multi test f

Card Set Information

Author:
johnnystevens
ID:
10952
Filename:
multi test f
Updated:
2010-03-17 13:00:39
Tags:
testing
Folders:

Description:
multiple choice upload test
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user johnnystevens on FreezingBlue Flashcards. What would you like to do?


  1. 501 Which of the following describes penetration testing?

    A. Simulating an actual attack on a network
    B. Detecting active intrusions
    C. Establishing a security baseline
    D. Hacking into a network for malicious reasons
    A. Simulating an actual attack on a network
    (this multiple choice question has been scrambled)
  2. 502 When an IDS is configured to match a specific traffic pattern, then which of the following is this referring to?

    A. Signature-based
    B. Anomaly-based
    C. Heuristic-based
    D. Behavior-based
    A. Signature-based
    (this multiple choice question has been scrambled)
  3. 503 An application that gets downloaded onto a system by appearing to be a useful tool for cleaning out duplicate contacts in a user?s emails would be considered:

    A. a Trojan
    B. a worm
    C. spyware
    D. spam
    A. a Trojan
    (this multiple choice question has been scrambled)
  4. 504 Installing an application on every desktop in a company?s network that watches for possible intrusions would be an example of:

    A. a HIDS
    B. a personal software firewall
    C. hardening
    D. a NIDS
    A. a HIDS
    (this multiple choice question has been scrambled)
  5. 505 An administrator suspects an issue retrieving files on the network and accesses the file server?s performance monitor to check the results against:

    A. the system monitor
    B. the performance baseline
    C. yesterdays performance
    D. the manufacturer?s website
    B. the performance baseline
    (this multiple choice question has been scrambled)
  6. 506 An administrator runs a tool checking SMTP, DNS, POP3, and ICMP packets on the network. This is an example of which of the following?

    A. A protocol analyzer
    B. A penetration test
    C. A port scanner
    D. A vulnerability scan
    A. A protocol analyzer
    (this multiple choice question has been scrambled)
  7. 507 A company runs a backup after each shift and the main concern is how quickly the backups are completed between shifts. Recovery time should be kept to a minimum. The administrator decides that backing up all the data that has changed during the last shift is the best way to go. This would be considered a:

    A. shadow copy
    B. differential backup
    C. incremental backup
    D. full backup
    B. differential backup
    (this multiple choice question has been scrambled)
  8. 508 Users should be able to access their email and several secure applications from any workstation on the network. Additionally, the administrator has implemented an authentication system requiring the use of a username, password, and a company issued smart card. Which of the following is this an example of?

    A. Least privilege
    B. ACL
    C. Three factor authentication
    D. SSO
    D. SSO
    (this multiple choice question has been scrambled)
  9. 509 Both the client and the server authenticate before exchanging data. This is an example of:

    A. multifactor authentication
    B. biometrics
    C. SSO
    D. mutual authentication
    D. mutual authentication
    (this multiple choice question has been scrambled)
  10. 510 Which of the following could be used to institute a tunneling protocol for security?

    A. IPX/SPX
    B. IPSec
    C. EAP
    D. FTP
    B. IPSec
    (this multiple choice question has been scrambled)
  11. 511 Which of the following is an encryption program used to secure email and voice over the Internet?

    A. Blowfish
    B. S/MIME
    C. PGP
    D. ECC
    C. PGP
    (this multiple choice question has been scrambled)
  12. 512 Which of the following is used for securing communication between a client and a server?

    A. SHA-1
    B. NTLM
    C. MD5
    D. SMTP
    B. NTLM
    (this multiple choice question has been scrambled)
  13. 513 Which of the following processes are used to monitor and protect the DNS server?

    A. Ping the DNS server every minute to verify connectivity
    B. Check DNS records regularly
    C. Use personal firewalls to block port 53
    D. Set PTR records to purge daily
    B. Check DNS records regularly
    (this multiple choice question has been scrambled)
  14. 514 Which of the following is the MOST effective method for stopping a phishing attempt?

    A. SPAM filters
    B. User education
    C. Up-to-date antivirus definitions
    D. Paper shredders
    B. User education
    (this multiple choice question has been scrambled)
  15. 515 A corporation has a contractual obligation to provide a certain amount of system uptime to a client. Which of the following is this contract an example of?

    A. Redundancy
    B. SLA
    C. Due diligence
    D. PII
    B. SLA
    (this multiple choice question has been scrambled)
  16. 516 Which of the following would allow for a network to remain operational after a T1 failure?

    A. RAID 5 drive array
    B. Redundant ISP
    C. Redundant servers
    D. Uninterruptible Power Supply (UPS)
    B. Redundant ISP
    (this multiple choice question has been scrambled)
  17. 517 Which of the following asymmetric encryption algorithms was utilized FIRST?

    A. Whirlpool
    B. DES
    C. AES
    D. Serpent
    B. DES
    (this multiple choice question has been scrambled)
  18. 518 A ticket granting server is an important concept in which of the following authentication models?

    A. Kerberos
    B. CHAP
    C. RADIUS
    D. PAP
    A. Kerberos
    (this multiple choice question has been scrambled)
  19. 519 Which of the following is an example of two-factor authentication?

    A. Smart card and PIN
    B. Smart card and ID badge
    C. User ID and password
    D. Fingerprint reader and iris scanner
    A. Smart card and PIN
    (this multiple choice question has been scrambled)
  20. 520 Which of the following could physically damage a device if a long term failure occurred?

    A. Battery backup system
    B. OVAL
    C. Shielding
    D. HVAC
    D. HVAC
    (this multiple choice question has been scrambled)
  21. 521 Which of the following is the easiest way to disable a 10Base2 network?

    A. Remove a terminator
    B. Install a zombie
    C. Remove a vampire tap
    D. Introduce crosstalk
    A. Remove a terminator
    (this multiple choice question has been scrambled)
  22. 522 Which of the following is the BEST method for securing the data on a coaxial network?

    A. Weld all terminators to the cable ends
    B. Run all new cables parallel to existing alternating current (AC) cabling
    C. Make sure all terminators are grounded
    D. Run all cables through a conduit
    D. Run all cables through a conduit
    (this multiple choice question has been scrambled)
  23. 523 Which of the following is the weakest password?

    A. P^s5W0rd
    B. C0mpt!a2**8
    C. Indu5tr1als
    D. F%r3Walke3r
    C. Indu5tr1als
    (this multiple choice question has been scrambled)
  24. 524 Which of the following is the GREATEST security risk regarding removable storage?

    A. Availability of data
    B. Not enough space available
    C. Integrity of data
    D. Confidentiality of data
    D. Confidentiality of data
    (this multiple choice question has been scrambled)
  25. 525 Which of the following mimics a legitimate program in order to steal sensitive data?

    A. Worm
    B. Trojan
    C. Botnet
    D. Spam
    B. Trojan
    (this multiple choice question has been scrambled)
  26. 526 Which of the following allows for a user to have only the minimum level of access required for their job duties?

    A. Implicit deny
    B. Privilege escalation
    C. Job rotation
    D. Least privilege
    D. Least privilege
    (this multiple choice question has been scrambled)
  27. 527 A manager needs to control employee overtime. Which of the following would BEST allow for the manager to control when the employees are on the network?

    A. Access control list
    B. User account expiration
    C. Time of day restriction
    D. Domain password policy
    C. Time of day restriction
    (this multiple choice question has been scrambled)
  28. 528 Which of the following BEST describes hashing?

    A. Computing a unique mathematic identifier in order to prevent change during transport
    B. Computing a unique mathematic identifier in order to detect change during transport
    C. Encrypting the data payload and computing a unique mathematic identifier in order to detect change during transport
    D. Encrypting the data payload and computing a unique mathematic identifier in order to prevent change during transport
    B. Computing a unique mathematic identifier in order to detect change during transport
    (this multiple choice question has been scrambled)
  29. 529 Which of the following is MOST likely to crash a workstation?

    A. Protocol analyzer
    B. Penetration test
    C. Vulnerability assessment
    D. Network mapper
    B. Penetration test
    (this multiple choice question has been scrambled)
  30. 530 Which of the following is the critical piece of an encrypted communication that must be kept secret?

