multi test h

Card Set Information

Author:
johnnystevens
ID:
10954
Filename:
multi test h
Updated:
2010-03-17 13:02:14
Tags:
testing
Folders:

Description:
multiple choice upload test
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user johnnystevens on FreezingBlue Flashcards. What would you like to do?


  1. 701 Which of the following BEST allows a technician to mitigate the chances of a successful attack against the wireless network?

    A. Implement an identification system and WPA2
    B. Implement an authentication system and WPA
    C. Implement an authentication system and WEP
    D. Implement a biometric system and WEP
    B. Implement an authentication system and WPA
    (this multiple choice question has been scrambled)
  2. 702 A technician is reviewing the system logs for a firewall and is told that there is an implicit deny within the ACL. Which of the following is an example of an implicit deny?

    A. An ACL is a way to secure traffic from one network to another
    B. An implicit deny statement denies all traffic from one network to another
    C. Items which are not specifically given access are denied by default
    D. Each item is denied by default because of the implicit deny
    C. Items which are not specifically given access are denied by default
    (this multiple choice question has been scrambled)
  3. 703 Which of the following is the MOST likely reason that an attacker would use a DoS attack?

    A. The attacker is working with inside entities to test the company?s firewall
    B. The attacker is working with outside entities to test the company?s coding practices
    C. The attacker is attempting to distract the company from the real underlining attack
    D. The attacker wants to prevent authorized users from using a certain service
    D. The attacker wants to prevent authorized users from using a certain service
    (this multiple choice question has been scrambled)
  4. 704 Which of the following is a way to gather reconnaissance information from a printer resource?

    A. HTTP
    B. SMTP
    C. RADIUS
    D. SNMP
    D. SNMP
    (this multiple choice question has been scrambled)
  5. 705 A technician gets informed that there is a worm loose on the network. Which of the following should the technician review to discover the internal source of the worm?

    A. Performance logs
    B. Maintenance logs
    C. Antivirus logs
    D. Access logs
    C. Antivirus logs
    (this multiple choice question has been scrambled)
  6. 706 Which of the following BEST allows for the encryption of an entire hard drive?

    A. Symmetric algorithm
    B. Public key infrastructure
    C. Hashing function
    D. Asymmetric algorithm
    A. Symmetric algorithm
    (this multiple choice question has been scrambled)
  7. 707 Which of the following would a Faraday cage prevent usage of?

    A. Uninterruptible Power Supply (UPS)
    B. Cell phone
    C. USB key
    D. Storage drive
    B. Cell phone
    (this multiple choice question has been scrambled)
  8. 708 Which of the following will allow a technician to block certain HTTP traffic from company staff members?

    A. NIDS
    B. DMZ
    C. VLAN
    D. Content filter
    D. Content filter
    (this multiple choice question has been scrambled)
  9. 709 Which of the following is a security threat to a workstation that requires interaction from a staff member?

    A. Logic bomb
    B. Worm
    C. Botnet
    D. Virus
    D. Virus
    (this multiple choice question has been scrambled)
  10. 710 Which of the following will prevent a person from booting into removal storage media if the correct boot sequence is already set?

    A. BIOS password settings
    B. USB key settings
    C. BIOS power on settings
    D. BIOS boot options
    A. BIOS password settings
    (this multiple choice question has been scrambled)
  11. 711 Which of the following ports need to be open to allow a user to login remotely onto a workstation?

    A. 8080
    B. 636
    C. 53
    D. 3389
    D. 3389
    (this multiple choice question has been scrambled)
  12. 712 Which of the following, if intercepted, could allow an attacker to access a user?s email information?

    A. Cross-site scripting
    B. Browser cookies
    C. Cell traffic
    D. SMTP traffic
    B. Browser cookies
    (this multiple choice question has been scrambled)
  13. 713 Which of the following would allow a technician to minimize the risk associated with staff running port scanners on the network?

    A. Vulnerability scanners
    B. Network mappers
    C. Group policy
    D. Password crackers
    C. Group policy
    (this multiple choice question has been scrambled)
  14. 714 Which of the following is the MOST effective application to implement to identify malicious traffic on a server?

