Module IV & V Certification Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vtgamer
V
Vtgamer
Community Contributor
Quizzes Created: 5 | Total Attempts: 3,931
| Attempts: 146 | Questions: 64
Please wait...
Question 1 / 64
0 %
0/100
Score 0/100
1.   Look at the following items, which one usually applies specifically to a web browser?

Explanation

A pop-up blocker is a feature that is typically found in web browsers and is specifically designed to prevent unwanted pop-up windows from appearing while browsing the internet. This feature helps to enhance the user experience by reducing distractions and preventing potential security threats that may be associated with pop-up windows. Therefore, a pop-up blocker is an essential tool for web browsers to ensure a smoother and safer browsing experience.

Submit
Please wait...
About This Quiz
Security Quizzes & Trivia

SCOO certification quiz for security plus test test and retest

Personalize your quiz and earn a certificate with your name on it!
2.   Which of the following would be an easy way to determine whether a secure webpage has a valid certificate?

Explanation

Right-clicking on the lock at the bottom of the browser and checking the certificate information would be an easy way to determine whether a secure webpage has a valid certificate. This action allows the user to view the details of the certificate, such as the issuer, expiration date, and any warnings or errors associated with it. By examining this information, the user can verify the authenticity and validity of the certificate, ensuring that the webpage is secure.

Submit
3.   A PC is rejecting push updates from the server; all other PCs on the network are accepting the updates successfully. What should be examined first?

Explanation

The local firewall should be examined first because it is responsible for controlling the network traffic on the PC. If the local firewall is blocking the push updates from the server, it could be the reason why the PC is rejecting them while other PCs on the network are accepting them successfully. By checking the local firewall settings and ensuring that it is not blocking the updates, the issue can potentially be resolved.

Submit
4.   Which of the following would be the MOST effective backup site
for disaster recovery?

Explanation

A hot site would be the most effective backup site for disaster recovery because it is a fully operational data center that is ready to take over immediately in the event of a disaster. It has all the necessary hardware, software, and infrastructure in place to quickly restore operations and minimize downtime. This ensures business continuity and allows for seamless transition during a disaster situation.

Submit
5.   In a secure environment, which authentication mechanism performs better?

Explanation

TACACS performs better in a secure environment because it encrypts client-server negotiation dialogs. This means that the communication between the client and server is protected and cannot be easily intercepted or accessed by unauthorized individuals. This encryption adds an extra layer of security to the authentication process, making it more robust and reliable in maintaining the confidentiality and integrity of the authentication data.

Submit
6.   A VPN typically provides a remote access link from one host to another over:

Explanation

A VPN typically provides a remote access link from one host to another over the Internet. This means that users can securely connect to a private network from a remote location using the public Internet as the medium of communication. The VPN establishes a secure and encrypted connection, allowing users to access resources on the private network as if they were directly connected to it. This is a common method used by organizations to enable remote workers to securely access company resources.

Submit
7.   The employees at a company are using instant messaging on company networked computers. The MOST important security issue to address when using instant messaging is that instant messaging:

Explanation

The most important security issue to address when using instant messaging is that communications are open and unprotected. This means that the messages being sent can be intercepted and read by unauthorized individuals, posing a risk to the confidentiality of sensitive information. It is crucial to implement encryption measures to ensure that the messages are securely transmitted and only accessible to the intended recipients.

Submit
8.   A travel reservation organization conducts the majority of its transactions via a public facing website. Any downtime to this website will lead to serious financial damage for this organization. One web server is connected to several distributed database servers. Which statement is correct about this scenario?

Explanation

In this scenario, the correct answer is "Single point of failure." This means that if the web server, which is the single point of access for the public facing website, experiences any downtime or failure, it will result in serious financial damage for the travel reservation organization. The fact that the web server is connected to multiple distributed database servers does not eliminate the risk of a single point of failure, as the web server itself is still vulnerable.

Submit
9.   Remote authentication allows you to authenticate Zendesk users using a locally hosted script. Which of the following is an example of remote authentication?

Explanation

Remote authentication refers to the process of authenticating users using a locally hosted script. In this scenario, the example of remote authentication is when a user in one city logs onto a network in another city. This means that the user is accessing a network that is physically located in a different location, and they are able to authenticate themselves using a username and password pair. This type of authentication allows users to securely access resources and services from a remote location, ensuring that only authorized individuals can gain access to the network.

