101-150 Flashcards

1
Q

Which of the following protocols periodically verifies the identity of the client by using a three-way handshake?

A. CHAP

B. PAP

C. PPP

D. EAP-TLS

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following protocols is designed to provide more secure encryption than the weak wired encryption privacy?

A. LEAP

B. TKIP

C. PEAP

D. CCMP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are the security measures that are needed to maintain the security of wireless LAN?

Each correct answer represents a complete solution. Choose all that apply.

A. WIPS

B. WLAN controller

C. Firewalls

D. WIDS

A

A, C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

A. Fraggle

B. Smurf

C. Bonk

D. Ping flood

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Picture

You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domainbased network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.

Which of the following steps will you take to accomplish the task?

A. Configure phishing filter in Internet Explorer 7.0. Configure it to filter all phishing mails.

B. Remove domain names of such emails from the Safe Sender’s list.

C. Configure phishing filter in Windows Mail. Configure it to move such mails to the Junk Mail folder.

D. Add domain names of such emails in the Block Sender’s list.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?

A. L2TP

B. IPSec

C. WAP

D. WEP

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following keys is derived from Group Master Key (GMK)?

A. Private Key

B. Group Temporal Key

C. Public Key

D. Pairwise Transient Key

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following types of filtering allows or restricts the flow of specific types of packets to provide security?

A. Route filtering

B. MAC address filtering

C. Packet filtering

D. Ingress filtering

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Peter works as a Network Administrator for the uCertify Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?

A. Buffer overflow attack

B. Denial-of-Service (DoS) attack

C. SQL injection attack

D. Man-in-the-middle attack

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for computers to connect and use a network service?

A. HTTP

B. SSL

C. IPSec

D. RADIUS

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are social engineering techniques?
Each correct answer represents a complete solution. Choose all that apply.

A. Phishing

B. Baiting

C. Pretexting

D. Salami attack

A

A, B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You work as a Network Administrator for uCertify Inc. You need to provide a secure communication between the server and the client computers of the company. Which of the following protocols will you use to manage the communication securely?

A. HTTP

B. TCP

C. TLS

D. SSL

A

C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following types of attacks is performed by Adam?

A. Man-in-the-middle attack

B. Reverse social engineering attack

C. DDoS attack that involves flooding a network or system

D. DoS attack that involves crashing a network or system

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following components are typically required for securing a wireless 802.11 network? Each correct answer represents a complete solution. Choose all that apply.

A. Network segmentation

B. Monitoring

C. AAA

D. Data confidentiality

A

A, B, C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an application protocol that is used to query and modify data using directory services running over TCP/IP?

A. LDAP

B. HTTP

C. LEAP

D. RBAC

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following encryption algorithms is used by Wired Equivalent Privacy (WEP)?

A. RSA

B. RC4

C. TKIP

D. CCMP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following actions will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.

B. Implement the IEEE 802.1X authentication for the wireless network.

C. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

D. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.

E. Implement the open system authentication for the wireless network.

A

A, B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following are the types of password guessing attacks? Each correct answer represents a complete solution. Choose two.

A. Password attack

B. Man-in-the-middle attack

C. Dictionary attack

D. Brute force attack

A

C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

A. EAP-TLS

B. CHAP

C. EAP

D. PEAP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following policies are considered as a good starting point while designing a wireless security policy document? Each correct answer represents a complete solution. Choose all that apply.

A. Rogue AP policy

B. Functional security policy

C. Protocol policy

D. General security policy

A

A, B, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following are important characteristics of VPNs?

Each correct answer represents a complete solution. Choose all that apply.

A. Encapsulation

B. Authentication

C. Encryption

D. Data integrity

A

A, B, C, D

22
Q

Which of the following is a computer network that is layered on top of an underlying computer network?

A. WLAN

B. RSN

C. VPN

D. TSN

A

C

23
Q

Which of the following attacks on wireless LAN is performed to shut down the wireless network?

A. Active attack

B. Man-in-the-middle attack

C. Passive attack

D. Jamming attack

A

D

24
Q

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel?

Each correct answer represents a complete solution. Choose two.

A. RC4

B. AES

C. MS-CHAP v2

D. GTC

A

C, D

25
Q

Which of the following are NOT steps in securing your wireless connection? Each correct answer represents a complete solution. Choose two.

A. Using either WEP or WPA encryption

B. Strong password policies on workstations.

C. MAC filtering on the router

D. Not broadcasting SSID

E. Hardening the server OS

A

B, E

26
Q

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?

A. Replay attack

B. Spoofing

C. Phishing

D. Password guessing attack

A

C

27
Q

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?

A. Implement a dynamic NAT.

B. Implement an ACL.

C. Implement a WIPS.

D. Implement a firewall.

A

C

28
Q

Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?

Each correct answer represents a complete solution. Choose all that apply.

