You are on page 1of 67

Which type of hacker has no affiliation with an organization yet will hack systems without malicious intent?

Answers:

A.
Black hat
B.
White hat
C.
Gray hat
D.
Blue hat

Response Feedback:

Question 2
0.77 out of 0.77 points
A system can easily be completely secure.
Selected Answer:

False
True

Answers:

False
Response Feedback:

Question 3
0.77 out of 0.77 points
Which of the following is the greatest risk for removable storage?
Answers:

A.
Confidentiality of data
B.
Availability of data
C.
Integrity of data
D.
Accountability of data

Response Feedback:

Question 4
0.77 out of 0.77 points
1337 is a badge of honor associated with what group of cyber attackers?
Answers:

A.
Green hat hackers
B.
Blue hat hackers
C.
Skript Kiddies
D.
Elite

Question 5
0.77 out of 0.77 points
In information security the three main goals are known as Confidentiality, Integrity, and Availability.

Answers:

True
False

Response Feedback:

Question 6
0.77 out of 0.77 points
The possession of indisputable proof of something users have done and they cannot deny it.
Answers:

A.
Uninhibited
B.
Non-repudiation
C.
Non-contradiction
D.
Non-refudation

Question 7
0.77 out of 0.77 points
When creating a security plan, three categories of controls should be implemented:
Answers:

A.
Particians, Technicians, Administration (PTA).
B.
Physical, Technical, Administrative (PTA).
C.
Practical, Technical, Analytical (PTA).
D.
Parent, Teacher, Association (PTA).

Question 8
0 out of 0.77 points
According to my lecture a hot site, warm site, and cold site could be referenced as a:
Answers:

A.
Barnyard Coop
B.
COOP
C.
Ford Pinto flying in reverse down the highway.
D.
COUP Deville

Question 9
0.77 out of 0.77 points
The protection of data, information, and information systems from unauthorized access and prevention from
unapproved alteration, modification, disruption, or destruction of data is known as:
Selected Answer:

C.
Information Security

Answers:

A.

Information Integrity
B.
Security Compliance
C.
Information Security
D.
Data Procurement

Question 10
0 out of 0.77 points
When a user is permitted to access specific data or areas of a structure?
Answers:

A.
Accounting
B.
Availability
C.
Authentication
D.
Authorization

Question 11
0.77 out of 0.77 points
AAA of Computer Security is an acronym for which of the following: (Choose Three)
Answers:

A.
Authentication
B.
Authorization
C.
Ardvarks
D.
Armadillos
E.
Accounting
F.
Anchovies

Response Feedback:

Question 12
0.77 out of 0.77 points
Tom sends out many emails containing secure information to other companies. What concept should be
implemented to prove that Tom did indeed send the emails?
Answers:

A.
Integrity
B.
Authenticity
C.
Nonrepudiation
D.

Confidentiality
Response Feedback:

Question 13
0.77 out of 0.77 points
The establishment of an individual's identification with proof and confirmation is known as?
Answers:

A.
Accounting
B.
Authentication
C.
Availability
D.
Authorization

Question 14
0.77 out of 0.77 points
What security software protects a computer from various forms of malicious software?
Answers:

A.
Anti-virus
B.
Anti-Malware
C.
Non-Repudiation
D.
Data Removal

Question 15
0 out of 0.77 points
According to my lecture what would the beginer cyber attackers be called?
Answers:

A.
Chris Griffons of hackers
B.
Skript Kiddies
C.
The other guys
D.
Noobies

Question 16
0.77 out of 0.77 points
Encryption, authentication, and antimalware are all ways to protect against malicious threats.
Answers:

True
False

Response Feedback:

Question 17
0.77 out of 0.77 points

For information security, what is the I in CIA?


Answers:

A.
Information
B.
Indigestion
C.
Integrity
D.
Insurrection

Response Feedback:

Question 18
0 out of 0.77 points
Social engineering includes viruses, worms, and Trojan horses.
Answers:

True
False

Response Feedback:

Question 19
0 out of 0.77 points
According to my lecture what is an algorithm used to make information unreadable.
Answers:

A.
A Message Digest (MD5) used to verify the integrity of the data.
B.
A mathmatical equation used to create a cypher.
C.
An engineering calculation used to create a cypher.
D.
An algebraic equation used to create a cypher.

Question 20
0.77 out of 0.77 points
Individuals who hack into systems at an organizations request but are not employed by the organization are
known as blue hats.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 21
0 out of 0.77 points
The strongest security plan that applies many of the best practice and/or security methods and combines them
into a single defense strategy is known as:
Answers:

A.
Defense in Depth (DID).
B.

I have no clue for 500, Alex Trebek!