Submit
10.   Which of the following attacks are being referred to if someone is accessing your email server and sending inflammatory information to others?

Explanation

A repudiation attack refers to the unauthorized access of an email server by an individual who then uses it to send inflammatory information to others. This attack allows the attacker to deny their involvement or claim that they did not send the malicious emails. It is a form of cyber attack that aims to manipulate or deceive recipients by sending false or harmful information from someone else's account, causing reputational damage or spreading false information. This attack can be detrimental to both individuals and organizations, as it can lead to legal consequences and damage relationships.

Submit
11.   A network administrator advises the server administrator of his company to implement whitelisting, blacklisting, closing open relays and strong authentication techniques. What threat is being addressed?

Explanation

The network administrator's advice to implement whitelisting, blacklisting, closing open relays, and strong authentication techniques indicates that the threat being addressed is spam. These measures are commonly used to prevent unwanted and unsolicited emails from reaching the company's servers and networks. Whitelisting allows only approved senders to deliver emails, blacklisting blocks known spam sources, closing open relays prevents unauthorized use of the server to send spam, and strong authentication ensures that only legitimate users can access the email system.

Submit
12.   Which of the following would be MOST important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction?

Explanation

A disaster recovery plan is the most important aspect to ensure that a company can recover in case of severe environmental trouble or destruction. This plan outlines the steps and procedures to be followed in the event of a disaster, ensuring that the company can quickly and efficiently resume its operations. Offsite storage, alternate sites, and fault-tolerant systems are all important components of a disaster recovery plan, but the plan itself is the overarching strategy that ties everything together and provides a roadmap for recovery.

Submit
13.   How would someone test the integrity of a company’s backup
data?

Explanation

To test the integrity of a company's backup data, one can restore a part of the backup. This involves selecting a portion of the backup and restoring it to ensure that the data is accurately recovered and usable. By doing so, any potential issues or errors in the backup can be identified and addressed, ensuring that the backup data is reliable and can be relied upon in case of data loss or system failure.

Submit
14.   Choose the primary disadvantage of using a third party mail relay:

Explanation

Using a third party mail relay can be disadvantageous because spammers can take advantage of it. This means that spammers can use the third party mail relay to send unsolicited and unwanted emails to a large number of recipients, which can lead to an increase in spam emails that users receive. This can be frustrating for users and can also cause issues such as clogging up email servers and potentially compromising the security of the system.

Submit
15.   Choose the option that details one of the primary benefits of using S/MIME/Secure Multipurpose Internet Mail Extension?

Explanation

S/MIME allows users to send both encrypted and digitally signed email messages, which ensures the security and authenticity of the email communication. Encrypting email messages protects the content from unauthorized access, while digital signatures verify the identity of the sender and ensure the integrity of the message. This provides confidentiality, privacy, and trust in email communication, making it one of the primary benefits of using S/MIME.

Submit
16.   Which of the following is the best description about the method of controlling how and when users can connect in from home?

Explanation

A remote access policy is a set of rules and guidelines that dictate how and when users can connect to a network remotely from their homes. It outlines the authentication methods, security protocols, and access privileges that are allowed for remote connections. This policy ensures that only authorized users can connect to the network and helps to protect sensitive data from unauthorized access. It is the best description for controlling how and when users can connect from home as it provides a comprehensive framework for managing remote access to a network.

Submit
17.   From the list of protocols, which two are VPN (Virtual Private Network) tunneling protocols? (Select two)

Explanation

L2TP (Layer Two Tunneling Protocol) and PPTP (Point-to-Point Tunneling Protocol) are both VPN tunneling protocols. L2TP is a protocol that allows the creation of virtual private networks over the internet, providing secure communication between remote networks or users. PPTP is another protocol that enables the creation of VPN tunnels, allowing secure and encrypted communication between remote clients and a private network. Both protocols are commonly used in VPN implementations to ensure the confidentiality and integrity of data transmitted over the network.

Submit
18.   An SMTP server is the source of email spam in an organization. Which of the following is MOST likely the cause

Explanation

Anonymous relays allow anyone to send emails through the SMTP server without authentication. This can be exploited by spammers to send spam emails. Therefore, if anonymous relays have not been disabled, it is most likely the cause of the email spam in the organization.

