CSC 226 Homework Study

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following can be used to prevent a buffer overflow attack? A. DEP B. FIM C. VPN D. DNS

DEP

Which type of log can provide detailsregarding requests for specific files on a system? a. Audit log b. Event log c. Access log d. SysFile log

Event log

AES-CCMP is the encryption protocol standard used in _____. A. WPA B. WPA2 C. IEEE 802.11 D. NFC

WPA2

Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated? A. suspicious outbound connections B. IP addresses that are being rejected and dropped C. successful logins D. IP addresses that are being rejected and dropped

successful logins

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? A. Push-Button method B. PIN method C. piconet method D. NFC method

PIN method

What is the recommended secure protocol for voice and video applications? a. Secure Real-time Transport Protocol(SRTP) b. Hypertext Transport Protocol Secure(HTTPS) c. Network Time Protocol (NTP) d. Secure/Multipurpose Internet MailExtensions (S/MIME)

Secure Real-time Transport Protocol(SRTP)

Which of the following is NOT a method for strengthening a key? A) Randomness B) Cryptoperiod C) Length D) Variablity

Variablity

Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use? A. "Security and convenience are not related." B. "Convenience always outweighs security." C. "Security and convenience are inversely proportional." D. "Whenever security and convenience intersect, security always wins."

"Security and convenience are inversely proportional."

A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase? A. Controller AP B. Standalone AP C. Fat AP D. Any type of AP can be managed by a WLC.

Controller AP

What entity calls in crypto modules to perform cryptographic tasks? A. Certificate Authority (CA) B. OCSP Chain C. Intermediate CA D. Crypto service provider

Crypto service provider

Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name? a. DNS replay b. DNS masking c. DNS poisoning d. DNS forwarding

DNS poisoning

Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend? A. EAP-TLS B. EAP-TTLS C. EAP-SSL D. EAP-FAST

EAP-FAST

Why is a rogue AP a security vulnerability? A. It uses the weaker IEEE 80211i protocol. B. It conflicts with other network firewalls and can cause them to become disabled. C. It allows an attacker to bypass network security configurations. D. It requires the use of vulnerable wireless probes on all mobile devices.

It allows an attacker to bypass network security configurations.

Aideen sent an email to her supervisorexplaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email? a. It is fully supported in BIND9. b. It adds additional resource records. c. It adds message header information. d. It can prevent a DNS transfer attack.

It can prevent a DNS transfer attack.

Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP? A. It is the transport protocol used in TCP/IP for authentication B. It is a framework for transporting authentication protocols C. It is a subset of WPA2 D. It is a technology used by IEEE 802.11 for encryption

It is a framework for transporting authentication protocols

Which statement is NOT true regarding hierarchical trust models? A. It is designed for use on a large scale. B. The root signs all digital certificate authorities with a single key. C. It assigns a single hierarchy with one master CA. D. The master CA is called the root.

It is designed for use on a large scale.

Which of these is NOT correct about an SSL/TLS accelerator? A. It is a separate hardware card that inserts into a web server. B. It contains one or more co-processors to handle SSL/TLS processing. C. It can be installed as a "virtual SSL/TLS server" alongside a forward proxy server. D. It replaces FTP using Secure Sockets Layer (FTPS) as a file transport layer resting "on top" of SSL/TLS.

It replaces FTP using Secure Sockets Layer (FTPS) as a file transport layer resting "on top" of SSL/TLS.

Which of these is NOT a risk when a home wireless router is not securely configured? A. Only a small percentage of the total traffic can be encrypted. B. An attacker can steal data from any folder with file sharing enabled. C. User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker. D. Malware can be injected into a computer connected to the WLAN.

Only a small percentage of the total traffic can be encrypted.

Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs? a. Network tap b. Port mirroring c. Aggregation switch d. Correlation engine

Port mirroring

Which of the following is NOT a successive layer in which information security is achieved? A. Products B. People C. Procedures D. Purposes

Purposes

What is a difference between NFC and RFID? A. NFC is based on wireless technology while RFID is not. B. RFID is faster than NFC. C. RFID is designed for paper-based tags while NFC is not. D. NFC devices cannot pair as quickly as RFID devices.

RFID is designed for paper-based tags while NFC is not.

Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust? A. Frequency band B. Channel selection C. RFID spectrum D. Channel width

RFID spectrum

Which of these is the most secure protocol for transferring files? a. FTPS b. SFTP c. TCP d. FTP

SFTP

Which version of Simple Network Management Protocol (SNMP) is considered the most secure? a. SNMPv2 b. SNMPv3 c. SNMPv4 d.SNMPv5

SNMPv3

_____ is a protocol for securely accessing a remote computer. A. Transport Layer Security (TLS) B. Secure Shell (SSH) C. Secure Sockets Layer (SSL) D. Secure Hypertext Transport Protocol (SHTTP)

Secure Shell (SSH)

Which of the following is NOT true regarding security? A. Security is a goal. B. Security includes the necessary steps to protect from harm. C. Security is a process. D. Security is a war that must be won at all costs.

Security is a war that must be won at all costs.

_____ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity. A. Encrypted signatures B. Session keys C. Digital certificates D. Digital digests

Session keys

Which of these is considered the strongest cryptographic transport protocol? A. TLS v1.2 B. TLS v1.0 C. SSL v2.0 D. SSL v2.0

TLS v1.2

WPA replaces WEP with _____. A. WPA2 B. Temporal Key Integrity Protocol (TKIP) C. Cyclic Redundancy Check (CRC) D. Message Integrity Check (MIC)

Temporal Key Integrity Protocol (TKIP)

Which type of hypervisor does not run on an underlying operating system? A. Type I B. Type II C. Type III D. Type IV

Type I

Which of these is NOT a limitation of turning off the SSID broadcast from an AP? A. Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another. B. Some versions of operating systems favor a network that broadcasts an SSID over one that does not. C. Users can more easily roam from one WLAN to another. D. The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.

Users can more easily roam from one WLAN to another.

Which application stores the user's desktop inside a virtual machine that resides on a server and is accessible from multiple locations? A. Application cell B. Container C. VDE D. VDI

VDI

Which of the following is NOT a security concern of virtualized environments? A. Virtual machines must be protected from both the outside world and from other virtual machines on the same physical computer. B. Physical security appliances are not always designed to protect virtual systems. C. Virtual servers are less expensive than their physical counterparts. D. Live migration can immediately move one virtualized server to another hypervisor.

Virtual servers are less expensive than their physical counterparts.

Which of these is NOT a type of wireless AP probe? A. wireless device probe B. WNIC probe C. dedicated probe D. AP probe

WNIC probe

What is a race condition? A. When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers B. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences. C. When an attack finishes its operation before antivirus can complete its work. D. When a software update is distributed prior to a vulnerability being discovered.

When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

Which of these technologies is NOT found in a wireless router? A. access point B. router C. dynamic host configuration protocol (DHCP) server D. firewall

access point

Which of these is NOT part of the certificate life cycle? A. expiration B. revocation C. authorization D. creation

authorization

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered? A. captive portal B. web-based portal C. rogue portal D. authenticated portal

captive portal

A(n) _____ is a published set of rules that govern the operation of a PKI. A. signature resource guide (SRG) B. enforcement certificate (EF) C. certificate practice statement (CPS) D. certificate policy (CP)

certificate policy (CP)

The strongest technology that would assure Alice that Bob is the sender of a message is a(n) _____. A. digital signature B. encrypted signature C. digest D. digital certificate

digital certificate

The primary design of a(n) _____ is to capture the transmissions from legitimate users. A. rogue access point B. WEP C. evil twin D. Bluetooth grabber

evil twin

Public key infrastructure (PKI) _____. A. generates public/private keys automatically B. creates private key cryptography C. is the management of digital certificates D. requires the use of an RA instead of a CA

is the management of digital certificates

DNSSEC adds additional _____ and message header information, which can be used to verify that the requested data has not been altered in transmission. A. resource records B. field flags C. hash sequences D. zone transfers

resource records

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest? A. algorithm B. initialization vector (IV) C. nonce D. salt

salt

A digital certificate associates _____. A. a user's public key with his private key B. the user's identity with his public key C. a user's private key with the public key D. a private key with a digital signature

the user's identity with his public key

Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____. A. on electronic digital devices and limited analog devices that can connect via the Internet or through a local area network. B. through a long-term process that results in ultimate security. C. using both open-sourced as well as supplier-sourced hardware and software that interacts appropriately with limited resources. D. through products, people, and procedures on the devices that store, manipulate, and transmit the information.

through products, people, and procedures on the devices that store, manipulate, and transmit the information.

