. Which of the following best describes an attack where traffic patterns indicate an unauthorized service is relaying information to a source outside the network?

image A. Spoofing

image B. Man in the middle

image C. Replay

image D. Denial of service

86. Which of the following looks at the long-term actions taken by an organization after an incident?

image A. Emergency response plan

image B. Security plan

image C. Disaster recovery plan

image D. Business continuity plan

87. Who is ultimately responsible for setting the tone of the role of security in an organization?

image A. Staff

image B. Management

image C. Consultants

image D. Everyone

88. You download and install a newly released Microsoft server patch, and several of the servers stop functioning properly. What should your first step be to return the servers to a functional state? (Choose the best answer.)

image A. Reload the patch and see whether the problems stop.

image B. Roll back the changes.

image C. Call the manufacturer and see whether there is a fix.

image D. Document the changes and troubleshoot.

89. Your company is in the process of setting up an IDS system. You want to scan for irregular header lengths and information in the TCP/IP packet. Which IDS methodology is most suitable for this purpose?

image A. Heuristic analysis

image B. Anomaly analysis

image C. Stateful inspection

image D. Pattern matching

90. Which of the following is used to provide centralized management of computers through a remotely installed agent?

image A. SMTP

image B. SNMP

image C. LDAP

image D. L2TP

91. What are the major security concerns with using DHCP? (Choose the two best answers.)

image A. The network is vulnerable to man-in-the-middle attacks.

image B. Anyone hooking up to the network can automatically receive a network address

image C. Clients might be redirected to an incorrect DNS address.

image D. There are no security concerns with using DHCP.

92. Which of the following is the security layer of the Wireless Application Protocol (WAP)?

image A. Wireless Security Layer (WSL)

image B. Wireless Transport Layer (WTL)

image C. Wireless Transport Layer Security (WTLS)

image D. Wireless Security Layer Transport (WSLT)

93. Which of the following are tunneling protocols used in VPN connections? (Select all correct answers.)

image A. PPTP

image B. L2TP

image C. CHAP

image D. IPsec

94. Which of the following statements best describes the behavior of a worm?

image A. A worm is self-replicating and needs no user interaction.

image B. A worm attacks only after it is triggered.

image C. A worm attacks system files only.

image D. A worm attempts to hide from antivirus software by garbling its code.

95. Which of the following best describes the difference between TACACS and RADIUS?

image A. RADIUS is an authentication protocol; TACACS is an encryption protocol.

image B. RADIUS is an actual Internet standard; TACACS is not.

image C. TACACS is an actual Internet standard; RADIUS is not.

image D. RADIUS is an encryption protocol; TACACS is an authentication protocol.

96. In which of the following types of architecture is the user responsible for the creation of the private and public key?

image A. Decentralized key management

image B. Centralized key management

image C. Revocation key management

image D. Multilevel key management

97. Which of the following is the weakest link in a security policy?

image A. Management

image B. A misconfigured firewall

image C. An unprotected web server

image D. Uneducated users

98. Which of the following is true of Pretty Good Privacy (PGP)? (Choose the two best answers.)

image A. It uses a web of trust.

image B. It uses a hierarchical structure.

image C. It uses public key encryption.

image D. It uses private key encryption.

99. Which of the following is the type of algorithm used by MD5?

image A. Block cipher algorithm

image B. Hashing algorithm

image C. Asymmetric encryption algorithm

image D. Cryptographic algorithm

100. You are the consultant for a small manufacturing company that wants to implement a backup solution. Which of the following methods is the best choice for this type of organization?

image A. Site redundancy

image B. Offsite, secure recovery

image C. Onsite backup

image D. High-availability systems

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset