Practice Test 6 Flashcards
A server on your network needs to be accessed by external users. The content of the server should be publicly available and does not contain any confidential information. Where should you place it?
A) Intranet
B) Behind an IPsec tunneling firewall
C) Behind the firewall and NAT service
D) DMZ
DMZ
True or False: It is good practice to disable unused or publicly accessible network ports?
A) False
B) True
True
Which of the following is a common synonym for a Protocol Analyzer?
A) layer 3 switch
B) Port scanner
C) Intelligent HUB
D) Packet Sniffer
Packet Sniffer
Which of the following choices properly defines the term war chalking?
A) Driving in a vehicle and scanning for open WiFi access points
B) Cracking a WEP2 WiFi encryption
C) Marking open WiFi access points
D) Port Scanning a wifi network
Marking open WiFi access points
Which of the following protocols is used to encrypt emails?
A) SMAP
B) PGP
C) SMTP
D) HTTPS
PGP
Which of the following is a computer hardware component that can process and store cryptographic keys?
A) EULA
B) HCL
C) WPA2
D) TPM
TPM
Which of the following is an example of multi-factor authentication?
A) Smart card and ID badge
B) Fingerprint and iris scan
C) Password and pin
D) Pin number and smart card
Pin number and smart card
Which of the following STOPS attacks on a host system?
A) NIPS
B) NIDS
C) HIPS
D) HIDS
HIPS
Which of the following is an access control method, which is based of a persons job?
A) DAC
B) HMAC
C) RBAC
D) MAC
RBAC
Which port is used by telnet?
A) 22
B) 20
C) 21
D) 23
23
When converted into binary, how many bits are present in an IPv4 Address?
A) 64
B) 48
C) 128
D) 32
32
Which option will provide short-term system availability in case of loss or failure?
A) Cold Site
B) Full disk encryption
C) RAID 5
D) RAID 0
RAID 0
A list of permissions on a router that determines who can access specific areas of a network, is known as what?
A) OEM
B) Firewall
C) FAQ
D) ACL
ACL
Which authentication protocol periodically verifies a client with a 3-way handshake?
A) PAP
B) CHAP
C) SSO
D) Kerberos
CHAP
Which of the following describes the most secure firewall configuration?
A) Allow all, deny malicious applications and ports
B) Deny all protocols, allow TCP/IP
C) Deny all UPD, allow all TCP
D) Deny all, with exceptions for required applications and ports
Deny all, with exceptions for required applications and ports