keywords:
Bookmark and Share



Front Back
Which type of audit can be used to determine whether accounts have been established properly and verify that privilege creep isn't occurring
a. Privilege Audit
b. Usage Audit
c. Escalation Audit
d. Report Audit
a. Privilege audit
What kind of physical access device restricts access to a small number of individuals at one time?
a. Checkpoint
b. Perimeter Security
c. Security Zones
D. Mantrap
D. Mantrap
Which of the following is a set of voluntary standards governing encryption?
a. PKI
b. PKCS
c. ISA
D. SSL
b. PKCS
Which protocol is used to create a secure environment in a wireless network?
a. WAP
b. WEP
c. WTLS
d. WML
b. WEP
An Internet server interfaces with TCP/IP at which layer of the DOD model?
a. Transport Layer
b. Network Layer
c. Process Layer
d. Internet Layer
c. Process Layer
You want to establish a network connection between two LANs using the Internet. Which technology would best accomplish that for you?
a. IPSec
b. L2TP
c. PPP
d. SLIP
b. L2TP
Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?
a. DMZ
b. VLAN
c. I&A
d. Router
a. DMZ
In the key recovery process, which key must be recoverable?
a. Rollover Key
b. Secret Key
c. Previous Key
d. Escrow Key
c. Previous Key
Which kind of attack is designed to overload a particular protocol or service?
a. Spoofing
b. Back Door
c. Man in the Middle
d. Flood
d. Flood
Which component of an IDS collects data?
a. Data Source
b. Sensor
c. Event
d. Analyzer
b. Sensor
What is the process of making an operating system secure from attack called?
a. Hardening
b. Tuning
c. Sealing
d. Locking Down
a. Hardening
The integrity objective addresses which characteristic of information security?
a. Verification that information is accurate
b. Verification that ethics are properly maintained
c. Establishment of clear access control of data
d. Verification that data is kept private and secure
a. Verification that information is accurate
Which mechanism is used by PKI to allow immediate verification of a certificate’s validity?
a. CRL
b. MD5
c. SSHA
d. OCSP
d. OCSP
Which of the following is the equivalent of a VLAN from a physical security perspective?
a. Perimeter Security
b. Partitioning
c. Security Zones
d. Physical Barrier
b. Partitioning
A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was called account.doc. The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?
a. Your user inadvertently downloaded a virus using IM.
b. Your user may have a defective hard drive.
c. Your user is hallucinating and should increase his medication.
d. The system is suffering from power surges.
a. Your user inadvertently downloaded a virus using IM.
Which mechanism or process is used to enable or disable access to a network resource based on an IP address?
a. NDS
b. ACL
c. Hardening
d. Port Blocking
b. ACL
Which of the following would provide additional security to an Internet web server?
a. Changing the port address to 80
b. Changing the port address to 1019.
c. Adding a firewall to block port 80
d. Web servers can’t be secured.
b. Changing the port address to 1019.
What type of program exists primarily to propagate and spread itself to other systems?
a. Virus
b. Trojan Horse
c. Logic Bomb
d. Worm
d. Worm
An individual presents herself at your office claiming to be a service technician. She wants to discuss your current server configuration. This may be an example of what type of attack?
a. Social Engineering
b. Access Control
c. Perimeter screening
d. Behavioral engineering
a. Social Engineering
Which of the following is a major security problem with FTP servers?
a. Password files are stored in an unsecure area on disk
b. Memory traces can corrupt file access
c. User IDs and passwords are unencrypted
d. FTP sites are unregistered
c. User IDs and passwords are unencrypted
Which system would you install to provide active protection and notification of security problems in a network connected to the Internet?
a. IDS
b. Network Monitoring
c. Router
d. VPN
a. IDS
The process of verifying the steps taken to maintain the integrity of evidence is called what?
a. Security Investigation
b. Chain of Custody
c. Three A's of Investigation
d. Security Policy
b. Chain of Custody
What encryption process uses one message to hide another?
a. Steganography
b. Hashing
c. MDA
d. Cryptointelligence
a. Steganography
Which policy dictates how computers are used in an organization?
a. Security Policy
b. User Policy
c. Use Policy
d. Enforcement Policy
c. Use Policy
Which algorithm is used to create a temporary secure session for the exchange of key information?
