Practice Questions Flashcards

0
Q

What type of fire suppression is dangerous to people?

A

Halon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What risk reduction strategy is based on punishment.

A

Risk deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What best prevents replay attacks?

A

KDC- Kerberos Distribution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False. Kerberos is both an Authentication Service and a Ticket Granting service

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Collision resistance is best provided by what?

A

SHA256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What program is used to brute force a network password?

A

John The Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rainbow tables are used for what?

A

Breaking weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name three injection type attacks.

A

SQL, XMZL, and LDAP injections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false. You don’t need to enforce cryptographic keys to help mitigate SSH brute force attacks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An admin uses a tool to check SMTP, DNS, POP3, and ICMP. What is he using?

A

Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which ports are used by NetBIOS?

A

139/445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP uses which ports?

A

389/636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be deployed to provide secure tunneling service?

A

IPV6 because it uses IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most secure method of utilizing FTP?

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tying ports to MAC Adresses and preventing additional devices from being connected are examples of what?

A

Implementing port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

L2TP is used by what?

A

VPNs

16
Q

Being told your patches are out of date is an example of what?

A

Network access control NAC

17
Q

An admin wants to provide 259 staff with access to a corporate network, what should he use?

A

VPN Concentrator

18
Q

What protocol uses a three way handshake?

A

TCP

19
Q

Cloud computing uses what technology?

A

Virtualization