C.
Donut of Destruction (DOD).
D.
The Doppelganger defense.

Question 23
0.77 out of 0.77 points
Which of the following does the A in CIA stand for when it comes to IT security? Select the best answer.
Answers:

A.
Availability
B.
Accountability
C.
Auditing
D.
Assessment

Response Feedback:

Question 24
0 out of 0.77 points

According to my lecture Red Hat Hackers:


Answers:

A.
Are cyber attackers enlisted by a communist country.
B.
Are cyber attackers who prefer to wear red velvet fedoras.
C.
Are cyber attackers who facilitate attacks specifcially against Red Hat Linux operating systems (OS).
D.
Are cyber attackers who advocate for Red Hat Linux groups.

Question 25
0.77 out of 0.77 points
The tracking of data, computer usage, and network resources.
Answers:

A.
Accounting
B.
Availability
C.
Authorization
D.
Authentication

Question 26
0.77 out of 0.77 points
The possession of indisputable proof of something users have done and they cannot deny it.

Answers:

A.
Uninhibited
B.
Non-contradiction
C.
Non-repudiation
D.
Non-refudation

Question 27
0.77 out of 0.77 points
According to my lecture what is the number one insider threat to an organization's security portfolio?
Answers:

A.
Peter Griffin's crayon.
B.
Compliance
C.
Continuum
D.
Complacency

The love bug is an example of a rootkit.


Answers:

True
False

Question 2
0.77 out of 0.77 points

Which of the following occurs when an IDS identifies legitimate activity as something malicious?
Selected Answer:

C.
False-positive

Answers:

A.
Misidentification
B.

False-negative
C.
False-positive
D.
Monitoring positive
Response Feedback:

Question 3
0 out of 0.77 points

Access control is the methodology utilized to permit access to computer systems?


Answers:

True
False

Response Feedback:

Question 4
0 out of 0.77 points

Viruses self-replicate whereas worms do not.


Answers:

True
False

Response Feedback:

Question 5

0.77 out of 0.77 points

A high level format would be all that is required to securely remove data from a storaged device, for example a
hard disk drive (HDD) or a USB flash drive?
Selected Answer:

False

Answers:

True
False

Response Feedback:

Question 6
0.385 out of 0.77 points

Which of the following can help to prevent spam? (Select the two best answers.)
Answers:

A.
Run a Trojan scan.
B.
Close open mail relays.
C.
Use a spam filter.
D.
Consider technologies that discouraged spyware.

Question 7
0 out of 0.77 points

Photos, videos, and text messages are just some of the multi media files that store location-specific information
known as:
Answers:

A.
Latitudal and Longitudal oreintation
B.
Geotagging
C.
Global Positioning System (GPS)
D.
Degrees, by minutes and seconds

Response Feedback:

Question 8
0.77 out of 0.77 points

Which of the following is the best option to use to prevent spyware?


Selected Answer:

D.
Windows Defender

Answers:

A.
Personal software firewall
B.
Whitelists
C.
Antivirus software

D.
Windows Defender

Question 9
0.77 out of 0.77 points

A master computer controls a botnet.


Answers:

True
False

Response Feedback:

Question 10
0.77 out of 0.77 points

What are two ways of discouraging bluesnarfing? (Select the two best answers.)
Answers:

A.
Set the device to undiscoverable.
B.
Turn off the device.
C.
Select a difficult-to-guess pairing key.
D.
Use infrared

Response Feedback:

Question 11
0.77 out of 0.77 points

In the event that a mobile device is lost or stolen all data could be remotely deleted bit by bit through a process
called:
Answers:

A.
SIM Clone
B.
Full device encryption
C.
Lockout
D.
Sanatization

Response Feedback:

Question 12
0.77 out of 0.77 points

By turning on the phishing filter, a person can prevent spyware.


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 13

0.77 out of 0.77 points

Malware is software designed to infiltrate a computer system without the users consent.
Selected Answer:

True

Answers:

True
False

Question 14
0.77 out of 0.77 points

Logic bombs are platonic.


Selected Answer:

False

Answers:

True
False

Response Feedback:

Question 15
0.77 out of 0.77 points

Security features built with in a web browser that have the ability to block external files, scripts, and/or image
from loading are known as:
Selected Answer:

C.
Content Filters

Answers:

A.
Ad Filters
B.

Parental Controls
C.
Content Filters
D.
Pop-up Blockers
Response Feedback:

Question 16
0.77 out of 0.77 points

Active interception is the act of exploiting a bug or design flaw in software.