a. KDC
b. KEA
c. SSL
d. RSA
b. KEA
You’ve been hired as a security consultant for a company that’s beginning to implement handheld devices, such as PDAs. You’re told that the company must use an asymmetric system. Which security standard would you recommend it implement?
a. ECC
b. PKI
c. SHA
d. MD
a. ECC
Which of the following backup methods will generally provide the fastest backup times?
a. Full Backup
b. Incremental Backup
c. Differential Backup
d. Archival Backup
b. Incremental Backup
You want to grant access to network resources based on authenticating an individual’s retina during a scan. Which security method uses a physical characteristic as a method of determining identity?
a. Smart Card
b. I&A
c. Biometrics
d. CHAP
c. Biometrics
Which access control method is primarily concerned with the role that individuals have in the organization?
a. MAC
b. DAC
c. RBAC
d. STAC
c. RBAC
The process of investigating a computer system for clues into an event is called what?
a. Computer Forensics
b. Virus Scanning
c. Security Policy
d. Evidence Gathering
a. Computer Forensics
Of the following types of security, which would be primarily concerned with someone stealing the server from the premises?
a. Physical Security
b. Operational Security
c. Management and Policy
d. Authentication
a. Physical Security
Upper management has suddenly become concerned about security. As the senior network administrator, you are asked to suggest changes that should be implemented. Which of the following access methods should you recommend if the method is to be one that is primarily based on preestablished access and can’t be changed by users?
a. MAC
b. DAC
c. RBAC
d. Kerberos
a. MAC
Your office administrator is being trained to perform server backups. Which authentication method would be ideal for this situation?
a. MAC
b. DAC
c. RBAC
d. Security Tokens
c. RBAC
You’ve been assigned to mentor a junior administrator and bring him up to speed quickly. The topic you’re currently explaining is authentication. Which method uses a KDC to accomplish authentication for users, programs, or systems?
a. CHAP
b. Kerberos
c. Biometrics
d. Smart Cards
b. Kerberos
Which authentication method sends a challenge to the client that is encrypted and then sent back to the server?
a. Kerberos
b. PAP
c. DAC
d. CHAP
d. CHAP
After a careful risk analysis, the value of your company’s data has been increased. Accordingly, you’re expected to implement authentication solutions that reflect the increased value of the data. Which of the following authentication methods uses more than one authentication process for a logon?
a. Multi-factor
b. Biometrics
c. Smart Card
d. Kerberos
a. Multi-factor
Which of the following IP addresses is within the private address range?
a. 192.1.1.5
b. 192.168.0.10
c. 192.225.5.1
d. 192.255.255.255
b. 192.168.0.10
After acquiring another company, your organization is in a unique position to create a new—much larger—network from scratch. You want to take advantage of this reorganization to implement the most secure environment that users, and managers, can live with. You’ve already decided that the only way this will be possible is to implement security zones. Which of the following isn’t an example of a type of security zone?
a. Internet
b. Intranet
c. Extranet
d. NAT
d. NAT
Which of the following protocols allows an organization to present a single TCP/IP address to the Internet while utilizing private IP addressing across the LAN?
a. NAT
b. VLAN
c. DMZ
d. Extranet
a. NAT
You’re the administrator for Mercury Technical. Due to several expansions, the network has grown exponentially in size within the past two years. Which of the following is a popular method for breaking a network into smaller private networks that can coexist on the same wiring and yet be unaware of each other?
a. VLAN
b. NAT
c. MAC
d. Security Zone
a. VLAN
Of the following services, which one would be most likely to utilize a retinal scan?
a. Auditing
b. Authentication
c. Access Control
d. Data Confidentiality
b. Authentication
One of the vice presidents of the company calls a meeting with information technology after a recent trip to competitors’ sites. She reports that many of the companies she visited granted access to their buildings only after fingerprint scans, and she wants similar technology employed at this company. Of the following, which technology relies on a physical attribute of the user for authentication?
a. Smart Card
b. Biometrics
c. Mutual Authentication
d. Tokens
b. Biometrics
Which technology allows a connection to be made between two networks using a secure protocol?
a. Tunneling
b. VLAN
c. Internet
d. Extranet
a. Tunneling
x of y cards Next >|