    A. The key exchange algorithm
    B. The initial salt value
    C. The encryption algorithm
    D. The final CRC of the key packet
    B. The initial salt value
    (this multiple choice question has been scrambled)
  31. 531 A PC is rejecting push updates from the server; all other PCs on the network are accepting the updates successfully. Which of the following should the administrator check FIRST?

    A. Local firewall
    B. Password expiration
    C. Anti-spyware
    D. Pop-up blocker
    A. Local firewall
    (this multiple choice question has been scrambled)
  32. 532 Which of the following describes an encrypted connection across public communication lines?

    A. EAP
    B. CHAP
    C. VPN
    D. TACACS
    C. VPN
    (this multiple choice question has been scrambled)
  33. 533 After a period of high employee turnover, which of the following should be implemented?

    A. A review of group policies
    B. A review of storage and retention policies
    C. A review of NTLM hashes on the domain servers
    D. A review of user access and rights
    D. A review of user access and rights
    (this multiple choice question has been scrambled)
  34. 534 All PCs in a network share a single administrator ID and password. When the administrator attempts to remotely control a users PC the attempt fails. Which of the following should the administrator check FIRST?

    A. The HIPS on the local PC
    B. The antivirus settings on the remote PC
    C. The antivirus settings on the local PC
    D. The HIPS on the remote PC
    D. The HIPS on the remote PC
    (this multiple choice question has been scrambled)
  35. 535 All of the following are considered key exchange protocols EXCEPT:

    A. RSA
    B. Diffie-Hellman
    C. KEA
    D. SAFER
    D. SAFER
    (this multiple choice question has been scrambled)
  36. 536 Which of the following keys is generally applied FIRST to a message digest to provide non-repudiation using asymmetric cryptography?

    A. Private key of the receiver
    B. Private key of the sender
    C. Public key of the receiver
    D. Public key of the sender
    B. Private key of the sender
    (this multiple choice question has been scrambled)
  37. 537 Which of the following describes a weakness of the hash functions?

    A. Collusion
    B. Birthday attack
    C. Man-in-the-middle
    D. Collision
    D. Collision
    (this multiple choice question has been scrambled)
  38. 538 All of the following are organizational policies that reduce the impact of fraud EXCEPT:

    A. job rotation
    B. escorting procedures
    C. password complexity rules
    D. separation of duties
    C. password complexity rules
    (this multiple choice question has been scrambled)
  39. 539 A technician is conducting a forensics analysis on a computer system. Which of the following should be done FIRST?

    A. Get a binary copy of the system
    B. Look for hidden files
    C. Search for Trojans
    D. Analyze temporary files
    A. Get a binary copy of the system
    (this multiple choice question has been scrambled)
  40. 540 A technician noticed a remote attack taking place on a system. Which of the following should be done FIRST?

    A. Contain the attack
    B. Disconnect the system from the network
    C. Respond to the attacker
    D. Follow the incident management procedure in place
    D. Follow the incident management procedure in place
    (this multiple choice question has been scrambled)
  41. 541 Which of the following IDS generally follows a learning process?

    A. Signature-based IDS
    B. Event-based IDS
    C. Anomaly-based IDS
    D. Rule-based IDS
    C. Anomaly-based IDS
    (this multiple choice question has been scrambled)
  42. 542 Which of the following algorithms is faster when encrypting data?

    A. Whole disk encryption algorithms
    B. Public key algorithms
    C. Symmetric key algorithms
    D. Asymmetric key algorithms
    C. Symmetric key algorithms
    (this multiple choice question has been scrambled)
  43. 543 Which of the following is a reason why DNS logs should be archived?

    A. For complying with payment card industry (PCI) requirements
    B. For use in an investigation in the future
    C. For use in disaster recovery of the DNS server
    D. For complying with PII requirements
    B. For use in an investigation in the future
    (this multiple choice question has been scrambled)
  44. 544 Which of the following is a best practice for securing log files?