Submit
19.   Which of the following would be the MOST common method of attackers to spoof email:

Explanation

Open relays are the most common method for attackers to spoof email. Open relays are mail servers that allow anyone to send emails through them, without requiring any authentication or verification. Attackers can exploit these open relays to send emails that appear to come from a different source, making it difficult to trace the origin of the email or identify the attacker. This method is often used for phishing attacks, spamming, and spreading malware.

Submit
20.   Users on a network report that they are receiving unsolicited emails from the same email address. Which action should be performed to prevent this from occurring?

Explanation

To prevent users from receiving unsolicited emails from the same email address, the best action to take is to install an anti-spam filter on the domain mail servers and filter the email address. This will allow the mail servers to identify and block spam emails coming from the specific email address, effectively preventing them from reaching the users' inboxes. This solution targets the root of the problem by filtering the emails at the server level, ensuring that all users on the network are protected from receiving these unsolicited emails.

Submit
21.   The concept that a web script is run in its own environment and cannot interfere with any other process is known as a :

Explanation

The concept that a web script is run in its own environment and cannot interfere with any other process is known as a sandbox. A sandbox is a security mechanism that isolates running programs, preventing them from accessing resources or data outside of their designated area. This ensures that any malicious or faulty code executed within the sandbox does not affect the rest of the system. Sandboxing is commonly used in web browsers and operating systems to enhance security and protect against potential threats.

Submit
22.   Which of the following uses private key/public key technology to secure web sites?

Explanation

SSL (Secure Sockets Layer) uses private key/public key technology to secure web sites. It encrypts the data transmitted between a web server and a client, ensuring that it cannot be intercepted or tampered with by unauthorized parties. The private key is used to encrypt the data, and the public key is used to decrypt it. This ensures that only the intended recipient can access the encrypted data. SSL is widely used to provide secure communication over the internet, particularly for e-commerce websites and other sites that handle sensitive information.

Submit
23.   Which types of keys will be used if a server and workstation communicate via SSL (Select TWO)

Explanation

When a server and workstation communicate via SSL, they use public keys and session keys. Public key encryption is used to establish a secure connection between the server and the workstation. The server's public key is used to encrypt data that can only be decrypted using the server's private key. Session keys are then used for the actual encryption and decryption of data during the SSL session. These session keys are randomly generated for each session and are used to encrypt and decrypt the data exchanged between the server and the workstation.

Submit
24.   Which of the following programming techniques should be used to prevent buffer overflow attacks?

Explanation

Input validation is the correct answer because it involves checking and validating user input to ensure it meets the expected criteria and does not exceed the allocated buffer size. By implementing proper input validation techniques, such as length checks, data type checks, and sanitization, potential buffer overflow vulnerabilities can be mitigated. This helps to prevent attackers from injecting malicious code or overwriting adjacent memory locations, thus protecting the system from buffer overflow attacks.

Submit
25.   A peer-to-peer computer network uses diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application. Which of the following is a security risk while using peer-to-peer software?

Explanation

Peer-to-peer software allows for direct communication and file sharing between participants in a network, without the need for centralized servers. This decentralized nature can increase the risk of data leakage, as there may not be strict control over who has access to the shared data. Additionally, participants in the network may have varying levels of security measures in place, making it easier for unauthorized individuals to access and leak sensitive information.

Submit
26.   Which of the following is a common type of attack on web servers?

Explanation

Buffer overflow is a common type of attack on web servers where a program or process tries to store more data in a buffer than it can handle. This can lead to the overflow of data into adjacent memory locations, potentially allowing an attacker to execute malicious code or gain unauthorized access to the system.

Submit
27.   Which one of the following options will allow for a network to remain operational after a T1 failure?

Explanation

Redundant ISP refers to having multiple Internet Service Providers (ISPs) connected to a network. In the event of a T1 failure, where the primary ISP connection is disrupted, the network can continue to operate by using the secondary or backup ISP connection. This redundancy ensures that there is an alternate route for network traffic, allowing the network to remain operational even if one ISP fails.

Submit
28.   The Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams (hereafter referred to as just “authentication”), and to provide protection against replays. Which of the following is correct about authentication header (AH)?

Explanation

The authentication information in the Authentication Header (AH) is a keyed hash based on all of the bytes in the packet. This means that the authentication information is generated by applying a hash function to all the bytes in the packet, using a secret key. This ensures that any modification to the packet will result in a different hash value, providing connectionless integrity. Additionally, the use of a secret key ensures data origin authentication, as only the sender with the correct key can generate the correct hash value.

