Module III Certification Quiz Part 1

91 Questions | Total Attempts: 126

SettingsSettingsSettings
Please wait...
Module Quizzes & Trivia

Scoo quiz for security plus test test and test some more


Questions and Answers
  • 1. 
    Many unauthorized staff has been entering the data center by piggybacking authorized staff. The CIO has mandated to stop this behavior. Which technology should be installed at the data center to prevent piggybacking?
    • A. 

      Token access

    • B. 

      Security badges

    • C. 

      Hardware locks

    • D. 

      Mantrap

  • 2. 
      Why will a Faraday cage be used?
    • A. 

      To minimize weak encryption

    • B. 

      To allow wireless usage

    • C. 

      To find rogue access points

    • D. 

      To mitigate data emanation

  • 3. 
      An enclosure that prevents radio frequency signals from emanating out of a controlled environment is BEST described as which of the following?
    • A. 

      Grounded wiring frame

    • B. 

      TEMPEST

    • C. 

      Faraday cage

    • D. 

      Mantrap

  • 4. 
      Which one of the following options will create a security buffer zone between two rooms?
    • A. 

      DMX

    • B. 

      Turnstile

    • C. 

      Mantrap

    • D. 

      Anti-pass back

  • 5. 
      As a network administrator you need to take personal safety into consideration. What fire suppression substances types can effectively prevent damage to electronic equipment?
    • A. 

      CO2

    • B. 

      Halon

    • C. 

      Water

    • D. 

      Foam

  • 6. 
      A Faraday case or Faraday shield is an enclosure formed by conducting material, or by a mesh of such material. Such an enclosure blocks out external static electrical fields. Faraday cages are named after physicist Michael Faraday, who built one in 1836. Which of the following would a Faraday cage prevent usage of?
    • A. 

      Uninterruptible Power Supply (UPS)

    • B. 

      Cell phone

    • C. 

      USB key

    • D. 

      Storage drive

  • 7. 
      An administrator wants to make sure that no equipment is damaged when encountering a fire or false alarm in the server room. Which type of fire suppression system should be used?
    • A. 

      Deluge sprinkler

    • B. 

      Hydrogen peroxide

    • C. 

      Wet pipe sprinkler

    • D. 

      Carbon dioxide

  • 8. 
      For the following options, which is an area of the network infrastructure that allows a technician to put public facing systems into it without compromising the entire infrastructure?
    • A. 

      VPN

    • B. 

      VLAN

    • C. 

      DMZ

    • D. 

      NAT

  • 9. 
      In computing, a stateful firewall (any firewall that performs stateful packet inspection (SPI) or stateful inspection) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. You have been studying stateful packet inspection and want to perform this security technique on the network. Which device will you use to BEST utilize stateful packet inspection?
    • A. 

      Switch

    • B. 

      IDS

    • C. 

      Hub

    • D. 

      Firewall

  • 10. 
      A company is upgrading the network and needs to reduce the ability of users on the same floor and network segment to see each other’s traffic. Which of the following network devices should be used?
    • A. 

      Switch

    • B. 

      Firewall

    • C. 

      Hub

    • D. 

      Router

  • 11. 
      Coaxial cable is a cable consisting of an inner conductor, surrounded by a tubular insulating layer typically made from a flexible material with a high dielectric constant, all of which is then surrounded by another conductive layer (typically of fine woven wire for flexibility, or of a then metallic foil), and then finally covered again with a thin insulating layer on the outside. Which is the primary security risk with coaxial cable?
    • A. 

      Data emanation from the core

    • B. 

      Refraction of the signal

    • C. 

      Crosstalk between the wire pairs

    • D. 

      Diffusion of the core light source

  • 12. 
      Which statement best describes a static NAT?
    • A. 

      A static NAT uses a one to many mapping

    • B. 

      A static NAT uses a many to many mapping

    • C. 

      A static NAT uses a many to one mapping

    • D. 

      A static NAT uses a one to one mapping

  • 13. 
      Which of the following is employed to allow distrusted hosts to connect to services inside a network without allowing the hosts direct access to the internal networks?
    • A. 

      Demilitarized zone (DMZ)

    • B. 

      VLAN

    • C. 

      Extranet

    • D. 

      Intranet

  • 14. 
      Which media is LEAST susceptible to a tap being placed on the line?
    • A. 

      Coaxial

    • B. 

      UTP

    • C. 

      Fiber

    • D. 

      STP

  • 15. 
      Fiber optic cable is considered safer than CAT5 because fiber optic cable (Select TWO)
    • A. 

      Can be run for a longer distance

    • B. 

      Is hard to tap into

    • C. 

      Is made of glass rather than copper

    • D. 

      Is more difficult o install

    • E. 

      Is not susceptible to interference

  • 16. 
      Which of the following types of firewalls provides inspection at layer 7 of the OSI model?
    • A. 

      Stateful inspection

    • B. 

      Packet filters

    • C. 

      Application-proxy

    • D. 

      Network address translation (NAT)

  • 17. 
      A software or hardware device that allows only authorized network traffic in or out of a computer or network is called a:
    • A. 

      Honeypot

    • B. 

      Packet sniffer

    • C. 

      Anti-virus program

    • D. 

      Firewall

  • 18. 
      Internet filter appliances/servers will most likely analyze which three items? (Select THREE)
    • A. 

      URLs

    • B. 

      Content

    • C. 

      CRLs

    • D. 

      Certificate

  • 19. 
      Which item will MOST likely permit an attacker to make a switch function like a hub?
    • A. 

      ARP poisoning

    • B. 

      MAC flooding

    • C. 

      DNS poisoning

    • D. 

      DNS spoofing

  • 20. 
      A company implements an SMTP server on their firewall. This implementation would violate which of the following security principles?
    • A. 

      Create an in-depth defense

    • B. 

      Address internal threats

    • C. 

      Keep the solution simple

    • D. 

      Use a device as intended

  • 21. 
      In computer networking, network address translation (NAT) is the process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another. Which description is true about a static NAT?
    • A. 

      A static NAT uses a many to one mapping

    • B. 

      A static NAT uses a one to one mapping

    • C. 

      A static NAT uses a many to many mapping

    • D. 

      A static NAT uses a one to many mapping

  • 22. 
      Which method is easiest to disable a 10Base2 network?
    • A. 

      Introduce crosstalk

    • B. 

      Install a zombie

    • C. 

      Remove a vampire tap

    • D. 

      Remove a terminator

  • 23. 
      A company wants to connect the network to a manufacturer’s network to be able to order parts. Which of the following types of networks should the company implement to provide the connection while limiting the services allowed over the connection?
    • A. 

      Extranet

    • B. 

      Scatternet

    • C. 

      Intranet

    • D. 

      VON

  • 24. 
      Which of the following portions of a company’s network is between the Internet and an internal network?
    • A. 

      Filter router

    • B. 

      Demilitarized zone (DMZ)

    • C. 

      Workstation

    • D. 

      IDS

  • 25. 
      The MOST common exploits of Internet-exposed network services are due to:
    • A. 

      Buffer overflows

    • B. 

      Active content (e.g. Java Applets)

    • C. 

      Trojan horse programs

    • D. 

      Illicit servers

Back to Top Back to top