    A. Deny administrators all access to log files to prevent write failures
    B. Log all failed and successful login attempts
    C. Change security settings to avoid corruption
    D. Copy or save the logs to a remote log server
    D. Copy or save the logs to a remote log server
    (this multiple choice question has been scrambled)
  45. 545 Which of the following logs shows when the workstation was last shutdown?

    A. System
    B. Security
    C. DHCP
    D. Access
    A. System
    (this multiple choice question has been scrambled)
  46. 546 Which of the following is a best practice auditing procedure?

    A. Mitigate vulnerabilities
    B. Set strong password requirements
    C. Review user access and rights
    D. Draft an email retention policy
    C. Review user access and rights
    (this multiple choice question has been scrambled)
  47. 547 Which of the following tools is commonly used to detect security anomalies on a host?

    A. A network mapper
    B. A TACACS+ implementation
    C. A remote protocol analyzer
    D. A file system integrity checker
    D. A file system integrity checker
    (this multiple choice question has been scrambled)
  48. 548 Snort, TCPDump and Wireshark are commonly used for which of the following?

    A. Port scanning
    B. Network sniffing
    C. DDOS attacks
    D. Host monitoring
    B. Network sniffing
    (this multiple choice question has been scrambled)
  49. 549 Which of the following would typically require the use of a network protocol analyzer?

    A. Determining who logged on to a machine last night at midnight
    B. Determining how many users are logged onto the domain controller
    C. Determining what the speed is on the external interface of a firewall
    D. Determining why authentication between two machines failed
    D. Determining why authentication between two machines failed
    (this multiple choice question has been scrambled)
  50. 550 Which of the following security related anomalies are MOST likely to be detected by a protocol analyzer?

    A. Disabled network interface on a server
    B. Many malformed or fragmented packets
    C. Decryption of encrypted network traffic
    D. Passive sniffing of local network traffic
    B. Many malformed or fragmented packets
    (this multiple choice question has been scrambled)
  51. 551 Users and computers are generally grouped into domains for security purposes. Which of the following is a common attribute used to determine which domain a user or computer belongs to?

    A. Location
    B. Password
    C. OS
    D. MAC address
    A. Location
    (this multiple choice question has been scrambled)
  52. 552 Malware that uses virtualization techniques can be difficult to detect because of which of the following?

    A. A portion of the malware may have been removed by the IDS
    B. The malware may be running at a more privileged level than the antivirus software
    C. The malware may be implementing a proxy server for command and control
    D. The malware may be using a Trojan to infect the system
    B. The malware may be running at a more privileged level than the antivirus software
    (this multiple choice question has been scrambled)
  53. 553 Which of the following is a reason why virtualization techniques are often used to implement a honeynet?

    A. To reduce the number of connections allowed
    B. To slow the intruders network connection speed
    C. To reduce the number of physical devices needed
    D. To hide the encryption being used in the honeynet
    C. To reduce the number of physical devices needed
    (this multiple choice question has been scrambled)
  54. 554 Which of the following is an industry standard for remote logging?

    A. syslog
    B. RDP
    C. rlogin
    D. ipfilter
    A. syslog
    (this multiple choice question has been scrambled)
  55. 555 Audit trails are used for which of the following?

    A. Continuity
    B. Availability
    C. Authorization
    D. Accountability
    D. Accountability
    (this multiple choice question has been scrambled)
  56. 556 Which of the following can be used to centrally manage security settings?

    A. Service pack
    B. NIDS
    C. Group policy
    D. Cross-site scripting
    C. Group policy
    (this multiple choice question has been scrambled)
  57. 557 Which of the following is a best practice disaster recovery strategy?

    A. Hire an independent consultant
    B. Test the recovery plan
    C. Spend at least 5% of the IT budget
    D. Use a reciprocal agreement
    B. Test the recovery plan
    (this multiple choice question has been scrambled)
  58. 558 Which of the following activities is MOST closely associated with DLL injection?

    A. Network mapping
    B. SQL servers
    C. Vulnerability assessment
    D. Penetration testing
    D. Penetration testing
    (this multiple choice question has been scrambled)
  59. 559 Which of the following is true about penetration testing or vulnerability assessments?

