Extra 1357-1448 Flashcards
QUESTION NO: 1357 Which type of network topology passes all traffic through all active nodes? A. Broadband B. Star C. Baseband D. Token Ring
Answer: D Explanation: Token ring passes all traffic through nodes.
QUESTION NO: 1358 The act of validating a user with a unique and specific identifier is called what? A. Validation B. Registration C. Authentication D. Authorization E. Identification
Answer: C Explanation: Authentication is the act of validating a user with a unique and specific identifier.
QUESTION NO: 1359 Why is fiber the most secure means of transmission? A. High speed multiplexing B. Interception of traffic is more difficult because it is optically based C. Higher data rates make it more secure D. Multiplexing prevents traffic analysis E. Built-in fault tolerance
Answer: B Explanation: Fiber is more secure because it is hard to tap into and gives off no EMI such as copper cabling.
QUESTION NO: 1360 The IAB defines which of the following as a violation of ethics? A. Performing a DoS B. Downloading an active control C. Performing a penetration test D. Creating a virus E. Disrupting Internet communications
Answer: E Explanation: The IAB considers the Internet a privilege, not a right, and as such considers it unethical to purposely disrupt communications.
QUESTION NO: 1361 A chain of custody shows who ______ _________ and _________.(Choose three) A. Who controlled the evidence B. Who transcribed the evidence C. Who validated the evidence D. Who presented the evidence E. Secured the evidence F. Obtained the evidence
Answer: A,E,F Explanation: The chain of evidence shows who obtained the evidence, who secured the evidence, and who controlled the evidence.
QUESTION NO: 1362 Good forensics requires the use of a bit level copy?(True/False) A. True B. False
Answer: A Explanation: Good forensics requires the use of a bit level copy. A bit level copy duplicates all information on the suspect’s disk. This includes slack space and free space.
QUESTION NO: 1363 Which agency shares the task of investigating computer crime along with the FBI? A. Secret Service B. CIA C. Department of justice D. Police force E. NSA
Answer: A Explanation: Along with the FBI, the Secret Service has been given the authority to investigate computer crime.
QUESTION NO: 1364 This type of password recovery is considered more difficult and must work through all possible combinations of numbers and characters. A. Passive B. Active C. Dictionary D. Brute force E. Hybrid
Answer: D Explanation: Brute force cracking is considered more difficult and must work through all possible combinations of numbers and characters.
QUESTION NO: 1365 _______ are added to Linux passwords to increase their randomness. A. Salts B. Pepper C. Grains D. MD5 hashes E. Asymmetric algorithms
Answer: A Explanation: Salts are added to Linux passwords to increase their randomness. They are used to help insure that no two users have the same, hashed password.
QUESTION NO: 1366 The Linux root user password is typically kept in where?(Choose two) A. etc/shadow B. cmd/passwd C. etc/passwd D. windows/system32 E. var/sys F. var/password
Answer: A,C Explanation: The Linux root user password is typically kept in /etc/passwd or etc/shadow.
QUESTION NO: 1367 The goal of cryptanalysis is to ____________. A. Determine the number of encryption permutations required B. Reduce the system overhead for a crypto-system C. Choose the correct algorithm for a specified purpose D. Forge coded signals that will be accepted as authentic E. Develop secure crypto-systems
Answer: D Explanation: The goal of cryptanalysis is to forge coded signals that will be accepted as authentic.
QUESTION NO: 1368 If an employee is suspected of computer crime and evidence need to be collected, which of the following departments must be involved with the procedure? A. Public relations B. Law enforcement C. Computer security D. Auditing E. HR
Answer: E Explanation: Human Resources always needs to be involved if an employee is suspected of wrongdoing. They know what rules apply to protect and prosecute employees.
QUESTION NO: 1369 What is it called when a system has apparent flaws that were deliberately available for penetration and exploitation? A. A jail B. Investigation C. Enticement D. Data manipulation E. Trapping
Answer: C Explanation: Administrators that leave systems with apparent flaws are performing an act of enticement. This is sometimes called a honeypot.
QUESTION NO: 1370 Why are computer generated documents not considered reliable? A. Difficult to detect electron tampering B. Stored in volatile media C. Unable to capture and reproduce D. Too delicate E. Because of US law, Section 7 paragraph 154
Answer: A Explanation: Because it is difficult to detect electron tampering and can be easily modified.
QUESTION NO: 1371 What is the name of the software that prevents users from seeing all items or directories on a computer and is most commonly found in the UNIX/Linux environment? A. Shell Kits B. Root Kits C. Ethereal D. Shadow data E. Netbus
Answer: D
QUESTION NO: 1372 What is a commercial application of steganography that is used to identify pictures or verify their authenticity? A. A MAC B. A digital checksum C. A MD5 hash D. A digital signature E. A watermark
Answer: E Explanation: A watermark is a commercial application of steganography that is used to identify pictures or verify its authenticity.
QUESTION NO: 1373 What are the basic questions that must be asked at the beginning of any investigation?(Choose all that apply) A. Who B. Cost C. What D. When E. Where F. How G. Time frame H. Budget
Answer: A,C,D,E,F Explanation: At the beginning of any investigation, an investigator must ask who, what, when, where, and how. Answering the questions will lead to the successful conclusion of the case.
QUESTION NO: 1374 Risk can be eliminated.(True/False) A. True B. False
Answer: B Explanation: Risk can never be eliminated. It may be reduced or transferred to a third party through insurance, but will always remain in some form.