    A. HIDS software
    B. Antivirus software
    C. Personal software firewall
    D. Enterprise software firewall
    A. HIDS software
    (this multiple choice question has been scrambled)
  15. 715 Which of the following is the MOST appropriate type of software to apply on a workstation that needs to be protected from other locally accessible workstations?

    A. HIDS
    B. Personal software firewall
    C. Pop-up blocker software
    D. Antivirus software
    B. Personal software firewall
    (this multiple choice question has been scrambled)
  16. 716 Which of the following is a way for a technician to identify security changes on a workstation?

    A. Configuration baseline
    B. Service pack application
    C. Security templates
    D. Group policy management
    A. Configuration baseline
    (this multiple choice question has been scrambled)
  17. 717 Which of the following is a way to correct a single security issue on a workstation?

    A. Patch management
    B. Configuration baseline
    C. A patch
    D. A service pack
    C. A patch
    (this multiple choice question has been scrambled)
  18. 718 Which of the following protects a home user from the Internet?

    A. Anti-malware software
    B. Antivirus application
    C. Personal firewall
    D. HIDS
    C. Personal firewall
    (this multiple choice question has been scrambled)
  19. 719 Computer equipment has been stolen from a company?s office. To prevent future thefts from occurring and to safeguard the company?s trade secrets which of the following should be implemented?

    A. ID badges and passwords
    B. Hardware locks and door access systems
    C. Video surveillance and access logs
    D. Multifactor authentication
    B. Hardware locks and door access systems
    (this multiple choice question has been scrambled)
  20. 720 Which of the following is the primary purpose for a physical access log in a data center?

    A. Prevent unauthorized personnel access to the data center
    B. Maintain a list of personnel who exit the facility
    C. Maintain a list of personnel who enter the facility
    D. Allow authorized personnel access to the data center
    C. Maintain a list of personnel who enter the facility
    (this multiple choice question has been scrambled)
  21. 721 Which of the following biometric authentication devices also carries significant privacy implications due to personal health information that can be discovered during the authentication process?

    A. Retina scanner
    B. Fingerprint scanner
    C. Facial recognition
    D. Iris scanner
    A. Retina scanner
    (this multiple choice question has been scrambled)
  22. 722 An administrator has already implemented two-factor authentication and now wishes to install a third authentication factor. If the existing authentication system uses strong passwords and PKI tokens which of the following would provide a third factor?

    A. Pass phrases
    B. Six digit PINs
    C. Fingerprint scanner
    D. Elliptic curve
    C. Fingerprint scanner
    (this multiple choice question has been scrambled)
  23. 723 A biometric authentication system consists of all of the following components EXCEPT:

    A. supplicant
    B. hardware token
    C. reader
    D. credential store
    B. hardware token
    (this multiple choice question has been scrambled)
  24. 724 Which of the following is an example of remote authentication?

    A. A user on a metropolitan area network (MAN) accesses a host by entering a username and password pair while not connected to the LAN
    B. A user in one building logs on to the network by entering a username and password into a host in the same building
    C. A user on a campus area network (CAN) connects to a server in another building and enters a username and password pair
    D. A user in one city logs onto a network by connecting to a domain server in another city
    D. A user in one city logs onto a network by connecting to a domain server in another city
    (this multiple choice question has been scrambled)
  25. 725 Which of the following is a three-factor authentication system?

    A. Password, passphrase, PIN and iris scanner
    B. Username, PIN and fingerprint reader
    C. Username, password, token and iris scanner
    D. PIN, palm recognition scanner and passphrase
    C. Username, password, token and iris scanner
    (this multiple choice question has been scrambled)
  26. 726 Which of the following is an acceptable group in which to place end users?

    A. Root
    B. Backup operators
    C. Domain users
    D. Administrators
    C. Domain users
    (this multiple choice question has been scrambled)
  27. 727 According to industry best practices, administrators should institute a mandatory rotation of duties policy due to which of the following?

