Ch 11- Self Test Flashcards

1
Q

Which best practice configures host computers so that they are not vulnerable to attack?

A

A. Vulnerability Assessment
B. Penetration test
C. Hardening
D. PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of test simulates a network attack?

A

A. Vulnerability assessment
B. Establishing an attack baseline
C. Hardening
D. Penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have been asked to harden a crucial network router. What should you do? (Choose 2)

A

A. Disable the routing of IPv6 packets
B. Change the default administrative password
C. Apply firmware patches
D. Configure the router for SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are invited to join an IT meeting where the merits and pitfalls of cloud computing are being debated. Your manager conveys her concerns of data confidentiality for cloud storage. What can be done to secure data stored in the cloud?

A

A. Encrypt the data
B. Digitally sign the data
C. Use a stream cipher
D. Change default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following works best to encrypt variable-length data?

A

A. Block cipher
B. Symmetric cipher
C. Asymmetric cipher
D. Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

With PKI, which key is used to validate a digital signature?

A

A. Private key
B. Public key
C. Secret key
D. Signing key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is related to nonrepudiation?

A

A. Block cipher
B. PKI
C. Symmetric encryption
D. Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sean configures a web application to allow content managers to upload files to the website. What type of access control model is Sean using?

A

A. DAC
B. MAC
C. RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are the administrator of a Windows network. When creating a new user account, you specify a security clearance of top secret so that the user can access classified files. What type of access control method is being used?

A

A. DAC
B. MAC
C. RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True of False. DAC is suitable for large organizations.

A

A. True

B. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly