multi test 1

The flashcards below were created by user Anonymous on FreezingBlue Flashcards.

  1. 1 All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:

    A. SSH
    B. L2TP
    C. SSL
    D. IPSeC
    B. L2TP
    (this multiple choice question has been scrambled)
  2. 2 Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

    A. Trojan horse
    B. Virus
    C. Worm
    D. Steganography
    D. Steganography
    (this multiple choice question has been scrambled)
  3. 3 Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?

    A. TCP/IP hijacking
    B. Teardrop
    C. Replay
    D. Phishing
    A. TCP/IP hijacking
    (this multiple choice question has been scrambled)
  4. 4 How should a company test the integrity of its backup data?

    A. By conducting another backup
    B. By reviewing the written procedures
    C. By using software to recover deleted files
    D. By restoring part of the backup
    D. By restoring part of the backup
    (this multiple choice question has been scrambled)
  5. 5 Which of following can BEST be used to determine the topology of a network and discover unknown devices?

    A. Protocol analyzer
    B. NIPS
    C. Network mapper
    D. Vulnerability scanner
    C. Network mapper
    (this multiple choice question has been scrambled)
  6. 6 When should a technician perform penetration testing?

    A. When the technician is war driving and trying to gain access
    B. When the technician is trying to guess passwords on a network
    C. When the technician has permission from the owner of the network
    D. When the technician suspects that weak passwords exist on the network
    C. When the technician has permission from the owner of the network
    (this multiple choice question has been scrambled)
  7. 7 An administrator has implemented a new SMTP service on a server. A public IP address translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the server?s public IP address is now reported in a spam real-time block list. Which of the following is wrong with the server?

    A. The public IP address is incorrect
    B. The amount of sessions needs to be limited
    C. SMTP open relaying is enabled
    D. It does not have a spam filter
    C. SMTP open relaying is enabled
    (this multiple choice question has been scrambled)
  8. 8 Which of the following is MOST efficient for encrypting large amounts of data?

    A. Hashing algorithms
    B. Asymmetric key algorithms
    C. Symmetric key algorithms
    D. ECC algorithms
    C. Symmetric key algorithms
    (this multiple choice question has been scrambled)
  9. 9 Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?

    A. Session hijacking
    B. Weak encryption
    C. War driving
    D. Rogue access points
    C. War driving
    (this multiple choice question has been scrambled)
  10. 10 Which of the following BEST describes ARP?

    A. Discovering the IP address of a device from the MAC address
    B. Discovering the DNS name of a device from the IP address
    C. Discovering the IP address of a device from the DNS name
    D. Discovering the MAC address of a device from the IP address
    D. Discovering the MAC address of a device from the IP address
    (this multiple choice question has been scrambled)
  11. 11 Which of the following would be BEST to use to apply corporate security settings to a device?

    A. A security patch
    B. A security template
    C. An OS service pack
    D. A security hotfix
    B. A security template
    (this multiple choice question has been scrambled)
  12. 12 A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If the anti-malware software is purchased, which of the following is the expected net savings?

    A. $5,000
    B. $900
    C. $2,700
    D. $2,290
    D. $2,290
    (this multiple choice question has been scrambled)
  13. 13 Which of the following is the main objective of steganography?

    A. Message digest
    B. Encrypt information
    C. Hide information
    D. Data integrity
    C. Hide information
    (this multiple choice question has been scrambled)
  14. 14 Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?

    A. AES
    B. DH-ECC
    C. 3DES
    D. MD5
    B. DH-ECC
    (this multiple choice question has been scrambled)
  15. 15 Which of the following improves security in a wireless system?

    A. IP spoofing
    B. MAC filtering
    C. Closed network
    D. SSID spoofing
    B. MAC filtering
    (this multiple choice question has been scrambled)
  16. 16 A user wants to implement secure LDAP on the network. Which of the following port numbers secure LDAP use by default?

    A. 443
    B. 53
    C. 389
    D. 636
    D. 636
    (this multiple choice question has been scrambled)
  17. 17 On which of the following is a security technician MOST likely to find usernames?

    A. Firewall logs
    B. DNS logs
    C. Application logs
    D. DHCP logs
    C. Application logs
    (this multiple choice question has been scrambled)
  18. 18 How many keys are utilized with asymmetric cryptography?