Answers:

True
False

Response Feedback:

Question 17
0.77 out of 0.77 points

Which of the following methods of malware delivery is used in computer programs to bypass normal
authentication?
Answers:

A.
Active interception
B.
Privilege escalation

C.
Backdoor
D.
Rootkit
Response Feedback:

Question 18
0.77 out of 0.77 points

Opening mail relays can decrease the amount of spam that an organization receives on its email server.
Answers:

True
False

Response Feedback:

Question 19
0.77 out of 0.77 points

Which of the following is an example of whole disk encryption?


Selected Answer:

D.
BitLocker

Answers:

A.
Bluesnarfing
B.
AES

C.
Windows Vista Ultimate
D.
BitLocker
Response Feedback:

Question 20
0.77 out of 0.77 points

Which of the following can help to secure the BIOS of a computer? (Select the two best answers.)
Answers:

A.
Use a BIOS supervisor password.
B.
Disable USB ports.
C.
Configure a user password.
D.
Use a case lock.

Question 21
0.77 out of 0.77 points

Which of the following type of virus can change every time it is executed in an attempt to avoid antivirus
detection?
Selected Answer:

B.

Polymorphic
Answers:

A.
Armored
B.
Polymorphic
C.
Macro
D.
Boot sector

Response Feedback:

Question 22
0.77 out of 0.77 points

Back Orifice is an example of a backdoor.


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 23
0.77 out of 0.77 points

Which of the following is an inline device that checks all packets?


Selected Answer:

C.
Network intrusion detection system

Answers:

A.
Host-based intrusion detection system
B.
Statistical anomaly
C.
Network intrusion detection system
D.
Personal software firewall

Response Feedback:

Question 24
0.77 out of 0.77 points

A RAT is an example of a Trojan horse.


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 26
0 out of 0.77 points

An array of hard drives connected directly to an Ethernet network that utilize between 2 and 32 hard drives is
known as:
Answers:

A.
Network Attached Storage (NAS)
B.
Redundant Array of Inexpensive Drives (Raid) 5
C.
Storage Area Network (SAN)
D.
Redundant Array of Inexpensive Drives (Raid) 0

Response Feedback:

Question 27
0 out of 0.77 points

What password has the ability to block unauthorized access to a computer system at boot up prior to loading the
host operating system?
Answers:

A.
BIOS password
B.
Firmware Password
C.
Whole Disk Encryption Password
D.

Power-on password

What is the best option to use to isolate an operating system?


Selected Answer:

A.
Virtualization software

Answers:

A.
Virtualization software
B.
Network-based intrusion detection system
C.
Antivirus software
D.
Host-based intrusion detection system

Response Feedback:

Question 2
0.77 out of 0.77 points

The option Never Check for Updates is recommended by Microsoft.


Selected Answer:
Answers:

False
True
False

Response Feedback:

Question 3
0 out of 0.77 points

The term "Actual OS" as it is applied to virtualization would mean?


Answers:

A.
Host Operating System
B.
First instance of the guest Operating System
C.
Previous instance of the guest Operating System
D.
Actual Virtual Operating System

Response Feedback:

Question 4
0.77 out of 0.77 points

Every version of the Microsoft Windows environment uses what executable file to access the Windows Update
access window?
Selected Answer:

B.
WUAPP.EXE

Answers:

A.

SECSET.EXE
B.
WUAPP.EXE
C.
CONFIGMAN.EXE
D.
UPMAN.EXE
Response Feedback:

Question 5
0.77 out of 0.77 points

A service pack is a group of updates, bug fixes, updated drivers, and security fixes.
Selected
Answer:

Tru
e

Answers:

Tru
e
False

Response
Feedback:

Question 6
0 out of 0.77 points

What does the term "Streaming" mean as it is applied to cyber security?


Answers:

A.

The installation of the Operating System (OS) and Service Pack (SP) at the same time
from the original distribution disc
B.
The installation of the Operating System (OS) and Service Pack (SP) at the same time
from a multicast network imaging process
C.
The installation of the hotfixes and/or patches and from the Operating System (OS)
developer's web site
D.
The installation of the Operating System (OS) and Service Pack (SP) at the same time
from a digital download from the OS developer's web site
Response Feedback:

Question 7
0 out of 0.77 points

To turn off services, you would access the Programs and Features section of the Control Panel.
Selected Answer:
Answers:

True
True
False

Response Feedback:

Question 8
0.77 out of 0.77 points

The systeminfo commands show a list of hot fixes that have been installed to the operating system.

Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 9
0 out of 0.77 points

Of the following, which can be a security benefit when using virtualization?


Selected Answer:

A.
If one virtual machine is compromised, none of the other virtual machines can be
compromised.

Answers:

A.
If one virtual machine is compromised, none of the other virtual machines can be
compromised.
B.
If a virtual machine is compromised, the adverse effects can be compartmentalized.
C.
Patching a computer patches all virtual machines running on the computer.
D.
Virtual machines cannot be affected by hacking techniques.