Submit
29.   Which authentication method does the following sequence: logon request, encrypts value response, server, challenge, compare encrypts results, authorize or fail referred to?

Explanation

The given sequence of logon request, encrypts value response, server challenge, compare encrypts results, authorize or fail refers to the CHAP (Challenge Handshake Authentication Protocol) authentication method. CHAP is a protocol used to authenticate a remote user or device to a network. It involves a challenge-response mechanism where the server sends a challenge to the client, the client encrypts the challenge with a shared secret, and the server compares the encrypted results to authenticate the client. If the results match, the client is authorized, otherwise, it fails.

Submit
30.   Which of the following identifies the layer of the OSI model where SSL provides encryption?

Explanation

SSL (Secure Sockets Layer) provides encryption at the session layer of the OSI model. This layer is responsible for establishing, managing, and terminating connections between applications. SSL ensures secure communication by encrypting the data exchanged between the client and the server. It establishes a secure session and provides authentication, confidentiality, and integrity of the data transmitted.

Submit
31.   To reduce vulnerabilities on a web server, an administrator should adopt which of the following preventative measures?

Explanation

Applying the most recent manufacturer updates and patches to the server is a preventative measure to reduce vulnerabilities on a web server. Manufacturers regularly release updates and patches to fix security vulnerabilities and improve the server's overall performance. By keeping the server up to date with these updates, the administrator ensures that any known vulnerabilities are addressed and patched, reducing the risk of exploitation by attackers. This measure is essential for maintaining the security and integrity of the web server.

Submit
32.   Which is the correct order in which crucial equipment should draw power?

Explanation

The correct order in which crucial equipment should draw power is UPS line conditioner, UPS battery, and backup generator. This order ensures that the power is first conditioned by the line conditioner to stabilize voltage and remove any noise or fluctuations. Then, the UPS battery provides a backup power source in case of a power outage. Finally, the backup generator kicks in to provide continuous power supply for extended periods of time. This order ensures that the equipment receives clean and reliable power throughout.

Submit
33.   Recently, your company has implemented a work from home program. Employees should connect securely from home to the corporate network. Which encryption technology can be used to achieve this goal?

Explanation

IPSec (Internet Protocol Security) is the correct answer because it is a widely used encryption technology that provides secure communication over the internet. It can be used to establish a secure connection between the employee's home network and the corporate network, ensuring that data transmitted between the two is encrypted and protected from unauthorized access. IPSec can be implemented through VPN (Virtual Private Network) protocols to create a secure tunnel for remote access, making it an ideal choice for employees connecting securely from home to the corporate network.

Submit
34.   Your company’s website permits customers to search for a product and display the current price and quantity available of each product from the production database. Which of the following will invalidate an SQL injection attack launched from the lookup field at the web server level?

Explanation

not-available-via-ai

Submit
35.   Which of the following has largely replaced SLIP?

Explanation

PPP (Point to Point Protocol) has largely replaced SLIP (Serial Line Internet Protocol). SLIP was an older protocol used for establishing a direct connection between two devices over a serial line, typically for internet access. However, SLIP had limitations such as lack of error correction and authentication. PPP, on the other hand, is a more advanced protocol that provides error detection and correction, authentication, and multilink capabilities. It became the standard protocol for establishing internet connections and has largely replaced SLIP in modern networking environments. VPN (Virtual Private Network) is a separate technology used for secure remote access, not a replacement for SLIP. RADIUS (Remote Authentication Dial-In User Service) is a protocol used for centralized authentication, authorization, and accounting for remote access users, not a replacement for SLIP.

Submit
36.   Which of the following types of publicly accessible servers should have anonymous logins disabled to prevent an attacker from transferring malicious data?

Explanation

FTP (File Transfer Protocol) is a type of publicly accessible server that allows users to transfer files between computers. Disabling anonymous logins on an FTP server is important to prevent attackers from accessing the server without authentication and potentially transferring malicious data. By disabling anonymous logins, only authorized users with valid credentials can access the FTP server, reducing the risk of unauthorized access and data breaches.

Submit
37.   Which of the following is often misused by spyware to collect and report a user’s activities?