    A. Continuity of operations in the event of a spam outbreak
    B. Continuity of operations in the event of a virus outbreak
    C. Continuity of operations in the event of future growth of the network
    D. Continuity of operations in the event of absence or accident
    D. Continuity of operations in the event of absence or accident
    (this multiple choice question has been scrambled)
  28. 728 According to industry best practices, administrators should institute a mandatory rotation of duties policy due to which of the following?

    A. To detect malware
    B. To detect an inside threat
    C. To detect outside attackers
    D. To detect viruses
    B. To detect an inside threat
    (this multiple choice question has been scrambled)
  29. 729 Which of the following is considered the strongest encryption by use of mathematical evaluation techniques?

    A. DES
    B. AES
    C. ROT13
    D. 3DES
    B. AES
    (this multiple choice question has been scrambled)
  30. 730 Which of the following should be implemented when protecting personally identifiable information (PII) and sensitive information on IT equipment that can be easily stolen (E. g. USB drive, laptops)?

    A. Sensitive file encryption
    B. Confidentiality
    C. Whole disk encryption
    D. Dual-sided certificates
    C. Whole disk encryption
    (this multiple choice question has been scrambled)
  31. 731 Which of the following is the BEST wireless security practice that could be implemented to prevent unauthorized access?

    A. Disabling of the SSID broadcast
    B. WPA2 with TKIP
    C. WPA with MAC filtering
    D. WPA2 with a strong pass-phrase
    B. WPA2 with TKIP
    (this multiple choice question has been scrambled)
  32. 732 Which of the following can prevent malicious software applications from being introduced while browsing the Internet?

    A. Input validation
    B. Strong authentication
    C. Anti-spyware scanners
    D. Pop-up blockers
    D. Pop-up blockers
    (this multiple choice question has been scrambled)
  33. 733 Which of the following are reasons to implement virtualization technology? (Select TWO)

    A. To reduce recovery time in the event of application failure
    B. To decrease false positives on the NIDS
    C. To eliminate virtual redundancy
    D. To decrease access to security resources
    E. To provide a secure virtual environment for testing
    • A. To reduce recovery time in the event of application failure
    • E. To provide a secure virtual environment for testing
  34. 734 Network security administrators should implement which of the following to ensure system abuse by administrators does not go undetected in the logs?

    A. Acceptable use policy
    B. Least privilege
    C. Separation of duties
    D. Implicit deny
    C. Separation of duties
    (this multiple choice question has been scrambled)
  35. 735 After completing a risk assessment and penetration test against a network, a security administrator recommends the network owner take actions to prevent future security incidents. Which of the following describes this type of action?

    A. Risk transference
    B. Risk acceptance
    C. Risk mitigation
    D. Risk avoidance
    C. Risk mitigation
    (this multiple choice question has been scrambled)
  36. 736 Public key infrastructure uses which of the following combinations of cryptographic items?

    A. One time keys, WEP and symmetric cryptography
    B. Public keys, symmetric keys and ECC-based keys
    C. Private keys, public keys and ECC-based keys
    D. Private keys, public keys and asymmetric cryptography
    D. Private keys, public keys and asymmetric cryptography
    (this multiple choice question has been scrambled)
  37. 737 An administrator wants to implement a procedure to control inbound and outbound traffic on a network segment. Which of the following would achieve this goal?

    A. ACL
    B. Proxy
    C. HIDS
    D. NIDS
    A. ACL
    (this multiple choice question has been scrambled)
  38. 738 In PKI, the CA is responsible for which of the following?

    A. Maintaining the CRL
    B. Maintaining the cipher block chain
    C. Maintaining the browsers PKI store
    D. Maintaining all private keys
    A. Maintaining the CRL
    (this multiple choice question has been scrambled)
  39. 739 In PKI, which of the following entities is responsible for publishing the CRL?

    A. Recovery agent
    B. User
    C. CA
    D. ACL
    C. CA
    (this multiple choice question has been scrambled)
  40. 740 Which of the following is a security risk associated with USB drives?

    A. Large storage capacity and high visibility
    B. Easy to conceal and large storage capacity
    C. Small storage capacity and low visibility
    D. Easy to conceal and detect
    B. Easy to conceal and large storage capacity
    (this multiple choice question has been scrambled)
  41. 741 Which of the following is a security risk associated with introducing cellular telephones with mobile OS installed on a closed network?

    A. New vector to introduce viruses and malware to the network
    B. War-dialing DoS attacks against the network
    C. War-driving DDoS attacks against the network
    D. New vector to introduce VoIP to the network
    • A. New vector to introduce viruses and malware to the network
  42. 742 The availability of portable external storage such as USB hard drives has increased which of the following threats to networks?

    A. Introduction of material on to the network
    B. Increased loss business data
    C. Removal of sensitive and PII data
    D. Introduction of rogue wireless access points
    C. Removal of sensitive and PII data
    (this multiple choice question has been scrambled)
  43. 743
    An administrator finds a device attached between the USB port on a host and the attached USB keyboard. The administrator has also noticed large documents being transmitted from the host to a host on an external network. The device is MOST likely which of the following?

    A. In-line network analyzer
    B. In-line keystroke logger
    C. External USB drive
    D. USB external hub
    B. In-line keystroke logger
    (this multiple choice question has been scrambled)
  44. 744 A user is receiving an error which they have not seen before when opening an application. Which of the following is MOST likely the cause of the problem?

    A. A patch was pushed out
    B. The NIDS baseline has been updated
    C. The HIDS baseline has been updated
    D. A signature update was completed on the NIPS
    A. A patch was pushed out
    (this multiple choice question has been scrambled)
  45. 745 Which of the following is used to encrypt email and create digital signatures?

    A. S/MIME
    B. RSA
    C. LDAP
    D. HTTPS
    A. S/MIME
    (this multiple choice question has been scrambled)
  46. 746 Which of the following can be used to encrypt FTP or telnet credentials over the wire?

    A. HTTPS
    B. SSH
    C. SHTTP
    D. S/MIME
    B. SSH
    (this multiple choice question has been scrambled)
  47. 747 Which of the following is a vulnerability assessment tool?

    A. AirSnort
    B. John the Ripper
    C. Cain & Abel
    D. Nessus
    D. Nessus
    (this multiple choice question has been scrambled)
  48. 748 Which of the following is a vulnerability scanner?

    A. Cain & Abel
    B. John the Ripper
    C. Microsoft Baseline Security Analyzer
    D. AirSnort
    C. Microsoft Baseline Security Analyzer
    (this multiple choice question has been scrambled)
  49. 749 Which of the following is a password cracking tool?

    A. John the Ripper
    B. AirSnort
    C. Wireshark
    D. Nessus
    A. John the Ripper
    (this multiple choice question has been scrambled)
  50. 750 Which of the following is a protocol analyzer?

    A. WireShark
    B. Nessus
    C. Cain & Abel
    D. John the Ripper
    A. WireShark
    (this multiple choice question has been scrambled)
  51. 751 Which of the following is a system setup to distract potential attackers?

    A. Honeypot
    B. Firewall
    C. VLAN
    D. DMZ
    A. Honeypot
    (this multiple choice question has been scrambled)
  52. 752 Changing roles every couple of months as a security mitigation technique is an example of which of the following?

    A. Job rotation
    B. Separation of duties
    C. Mandatory vacations
    D. Least privilege
    A. Job rotation
    (this multiple choice question has been scrambled)
  53. 753 Which of the following should be checked if an email server is forwarding emails for another domain?

    A. DNS zone transfers
    B. Cookies
    C. SMTP open relay
    D. ActiveX controls
    C. SMTP open relay
    (this multiple choice question has been scrambled)
  54. 754 Which of the following will allow the running of a system integrity verifier on only a single host?

    A. NIPS
    B. VLAN
    C. NIDS
    D. HIDS
    D. HIDS
    (this multiple choice question has been scrambled)
  55. 755 Which of the following has the ability to find a rootkit?