A. Pairwise Master Key (PMK)

B. Group Master Key (GMK)

C. Pairwise Transient Key (PTK)

D. Group Temporal Key (GTK)

A

A, B, C, D

29
Q

You work as a network administrator for Web Perfect Inc. You configure both WPA and EAP authentications on a client computer in the company’s wireless network. Where will the encryption key be located during the active user session? Each correct answer represents a part of the solution. Choose two.

A. On the AP

B. On the controller

C. Shared with all clients in the network

D. On the client

A

A, D

30
Q

Which of the following protocols are used to secure a VPN connection? Each correct answer represents a complete solution. Choose all that apply.

A. IPSec

B. TLS

C. SSL

D. L2TP

A

A, D

31
Q

Which of the following attacks come under the category of layer 2 Denial-of-Service attacks? Each correct answer represents a complete solution. Choose all that apply.

A. RF jamming attack

B. Password cracking

C. Spoofing attack

D. SYN flood attack

A

C, D

32
Q

Which of the following provides the best protection against a man-in-the-middle attack?

A. Strong password

B. Firewall

C. Strong encryption

D. Fiber-optic cable

A

C

33
Q

Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?

A. WLAN controller

B. Spectrum analyzer

C. Protocol analyzer

D. WIPS

A

D

34
Q

Which of the following encryption methods uses AES technology?

A. Dynamic WEP

B. Static WEP

C. CCMP

D. TKIP

A

C

35
Q

You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following would be the most help against Denial of Service (DOS) attacks?

A. Honey pot

B. Network surveys.

C. Packet filtering firewall

D. Stateful Packet Inspection (SPI) firewall

A

D

36
Q

Which of the following would be the most help against Denial of Service (DOS) attacks?

A. Honey pot

B. Network surveys.

C. Packet filtering firewall

D. Stateful Packet Inspection (SPI) firewall

A

D

37
Q

Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

A. Pairwise Master Key

B. Group Temporal Key

C. Private Key

D. Pairwise Transient Key

A

A

38
Q

Which of the following types of attacks come under the category of hacker attacks? Each correct answer represents a complete solution. Choose all that apply.

A. Password cracking

B. Smurf

C. IP address spoofing

D. Teardrop

A

A, C

39
Q

Which of the following keys are used by the public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose all that apply.

A. Group Temporal Key

B. Private Key

C. Pairwise Transient Key

D. Public Key

A

B, D

40
Q

Which of the following is designed to detect bit-flipping and forgery attacks that are used against WEP?

A. Cyclic redundancy check (CRC)

B. Initialization vector (IV)

C. Message authentication code (MAC)

D. Message integrity code (MIC)

A

D

41
Q

Which of the following are software applications designed to track a user’s personal information with the intent to pass it on to third parties without the user’s permission?

Each correct answer represents a complete solution. Choose all that apply.

A. Stealware

B. Adware

C. Spyware

D. Zombie

A

B, C

42
Q

You work as a Network Administrator for Tech Perfect Inc. The company has a secure wireless network. Since the company’s wireless network is so dynamic, it requires regular auditing to maintain proper security. For this reason, you are configuring NetStumbler as a wireless auditing tool. What services can NetStumbler provide? Each correct answer represents a complete solution. Choose all that apply.

A. Detection of causes of wireless interference

B. Verification of network configurations

C. Detection of unauthorized (“rogue”) access points

D. Capturing and decoding of packets

A

A, B, C

43
Q

A Cisco Unified Wireless Network has an access point (AP) that provides a single point of management and reduces the security concern of a stolen access point. Which type of access point has this characteristic?

A. Rouge AP

B. Autonomous AP

C. Lightweight AP

D. LWAPP

A

C

44
Q

Which of the following is a type of malware that is secretly installed on the user’s personal computer and collects users’ information without their knowledge?

A. Worm

B. Virus

C. Spyware

D. Adware

A

C

45
Q

Which of the following features of a switch helps to protect network from MAC flood and MAC spoofing?

A. Port security

B. Quality of Service (QoS)

C. Multi-Authentication

D. MAC Authentication Bypass

A

A

46
Q

Which of the following protocols uses separate control and data connections between the client and server applications?

A. HTTP

B. FTP

C. SMTP

D. SCP

A

B

47
Q

Which of the following are attacks/techniques related to Wired Equivalent Privacy (WEP)?

Each correct answer represents a complete solution. Choose all that apply.

A. Bit-flipping attack

B. Phishing

C. Weak key

D. Baiting

A

A, C

48
Q

Which of the following are secure infrastructure management protocols used in WLAN?

Each correct answer represents a complete solution. Choose all that apply.

A. SNMPv3

B. Telnet

C. SCP

D. HTTPS

A

A, C, D

49
Q

Which of the following is an intermediate network similar to RSN that supports legacy security such as WEP within the same BSS?

A. WPA2

B. VPN

C. WPA

D. TSN

A

D

50
Q

Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?

A. PKI

B. DES

C. WAP

D. WEP

A

D