Response Feedback:

Question 10
0 out of 0.77 points

To open the Local Group Policy Editor console window, a user should type MMC in the Run prompt.
Answers:

True
False

Response Feedback:

Question 11
0 out of 0.77 points

The second step in a patch management strategy is testing.


Answers:

True
False

Response Feedback:

Question 12
0.77 out of 0.77 points

The Windows Update program can be accessed by clicking Start > All Programs.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 13
0.77 out of 0.77 points

Which command lists the hotfixes installed to Windows?


Answers:

A.
cmd.exe
B.
sc config
C.
gpedit.msc
D.
systeminfo

Response Feedback:

Question 14
0.77 out of 0.77 points

Which one of the following navigational paths shows the current service pack level to the user?
Answers:

A.
Click Start, right-click Computer, and select Manage.
B.
Click Start, right-click Network, and select Manage.
C.
Click Start, right-click Computer, and select Properties.
D.
Click Start, right-click Network, and select Properties.

Response Feedback:

Question 15
0.77 out of 0.77 points

Which commands disable a service in the command line?


Answers:

A.
sc config
B.
net stop
C.
net start
D.
net disable

Response Feedback:

Question 16
0.77 out of 0.77 points

Which of the following is the best file system to use in Windows?


Answers:

A.
NTFS
B.

FAT32
C.
FAT16
D.
FAT
Response Feedback:

Question 17
0 out of 0.77 points

The convert command converts an NTFS drive to FAT32.


Answers:

True
False

Response Feedback:

0.77 points

What does the term ACL mean as it is applied to cyber security?


Selected Answer:

B.
Access Control List

Answers:

A.
Another Crazy Lunatic
B.

Access Control List


C.
Anterior Cruciate Ligament
D.
Atlantic Container Line
Response Feedback:

Question 20
0.77 out of 0.77 points

Which of the following should you implement to keep a well-maintained computer? (Select the three best
answers.)
Answers:

A.
Update the firewall.
B.
Update the BIOS.
C.
Remove the unnecessary firewall.
D.
Use a surge protector.

Response Feedback:

Question 21
0.77 out of 0.77 points

What is baselining?
Selected Answer:

B.
The process of measuring changes in networking devices, hardware, and software

Answers:

A.
A type of patch management
B.
The process of measuring changes in networking devices, hardware, and software
C.
The act of securing an operating system and updating it
D.
A group of updates, bug fixes, and security fixes

Response Feedback:

Question 22
0 out of 0.77 points

The key stroke combination of Alt + T performs what function in a Microsoft Windows environment?
Answers:

A.
Swap to another open web browser tab
B.
Accesses the "View" tab
C.

View the MS Windows tool menu


D.
View the MS Windows menu bar
Response Feedback:

Question 23
0.77 out of 0.77 points

What does the term TOS mean as it is applied to cyber security?


Answers:

A.
Teacher Over Shoulder
B.
The Original Series
C.
Terms of Service
D.
Trusted Operating System

Response Feedback:

Question 24
0.77 out of 0.77 points

The net stop commands disable services in Windows.

Answers:

True
False

Response Feedback:

Question 25
0.77 out of 0.77 points

Hardening is the act of configuring an OS securely, updating it, and removing unnecessary applications.
Answers:

True
False

Response Feedback:

Question 26
0.77 out of 0.77 points

Which of the following should be done to maintain and harden a hard disk? (Select the two best answers.)
Answers:

A.
Install third-party applications.
B.
Defragment the drive.
C.
Consider a whole disk encryption.
D.
Sanitize the drive.

Response Feedback:

Question 27
0.77 out of 0.77 points

Which of the following are examples of virtualization? (Select the three best answers.)
Answers:

A.
Microsoft Virtual PC
B.
VMware
C.
Microsoft Visio
D.
Microsoft Virtual Server


UAC keeps every user in standard mode instead of in administrator mode by default.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 2
1 out of 1 points
Timothy complains about a lot of pop-up Windows when he uses Internet Explorer. Which key combination
should you tell him to use to close the pop-up Windows?
Selected Answer:

B.
Alt+F4

Answers:

A.
Windows key
B.
Alt+F4
C.
Ctrl+Alt+Del
D.
Ctrl+Shift+Esc

Response Feedback:

Question 3
0 out of 1 points
Which of the following can run on any platform?
Selected Answer:

A.
Sandbox

Answers:

A.
Sandbox
B.
ActiveX controls
C.
Internet Explorer
D.
Java applets

Response Feedback:

Question 4
3 out of 3 points (Extra Credit)

Question 5
1 out of 1 points
The Network tab in Firefox is used to connect to a proxy server.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 6
0 out of 1 points
Which of the following is placed in an application by programmers either knowingly or inadvertently to bypass
normal authentication?
Selected Answer:

D.
Input validation

Answers:

A.
Sandbox
B.
Back door
C.
Virus
D.
Input validation

Question 7
1 out of 1 points
Adblock Plus is an add-on to FireFox used to block third-party advertisement pop-ups.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 8
1 out of 1 points
Which tab in the Internet options dialog box of Internet Explorer enables a person to make secure connections
through a VPN?
Selected Answer:

A.
Connections tab

Answers:

A.
Connections tab
B.
Programs tab
C.
Content tab
D.
Advanced tab

Response Feedback:

Question 9
1 out of 1 points
Your boss wants you to make changes to 20 computers Internet Explorer programs. To do this quickly what is the
best solution?

Selected Answer:

B.
Create and use a template.

Answers:

A.
Use a proxy server.
B.
Create and use a template.
C.
Create an organizational unit.
D.
Create a script.

Response Feedback:

Question 10
1 out of 1 points
To make changes to Internet Explorer policies that correspond to an OU, you need a domain controller.
Selected Answer:
Answers:

True
True
False

Response Feedback:

Question 11
1 out of 1 points
Input validation is a process that ensures the correct usage of data.
Selected Answer:
Answers:

True
True
False

Response Feedback:

Question 12
1 out of 1 points
What is the most common port used when connecting an Internet Explorer browser to a proxy server for use with
HTTP connections?
Selected Answer:

D.
80

Answers:

A.
53
B.
21
C.
443
D.
80

Response Feedback:

Question 13
1 out of 1 points
A proxy server acts as a go-between of a client computers web browser and the web server.

Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 14
1 out of 1 points
How can Internet Explorer be centrally managed for several computers?
Selected Answer:

A.
By way of a group policy

Answers:

A.
By way of a group policy
B.
By creating an organizational unit
C.
In the Advanced tab of the Internet options dialog box
D.
In the Registry

Response Feedback:

Question 15
1 out of 1 points
Alt+F8 is the key combination that closes pop-up windows.
Selected Answer:

False
True

Answers:

False
Response Feedback:

Question 16
1 out of 1 points
Which of the following should you include as general browser security practices? (Select the two best answers.)
C.
Train your users.

Answers:

D.
Use a proxy server.
A.
Use multiple web browsers.
B.
Use the latest browser.
C.
Train your users.
D.
Use a proxy server.

Response Feedback:

Question 17
1 out of 1 points
To accept fewer cookies, you would add them to the Restricted Sites zone.

Selected Answer:

False
True

Answers:

False
Response Feedback:

Question 18
1 out of 1 points
Of the following, what are three ways to increase the security of Microsoft Outlook? (Select the three best
answers.)
Selected Answers:

A.
Install the latest service pack.
B.
Password protect .PST files.
D.
Increase the junk email security level.

Answers:

A.
Install the latest service pack.
B.
Password protect .PST files.
C.
Set macro security levels.
D.
Increase the junk email security level.

Response Feedback:

Question 19
1 out of 1 points
One way of protecting Microsoft Outlook is to use a password for opening or modifying documents.
Selected Answer:

False
True

Answers:

False
Response Feedback:

Question 20
1 out of 1 points
ActiveX controls can run on any browser platform.
Selected Answer:
Answers:

False
True
False

Response Feedback:

Question 21
1 out of 1 points
James doesn't want people to see where he browsed to on the Internet. What is a good way to clear his Internet
browsing history?
Selected Answer:

A.
Checkmark the Empty Temporary Internet Files Folder When the Browser Is
Closed check box.

Answers:

A.
Checkmark the Empty Temporary Internet Files Folder When the Browser Is
Closed check box.
B.
Use the disk defragmenter.
C.
Clear all cookies in the Advanced Privacy Settings dialog box.
D.
Use cross-site scripting.

An intranet enables sister companies to access a secure area of a company's network.


Selected Answer:

False

Answers:

True
False

Response Feedback:

Question 2
1.34 out of 1.34 points

Which of the following ways can help secure a modem? (Select the two best
answers.)
Selected Answers:

A.

Use the callback feature.


B.

Used strong passwords.


Answers:

A.

Use the callback feature.


B.

Used strong passwords.

C.

Use telnet.
D.

Mount the modem to the floor.