Explanation

Spyware often misuses tracking cookies to collect and report a user's activities. Tracking cookies are small text files that are placed on a user's computer by websites to track their online behavior. Spyware can exploit these cookies to gather information about the websites visited, search history, and other online activities of the user without their consent. This information is then reported back to the spyware's creator, compromising the user's privacy and security.

Submit
38.   Which of the following types of backups requires that files and software that have been changed since the last full backup be copied to storage media?

Explanation

A differential backup requires that files and software that have been changed since the last full backup be copied to storage media. This means that only the files that have been modified or added since the last full backup are included in the differential backup. This type of backup allows for faster restoration of data compared to a full backup, as it only requires restoring the last full backup and the differential backup.

Submit
39.   Which port must be open to allow a user to login remotely onto a workstation?

Explanation

Port 3389 must be open to allow a user to login remotely onto a workstation. This port is used by the Remote Desktop Protocol (RDP), which allows users to connect to and control a remote computer over a network connection. By opening port 3389, the necessary communication can take place between the user's device and the remote workstation, enabling remote login functionality. Ports 8080, 636, and 53 are used for different purposes and not specifically for remote login, making them incorrect answers.

Submit
40.   Which of the following could cause communication errors with an IPSec VPN tunnel because of changes made to the IP header?

Explanation

NAT (Network Address Translation) could cause communication errors with an IPSec VPN tunnel because it modifies the IP header by replacing the private IP address with a public IP address. This alteration can disrupt the IPSec VPN tunnel, as the original IP header information is changed and may not be recognized by the receiving end of the tunnel. DNS, SOCKS, and private addressing do not directly affect the IP header and therefore would not cause communication errors with an IPSec VPN tunnel due to changes made to the IP header.

Submit
41.   On a company’s LAN, port 3535 is typically blocked for outbound traffic. An end-user has recently purchased a legitimate business program that needs to make outbound calls through this port. Which step should be taken by a technician to allow this (Select TWO)

Explanation

To allow the legitimate business program to make outbound calls through port 3535, the technician should take two steps. First, they should open the port on the user's personal software firewall. This will ensure that the program is not blocked by the user's own firewall settings. Secondly, the technician should open the port on the company's firewall. This will allow the program to communicate through the LAN and make outbound calls using port 3535.

Submit
42.   The CHAP (Challenge Handshake Authentication Protocol) sends a logon request from the client to the server, and the server sends a challenge back to the client. At which stage does the CHAP protocol perform the handshake process? Choose the best complete answer.

Explanation

The CHAP protocol performs the handshake process at the stage when the connection is established and at any time after the connection has been established. This means that the logon request and challenge are sent during the initial connection setup, and the authentication process can continue to occur at any point after the connection has been established.

Submit
43.   Which of the following ports are typically used by email clients (Select TWO)

Explanation

Ports 110 and 143 are typically used by email clients. Port 110 is used for the Post Office Protocol version 3 (POP3), which is a protocol used to retrieve email from a mail server. Port 143 is used for the Internet Message Access Protocol (IMAP), which is a protocol used to access and manage email on a remote mail server.

Submit
44.   In a secure environment, which authentication mechanism will perform better?

Explanation

TACACS will perform better in a secure environment because it encrypts client-server negotiation dialogs. This means that the communication between the client and server is encrypted, providing an additional layer of security. RADIUS also provides remote access authentication, but it specifically encrypts client-server passwords, which may not be as comprehensive as encrypting the entire negotiation dialogs. Therefore, TACACS is the better authentication mechanism in terms of security in this scenario.

Submit
45.   Which of the following definitions should BEST suit the functions of an email server?

Explanation

An email server is a computer program or software that forms a platform on which messages are sent. It acts as a central hub for sending, receiving, and storing email messages. It manages the transmission of messages between different email clients and ensures that messages are delivered to the intended recipients. The email server also provides features like authentication, encryption, and spam filtering to enhance the security and reliability of email communication.

Submit
46.   Which of the following is the MOST significant flaw in Pretty Good Privacy (PGP) authentication?

Explanation

The most significant flaw in Pretty Good Privacy (PGP) authentication is that a user must trust the public key that is received. This means that if an attacker is able to intercept and replace the public key, the user would unknowingly be encrypting their messages with the attacker's key instead of the intended recipient's key. This flaw compromises the security and confidentiality of the communication, as the attacker can decrypt and read the intercepted messages.