    A. Seven
    B. Five
    C. One
    D. Two
    D. Two
    (this multiple choice question has been scrambled)
  19. 19 During a risk assessment it is discovered that only one system administrator is assigned several tasks critical to continuity of operations. It is recommended to cross train other system administrators to perform these tasks and mitigate which of the following risks?

    A. Single point of failure
    B. Disclosure of PII
    C. DDoS
    D. Privilege escalation
    A. Single point of failure
    (this multiple choice question has been scrambled)
  20. 20 Which of the following network filtering devices will rely on signature updates to be effective?

    A. Honeynet
    B. Firewall
    C. NIDS
    D. Proxy server
    C. NIDS
    (this multiple choice question has been scrambled)
  21. 21 Which of the following is a single server that is setup in the DMZ or outer perimeter in order to distract attackers?

    A. Honeynet
    B. VLAN
    C. DMZ
    D. Honeypot
    D. Honeypot
    (this multiple choice question has been scrambled)
  22. 22 Which of the following encryption algorithms is decrypted in the LEAST amount of time?

    A. L2TP
    B. RSA
    C. 3DES
    D. AES
    D. AES
    (this multiple choice question has been scrambled)
  23. 23 An administrator is trying to secure a network from threats originating outside the network. Which of the following devices provides protection for the DMZ from attacks launched from the Internet?

    A. Content filter
    B. Firewall
    C. Antivirus
    D. Proxy server
    B. Firewall
    (this multiple choice question has been scrambled)
  24. 24 Which of the following is a way to manage operating system updates?

    A. Hotfix management
    B. Service pack management
    C. Change management
    D. Patch application
    C. Change management
    (this multiple choice question has been scrambled)
  25. 25 Which of the following is a list of discrete entries that are known to be benign?

    A. Signature
    B. Whitelist
    C. ACL
    D. Blacklist
    B. Whitelist
    (this multiple choice question has been scrambled)
  26. 26 Which of the following increases the collision resistance of a hash?

    A. Increase the input length
    B. Larger key space
    C. Rainbow Table
    D. Salt
    D. Salt
    (this multiple choice question has been scrambled)
  27. 27 A programmer has decided to alter the server variable in the coding of an authentication function for a proprietary sales application. Before implementing the new routine on the production application server, which of the following processes should be followed?

    A. Change management
    B. Secure disposal
    C. Password complexity
    D. Chain of custody
    A. Change management
    (this multiple choice question has been scrambled)
  28. 28 When deploying 50 new workstations on the network, which of following should be completed FIRST?

    A. Run the latest spyware
    B. Run OS updates
    C. Install a word processor
    D. Apply the baseline configuration
    D. Apply the baseline configuration
    (this multiple choice question has been scrambled)
  29. 29 Which of the following should be implemented to have all workstations and servers isolated in their own broadcast domains?

    A. VLANs
    B. Intranet
    C. NAT
    D. Access lists
    A. VLANs
    (this multiple choice question has been scrambled)
  30. 30 End users are complaining about receiving a lot of email from online vendors and pharmacies. Which of the following is this an example of?

    A. Trojan
    B. Spam
    C. Phishing
    D. DNS poisoning
    B. Spam
    (this multiple choice question has been scrambled)
  31. 31 Which of the following BEST describes a private key in regards to asymmetric encryption?

    A. The key owner and a recipient of an encrypted email have exclusive access to the private key.
    B. Only the CA has access to the private key.
    C. The key owner has exclusive access to the private key.
    D. Everyone has access to the private key on the CA.
    C. The key owner has exclusive access to the private key.
    (this multiple choice question has been scrambled)
  32. 32 Which of the following logs might reveal the IP address and MAC address of a rogue device within the local network?

    A. Security logs
    B. DNS logs
    C. DHCP logs
    D. Antivirus logs
    C. DHCP logs
    (this multiple choice question has been scrambled)
  33. 33 Which of the following is commonly used in a distributed denial of service (DDOS) attack?

    A. Trojan
    B. Phishing
    C. Botnet
    D. Adware
    C. Botnet
    (this multiple choice question has been scrambled)
  34. 34 Which of the following practices is MOST relevant to protecting against operating system security flaws?

    A. Firewall configuration
    B. Network intrusion detection
    C. Antivirus selection
    D. Patch management
    D. Patch management
    (this multiple choice question has been scrambled)
  35. 35 Which of the following is a best practice for coding applications in a secure manner?

