Identify the letter of the choice that best completes the statement or answers the question




НазваниеIdentify the letter of the choice that best completes the statement or answers the question
страница4/7
Дата конвертации30.10.2012
Размер0.79 Mb.
ТипДокументы
1   2   3   4   5   6   7

CCIS2400 (Security Essentials) Chapter 7 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. Until the development of the World Wide Web and _____ the Internet was primarily used for transferring files from one device to another.

a.

FTP

c.

HTML

b.

HTTP

d.

NNTP



____ 2. Jasson wants to ensure that all files being accessed from his FTP site are encrypted during transmission. What should he use to provide this level of security?

a.

SSL

c.

DES

b.

FTPS

d.

TLS



____ 3. The main reason that tunneling is used today is to _____.

a.

allow networks based on different protocols to communicate

b.

provide high speed connections

c.

provide security

d.

reduce the number of protocols needed to communicate



____ 4. Which of the following attributes can be locked down by remote access policies?

a.

Called-Station-ID

d.

Both a and b

b.

Caller-Station-ID

e.

a, b, and c

c.

Client-IP-Address



____ 5. George works for an ISP and needs to configure an NAS to support PPTP. What port does he need to open tunneling to function properly?

a.

423

c.

1701

b.

1024

d.

1723



____ 6. In the 802.1x protocol, the authentication server is typically a _____ server.

a.

RADIUS

c.

SSH

b.

TACACS

d.

NAS



____ 7. Secure Sockets Layer (SSL)/Transport Layer Security (TLS) operate at the _____ layer.

a.

Transport

c.

Application

b.

Session

d.

Network



____ 8. IPSec _____ mode encrypts only the data portion (payload) of each packet, yet leaves the header unencrypted.

a.

tunnel

c.

transport

b.

secure

d.

standard



____ 9. An endpoint can be software on a local computer, a dedicated hardware device such as a VPN _____ which aggregates hundreds or thousands of multiple connections together, or even a firewall.

a.

demultiplexor

c.

multiplexor

b.

concentrator

d.

sequencer



____ 10. _____ makes it possible for almost any application running on virtually any computer platform to obtain directory information, such as e-mail addresses and keys.

a.

X.500

c.

DCE

b.

DAP

d.

LDAP



____ 11. A WAP cell phone runs a tiny browser program called a microbrowser that uses _____ instead of HTML.

a.

WML

c.

WTML

b.

WHML

d.

WTTP



____ 12. The _____ standard defines a LAN that provides cable-free data access at a rate up to 2 Mbps for clients that are either mobile or in a fixed location.

a.

802.6

c.

802.11b

b.

802.11

d.

802.15



____ 13. A security vulnerability of SSID _____ is that it also provides the SSID to unauthorized users who pick up the signal.

a.

broadcasting

c.

beaconing

b.

relaying

d.

flooding



____ 14. _____ is an optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents.

a.

WEP

c.

WOL

b.

WTLS

d.

WSecure



____ 15. A serious vulnerability in WEP is that the _____ is not properly implemented.

a.

interrupt vector

c.

encryption

b.

CRC

d.

initialization vector



____ 16. Wi-Fi _____ Access is a secure WLAN solution crafted by the WECA in late 2002 as an interim solution until a permanent wireless security standard could be implemented.

a.

Protected

c.

Restricted

b.

Secured

d.

Controlled



____ 17. Which of these cannot be used to access files on an FTP server?

a.

web browser

c.

command line

b.

FTP client

d.

LPTP server



____ 18. Another name for anonymous FTP is __________________ FTP.

a.

blind

c.

freenet

b.

free-user

d.

unannounced



____ 19. The most widely-deployed tunneling protocol is __________________.

a.

L2TP

c.

PPP

b.

RADIUS

d.

PPTP



____ 20. Which of these is NOT an authentication technology?

a.

IEEE 802.11b

c.

TACACS+

b.

RADIUS

d.

IEEE 802.1x



CCIS2400 (Security Essentials) Chapter 6 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. Why is software so prone to attack?

a.

because of the number of tasks that software must perform

b.

extensibility

c.

connectivity

d.

all of the above



____ 2. Developer Ray Tomlinson sent the first e-mail message in _____.

a.

1967

c.

1974

b.

1971

d.

1980



____ 3. According to Jupiter Research, currently, the average user in an organization receives 81 e-mails and sends _____ e-mail messages daily.

a.

15

c.

30

b.

20

d.

81



____ 4. After _____ days, most sendmail configurations stop attempting to send a message that is having problems reaching its destination.

a.

3

c.

5

b.

4

d.

6



____ 5. What is the most current version of Internet Mail Access Protocol?

a.

IMAP1

c.

IMAP3

b.

IMAP2

d.

IMAP4



____ 6. The typical process for converting nontext documents into a text format is for three bytes from the binary file to be extracted and converted to _____ text characters.

a.

two

c.

twelve

b.

four

d.

sixteen



____ 7. The _____ worm, used a known security hole in Microsoft Outlook and Internet Explorer to insert a script file into the Windows operating system.

a.

VBS.BubbleBoy

c.

W32.Klez

b.

Nimda

d.

Code Red



____ 8. A file with the _____ extension is a Microsoft Access project.

a.

.bat

c.

.usf

b.

.mde

d.

.ade



____ 9. Based on the CAN-SPAM law, which of the following types of e-mail is legal?

a.

Sending e-mail to addresses that have been harvested from Web sites or randomly generated

b.

Sending sexually oriented e-mail without an identifying subject line

c.

Unsolicited commercial e-mail that contains accurate contact information for the sender

d.

Fraudulent or deceptive subject lines, headers, or e-mail addresses



____ 10. Adrian, the network administrator for M-Tel wants to ensure that all e-mail sent within his organization are protected as they are being transported. What encryption schemes can he use to do this?

a.

PGP

d.

both a and b

b.

S/MIME

e.

a, b, and c

c.

Kerberos



____ 11. What S/MIME feature uses digital signatures to determine whether a message was altered after it was sent?

a.

Interoperability

c.

Tamper detection

b.

Message privacy

d.

Seamless integration



____ 12. PGP uses a _____ to encrypt the private key on the local computer.

a.

random hash

c.

password

b.

passphrase

d.

session key



____ 13. _____ are often examined by law enforcement personnel when they are attempting to identify the Web sites that a criminal suspect has been viewing.

a.

Scripts

c.

Cookies

b.

Java applets

d.

Log files



____ 14. CGI security can be enhanced by _____.

a.

properly configuring CGI

b.

disabling any CGI scripts or programs that are unnecessary

c.

checking program code that uses CGI for any vulnerabilities

d.

all of the above



____ 15. _____ is a protocol that guarantees privacy and data integrity between applications communicating over the Internet.

a.

SSL

c.

TLS

b.

PCT

d.

HTTPS



____ 16. HTTPS uses port _____ instead of port 80, as with HTTP.

a.

23

c.

110

b.

25

d.

443



____ 17. Which of these is NOT a reason that software is susceptible to attack?

a.

cot

c.

extensibility

b.

length & complexity

d.

connectivity



____ 18. Which protocol handles outgoing e-mail?

a.

SMTP

c.

IMAP

b.

POP

d.

S/MIME



____ 19. Which of these attacks cannot be launched using e-mail?

a.

man-in-the-middle

c.

worm

b.

virus

d.

trojan horse



____ 20. Which of these protocol cannot be used to concrypt Internet traffic?

a.

SSL

c.

FORTEZZA

b.

PCT

d.

CGI


1   2   3   4   5   6   7

Похожие:

Identify the letter of the choice that best completes the statement or answers the question iconSection 1 Analytic Question Answers

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers to questions not answered at Mayor’s Question Time on

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers arising from the Plenary Assembly Question and Answer Session with Transport for London

Identify the letter of the choice that best completes the statement or answers the question iconNo fee of any kind may be charged for the material; all copied material must clearly identify its source and contain the statement on copyright shown below

Identify the letter of the choice that best completes the statement or answers the question iconFinancial statements Income statement Balance sheet Statement of cash flows Statement of changes in equity Notes to and forming part of the financial report

Identify the letter of the choice that best completes the statement or answers the question iconAppendix 1 London Assembly (Mayor’s Question Time) 12 December 2007 Transcript – Question and Answer Session

Identify the letter of the choice that best completes the statement or answers the question iconPhil265/Rels265 Final Exam 31 Multiple choice or True-False worth 1 mark each 3 Short Answer Questions from choice of 5 worth 3 marks each (paragraph or two in length) Introduction to Philosophy

Identify the letter of the choice that best completes the statement or answers the question iconThe Very Handy Manual: How to Catch and Identify Bees

Identify the letter of the choice that best completes the statement or answers the question icon20 Answers

Identify the letter of the choice that best completes the statement or answers the question iconLetter from the President


Разместите кнопку на своём сайте:
lib.convdocs.org


База данных защищена авторским правом ©lib.convdocs.org 2012
обратиться к администрации
lib.convdocs.org
Главная страница