    A. Vulnerability assessment exploits a weakness in a system
    B. Penetration testing removes malware if found during a scan
    C. Vulnerability assessment verifies incidence response
    D. Penetration testing exploits a vulnerability
    D. Penetration testing exploits a vulnerability
    (this multiple choice question has been scrambled)
  60. 560 Which of the following is a security risk of not password protecting the BIOS?

    A. A virus may corrupt the SCSI settings and the system will not boot
    B. The antivirus software will not run because it needs a BIOS password
    C. The authentication system may be subverted
    D. The system may be changed to boot from alternative media
    D. The system may be changed to boot from alternative media
    (this multiple choice question has been scrambled)
  61. 561 Executing proper logging procedures would be the proper course of action in which of the following scenarios? (Select TWO)

    A. Need to prevent access to a file or folder
    B. Need to know which files have been accessed
    C. Need to know who is logging on to the system
    D. Need to prevent users from logging on to the system
    E. Need to capture monitor network traffic in real time
    • B. Need to know which files have been accessed
    • C. Need to know who is logging on to the system
  62. 562 Executing proper logging procedures would facilitate which of the following requirements?

    A. Ignore suspicious queries to the DNS server
    B. Investigate suspicious queries to the DNS server
    C. Monitor suspicious queries to the DNS server in real time
    D. Block suspicious queries to the DNS server
    B. Investigate suspicious queries to the DNS server
    (this multiple choice question has been scrambled)
  63. 563 Which of the following is a concern when setting logging to a debug level?

    A. The log may fill up with extraneous information
    B. The device or application will only operate in test mode
    C. Some important events will not get logged
    D. The events may not contain enough details
    A. The log may fill up with extraneous information
    (this multiple choice question has been scrambled)
  64. 564 Which of the following should be considered when executing proper logging procedures? (Select TWO)

    A. The information that is needed to reconstruct events
    B. The number of disasters that may occur in one year
    C. The password requirements for user accounts
    D. The virtual memory allocated on the log server
    E. The amount of disk space required
    • A. The information that is needed to reconstruct events
    • E. The amount of disk space required
  65. 565 Which of the following malicious activities might leave traces in a DNS log file?

    A. Poisoning
    B. Hijacking
    C. Caching
    D. Phishing
    A. Poisoning
    (this multiple choice question has been scrambled)
  66. 566 Which of the following NAC scanning types is the LEAST intrusive to the client?

    A. Agentless
    B. ActiveX
    C. Open ID
    D. Agent based
    A. Agentless
    (this multiple choice question has been scrambled)
  67. 567 Common settings configured on an Internet content filtering device are database update settings, log settings and which of the following?

    A. Anomaly settings
    B. False positive threshold
    C. Content rules
    D. Performance settings
    C. Content rules
    (this multiple choice question has been scrambled)
  68. 568 Which of the following activities commonly involves feedback from departmental managers or human resources?

    A. Clearing cookies from the browser
    B. Resetting an employee password
    C. Setting system performance baseline
    D. User access and rights review
    D. User access and rights review
    (this multiple choice question has been scrambled)
  69. 569 While auditing a list of active user accounts, which of the following may be revealed?

    A. Passwords that are blank
    B. Accounts that need to be removed
    C. Passwords with dictionary words
    D. Accounts with weak passwords
    B. Accounts that need to be removed
    (this multiple choice question has been scrambled)
  70. 570 Which of the following is the BEST option for securing an email infrastructure?

    A. Set up an email proxy on the Internet and an email server in the DMZ
    B. Set up the email server in a DMZ
    C. Set up an email proxy in the DMZ and the email server in the internal network
    D. Set up an email proxy on the Internet and an email server in the internal network
    C. Set up an email proxy in the DMZ and the email server in the internal network
    (this multiple choice question has been scrambled)
  71. 571 Which of the following provides the BEST mechanism for non-repudiation?

    A. Digital signatures
    B. Message authentication codes
    C. Encryption
    D. Message digests
    A. Digital signatures
    (this multiple choice question has been scrambled)
  72. 572 Which of the following is the BEST logical access control method for controlling system access on teams working in shifts?