    A. Object oriented coding
    B. Rapid Application Development (RAD)
    C. Cross-site scripting
    D. Input validation
    D. Input validation
    (this multiple choice question has been scrambled)
  36. 36 Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?

    A. Cloning
    B. Virtualization
    C. Kiting
    D. Intrusion detection
    B. Virtualization
    (this multiple choice question has been scrambled)
  37. 37 Which of the following network tools would provide the information on what an attacker is doing to compromise a system?

    A. Proxy server
    B. Internet content filters
    C. Honeypot
    D. Firewall
    C. Honeypot
    (this multiple choice question has been scrambled)
  38. 38 Assigning proper security permissions to files and folders is the primary method of mitigating which of the following?

    A. Hijacking
    B. Trojan
    C. Policy subversion
    D. DoS
    B. Trojan
    (this multiple choice question has been scrambled)
  39. 39 Which of the following logical access controls would be MOST appropriate to use when creating an account for a temporary worker?

    A. Logical tokens
    B. Account expiration
    C. Time of day restrictions
    D. ACL
    B. Account expiration
    (this multiple choice question has been scrambled)
  40. 40 Which of the following may be an indication of a possible system compromise?

    A. A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline.
    B. The certificate for one of the web servers has expired and transactions on that server begins to drop rapidly.
    C. A protocol analyzer records a high number of UDP packets to a streaming media server on the Internet.
    D. A port monitor utility shows that there are many connections to port 80 on the Internet facing web server.
    A. A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline.
    (this multiple choice question has been scrambled)
  41. 41 An administrator suspects that files are being copied to a remote location during off hours. The file server does not have logging enabled. Which of the following logs would be the BEST place to look for information?

    A. Firewall logs
    B. Antivirus logs
    C. DNS logs
    D. Intrusion detection logs
    A. Firewall logs
    (this multiple choice question has been scrambled)
  42. 42 Which of the following access control methods gives the owner control over providing permissions?

    A. Rule-Based Access control (RBAC)
    B. Discretionary Access Control (DAC)
    C. Role-Based Access Control (RBAC)
    D. Mandatory Access Control (MAC)
    B. Discretionary Access Control (DAC)
    (this multiple choice question has been scrambled)
  43. 43 Which of the following access control methods grants permissions based on the users position in the company?

    A. Discretionary Access Control (DAC)
    B. Rule-Based Access control (RBAC)
    C. Role-Based Access Control (RBAC)
    D. Mandatory Access Control (MAC)
    C. Role-Based Access Control (RBAC)
    (this multiple choice question has been scrambled)
  44. 44 Which of the following access control methods includes switching work assignments at preset intervals?

    A. Mandatory vacations
    B. Job rotation
    C. Separation of duties
    D. Least privilege
    B. Job rotation
    (this multiple choice question has been scrambled)
  45. 45 Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?

    A. Kerberos
    B. TACACS
    C. RADIUS
    D. RAS
    A. Kerberos
    (this multiple choice question has been scrambled)
  46. 46 Which of the following would an attacker use to footprint a system?

    A. Port scanner
    B. Man-in-the-middle attack
    C. Password cracker
    D. RADIUS
    A. Port scanner
    (this multiple choice question has been scrambled)
  47. 47 Which of the following ensures a user cannot deny having sent a message?

    A. Availability
    B. Integrity
    C. Confidentiality
    D. Non-repudiation
    D. Non-repudiation
    (this multiple choice question has been scrambled)
  48. 48 Which of the following allows an attacker to embed a rootkit into a picture?

    A. Virus
    B. Steganography
    C. Worm
    D. Trojan horse
    B. Steganography
    (this multiple choice question has been scrambled)
  49. 49 Which of the following is a publication of inactivated user certificates?

    A. Certificate authority
    B. Recovery agent
    C. Certificate suspension
    D. Certificate revocation list
    D. Certificate revocation list
    (this multiple choice question has been scrambled)
  50. 50 Which of the following is a method of encrypting email?

    A. L2TP
    B. VPN
    C. S/MIME
    D. SMTP
    C. S/MIME
    (this multiple choice question has been scrambled)
Author:
Anonymous
ID:
10781
Card Set:
multi test 1
Updated:
2010-03-16 14:26:24
Tags:
testing
Folders:

Description:
multi load test 1
Show Answers: