Exam 2 Flashcards
At which part of the OSI model does the encapsulation process begin?
application
Which 2 layers of the OSI model are represented by the Link layer of the TCP/IP model?
Data Link and Physical
Which of the following represents the range of port numbers that are referred to a “well-known” port numbers?
0-1023
What is the port number for HTTP?
80
HTTPS=443
Telnet=23
POP3=110
which of the following is NOT and example of a knowledge authentication
A) password
B) mother’s maiden name
C) city of birth
D) smart card
D) smart card
which of the following statements about memory cards and smart cards is false?
A) a memory card is a swipe card that contains user authentication information
B) memory cards are also known as integrated circuit cards
C) smart cards contain memory and an embedded chip
D) smart card systems are more reliable than memory card systems
B) memory cards are not also known as integrated circuit cards smart cards are also known as integrated circuit cards
which biometric method is most effective?
A) Iris scan
B) retina scan
C) Fingerprint
D) handprint
A) Iris scan
What protocol in the TCP/IP suite resolves IP addresses and MAC addresses?
Address Revolution Protocol(ARP)
How many bits are contained in an IPv4 address?
32 bits in either binary or dotted decimal format.
IPv6 are 128 bits and in hexadecimal format.
Which of the following is a Class C address? A. 172.16.5.6 B. 192.168.5.54 C. 10.6.5.8 D. 224.6.6.6
B
Class C addresses range from 192.0.0.0-223.255.255.255
Which of the following is not a valid private IP address? A. 10.2.6.6 B. 172.15.6.6 C. 191.6.6.6 D. 223.54.5.5
A
Class A ranges from 10.0.0.0-10.255.255.255
Class B 172.16.0.0-172.31.255.255
Class C 192.168.0.0-192.168.255.255
Which service converts private IP addresses to public IP addresses? A. DHCP B. DNS C. NAT D. WEP
C, Network Address Translation
Which type of transmission uses stop and start bits? A. Asynchronous B. Unicast C. Multicast D. Synchronous
A
Which protocol encapsulates Fibre Channel frames over Ethernet networks? A. MPLS B. FCoE C. iSCSI D. VoIP
B
Fibre Channel over Ethernet
Which protocol uses port 14? A. RDP B. AFP C. IMAP D. SSH
C
Which of the following best describes NFS?
A. A file-sharing protocol
B. A directory query protocol that is based on X 500
C. An application layer protocol that is used to retrieve information from network devices
D. A client/server file-sharing protocol uses in UNIX/Linux
D
Which of the following is a multi-layer protocol that is used between components in process automation systems in electric and water companies? A. DNP3 B. VoIP C. WPA D. WPA2
A
Which wireless implementation includes MU MIMO? A. 802.11a B.802.11ac C. 802.11g D. 802.11n
B
what is a Type I error in a biometric system?
A) crossover error rate (CER)
B) false rejection rate (FRR)
C) false acceptance rate (FAR)
D) throughput rate
B) false rejection rate (FRR)
a Type 2 error is false acceptance rate (FAR)
which Access Control model is most often used by routers and firewalls to control access to network?
A) discretionary access control
B) mandatory access control
C) rule-based access control
D) role-based access control
C) rule-based access control
which thread is NOT considered a social engineering?
A) Phishing
B) Pharming
C) DoS attack
D) Dumpster diving
C) denial-of-service (DoS) attack
which of the following statements best describes an IDaaS implementation?
A) ensures that any instance of identification and Authentication to a resource is man properly
B) collects and verifies information about an individual to prove that the person who has a valid account is who he or she claims to be
C) provides a set of identity and access management functions to Target system on customers promises and/or in the cloud
D) it isn’t an SAML standard that exchanges authentication and authorization data between organizations or security domains
C) an identity as a service implementation provides a set of identity and access management functions to Target systems on customers
which of the following is an example of multi-factor Authentication?
A) username and password
B) username, retina scan, and smart card
C) retina scan and Fingerprint scan
D) smart card and security token
B) username, retina scan, and smart card
you decide to implement an access control policy that requires the user log on from a certain work stations within your Enterprise. Which type of authentication Factor are you implementing
A) knowledge factor
B) location factor
C) ownership factor
D) characteristic factor
B) Location factor
which threat is considered a password threat?
A) buffer overflow
B) sniffing
C) spoofing
D) brute-force attack
D) a brute-force attack is considered a password threat
which session management mechanisms are often used to manage dekstop sessions?
A) screensavers and timeouts
B) FIPS 201.2 and NIST SP 809-79-2
C) bollards and locks
D) KDC, THAT, and TGS
A) screensavers and timeouts
which of the following is a major disadvantage of implementing an SSO system?
A) Users are able to use stronger passwords
B) Users need to remember the login credentials for a single system
C) User and password administration are simplified
D) If a user’s credentials are comprised, attacker can access all resources
D) if a user’s credentials are compromised in a single sign-on environment at actors have access to all resources
For which of the following penetration tests does the testing team know an attack is coming but have limited knowledge of network systems and devices and only publicly available information? A. Target test B. Physical test C. Blind test D. Double-blind test
C
Which of the following is NOT a guideline according to NIST SP 800-92?
A. Organization should establish policies and procedures for log management
B. Organizations should create and maintain a log management infrastructure
C. Organizations should prioritize log management appropriately throughout the organization
D. Choose auditors with security experience
D
According to NIST SP 800-92, which of the following are facts of log management infrastructure?(Choose all that apply)
A. General function(log parsing, event filtering, and event aggregation)
B. Storage(log rotation, log archival, log reduction, log conversion, log normalization, and log integrity checking)
C. Log analysis(event correlation, log viewing, and log reporting)
D. Log disposal(log clearing)
All of them
Where are the 2 ways of collecting logs using security information and event management(SIEM) products, according to NIST SP 800-92? A. Passive and Active B. Agentless and agent-based C. Push and pull D. Throughput and rate
B
which type of attack is carried out from multiple locations using zombies and botnets?
A) TEMPEST
B) DDoS
C) Backdoor
D) Emanating
B) a distributed DDoS attack is a DDoS attack that is carried out from multiple attack locations
what is the first step of the incident response process
A) respond to the incident
B) detect the incident
C) report the incident
D) recover the incident
B) detect the incident
respond to the incident report the incident to the appropriate personnel recover from the incident remediate all components review the incident