Digital certificates can be used for each of these EXCEPT _____. A. to verify the authenticity of the Registration Authorizer B. to encrypt channels to provide secure communication between clients and servers C. to verify the identity of clients and servers on the Web D. to encrypt messages for secure email communications

to verify the authenticity of the Registration Authorizer

Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT covered? a) default configurations b) weak configurations c) vulnerable business processes d) misconfigurations

vulnerable business processes

Which of the following ensures that only authorized parties can view protected information? A. Authorization B. Confidentiality C. Availability D. Integrity

Confidentiality

What functions of a switch does a software defined network separate? A. Host and virtual B. Control plane and physical plane C. RAM and hard drive D. Network level and resource level

Control plane and physical plane

Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection? A. Bluesnarfing B. Bluejacking C. Bluecreeping D. Bluestealing

Bluesnarfing

Which type of cloud is offered to specific organizations that have common concerns? a. Public cloud b. Hybrid cloud c. Private cloud d. Community cloud

Community cloud

Which trust model has multiple CAs, one of which acts as a facilitator? A. Bridge B. Hierarchical C. Distributed D. Web

Bridge

An entity that issues digital certificates is a _____. A. Certificate Signatory (CS) B. Digital Signer (DS) C. Certificate Authority (CA) D. Signature Authority (SA)

Certificate Authority (CA)

A centralized directory of digital certificates is called a(n) _____. A. Digital Signature Permitted Authorization (DSPA) B. Digital Signature Approval List (DSAP) C. Certificate Repository (CR) D. Authorized Digital Signature (ADS)

Certificate Repository (CR)

Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted? A. Electronic Code Book (ECB) B. Galois/Counter (GCM) C. Counter (CTR) D. Cipher Block Chaining (CBC)

Cipher Block Chaining (CBC)

Which digital certificate displays the name of the entity behind the website? A. Online Certificate Status Certificate B. Extended Validation (EV) Certificate C. Session Certificate D. X.509 Certificate

Extended Validation (EV) Certificate

Which type of device log contains the most beneficial security data? a. Firewall log b. Email log c. Switch log d. Router log

Firewall log

Which the following is NOT a reason why it is difficult to defend against today's attackers? A. Delays in security updating B. Greater sophistication of defense tools C. Increased speed of attacks D. Simplicity of attack tools

Greater sophistication of defense tools

13. Which of the following is NOT a service model in cloud computing? A. Software as a Service (SaaS) B. Hardware as a Service (HaaS) C. Platform as a Service (PaaS) D. Infrastructure as a Service (IaaS)

Hardware as a Service (HaaS)

Which of the following TCP/IP protocols do not relate to security? A) IP B) SNMP C) HTTPS D) FTP

IP

Which of the following is NOT a wireless peripheral protection option? A. Update or replacing any vulnerable device B. Switch to a more fully tested Bluetooth model C. Install a network sensor to detect an attack D. Substitute a wired device

Install a network sensor to detect an attack

What is the primary weakness of wired equivalent privacy (WEP)? A. It functions only on specific brands of APs. B. Its usage creates a detectable pattern. C. It slows down a WLAN from 104 Mbps to 16 Mbps. D. Initialization vectors (IVs) are difficult for users to manage.

Its usage creates a detectable pattern.

_____ refers to a situation in which keys are managed by a third party, such as a trusted CA. A. Key authorization B. Key escrow C. Remote key administration D. Trusted key authority

Key escrow

Which of these is a vulnerability of MAC address filtering? A. APs use IP addresses instead of MACs. B. The user must enter the MAC. C. MAC addresses are initially exchanged unencrypted. D. Not all operating systems support MACs.

MAC addresses are initially exchanged unencrypted.

Which technology is predominately used for contactless payment systems? A) Near field communication (NFC) B) Wireless local area network (WLAN) C) Bluetooth D) Radio Frequency ID (RFID)

Near field communication (NFC)

Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle? A. Virtual services B. Off-premises C. On-premises D. Hosted services

On-premises

_____ performs a real-time lookup of a digital certificate's status. A. Certificate Revocation List (CRL) B. Real-Time CA Verification (RTCAV) C. Online Certificate Status Protocol (OCSP) D. CA Registry Database (CARD)

Online Certificate Status Protocol (OCSP)


Set pelajaran terkait

Exam FX: Individual Accident & Health Insurance Policy Provisions

View Set

Elasticity & Taxation Practice Econ 102

View Set

Psychology of Adulthood & Aging Unit One

View Set

Microeconomics Midterm ch 13, 14, 15

View Set

Case Study: Bissell Brothers Escape - An entrepreneur's story

View Set