Response Feedback:

Question 3
1.34 out of 1.34 points

One way to defend against a double-tagging attack is to put unplugged ports on


the switch into an unused VLAN.
Selected Answer:
Answers:

False
True
False

Response Feedback:

Question 4
1.34 out of 1.34 points

Access control lists enable or deny traffic and can be configured to help secure a
router.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 5
1.34 out of 1.34 points

Subnetting increases security by compartmentalizing a network.


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 6
1.34 out of 1.34 points

Which of the following ranges comprise the well-known ports category?


Selected Answer:

B.

01023
Answers:

A.

10.0.0.010.255.255.255
B.

01023
C.

102449,151
D.

49,15265,535

Response Feedback:

Question 7
1.34 out of 1.34 points

One way to protect a WAN is to place all the computers behind a router.
Selected Answer:
Answers:

False
True
False

Response Feedback:

Question 8
1.34 out of 1.34 points

A DMZ is a special area of the network accessed by clients on the Internet.


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 9
1.34 out of 1.34 points

Which of the following cloud computing services would be in use if an


organization was using Gmail?

Selected Answer:

C.

SaaS
Answers:

A.

PaaS
B.

IaaS
C.

SaaS
D.

Private cloud
Response Feedback:

Question 10
1.34 out of 1.34 points

Which of the following is used to house FTP servers, mail servers, and web
servers so that people on the Internet can access them, but cannot access any
other of the organizations servers?
Selected Answer:

A.

DMZ
Answers:

A.

DMZ
B.

Intranet

C.

Subnet
D.

VLAN
Response Feedback:

Question 11
1.34 out of 1.34 points

NAT is also known as IP masquerading.


Answers:

True
False

Response Feedback:

Question 12
1.34 out of 1.34 points

The network 10.0.0.0 is a Class B private IP network.


Selected Answer:
Answers:

False
True
False

Response Feedback:

Question 13
0 out of 1.34 points

Which of the following is not an example of good cloud security?


Answers:

A.

Encryption
B.

8 character passwords
C.

Strong data access policies


D.

Powerful authentication methods


Response Feedback:

Question 14
3 out of 3 points (Extra Credit)

Q1.) What would be the purpose of implementing an Extranet?


Q2.) Please explain what is involved with the term (IDF) as it would relate to networking
infrastructure?
Q3.) Please explain what is involved with the term (MDF) as it would relate to networking
infrastructure?

Question 15
1.34 out of 1.34 points

Network access control sets rules by which network connections are governed.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 16
1.34 out of 1.34 points

A MAC flood is when a person accesses a single port of a switch that was not
physically secured.
Selected Answer:

False

Answers:

True
False

RADIUS uses port 1812


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 2
3 out of 3 points (Extra Credit)

Q1.) What is the primary purpose of ARP?


Q2.) What is the primary purpose of DNS?
Q3.) What is the difference between forward and reverse lookup zone for a DNS entry?
Selected Answer:

Q1.) What is the primary purpose of ARP?


The primary purpose of the ARP or the Address
Resolution Protocol is the association of an Internet
Protocol address to the address of a physical
machine that is part of a local network.
Q2.) What is the primary purpose of DNS?
Domain Name Service (DNS) is the service used to

convert human readable names of hosts to IP


addresses. Host names are not case sensitive and
can contain alphabetic or numeric letters or the
hyphen.
A fully qualified domain name (FQDN) consists of the
host name plus domain name as in the following
example:
ccbcmd.edu
The main function of DNS is the mapping of IP
addresses to human readable names.
Three main components of DNS
1.
resolver
2.
name server
3.
database of resource records(RRs)
Q3.) What is the difference between forward
and reverse lookup zone for a DNS entry?
Domain Name System (or Service or Server), an
Internet service that translates domain names into IP
addresses. Because domain names are alphabetic,
they're easier to remember. The Internet however, is
really based on IP addresses. Every time you use a
domain name, therefore, a DNS service must
translate the name into the corresponding IP
address. For example, the domain name
www.mydomain.com might translate to
198.105.232.4.
A forward lookup zone is a DNS zone in which
hostname to IP address relations are stored. When a
computer requests the IP address of a specific
hostname, the forward lookup zone is queried and
the result is returned.
A reverse lookup zone does just the opposite. When
a computer requests the hostname of an IP address,
the reverse lookup zone is queried and the result is
returned.
An A (address) record is a DNS record that can be
used to point your domain name and host names to
a static IP address.
A PTR record (sometimes called a "host PTR record")
is what lets someone do a "reverse" DNS lookup that is, they have your IP address and want to know
what your host/domain is
A CNAME record maps an alias or nickname to the
real or Canonical name which may lie outside the

current zone. Canonical means expected or real


name.
Correct Answer:
Response
Feedback:

[None]

1.) Address Resolution Protocol (ARP) is a protocol for mapping an


Internet Protocol address (IP address) to a physical machine (MAC)
address that is recognized in the local network.
2.) The primary purpose of Domain Name System (DNS) resolves web
page names to the associated IP address on the Internet. A key
element of the DNS is a worldwide collection of DNS servers.
3.) Forward=maps hostname to ip address Reverse=maps ip address to
name

Question 3
1.54 out of 1.54 points

If a server has inbound Port 21 open, what service is it running?