Submit
47.   Which of the following connectivity is required for a web server that is hosting an SSL based web site?

Explanation

A web server hosting an SSL based website requires inbound connectivity on port 443. Port 443 is the default port for HTTPS (HTTP over SSL/TLS) communication. Inbound connectivity on this port allows the server to receive incoming HTTPS requests from clients and establish secure connections. This is necessary for the server to serve the SSL based website and encrypt the data transmitted between the server and the clients.

Submit
48.   Which statement is true about the cryptographic algorithm employed by TLS to establish a session key?

Explanation

Diffie-Hellman is the correct answer because it is a cryptographic algorithm used by TLS (Transport Layer Security) to establish a session key. Diffie-Hellman allows two parties to securely exchange cryptographic keys over an insecure channel without any prior communication or shared secret. This algorithm ensures that the session key is securely generated and shared between the client and the server, enabling secure communication between them.

Submit
49.   You work as the security administrator at your company. You must configure the firewall to support TACACS. Which port(s) should you open on the firewall?

Explanation

To support TACACS, the firewall needs to have Port 49 open. TACACS (Terminal Access Controller Access-Control System) is a remote authentication protocol that allows network devices to communicate with a central authentication server. Port 49 is the designated port for TACACS communication, so opening this port on the firewall will enable the necessary communication between the devices and the authentication server. Ports 161, 21, and 53 are not relevant to TACACS and do not need to be opened for this purpose.

Submit
50.   Which item can easily create an unencrypted tunnel between two devices?

Explanation

L2TP (Layer 2 Tunneling Protocol) can easily create an unencrypted tunnel between two devices. L2TP is a protocol that allows the creation of virtual private networks (VPNs) and enables the secure transmission of data over the internet. However, by default, L2TP does not provide encryption, so it can easily create an unencrypted tunnel between devices. It is important to note that for secure communication, encryption should be added to the L2TP tunnel using additional protocols such as IPsec.

Submit
51.   A technician is helping an organization to correct problems with staff members unknowingly downloading malicious code from Internet websites.Which of the following should the technician do to resolve the problem?

Explanation

To resolve the problem of staff members unknowingly downloading malicious code from Internet websites, the technician should disable unauthorized ActiveX controls. ActiveX controls are a common target for malware and disabling unauthorized ones will prevent staff members from inadvertently downloading malicious code. This action will help protect the organization's network and systems from potential security threats.

Submit
52.   Which practice can best code applications in a secure manner?

Explanation

Input validation is the practice that can best code applications in a secure manner. Input validation involves checking and filtering user input to ensure that it meets the expected criteria and does not contain any malicious or unexpected data. By validating input, developers can prevent common security vulnerabilities such as SQL injection and cross-site scripting attacks. This helps to ensure that the application only processes valid and safe data, reducing the risk of security breaches and protecting user information.

Submit
53.   Which of the following definitions fit correctly to TACACS?

Explanation

not-available-via-ai

Submit
54.   Following a disaster, which of the following functions should be returned FIRST from the backup facility to the primary facility?

Explanation

In the event of a disaster, it is important to prioritize the restoration of critical functions to ensure the continuity of operations. The least critical functions can be temporarily suspended or delayed without significantly impacting the overall functionality of the system. Therefore, returning the least critical functions first from the backup facility to the primary facility allows for a gradual recovery process, focusing on essential operations first and gradually restoring less critical functions.

Submit
55.   A company has instituted a VPN to allow remote users to connect to the office. As time progresses multiple security associations are created with each association being more secure. Which of the following should be implemented to automate the selection of the BEST security association for each user?

Explanation

To automate the selection of the BEST security association for each user in a VPN, IKE (Internet Key Exchange) should be implemented. IKE is a protocol used to establish a secure and authenticated connection between two devices. It allows the negotiation and selection of the appropriate security parameters, such as encryption algorithms (like 3DES or AES) and hashing algorithms (like SHA), based on the capabilities and requirements of the devices involved. By implementing IKE, the VPN can automatically determine and establish the most secure security association for each user, ensuring the highest level of security for the remote connections.

Submit
56.   When power must be delivered to critical systems, which of the following is a countermeasure?

