Topic 1: Volume A
A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?
A. Social Engineering attack
B. Brute Force attack
C. War dialing attack
D. Replay attack
You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?
A. Microsoft Internet Information Server (IIS)
B. VPN
C. FTP server
D. Certificate server
You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant. Which algorithm are they most likely using for hashing?
A. PKI
B. SHA
C. Kerberos
D. MD5
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
A. Denial-of-Service attack
B. Vulnerability attack
C. Social Engineering attack
D. Impersonation attack
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?
A. Stateful firewall
B. Host-based application firewall
C. A network-based application layer firewall
D. An application firewall
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
A. CHAP
B. PEAP
C. EAP
D. EAP-TLS
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
A. TRACERT
B. PING
C. IPCONFIG
D. NSLOOKUP
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?
A. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
D. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?
A. Detective access control
B. Physical access control
C. Technical access control
D. Administrative access control
Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.
A. Authenticity
B. Globalization
C. Mobility
D. Integrity
E. Confidentiality
F. Nonrepudiation
Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?
A. PS/2
B. Joystick
C. Microphone
D. AGP
Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
A. Risk analysis
B. OODA loop
C. Cryptography
D. Firewall security
Page 4 out of 20 Pages |
Previous |