Вы находитесь на странице: 1из 9

1. A hacker sends an e-mail message to everyone at your company.

In the e-mail he alerts employees to a change in the health benefits Web site and requests users to follow a link to the new site, which, in fact, will capture the users private information. What security-threatening strategy is the hacker attempting? A) Phishing B) Denial-of-service attack C) Man-in-the-middle attack D) Brute force attack Points Earned: 0.0/1.0

Correct Answer(s): A

2. You work for a retailer that sells household goods online. The company has decided to redesign its network for better security. Included in this redesign is the addition of a new firewall. Assuming the firewall is placed between the Internet connection and the Web server, which of the following should be included in the firewall's configuration so that customers can still reach the Web site? A) Allow incoming UDP-based transmissions to port 23 B) Allow outgoing TCP-based transmissions to port 88 C) Allow incoming TCP-based transmissions to port 80 D) Allow outgoing UDP-based transmissions to port 1024 Points Earned: 1.0/1.0

Correct Answer(s): C

3. Which of the following is the most secure password?

A) 12345ABC B) dolphins C) !t1z0GS557x^^L D) A1B2C3 Points Earned: 1.0/1.0

Correct Answer(s): C

4. If you upgrade a 24-port hub that serves one of your organization's workgroups to a 24-port switch for better performance, how have you also improved security? A) You have caused all transmissions between clients in that workgroup and the rest of the network to be encrypted B) You have prevented the possibility for someone to spoof the IP address of a workgroup client and connect to the network backbone via the switch C) You have caused the IP addresses in packets issued by every node connected to the switch to be replaced with generic IP addresses D) You have prevented the possibility of one client eavesdropping on the transmission issued by another client connected to the switch Points Earned: 1.0/1.0

Correct Answer(s): D

5. You are alerted that suddenly 100% of the resources on your two core routers are being used and no legitimate traffic can travel into or out of your network. What kind of security attack are you most likely experiencing?

A) Denial-of-service attack B) Brute force attack C) Flashing D) IP Spoofing Points Earned: 1.0/1.0

Correct Answer(s): A

6. What type of device guards against an attack in which a hacker modifies the IP source address in the packets she's issuing so that the transmission appears to belong to your network? A) Packet-filtering firewall B) Proxy server C) NAT gateway D) Router Points Earned: 1.0/1.0

Correct Answer(s): B

7. Which of the following devices can improve performance for certain applications, in addition to enhancing network security? A) Packet-filtering firewall B) Proxy server C) NAT gateway D) Router

Points Earned:

1.0/1.0

Correct Answer(s): B

8. Which of the following can automatically detect and deny network access to a host whose traffic patterns appear suspicious? A) Router B) NAT gateway C) Proxy server D) IPS Points Earned: 1.0/1.0

Correct Answer(s): D

9. Which of the following encryption methods provides the best security for data traveling over VPN connections? A) PPTP B) L2TP C) IPSec D) SLIP Points Earned: 1.0/1.0

Correct Answer(s): C

10. Which of the following criteria could a routers ACL use for denying packets access to a private network? A) Source IP address B) Authentication header C) RTT D) Source MAC address Points Earned: 1.0/1.0

Correct Answer(s): A

11. Which of the following NOS logon restrictions is most likely to stop a hacker who is attempting to discover someone's password through a brute force or dictionary attack? A) Total time logged n B) Time of day C) Period of time after which a password expires D) Number of unsuccessful logon attempts Points Earned: 1.0/1.0

Correct Answer(s): D

12. If a firewall does nothing more than filter packets, at what layer of the OSI model does it operate?

A) Transport B) Network C) Data Link D) Session Points Earned: 1.0/1.0

Correct Answer(s): B

13. If you are entering your account number and password in a Web form to gain access to your stock portfolio online, which of the following encryption methods are you most likely using? A) SSL B) PGP C) SSH D) Kerberos Points Earned: 1.0/1.0

Correct Answer(s): A

14. Which of the following encryption techniques is incorporated into IP version 6? A) SSH B) SSL C) Kerberos D) IPSec

Points Earned:

1.0/1.0

Correct Answer(s): D

15. Which of the following is one reason WEP is less secure than 802.11i? A) WEP is only capable of 16-bit keys, whereas 802.11i can use keys up to 128 bits long. B) WEP uses the same key for authentication and encryption every time a client connects, whereas 802.11i assigns keys dynamically to each transmission C) WEP uses only one encryption method, whereas 802.11i combines two encryption methods for data in transit D) WEP does not require clients to specify an SSID, whereas 802.11i requires clients to specify an SSID plus a user name and password for the networks access server Points Earned: 1.0/1.0

Correct Answer(s): B

16. Using a 20-bit key is how many times more secure than using an 18-bit key? A) Two times B) Three times C) Four times D) Eight times Points Earned: 1.0/1.0

Correct Answer(s): C

17. Which of the following is an example of private key encryption? A) PGP B) SSL C) Kerberos D) HTTPS Points Earned: 1.0/1.0

Correct Answer(s): C

18. You are designing an 802.11g wireless network for a local caf. You want the wireless network to be available to the caf's customers, but not to anyone with a wireless NIC who happens to be in the vicinity. Which of the following security measures require customers to enter a network key to gain access to your network via the access point? A) SSL B) RADIUS C) TLS D) WEP Points Earned: 1.0/1.0

Correct Answer(s): D

19. Which of the following requires port-based authentication?

A) Kerberos B) RADIUS C) WEP D) WPA Points Earned: 1.0/1.0

Correct Answer(s): B

20. Which of the following plays a crucial role in the public key infrastructure? A) IDS B) Certificate authority C) VPN concentrator D) PGP Points Earned: 1.0/1.0

Correct Answer(s): B

Вам также может понравиться