    A. Job rotation
    B. Separation of duties
    C. Time of day restrictions
    D. Least privilege
    C. Time of day restrictions
    (this multiple choice question has been scrambled)
  73. 573 Which of the following key types does Kerberos use?

    A. Symmetric keys
    B. Ticket Grating Service
    C. Key Distribution Center
    D. Asymmetric keys
    D. Asymmetric keys
    (this multiple choice question has been scrambled)
  74. 574 Which of the following are recommended security measures when implementing system logging procedures? (Select TWO)

    A. Perform a binary copy of the system
    B. Apply retention policies on the log files
    C. Collect system temporary files
    D. Perform hashing of the log files
    E. Perform CRC checks
    • B. Apply retention policies on the log files
    • D. Perform hashing of the log files
  75. 575 Which of the following should be considered when implementing logging controls on multiple systems? (Select TWO)


    A. VLAN segment of the systems
    B. Systems clock synchronization
    C. Systems capacity and performance
    D. External network traffic
    E. Network security zone of the systems
    • B. Systems clock synchronization
    • C. Systems capacity and performance
  76. 576 Which of the following BEST describes actions pertaining to user account reviews? (Select TWO)

    A. User account reports are periodically extracted from systems and employment verification is performed
    B. User accounts and their privileges are periodically extracted from systems and reports are kept for auditing purposes
    C. User accounts and their privileges are periodically extracted from systems and are reviewed for the appropriate level of authorization
    D. User accounts reports are periodically extracted from systems and end users are informed
    E. User accounts reports are periodically extracted from systems and user access dates are verified
    • A. User account reports are periodically extracted from systems and employment verification is performed
    • C. User accounts and their privileges are periodically extracted from systems and are reviewed for the appropriate level of authorization
  77. 577 All of the following are attributes of an x.509 certificate EXCEPT:

    A. the version of the certificate
    B. the symmetric key of the owner
    C. the public key of the owner
    D. the issuer
    B. the symmetric key of the owner
    (this multiple choice question has been scrambled)
  78. 578 A user complains that pop-up windows continuously appear on their screen with a message stating that they have a virus and offering to see a program that will remove it. The technician is skeptical because the antivirus definitions on the machine are up-to-date. Which of the following BEST describes what the user is seeing?

    A. SMTP open relay
    B. Adware
    C. Spyware
    D. SQL injection
    B. Adware
    (this multiple choice question has been scrambled)
  79. 579 The GREATEST security concern in regards to data leakage with USB devices is:

    A. storage capacity
    B. physical size
    C. OS compatibility
    D. speed
    B. physical size
    (this multiple choice question has been scrambled)
  80. 580 Which of the following is the main difference between a substitution cipher and a transposition cipher when used to encode messages?

    A. One is a symmetric block cipher and the other is asymmetric
    B. One replaces blocks with other blocks while the other rearranges only
    C. One rearranges and replaces blocks while the other rearranges only
    D. One replaces blocks while the other rearranges and replaces only
    B. One replaces blocks with other blocks while the other rearranges only
    (this multiple choice question has been scrambled)
  81. 581 All of the following can be found in the document retention policy EXCEPT:

    A. retention periods
    B. type of storage media
    C. password complexity rules
    D. physical access controls
    C. password complexity rules
    (this multiple choice question has been scrambled)
  82. 582 Which of the following reduces effectiveness when deploying and managing NIPS?

    A. Encrypting all network traffic
    B. Network placement
    C. Reviewing the logs
    D. Continued tuning
    A. Encrypting all network traffic
    (this multiple choice question has been scrambled)
  83. 583 Which of the following authentication methods prevents a replay attack from occurring?

    A. L2TP
    B. RADIUS
    C. CHAP
    D. Kerberos
    D. Kerberos
    (this multiple choice question has been scrambled)
  84. 584 To prevent disk integrity errors due to small line-power fluctuations, a system administrator should install which of the following?

    A. Line conditioner
    B. Redundant power supplies
    C. Battery backup
    D. Voltage regulator
    A. Line conditioner
    (this multiple choice question has been scrambled)
  85. 585 Which of the following is the BEST way to mass deploy security configurations to numerous workstations?