Selected Answer:

B.

File Transfer Protocol


Answers:

A.

Simple Mail Transfer Protocol


B.

File Transfer Protocol


C.

Kerberos
D.

Hypertext Transfer Protocol


Response Feedback:

Question 4
1.54 out of 1.54 points

To use the Lightweight Directory Access Protocol (LDAP) in a secure fashion, what
port should be used?
Selected Answer:

A.

636
Answers:

A.

636
B.

443
C.

3389
D.

389
Response Feedback:

Question 5
1.54 out of 1.54 points

Which of the following is not a denial-of-service attack?

Selected Answer:

D.

Replay attack
Answers:

A.

Fork bomb
B.

Smurf attack
C.

Teardrop attack
D.

Replay attack
Response Feedback:

Question 6
1.54 out of 1.54 points

Port 53 is used by the DoS protocol


Selected Answer:

False
True

Answers:

False
Response Feedback:

Question 7
0 out of 1.54 points

Port 443 is used by Ms-sql-s


Selected Answer:

True
True

Answers:

False
Response Feedback:

Question 8
1.02667 out of 1.54 points

Which of the following are ways to help defend against distributed denial of
service attacks? (Select the three best answers).
Selected Answers:

A.

Update firewalls.
C.

Carefully select applications.


D.

Use a "clean pipe."


Answers:

A.

Update firewalls.
B.

Use intrusion prevention systems.


C.

Carefully select applications.


D.

Use a "clean pipe."

Response Feedback:

Question 9
1.54 out of 1.54 points

Which of the following commands can be used to turn off a service?


Answers:

A.

Sc config
B.

# chkconfig <service> off


C.

Net stop
D.

Net start
Response Feedback:

Question 10
0 out of 1.54 points

Syslog uses port 161


Answers:

True
False

Response Feedback:

Question 11
1.54 out of 1.54 points

Which of the following port numbers is used by the Character Generator?


Selected Answer:

D.

19
Answers:

A.

53
B.

21
C.

D.

19
Response Feedback:

Question 12
1.54 out of 1.54 points

Which of the following can best be described as the exploitation of a computer


session in an attempt to gain unauthorized access to data?
Answers:

A.

Session hijacking
B.

Null session
C.

Domain name kiting


D.

DoS
Response Feedback:

Question 13
1.54 out of 1.54 points

Your boss wants you to secure your Web server's transactions. Which protocol
and port number should you use to accomplish this?
Answers:

A.

RDP3389
B.

HTTPS443
C.

LDAP389
D.

POP3110
Response Feedback:

Question 14
1.54 out of 1.54 points

Port 88 is used by Kerberos


Selected Answer:

True

Answers:

True
False

Which of the following devices should you use to keep machines behind it anonymous?
(Select the best answer.)
Selected Answer:

A.

IP proxy
Answers:

A.

IP proxy
B.

Circuit level gateway


C.

Firewall
D.

Caching proxy
Response Feedback:

Question 2
1 out of 1 points

Which of the following are examples of protocol analyzers? (Select the two best
answers.)
B.

Wireshark
D.

Network Monitor
Answers:

A.

HTTP proxy
B.

Wireshark
C.

NAT filter
D.

Network Monitor
Response Feedback:

Question 3
1 out of 1 points

James has detected an intrusion in his company. What should he check


first?
Selected Answer:

B.

Firewall logs
Answers:

A.

Event Viewer
B.

Firewall logs
C.

Performance logs
D.

DNS Logs
Response Feedback:

Question 4
1 out of 1 points

Which of the following can detect malicious packets and discard them?
Selected Answer:

B.

NIPS
Answers:

A.

PAT
B.

NIPS
C.

Proxy server
D.

NIDS
Response Feedback:

Question 5
1 out of 1 points

Honeynets are one or more computers or servers used to counteract attempts at


unauthorized access to a network.
Selected Answer:

True

Answers:

True
False

Question 6
1 out of 1 points

A firewall can use NAT and packet filters.


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 7
1 out of 1 points

A NIDS can inspect traffic and possibly remove, detain, or redirect malicious
traffic.
Selected Answer:

False

Answers:

True
False

Response Feedback:

Question 8
1 out of 1 points

NAT filtering matches incoming traffic to corresponding outbound IP connections


by matching the IP address and port.
Answers:

True
False

Response Feedback:

Question 9
1 out of 1 points

NAT filtering accepts or rejects packets based on rules.