QUESTION NO: 1375 Employees are a greater risk to employers than outsiders. T/F(True/False) A. True B. False
Answer: A Explanation: Employees are a greater risk to employers than outsiders, because they possess two of the three items required to commit a crime: means and opportunity.
QUESTION NO: 1376 When an organization takes reasonable measures to ensure that it took precautions to protect its network and resources is called: A. Reasonable Action B. Security Mandate C. Due Care D. Prudent Countermeasures
Answer: C Explanation: Due care are the steps taken to show it has taken responsibility for its actions.
QUESTION NO: 1377 What two things below are associated with security policy?(Choose Two) A. Support of upper management B. Support of department managers C. Are tactical in nature D. Are strategic in nature E. Must be developed after procedures F. Must be developed after guidelines
Answer: A,D Explanation: Policies are written as a broad overview and require the support of upper management. After the development and approval of policies, guidelines and procedures may be written.
QUESTION NO: 1378 Total risk is equal to:(Choose All That Apply) A. Threat B. Vulnerability C. Frequency D. Asset value E. Asset loss
Answer: A,B,D Explanation: Total risk = asset value * vulnerability * threats
QUESTION NO: 1379 Government data classifications include which of the following:(Choose four) A. Open B. Unclassified C. Confidential D. Private E. Secret F. Top Secret
Answer: B,C,E,F Explanation: One of the most common systems used to classify information is the one developed within the US Department of Defense. These include: unclassified, sensitive, confidential, secret, and top secret.
QUESTION NO: 1380 Job rotation is important because: A. It insures your employees are cross-trained. B. It increases job satisfaction. C. It reduces the opportunity for fraud
Answer: C Explanation: Job rotation is tightly tied to the principle of least privilege. It is an effective security control.
QUESTION NO: 1381 Your co-worker is studying for the CISSP exam and has come to you with a question. What is ARP poisoning? A. Flooding of a switched network B. A denial of service that uses the DNS death ping C. Turning of IP to MAC resolution D. Inserting a bogus IP and MAC address in the ARP table E. Modifying a DNS record
Answer: D Explanation: ARP poisoning is a masquerading attack where the attacker inserts a bogus IP and MAC address in a victims ARP table or into the table of a switch. This has the effect of redirecting traffic to the attacker and not to the intended computer.
QUESTION NO: 1382 What is the best description for CHAP Challenge Handshake Authentication Protocol? A. Passwords are sent in clear text B. Passwords are not sent in clear text C. Passwords are not used, a digital signature is sent D. It is substandard to PAP E. It was used with PS2’s and has been discontinued
Answer: B Explanation: Passwords are not sent in clear text. The server performing the authentication sends a challenge value and the user types in the password. The password is used to encrypt the challenge value then is sent back to the authentication server.
QUESTION NO: 1383 CSMA/CD computers cannot communicate without a token.(True/False) A. True B. False
Answer: B Explanation: CSMA/CD computers do not use a token. It is the media access method used in Ethernet.
QUESTION NO: 1384 __________ sends out a message to all other computers indicating it is going to send out data. A. CSMA/CD B. CSMA/CA C. CSMA/HB D. PPP E. SLIP
Answer: B Explanation: CSMA/CA sends out a message to all other computers indicating it is going to send out data. CSMA/CA or token ring networking uses this approach to reduce the amount of data collisions.
QUESTION NO: 1385 Which of the following best describes ISDN BRI(Choose two) A. 2 B channels B. 4 B channels C. 23 B channels D. 1 D channel E. 2 D channels
Answer: A,D Explanation: ISDN BRI has 2 B and 1 D channels
QUESTION NO: 1386 The top speed of ISDN BRI is 256 KBS.(True/False) A. True B. False
Answer: B Explanation: The top speed of ISDN BRI is 128 KBS. Its two primary channels are each capable of carrying 64 KBS so the combined top speed is 128 KBS.
QUESTION NO: 1387 Which of the following should NOT be implemented to protect PBX’s?(Choose all that apply) A. Change default passwords and configurations B. Make sure that maintenance modems are on 24/7 C. Review telephone bill regularly D. Block remote calling after business hours E. Post PBX configuration and specs on the company website
Answer: B,E Explanation: Many vendors have maintenance modems that vendors can use to troubleshoot systems and provide updates. They should normally be turned off. Also information about the system should not be posted on the website and should be closely guarded.
QUESTION NO: 1388 Which of the following best describes the difference between a circuit based and application based firewall? A. Application based is more flexible and handles more protocols B. Circuit based provides more security C. Application based builds a state table D. Circuit based looks at IP addresses and ports E. Circuit based firewalls are only found in Cisco routers
Answer: D Explanation: Circuit based look only at IP address and ports, whereas application based dig much deeper into the packet. This makes it more secure.
QUESTION NO: 1389 _________ is the fraudulent use of telephone services. A. Rolling B. Warzing C. Wardriving D. Wardialing E. Phreaking
Answer: E Explanation: Phreaking is the fraudulent use of telephone services.
QUESTION NO: 1390 What is another name for a VPN? A. Firewall B. Tunnel C. Packet switching D. Pipeline E. Circuit switching
Answer: B Explanation: A VPN creates a secure tunnel through an insecure network.
QUESTION NO: 1391 Which of the following is a connection-orientated protocol? A. IP B. UDP C. TCP D. ICMP E. SNMP F. TFTP
Answer: C Explanation: TCP is a connection-orientated protocol.
QUESTION NO: 1392 Which of the following is not considered firewall technology? A. Screened subnet B. Screened host C. Duel gateway host D. Dual homed host
Answer: C Explanation: Duel gateway host is not considered firewall technology.