Part One Final

  1. What does authentication do?



    B. Confirms the identity of a user
  2. What methods monitor a network for the possible penetration of security measures?



    A. Intrusion detection and intrusion prevention
  3. Packet filter, circuit-level gateway, and application-level gateway are all forms of what?



    D. Stateful Inspection
  4. What form of security management do firewalls implement?



    A. Rule-based management
  5. What TCP/IP service enables a LAN to use private IP addresses for internal traffic and public IP addresses for external traffic?



    B. NAT
  6. What computing technology has the capability to simulate an operating system, a server, a storage device, or other network resources?



    A. Virtualization
  7. What IPv6 protocol set provides for the secure exchange of packets at the Network or IP layer?



    A. IPSec
  8. What TCP/IP protocol is TCP/UDP port 80 associated with?



    C. HTTP
  9. What IEEE standard defines Extensible Authentication Protocol?



    A. IEEE 802.1x
  10. What element of a security policy limits an employee's access to only those records or assets she needs to do her job?



    C. Principle of least privilege
  11. What type of risk control provides a method or strategy for handling the aftermath of a potential security event?



    B. Contingency
  12. Installing antivirus software is an example of what type of risk administration action?



    B. Risk Mitigation
  13. What is the correct order of the following incident response steps?
    A. RTO
    B. Create backups of data captures of the systems or devices.
    C. Isolate the suspect or affected systems or devices.
    D. Follow up on causes and vulnerabilities.
    E. Resolve the issues.
    C, B, E, A, D
  14. Which of the following has the highest (most important) order of volatility?



    A. Main Memory
  15. On a Windows system, what utility application creates and maintains system-level log files?
    A. Microsoft Internet Explorer
    B. Microsoft Explorer
    C. Regedit
    D. Event Viewer
    Event Viewer
  16. What do HVAC systems maintain inside a secured data center?



    D. Temperature and relative humidity
  17. What process categorizes information by its sensitivity, access, protection, and regulation?
    A. Information protection
    B. Information classification
    C. Information sensitivity
    D. Information access
    Information classification
  18. What is the fire class for an electrical fire?
    A. Class D
    B. Class B
    C. Class A
    D. Class C
    D Class C
  19. What type of plan is especially important for an IT department that's located remotely from its user base, which depends on its availability to conduct all of their business functions?



    D. Disaster Recovery Plan (DRP)
  20. A user on your network receives an email advising her to visit a company's website to confirm her name, address, phone number, and account number with the company. What type of social engineering could this email likely be?



    A. Phishing
  21. What type of network supports a website that allows you to transfer music files to another user without passing through security measures?



    D. Peer-to-Peer
  22. Which of the following concepts is most closely associated with load balancing?



    D. Computer clustering
  23. When two sectors of a hard disk drive fail, what technology is able to restore the data on the failed sectors and continue providing I/O services without a system failure?



    B. RAID
  24. What protocol creates a communications framework among nearby routers that is able to react when the default gateway on a network becomes unavailable to provide continuity of service?



    A. HSRP
  25. What TCP/IP layer 2 protocol is most associated with Denial-of-Service attack?



    B. ICMP
  26. What is the best defense against social engineering attacks.



    A. User Awareness
  27. What is the general term for software designed to perform damage, destruction, nuisance, and collect personal or private information?



    B. Malware
  28. In what type of attack does an attacker add an unauthorized device to a wireless network to gain access to a wired network connected to a wireless network access point?



    B. Bluesnarfing
    B. Insertion attack
  29. What term describes an unauthorized network access point inserted into a wireless network?



    C. Rogue access point
  30. What device is a helpful tool for network administrators for troubleshooting network issues and an attacker's tool for intercepting data packets on a network?



    D. Packet Sniffer
  31. What form of attack inserts programming code, data, formatting or commands into an existing document or file?



    D. All of the above
  32. What type of HTTP cookie remains on a user's computer between sessions with a specific website?



    D. Persistent Cookie
  33. What must an attacker do to gain the credentialing necessary to navigate inside of a network or system?



    A. Achieve escalation of privileges
  34. A new company employee is attempting to gain access to a primary application for her company. She has attempted to log into the application four times before giving up. The IDS system has reported this activity as an anomaly to the IT department. How should the IT security people view this report?



    A. False positive
  35. Of the security system types that you can use to screen system activity for unauthorized events and incidents, which one will identify a potential threat and attempt to block it?



    C. Intrusion prevention system (IPS)
  36. After performing an audit and review of the network security policies, Tom changes the administrator account name and password, requires all users to create new strong passwords, removes all unused and unneeded user accounts, and disable all unnecessary services running on the network serves. What process has Tom just completed?



    A. hardening
Author
slmckissack
ID
294868
Card Set
Part One Final
Description
Part One Final
Updated