101-150 Flashcards
Which of the following protocols periodically verifies the identity of the client by using a three-way handshake?
A. CHAP
B. PAP
C. PPP
D. EAP-TLS
A
Which of the following protocols is designed to provide more secure encryption than the weak wired encryption privacy?
A. LEAP
B. TKIP
C. PEAP
D. CCMP
B
Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Each correct answer represents a complete solution. Choose all that apply.
A. WIPS
B. WLAN controller
C. Firewalls
D. WIDS
A, C, D
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?
A. Fraggle
B. Smurf
C. Bonk
D. Ping flood
C
Picture
You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domainbased network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.
Which of the following steps will you take to accomplish the task?
A. Configure phishing filter in Internet Explorer 7.0. Configure it to filter all phishing mails.
B. Remove domain names of such emails from the Safe Sender’s list.
C. Configure phishing filter in Windows Mail. Configure it to move such mails to the Junk Mail folder.
D. Add domain names of such emails in the Block Sender’s list.
C
Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?
A. L2TP
B. IPSec
C. WAP
D. WEP
D
Which of the following keys is derived from Group Master Key (GMK)?
A. Private Key
B. Group Temporal Key
C. Public Key
D. Pairwise Transient Key
B
Which of the following types of filtering allows or restricts the flow of specific types of packets to provide security?
A. Route filtering
B. MAC address filtering
C. Packet filtering
D. Ingress filtering
C
Peter works as a Network Administrator for the uCertify Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?
A. Buffer overflow attack
B. Denial-of-Service (DoS) attack
C. SQL injection attack
D. Man-in-the-middle attack
B
Which of the following is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for computers to connect and use a network service?
A. HTTP
B. SSL
C. IPSec
D. RADIUS
D
Which of the following are social engineering techniques?
Each correct answer represents a complete solution. Choose all that apply.
A. Phishing
B. Baiting
C. Pretexting
D. Salami attack
A, B, C
You work as a Network Administrator for uCertify Inc. You need to provide a secure communication between the server and the client computers of the company. Which of the following protocols will you use to manage the communication securely?
A. HTTP
B. TCP
C. TLS
D. SSL
C, D
Which of the following types of attacks is performed by Adam?
A. Man-in-the-middle attack
B. Reverse social engineering attack
C. DDoS attack that involves flooding a network or system
D. DoS attack that involves crashing a network or system
D
Which of the following components are typically required for securing a wireless 802.11 network? Each correct answer represents a complete solution. Choose all that apply.
A. Network segmentation
B. Monitoring
C. AAA
D. Data confidentiality
A, B, C, D
Which of the following is an application protocol that is used to query and modify data using directory services running over TCP/IP?
A. LDAP
B. HTTP
C. LEAP
D. RBAC
A
Which of the following encryption algorithms is used by Wired Equivalent Privacy (WEP)?
A. RSA
B. RC4
C. TKIP
D. CCMP
B
Which of the following actions will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
B. Implement the IEEE 802.1X authentication for the wireless network.
C. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.
D. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.
E. Implement the open system authentication for the wireless network.
A, B, C
Which of the following are the types of password guessing attacks? Each correct answer represents a complete solution. Choose two.
A. Password attack
B. Man-in-the-middle attack
C. Dictionary attack
D. Brute force attack
C, D
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
A. EAP-TLS
B. CHAP
C. EAP
D. PEAP
B
Which of the following policies are considered as a good starting point while designing a wireless security policy document? Each correct answer represents a complete solution. Choose all that apply.
A. Rogue AP policy
B. Functional security policy
C. Protocol policy
D. General security policy
A, B, D