Comprehensive Security Solutions Flashcards

1
Q
What separates the authentication and authorization process into three operations? 
A. XTACACS 
B. TACACS+ 
C. TACACS 
D. RADIUS
A

B. TACACS+ has added functionality and has extended attribute control and accounting processes. TACACS+ also separates the authentication and authorization process into three processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is proprietary to Cisco? 
A. XTACACS 
B. DIAMETER 
C. TACACS 
D. RADIUS
A

A. XTACACS is proprietary to Cisco.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following designs uses one packet filtering router between a trusted and untrusted network? 
A. Screened host 
B. Screened subnet 
C. Dual-homed gateway 
D. Single-tier packet filter
A

D. A single-tier packet filter design has one packet-filtering router installed between the trusted and untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following correctly represents a broadcast physical address? 
A. 00 00 0C 34 44 01 01 
B. 00 00 FF FF FF 
C. FF FF FF FF FF FF 
D. 01 00 0C 34 44 01
A

C. Broadcast MAC addresses appear as FF FF FF FF FF FF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
You have been asked to examine some network traffic with Wireshark and have noticed that some traffic is addressed to 224.3.9.5. What class of address is this? 
A. Class C 
B. Class D 
C. Class B 
D. Class A
A

B. An address of 224.3.9.5 is class D, or multicast, traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have been scanning a network and have found TCP 53 open. What might you conclude from this? A. DNS is configured for lookups.
B. A DNS zone transfer might be possible.
C. DNSSEC has been configured.
D. SMTP is being used.

A

B. DNS uses UDP port 53 for DNS queries and TCP port 53 for zone transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
You have just scanned your network and found UDP port 123. What service makes use of this port? 
A. Portmapper 
B. NTP 
C. Finger 
D. LDAP
A

B. Port 123 is used by NTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is not offered by Kerberos for Windows users? 
A. Interoperability 
B. Nondelegated authentication 
C. Mutual authentication 
D. Simplified trust management
A

B. Kerberos offers Windows users faster connections, mutual authentication, delegated authentication, simplified trust management, and interoperability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
LDAPS provides for security by making use of which one of the following? 
A. DES 
B. SSL 
C. SET 
D. PGP
A

B. LDAPS provides for security by using SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
DNSSEC does not protect against which of the following? 
A. Masquerading 
B. Domain spoofing 
C. Domain kiting 
D. Signature verification
A

C. DNSSEC does not protect against domain kiting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which DNS record holds zone replication TTL information? 
A. PTR 
B. NS 
C. MX 
D. SOA
A

D. The SOA record holds zone replication TTL information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which version of SNMP provides built-in security? A. Version C
B. Version B
C. Version 2
D. Version 3

A

D. Version 3 is more secure than previous versions of SNMP and offers encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
While using Wireshark, you have captured traffic on UDP port 69. What service or application might this be? 
A. FTP 
B. Finger 
C. SSH 
D. CTFTP
A

D. TFTP uses port 69 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is not a valid UPD header field? 
A. Source port 
B. Length 
C. Checksum 
D. Flag
A

D. UDP is composed of four fields: source, destination, length, and checksum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
In DNS, what is another name for an alias? 
A. MX 
B. CNAME 
C. SOA 
D. NS
A

B. The CNAME record is an alias.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
TSIG is used for what purpose? 
A. As a means of authentication updates to a Dynamic DNS database 
B. To prevent VLAN hopping 
C. As an LDAP security control 
D. To secure X.500
A

A. TSIG is used as a means of authenticating updates to a Dynamic DNS database.

17
Q

Cisco has several ways to incorporate VLAN traffic into trunking. These include which of the following? A. 802.1Q
B. 802.1x
C. 802.11
D. LDAP

A

A. Cisco has several ways to incorporate VLAN traffic into trunking, such as the IEEE’s implementation of 802.1Q and Cisco’s ISL.

18
Q
One of the big differences between IPv4 and IPv6 is the address length. IPv6 has address lengths of how many bits? 
A. 16 
B. 32 
C. 64 
D. 128
A

D. IPv6 has many improvements over IPv4; one of these is that the address space moves from 32 bits to 128 bits.

19
Q
Which of the following is an extension to Simple Object Access Protocol (SOAP) and is designed to add security to web services? 
A. WS-Security 
B. ESB 
C. LDAP 
D. SSO
A

A. WS_Security is an extension to SOAP and is designed to provide added security.

20
Q

Which of the following is not a component of VoIP? A. SIP
B. H.323
C. RTP
D. SPIT

A

D. SPIT is “Spam over Internet Telephony” and is not considered a component of VoIP.

21
Q

What are three types of security controls?
A. Preventative, Detective, and Corrective
B. Confidentiality, Integrity, Availability
C. Authorization, Integrity, Availability
D. Combustible, Metals, Liquids

A

A. The three types of security controls are preventative, detective, and corrective.

22
Q
In which of the following would a Security Analyst work? 
A. Human Resource department 
B. Logistics department 
C. Security Operations Center 
D. Accounting department
A

C. A security analyst would work in a SOC.