Assessment Test

  1. Jim wants to place a device in the network demilitarized zone that may be broken into by an attacker so that he can evaluate the strategies that hackers are using on his systems. Which of the following best describes what he would use?

    A. Honeypot

    B. Decoy system

    C. Honeybucket

    D. Spoofing system

  2. Frank calls you from the Los Angeles office to inform you of an attack he has discovered. Due to a vulnerability in an application, an attacker has the ability to intervene in a communications session by inserting a computer between the two participants. To each participant, the attacker appears to be the other participant. Which of the following best describes this type of attack?

    A. Man-in-the-middle attack

    B. DNS hijacking

    C. Trojan worm

    D. Backdoor attack

  3. Susan has been alerted that applications on the network are executing very slowly. Which type of attack uses more than one computer to attack network devices with a result of slowing the network down?

    A. DoS

    B. DDoS

    C. Worm

    D. TCP/IP attack

  4. Sam has determined that there are social engineering attacks happening in his company. What is the most effective means of protecting against social engineering attacks?

    A. Stateful inspection firewalls

    B. Trusted certificate lists

    C. Rule-based access control

    D. User education

  5. Aeroflight Instrument Company has just completed a risk assessment. It has implemented a complete risk management program. What is the primary goal of risk management?

    A. Reduce risk to an acceptable level.

    B. Remove all risks from an environment.

    C. Minimize security cost expenditures.

    D. Assign responsibilities to job roles.

  6. Which of the following best describes the use of passwords for access control?

    A. Authentication

    B. Authorization

    C. Auditing

    D. Identification

  7. Francine is director of accounting for Infosure Systems Corporation. She is proposing that the company start moving some the accounting applications to a cloud provider. She wants them to be accessible from various client devices through either a thin client interface, such as a web browser, or a program interface. Which cloud service model would best fit this description?

    A. BaaS

    B. IaaS

    C. PaaS

    D. SaaS

  8. Ken's boss is asking him what ARO stands for in regard to risk. What should he reply?

    A. Automatic review of operations

    B. Acceptable rate of output

    C. Authorized reduction of options

    D. Annualized rate of occurrence

  9. As a defense contractor, Juan's company must comply with strict access control regulations. Juan's supervisor tells him to implement an access control based on the company's users' physical characteristics. Under which type of access security would hand scanning and retina scanning fall?

    A. CHAP

    B. Multi-factor

    C. Biometrics

    D. Token

  10. What type of hardware device can be used to filter network traffic based upon an IP address?

    A. Firewall

    B. Bridge

    C. IP gateway

    D. Router

Answers to Assessment Test

  1. A. Honeypots are systems that allow investigators to evaluate and analyze the attack strategies used by attackers. A honeypot is a hardened system that is placed in a demilitarized zone and is intended to be sacrificed to gain knowledge or simply to distract attackers. A demilitarized zone is usually created between two firewalls and provides access to servers and other devices from the untrusted external network while protecting the internal enterprise network. Complete networks can be simulated in a single honeypot server, with fake data traffic as well as simulated databases.
  2. A. A man-in-the-middle attack attempts to fool both ends of a communications session into believing the system in the middle is actually the other end.
  3. B. A distributed denial of service (DDoS) attack uses multiple computer systems to attack a server or host in the network.
  4. D. User education is the most effective means of protecting against social engineering attacks.
  5. A. The primary goal of risk management is to reduce risk to an acceptable level.
  6. A. Passwords are the most common form of authentication.
  7. D. With the Software as a Service (SaaS) model, applications are accessible from various client devices through a thin client interface, a web browser, or an API.
  8. D. ARO stands for annualized rate of occurrence, which is the number of times an event might occur during the period of a year, drawn on historical data. This is used when calculating the cost of the loss of an asset due to a successful attack.
  9. C. A biometric control is any access control method based on a user's physical characteristics.
  10. A. A firewall is added to a network to filter traffic and secure the infrastructure. Firewalls are used to protect networks from each other, most specifically an internal trusted network from an external untrusted network such as the Internet. Firewalls filter on a number of traffic attributes, including IP address, destination and source address, and port address.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.167.195