Explanation

A backup generator is a countermeasure that can be used to deliver power to critical systems when needed. It provides an alternative power source in case of a power outage or failure. By having a backup generator in place, organizations can ensure that their critical systems continue to operate without interruption, minimizing downtime and potential losses. This is especially important in situations where uninterrupted power supply is crucial, such as in data centers, hospitals, or emergency response centers.

Submit
57.   Which of the following definitions fit correctly to PPTP?

Explanation

PPTP, or Point-to-Point Tunneling Protocol, supports encapsulation in a single point-to-point environment. This means that it is designed to create a secure connection between two devices or networks, allowing data to be transmitted safely over an untrusted network. It is commonly used for VPN (Virtual Private Network) connections, where it provides encryption and authentication for the data being transmitted between the client and the server. PPTP is not limited to UNIX systems and was not created by Cisco specifically for dial-up connections.

Submit
58.   Which of the following definitions fit correctly to RADIUS?

Explanation

RADIUS is a mechanism that allows authentication of dial-in and other network connections. It is commonly used in remote access environments to authenticate users and authorize their access to a network. RADIUS provides a centralized authentication and authorization service, allowing users to connect to a network using various protocols such as PPP, Ethernet, and Wi-Fi. It is widely used in enterprise networks, ISPs, and wireless networks to ensure secure and controlled access to resources.

Submit
59.   In computer programming, DLL injection is a technique used to run code within the address space of another process by forcing it to load a dynamic-link library. Which activity is MOST closely associated with DLL injection?

Explanation

DLL injection is most closely associated with penetration testing. Penetration testing involves actively testing the security of a system by attempting to exploit vulnerabilities, such as DLL injection, to gain unauthorized access or perform malicious activities. SQL servers, vulnerability assessment, and network mapping are also important activities in computer programming and security, but they are not directly related to DLL injection.

Submit
60.   Which authentication method will prevent a replay attack from occurring?

Explanation

CHAP (Challenge Handshake Authentication Protocol) is an authentication method that prevents replay attacks from occurring. In CHAP, the server challenges the client to prove its identity by sending a random number, and the client responds with a hash of the challenge and its password. This process is repeated periodically to ensure continued authentication. By using a different challenge each time, CHAP prevents an attacker from replaying a previously captured authentication exchange, thereby preventing replay attacks.

Submit
61.   Which of the following statements are true regarding File Sharing?

Explanation

The statement "When files are stored on a workstation, the connection is referred to as a peer-to-peer connection" is true. In a peer-to-peer connection, files are stored on individual workstations and can be directly shared between those workstations without the need for a central server. This is different from client-server connections where files are stored on a server and accessed by clients.

Submit
62.   Which of the following definitions BEST suit Java Applet?

Explanation

Java Applet is a program that runs within a web browser and requires the client browser to have the capability to run Java applets in a virtual machine on the client. This definition accurately describes the nature of Java Applet, as it is a client-side technology that relies on the browser's ability to execute Java code. The other definitions do not specifically address the requirement of running Java applets in a virtual machine, making them less suitable as definitions for Java Applet.

Submit
63.   A company’s security specialist is securing a web server that is reachable from the Internet. The web server is located in the core internal corporate network. The network cannot be redesigned and the server cannot be moved. Which of the following should the security specialist implement to secure the web server?

Explanation

A host-based firewall should be implemented to secure the web server because it is located in the core internal corporate network and cannot be moved. A host-based firewall is installed directly on the web server and provides an additional layer of protection by controlling incoming and outgoing network traffic specific to that server. This helps to prevent unauthorized access and potential attacks from reaching the server.

Submit
64.   To aid in preventing the execution of malicious code in email clients, which of the following should be done by the email administrator?

Explanation

To prevent the execution of malicious code in email clients, the email administrator should disable email client features. This is because certain features in email clients, such as automatic execution of scripts or opening attachments without user confirmation, can be exploited by malicious code. By disabling these features, the risk of executing malicious code is significantly reduced.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 19, 2010
    Quiz Created by
    Vtgamer
Cancel
  • All
    All (64)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  Which of the following has largely replaced SLIP?
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  ...
  Which practice can best code applications in a secure manner?
  Which of the following definitions fit correctly to TACACS?
  ...
  ...
  ...
  Which of the following definitions fit correctly to PPTP?
  Which of the following definitions fit correctly to RADIUS?
  ...
  ...
  ...
  Which of the following definitions BEST suit Java Applet?
  ...
  ...
Alert!

Advertisement