Selected Answer:

False

Answers:

True
False

Response Feedback:

Question 10
1 out of 1 points

A stateless packet filter is vulnerable to IP spoofing attacks.


Selected Answer:

True

Answers:

True
False

person searches for wireless networks from their car. What is this an example of?
Selected Answer:

D.

Wardriving
Answers:

A.

Bluejacking
B.

DDoS

C.

Replay attack
D.

Wardriving
Response Feedback:

Question 2
1 out of 1 points

Data emanation occurs most commonly on coaxial cable.


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 3
1 out of 1 points

Which of the following should be modified because it is weak by default?


Selected Answer:

B.

Default account
Answers:

A.

Wireless encryption

B.

Default account
C.

PNAC
D.

NAT firewall
Response Feedback:

Question 4
1 out of 1 points

You find a rogue access point on your network. What should you do with
it? (Select the best answer.)
Selected Answer:

D.

Remove it.
Answers:

A.

Use PNAC.
B.

Use strong encryption.


C.

Disable the SSID.


D.

Remove it.

Response Feedback:

Question 5
1 out of 1 points

RFI is a disturbance that can affect electrical circuits, devices, and cables due to
electromagnetic conduction or radiation.
Selected Answer:
Answers:

False
True
False

Response Feedback:

Question 6
1 out of 1 points

Which of the following has the strongest level of encryption?


Selected Answer:

C.

WPA2
Answers:

A.

WAP
B.

WEP
C.

WPA2

D.

WPA

Question 7
1 out of 1 points

Six characters or more constitutes a strong password.


Selected Answer:

False

Answers:

True
False

Response Feedback:

Question 8
1 out of 1 points

What should you configure to improve wireless security?


Selected Answer:

C.

MAC filtering.
Answers:

A.

Enable the SSID.


B.

IP spoofing.
C.

MAC filtering.

D.

Remove repeaters.
Response Feedback:

Question 9
1 out of 1 points

One way to secure the administration interface of a WAP is to turn it off when not
in use.
Selected Answer:

False

Answers:

True
False

Response Feedback:

Question 10
1 out of 1 points

Which of the following is the unauthorized access of information from a


wireless device through a Bluetooth connection
Selected Answer:

A.

Bluesnarfing
Answers:

A.

Bluesnarfing
B.

Bluejacking
C.

The blues
D.

Bluebeard
Response Feedback:

Question 11
1 out of 1 points

The act of splitting the wires of a twisted-pair cable connection would be


an example of which of the following?
Selected Answer:

A.

Wiretapping
Answers:

A.

Wiretapping
B.

Wardriving
C.

Data emanation
D.

Spectral analyzing

Response Feedback:

Question 12
1 out of 1 points

Which of the following is the act of exploiting a bug or design flaw in a


software or firmware application to gain access to resources that normally
would be protected from an application or user?
Selected Answer:

C.

Privilege escalation
Answers:

A.

Backdoor
B.

Weak password
C.

Privilege escalation
D.

DDoS
Response Feedback:

Question 13
1 out of 1 points

Crosstalk is when a signal transmitted on one copper wire creates an undesired


effect on another wire; the signal bleeds over, so to speak.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 14
1 out of 1 points

Privilege escalation is used in computer programs to bypass normal


authentication.
Selected Answer:
Answers:

False
True
False

Response Feedback:

Question 15
1 out of 1 points

WEP is deprecated; it should be replaced with a more secure protocol such as


WPA.
Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 16
1 out of 1 points

Which of the following cable types can be susceptible to crosstalk? (Select


the two best answers.)
Selected Answers:

A.

Coaxial
C.

Twisted-pair
Answers:

A.

Coaxial
B.

Fiber-optic
C.

Twisted-pair
D.

Data emanation
Response Feedback:

Question 17
1 out of 1 points

Which of the following is not a good strategy for securing a WAP?


Selected Answer:

D.

Place it in a Faraday cage


Answers:

A.

Turn off the SSID


B.

NAT filtering
C.

Use PNAC
D.

Place it in a Faraday cage


Response Feedback:

Question 19
1 out of 1 points

Default accounts often have weak passwords.


Selected Answer:

True

Answers:

True
False

Response Feedback:

Question 20
1 out of 1 points

WPA2 has a typical key size of 128 bits.


Selected Answer:
Answers:

False
True
False

Response Feedback:

Question 21
1 out of 1 points

Fiber optic cable is not susceptible to data emanations.


Selected Answer:

True

Answers:

True
False

You might also like