Assessment Test

  1. Which type of audit can be used to determine whether accounts have been established properly and verify that privilege creep isn't occurring?

    1. Privilege audit

    2. Usage audit

    3. Escalation audit

    4. Report audit

  2. What kind of physical access device restricts access to a small number of individuals at one time?

    1. Checkpoint

    2. Perimeter security

    3. Security zones

    4. Mantrap

  3. Which of the following is a set of voluntary standards governing encryption?

    1. PKI

    2. PKCS

    3. ISA

    4. SSL

  4. Which protocol is used to create a secure environment in a wireless network?

    1. WAP

    2. WEP

    3. WTLS

    4. WML

  5. An Internet server interfaces with TCP/IP at which layer of the DOD model?

    1. Transport layer

    2. Network layer

    3. Process layer

    4. Internet layer

  6. You want to establish a network connection between two LANs using the Internet. Which technology would best accomplish that for you?

    1. IPSec

    2. L2TP

    3. PPP

    4. SLIP

  7. Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?

    1. DMZ

    2. VLAN

    3. I&A

    4. Router

  8. In the key recovery process, which key must be recoverable?

    1. Rollover key

    2. Secret key

    3. Previous key

    4. Escrow key

  9. Which kind of attack is designed to overload a particular protocol or service?

    1. Spoofing

    2. Back door

    3. Man in the middle

    4. Flood

  10. Which component of an IDS collects data?

    1. Data source

    2. Sensor

    3. Event

    4. Analyzer

  11. What is the process of making an operating system secure from attack called?

    1. Hardening

    2. Tuning

    3. Sealing

    4. Locking down

  12. The integrity objective addresses which characteristic of information security?

    1. Verification that information is accurate

    2. Verification that ethics are properly maintained

    3. Establishment of clear access control of data

    4. Verification that data is kept private and secure

  13. Which mechanism is used by PKI to allow immediate verification of a certificate's validity?

    1. CRL

    2. MD5

    3. SSHA

    4. OCSP

  14. Which of the following is the equivalent of a VLAN from a physical security perspective?

    1. Perimeter security

    2. Partitioning

    3. Security zones

    4. Physical barrier

  15. A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was called account.doc. The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?

    1. Your user inadvertently downloaded a virus using IM.

    2. Your user may have a defective hard drive.

    3. Your user is hallucinating and should increase his medication.

    4. The system is suffering from power surges.

  16. Which mechanism or process is used to enable or disable access to a network resource based on an IP address?

    1. NDS

    2. ACL

    3. Hardening

    4. Port blocking

  17. Which of the following would provide additional security to an Internet web server?

    1. Changing the port address to 80.

    2. Changing the port address to 1019.

    3. Adding a firewall to block port 80.

    4. Web servers can't be secured.

  18. What type of program exists primarily to propagate and spread itself to other systems?

    1. Virus

    2. Trojan horse

    3. Logic bomb

    4. Worm

  19. An individual presents herself at your office claiming to be a service technician. She wants to discuss your current server configuration. This may be an example of what type of attack?

    1. Social engineering

    2. Access control

    3. Perimeter screening

    4. Behavioral engineering

  20. Which of the following is a major security problem with FTP servers?

    1. Password files are stored in an unsecure area on disk.

    2. Memory traces can corrupt file access.

    3. User IDs and passwords are unencrypted.

    4. FTP sites are unregistered.

  21. Which system would you install to provide active protection and notification of security problems in a network connected to the Internet?

    1. IDS

    2. Network monitoring

    3. Router

    4. VPN

  22. The process of verifying the steps taken to maintain the integrity of evidence is called what?

    1. Security investigation

    2. Chain of custody

    3. Three A's of investigation

    4. Security policy

  23. What encryption process uses one message to hide another?

    1. Steganography

    2. Hashing

    3. MDA

    4. Cryptointelligence

  24. Which policy dictates how computers are used in an organization?

    1. Security policy

    2. User policy

    3. Use policy

    4. Enforcement policy

  25. Which algorithm is used to create a temporary secure session for the exchange of key information?

    1. KDC

    2. KEA

    3. SSL

    4. RSA

  26. You've been hired as a security consultant for a company that's beginning to implement handheld devices, such as PDAs. You're told that the company must use an asymmetric system. Which security standard would you recommend it implement?

    1. ECC

    2. PKI

    3. SHA

    4. MD

  27. Which of the following backup methods will generally provide the fastest backup times?

    1. Full backup

    2. Incremental backup

    3. Differential backup

    4. Archival backup

  28. You want to grant access to network resources based on authenticating an individual's retina during a scan. Which security method uses a physical characteristic as a method of determining identity?

    1. Smart card

    2. I&A

    3. Biometrics

    4. CHAP

  29. Which access control method is primarily concerned with the role that individuals have in the organization?

    1. MAC

    2. DAC

    3. RBAC

    4. STAC

  30. The process of investigating a computer system for clues into an event is called what?

    1. Computer forensics

    2. Virus scanning

    3. Security policy

    4. Evidence gathering

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.117.2