    A. Security templates
    B. Security hotfix
    C. Configuration baseline
    D. Patch management
    A. Security templates
    (this multiple choice question has been scrambled)
  86. 586 Virtual machines are MOST often used by security researchers for which of the following purposes?

    A. To provide a virtual collaboration environment to discuss security research
    B. To provide an environment where malware can be executed with minimal risk to equipment and software
    C. To provide an environment where new network applications can be tested
    D. To provide a secure virtual environment to conduct online deployments
    B. To provide an environment where malware can be executed with minimal risk to equipment and software
    (this multiple choice question has been scrambled)
  87. 587 Which of the following is a password cracker?

    A. Cain & Abel
    B. NMAP
    C. CORE Impact
    D. WireShark
    A. Cain & Abel
    (this multiple choice question has been scrambled)
  88. 588 Which of the following characteristics of RAID increases availability?

    A. Mirroring
    B. Low cost
    C. Striping without parity
    D. Kiting
    A. Mirroring
    (this multiple choice question has been scrambled)
  89. 589 A document shredder will BEST prevent which of the following?

    A. Phishing
    B. Shoulder surfing
    C. Viruses
    D. Dumpster diving
    D. Dumpster diving
    (this multiple choice question has been scrambled)
  90. 590 Which of the following would BEST prevent the spread of a hoax?

    A. User education
    B. Chain of custody
    C. Up-to-date antivirus definitions
    D. Up-to-date anti-spyware definitions
    A. User education
    (this multiple choice question has been scrambled)
  91. 591 Which of the following is a term referring to the situation when a programmer leaves an unauthorized entry point into a program or system?

    A. Default account
    B. Back door
    C. Poisoning
    D. Privilege escalation
    B. Back door
    (this multiple choice question has been scrambled)
  92. 592 Which of the following refers to a system that is unable to accept new TCP connections due to a SYN flood attack?

    A. Airsnort
    B. DoS
    C. Teardrop
    D. Smurf
    B. DoS
    (this multiple choice question has been scrambled)
  93. 593 Which of the following would refer to a key fob with a periodically changing number that is used as part of the authentication process?

    A. Physical token
    B. Installation key
    C. Biometric device
    D. Hardware lock
    A. Physical token
    (this multiple choice question has been scrambled)
  94. 594 Which of the following is the MOST common method of one-factor authentication?

    A. Physical token and a password
    B. Fingerprint reader
    C. Smart card and a PIN
    D. User ID and password
    D. User ID and password
    (this multiple choice question has been scrambled)
  95. 595 An attorney demands to know exactly who had possession of a piece of evidence at a certain time after seizure. Which of the following documents would provide this?

    A. Change management
    B. Chain of custody
    C. Due process
    D. Due diligence
    B. Chain of custody
    (this multiple choice question has been scrambled)
  96. 596 Which of the following prevents damage to evidence during forensic analysis?

    A. Read-only drive connectors
    B. Drive recovery tools
    C. Write-only drive connectors
    D. Drive sanitization tools
    A. Read-only drive connectors
    (this multiple choice question has been scrambled)
  97. 597 Which of the following is a drawback of using PAP authentication?

    A. PAP requires that both workstations mutually authenticate
    B. PAP only authenticates between same vendor servers
    C. PAP changes its initialization vector with each packet
    D. PAP sends all passwords across the network as clear text
    D. PAP sends all passwords across the network as clear text
    (this multiple choice question has been scrambled)
  98. 598 Which of the following BEST describes using a third party to store the public and private keys?

    A. Recovery agent
    B. Registration authority
    C. Key escrow
    D. Public key infrastructure
    C. Key escrow
    (this multiple choice question has been scrambled)
  99. 599 Which of the following requires the server to periodically request authentication from the client?

    A. WPA2
    B. RAS
    C. CHAP
    D. EAP
    C. CHAP
    (this multiple choice question has been scrambled)
  100. 600 A biometric fingerprint scanner is an example of which of the following?

    A. SSO
    B. Three-factor authentication
    C. Single-factor authentication
    D. Two-factor authentication
    C. Single-factor authentication
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview