1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
1. Which is a form of cryptography provides confidentiality with a weak form of authentication or integrity?
Symmetric key encryption
Asymmetric Key encryption
Hash algorithm
Key distribution
Symmetric-key encryption
2. What is the main difference between a worm and a virus?
A worm tries to the steal information, while I virus tries to destroy data.
A worm is restricted to one system, while a virus can spread from system to system.
A worm can replace itself, while a virus requires a host for distribution.
A worm requires an execution mechanism to start while a virus can start itself
A worm can replicate itself, while a virus requires a host for distribution.
3. What type of malware monitors your actions?
Virus
Worm
Spyware
Trojan horse
Spyware
4. A collection of zombie computers have been set up to collect personal information. What type of malware to the zombie computers represent?
Trojan Horse
Logic Bomb
Botnet
Spyware
Botnet
5. Which is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously?
Worm
ActiveX Control
Outook Express
Trojan horse
Trojan Horse
6. Which/what of the following is a characteristic of a virus?
Is remotely controlled by a central command
Capable of replicating itself
Requires an activation mechanism to run
Requires administrative privileges to install
Requires an activation mechanism to run.
7. You have heard about a new malware program that presents itself to users as a virus scanner. When users run the software, it installs itself as a hidden program that has administrator access to various operating system components. The program then track system activity and allows an attacker to remotely gain administrator access to the computer. Which of the following terms best describes this software?
Which of the following is undetectable software that allows admin level access?
Botnet
Privilege escalation
Rootkit
Spyware
Rootkit
8. What is the primary distinguishing characteristic between a worm and a logic bomb?
Incidental damage to resources
Masquerades as a useful program
Self replication
Spreads via email
Self-replication
9. What is another name for a logic bomb?
Asynchronous attack
Trojan horse
Pseudo-flaw
DNS poisoning
Asynchronous Attack
10. Which of the following statements about the use of antivirus software is correct?
-Antivirus software should be configured to download updated virus definition files as soon as they become available.
-Once installed, antivirus software needs to be updated on a monthly basis.
-If servers on the network have antivirus software installed, workstations do not need antivirus software installed.
-If you install antivirus software, you no longer need a firewall on your network.
Anti-virus software should be configured to download updated virus definition files as soon as they become available.
11. Your organization is formulating a bring your own device (BYOD) security policy for mobile devices. Which of the following statements should be considered as you formulate your policy?
-You can't use domain-based group policies to enforce security settings on mobile devices.
-Mobile devices are immune to malware threats.
-Anti-malware software isn't available for most mobile device operating systems.
-It is difficult for users to connect personal mobile devices to your organizations corporate network.
You can't use domain-based group policies to enforce security settings on mobile devices.
12. Which of the following is defined as a contract that prescribes the technical support or business parameters a provider will bestowed to its client?
Service level agreement
Mutual aid agreement
Final audit report
Certificate practice statement
Service level agreement (SLA)
13. HIPAA is a set of federal regulations that define security guidelines. What do HIPAA guidelines protect?
Integrity
Availability
Non-repudiation
Privacy
Privacy
14. What is a service level agreement (SLA)?
A guarantee of a specific level of service
A contract with legal entity to limit your asset loss liability
An agreement to support another company in the event of a disaster
A contract with an ISP for a specific level of bandwidth
A guarantee of a specific level of service
15. You want to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
Change management
Resource allocation
Service Level Agreement (SLA)
Acceptable use
Change management
16. What is the most effective way to improve or enforce security in any environment?
Providing user awareness training
Disabling Internet access
Requiring two-factor authentication
Enforcing account lockout
providing User awareness training
17. Change control should be used to oversee and manage changes over what aspect of an organization?
● Physical environment
● Every aspect
● Personnel and policies
● IT hardware and software
Every aspect
18. You have recently discovered that a network attack is compromised your database server. The attacker may have stolen customer credit card numbers. You have stopped the attack and implemented security measures to prevent the same incident from occurring in the future. What else might you legally be required to do?
Implement training for employees who handle personal information
Perform additional investigations to identify the attacker
Contact your customers let them know about the security breach
Delete personally identifiable information from your computers
Contact your customers to let them know of the security breach
19. What is the primary countermeasure to social engineering?
Traffic filters
A written security policy
Heavy management oversight
Employee awareness training
Employee awareness training
20. Which of the following attacks tricks victims into providing confidential information through emails or websites that impersonate an online entity that the victim trusts?
Man-in-the-middle
Phishing
Adware
Session hijacking
Phishing
21. Dumpster diving is a low-tech way to gather information that may be useful in gaining unauthorized access or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
Create a strong password policy
Secure all terminals with screensaver passwords
Mandate the use of Integrated Windows Authentication
Establish and enforce a document destruction policy
Establish and enforce a document destruction policy
22. Which of the following social engineering attacks his Voice over IP (VoIP) to gain sensitive information?
Spear phishing
Masquerading
Vishing
Taligating
Vishing
23. You are about to enter your office building through a back entrance. A man dressed as a plumber asked you to let him and so he can fix the restroom. What should you do?
-Let him in.
-Direct him to the front entrance and instruct him to check in with the receptionist.
-Tell him no and quickly close the door.
-Let them in and help them find the restroom, then let them work.
Direct him to the front entrance and instruct him to check in with the receptionist.
24. Which of the following is not an example of a physical barrier access control mechanism?
One-time passwords
Fences
Mantrap
Biometric locks
One time passwords
25. Which of the following can be used to stop piggybacking at a front entrance where employees should swipe smartcards to gain entry?
Use weight scales
Install security cameras
Use key locks rather than electronic locks
Deploy a mantrap
Deploy a mantrap
26. What is the primary benefit of CCTV?
Increase security protection throughout an environment
Reduce the need for locks and sensors on doors
Expand the area visible by security guards
Provide a corrective control
Expands the area visible by security guards
27. Which of the following is not a benefit of physical security?
Sensitive data is protected from unauthorized access
Untrained employees cannot miss-use equipment
Employee passwords are stronger
Terrorists cannot walk in off the street and change the network configuration
Employee passwords are stronger.
28. An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?
Replay
Impersonation
Social engineering
Privilege escalation
Privilege escalation
29. When/while developing a network application, a programmer adds functionality that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code in shipping the application. What type of security weakness does this represent?
Buffer overflow
Weak passwords
Privilege escalation
Backdoor
Backdoor
30. What common design feature among instant messaging clients make them less secure than other means of communicating over the Internet?
Freely available for use
Real-time communication
Peer-to-peer networking
Transfer of text and files
Peer-to-peer networking
31. What type of attack is most likely to succeed with communications between instant messaging clients?
Sniffing
DNS poisoning
Brute force password attack
Denial of service
Sniffing
32. Which of the following attacks, is successful, causes a switch to function like a hub?
Replay
ARP poisoning
MAC flooding
MAC spoofing
MAC flooding
33. Which of the following switch attacks associates the attackers MAC address with the IP address of the victims devices?
Cross-site scripting
DNS poisoning
MAC spoofing
ARP spoofing/poisoning
ARP spoofing/poisoning
34. Which is a typical goal of MAC spoofing?
Rerouting local traffic to a specified destination
Causing a switch to enter fail open mode
Causing incoming packets to broadcast to all ports
Bypassing 802.1x port-based security
Bypassing 802.1x port based security
Which of the following is an appropriate definition of a VLAN?
-A logical grouping of devices based on service need, protocol, or other criteria.
-A device used to filter WAN traffic
-A physical collection of devices that belong together and are connected to the same wire or physical switch
-A device used to route traffic between separate networks
A logical grouping of devices based on service need, protocol, or other criteria
36. Which of the following can make passwords useless on a router?
Not controlling physical access to the router
Storing the router configuration file to a secure location
Using SSH to connect to a router remotely
Using the MD5 hashing algorithm to encrypt the password
Not controlling physical access to the router
37. You often travel away from the office. While traveling, you would like to use a modem on your laptop to connect directly to a server in your office and access files. You want the connection to be as secure as possible. What type of connection will you need?
Remote access
Internet
Virtual Private Network
Intranet
Remote access
38. RADIUS is primarily used for what purpose?
-managing RAID fault-tolerant drive configurations
-Controlling entry gate access using proximity sensors
-Authenticating remote clients before access to the network is granted
-Managing access to a network over a VPN
Authenticating remote clients before access to the network is granted
39. Which of the following cloud computing solutions delivers software applications to a client either over the Internet or a local area network?
SaaS
DaaS
IaaS
Paas
SaaS
40. Which of the following is not true regarding cloud computing?
-The term cloud is used as a metaphor for the Internet
-Typical cloud computing providers deliver common business applications online that are accessed from another Web server or software like a web browser
-Cloud computing requires end users to have knowledge of the physical location and configuration of the system that delivers the services
-Cloud computing is software, data access, computation, and storage services
Cloud computing requires end users to have knowledge of the physical location and configuration of the system that delivers the services.
41. Which of the following ports does FTP use to establish sessions and manage traffic?
80, 443
20,21
135-139
25,110
20,21
42. You want to store your computer generated audit logs in case they are needed in the future for examination. Which method can you use to ensure that the logs you put in storage have not been altered when you go to use them in the future?
-Store the logs in an offsite facility
-Create a hash of each log
-Make two copies of each log and store each copy in a different location
-Encrypt the logs
Create a hash of each log
43. What does hashing of log files provide?
Preventing the system from running when the log files are full
Preventing log files from being altered or overwritten
Proof that the files have not been altered
Sequencing of files and log entries to re-create a timeline of events
Proof that the files have not been altered.
44. Which of the following government acts protects medical records and personal health information?
ACA
FACTA
HIPAA
FISMA
HIPAA
45. When you dispose of a computer or cell used hardware and it is crucial that none of the data on the hard disks can be recovered, which of the following actions can you take to ensure that no data is recoverable?
Reformat all the hard disks in the computer
Encrypt all the data on the hard disks
Delete all files from all the hard disks in the computer
Damage the hard disks so badly that all data remaining is gone
Damage the hard disc so badly that all data remaining is gone.
46. How many keys are used with asymmetric (public key) cryptography?
One
Two
Three
Four
Two
47. A receiver wants to verify the integrity of the message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver used to access the hashing value and verify the integrity of the transmission?
A receiver's public key
Sender's private key
Sender's public key
Receiver's private key
Sender's public key
48. Which aspect of a birth certificate makes it a reliable and useful mechanism for proving the identity of a person, system, or service on the Internet?
It is a trusted third - party
It is a digital mechanism, rather than a physical one.
It uses electronic signatures.
It provides ease-of-use
It is a trusted third party
49. Which standard is most widely used for certificates?
SSL v.3.0
HTTP 1.1
802.1x
X.509
X.509
50. If you perform regular backups, what must be done to ensure that you are protected against data loss?
Write protect all backup media
Restrict restoration privileges to system administrators
Store the backup media in an on-site fireproof vault
Regularly test restoration procedures
Regularly test restoration procedures