Study Questions (251 - 286) Flashcards
Which of the following network design elements provides for a one-to-one relationship between an internal network address and an external network address?
A. NAT
B. NAC
C. VLAN
D. PAT
A
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
A. impersonation.
B. tailgating.
C. dumpster diving.
D. shoulder surfing.
D
In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him understand what traffic patterns are normal on his network. Which of the following tools would help Pete determine traffic patterns?
A. Syslog
B. Protocol analyzer
C. Proxy server
D. Firewall
B
TKIP uses which of the following encryption ciphers?
A. RC5
B. AES
C. RC4
D. 3DES
C
Jane, an administrator, needs to transfer DNS zone files from outside of the corporate network.
Which of the following protocols must be used?
A. TCP
B. ICMP
C. UDP
D. IP
A
Common access cards use which of the following authentication models?
A. PKI
B. XTACACS
C. RADIUS
D. TACACS
A
Which of the following application attacks is used to gain access to SEH?
A. Cookie stealing
B. Buffer overflow
C. Directory traversal
D. XML injection
B
Which of the following does a second authentication requirement mitigate when accessing privileged areas of a website, such as password changes or user profile changes?
A. Cross-site scripting
B. Cookie stealing
C. Packet sniffing
D. Transitive access
B
Jane, a security technician, has been tasked with preventing contractor staff from logging into the company network after business hours. Which of the following BEST allows her to accomplish this?
A. Time of day restrictions
B. Access control list
C. Personal identity verification
D. Mandatory vacations
A
Which of the following ports does DNS operate on, by default?
A. 23
B. 53
C. 137
D. 443
B
Sara from IT Governance wants to provide a mathematical probability of an earthquake using facts and figures.Which of the following concepts would achieve this?
A. Qualitative Analysis
B. Impact Analysis
C. Quantitative Analysis
D. SLE divided by the ARO
C
A buffer overflow can result in which of the following attack types?
A. DNS poisoning
B. Zero-day
C. Privilege escalation
D. ARP poisoning
C
Which of the following is an authentication service that uses UDP as a transport medium?
A. TACACS+
B. LDAP
C. Kerberos
D. RADIUS
D
Which of the following is true concerning WEP security?
A. WEP keys are transmitted in plain text.
B. The WEP key initialization process is flawed.
C. The pre-shared WEP keys can be cracked with rainbow tables.
D. WEP uses the weak RC4 cipher.
B
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).
A. Tethering B. Screen lock PIN C. Remote wipe D. Email password E. GPS tracking F. Device encryption
C F