    A. Anti-spam scanner
    B. Adware scanner
    C. Malware scanner
    D. Email scanner
    C. Malware scanner
    (this multiple choice question has been scrambled)
  56. 756 Which of the following will be prevented by setting a BIOS password?

    A. A machine becoming infected with a virus
    B. A machine becoming infected with a botnet
    C. Changing the system boot order
    D. Replacing a video card on a machine
    C. Changing the system boot order
    (this multiple choice question has been scrambled)
  57. 757 Which of the following is a security limitation of virtualization technology?

    A. Patch management becomes more time consuming
    B. If an attack occurs, it could potentially disrupt multiple servers
    C. It increases false positives on the NIDS
    D. A compromise of one instance will immediately compromise all instances
    B. If an attack occurs, it could potentially disrupt multiple servers
    (this multiple choice question has been scrambled)
  58. 758 Which of the following must be used to setup a DMZ?

    A. Proxy
    B. NIDS
    C. Honeypot
    D. Router
    D. Router
    (this multiple choice question has been scrambled)
  59. 759 Which of the following would be used to push out additional security hotfixes?

    A. Patch management
    B. Local security policy
    C. Cookies
    D. Configuration baseline
    A. Patch management
    (this multiple choice question has been scrambled)
  60. 760 Which of the following would be used to allow a server to shut itself down normally upon a loss of power?

    A. Uninterruptible Power Supply (UPS)
    B. Redundant power supply
    C. Redundant ISP
    D. Backup generator
    A. Uninterruptible Power Supply (UPS)
    (this multiple choice question has been scrambled)
  61. 761 Which of the following is the BEST security measure to use when implementing access control?

    A. Disabling SSID broadcast
    B. Time of day restrictions
    C. Changing default passwords
    D. Password complexity requirements
    D. Password complexity requirements
    (this multiple choice question has been scrambled)
  62. 762 Applying a service pack could affect the baseline of which of the following?

    A. Honeynet
    B. Heuristic-based NIDS
    C. Signature-based NIPS
    D. Signature-based NIDS
    B. Heuristic-based NIDS
    (this multiple choice question has been scrambled)
  63. 763 Which of the following is the strongest encryption form that can be used in all countries?

    A. WPA2
    B. TKIP
    C. WEP
    D. WPA
    C. WEP
    (this multiple choice question has been scrambled)
  64. 764 When would it be appropriate to use time of day restrictions on an account?

    A. In order to ensure false positives are not received during baseline testing
    B. To eliminate attack attempts of the network during peak hours
    C. To ensure the DMZ is not overloaded during server maintenance
    D. As an added security measure if employees work set schedules
    D. As an added security measure if employees work set schedules
    (this multiple choice question has been scrambled)
  65. 765 Which of the following could be used to restore a private key in the event of a CA server crashing?

    A. Recovery agent
    B. Key escrow
    C. CRL
    D. Trust model verification
    A. Recovery agent
    (this multiple choice question has been scrambled)
  66. 766 Which of the following is a possible security risk associated with USB devices?

    A. Input validation
    B. Cross-site scripting
    C. Bluesnarfing
    D. Domain kiting
    C. Bluesnarfing
    (this multiple choice question has been scrambled)
  67. 767 Which of the following is MOST effective in preventing adware?

    A. Pop-up blocker
    B. HIDS
    C. Antivirus
    D. Firewall
    A. Pop-up blocker
    (this multiple choice question has been scrambled)
  68. 768 Which of the following is the MOST important when implementing heuristic-based NIPS?

    A. Perform comprehensive heuristic-based analysis on the system
    B. Ensure the network is secure when baseline is established
    C. The brand of NIPS that is being used
    D. Enable automatic updates to the heuristic database
    B. Ensure the network is secure when baseline is established
    (this multiple choice question has been scrambled)
  69. 769 Which of the following attacks enabling logging for DNS aids?

    A. SQL injection
    B. Botnet attacks
    C. Local hosts file corruption
    D. Virus infections
    B. Botnet attacks
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview