Module IV & V Certification Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vtgamer
V
Vtgamer
Community Contributor
Quizzes Created: 5 | Total Attempts: 3,922
Questions: 64 | Attempts: 145

SettingsSettingsSettings
Module Quizzes & Trivia

SCOO certification quiz for security plus test test and retest


Questions and Answers
  • 1. 

      The Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams (hereafter referred to as just “authentication”), and to provide protection against replays. Which of the following is correct about authentication header (AH)?

    • A.

      The authentication information is a keyed hash based on all of the bytes in the packet.

    • B.

      The authentication information hash will remain the same if the bytes change on transfer

    • C.

      The authentication information may be the same on different packets if the integrity remains in place

    • D.

      The authentication information hash will increase by one if the bytes remain the same on transfer

    Correct Answer
    A. The authentication information is a keyed hash based on all of the bytes in the packet.
    Explanation
    The authentication information in the Authentication Header (AH) is a keyed hash based on all of the bytes in the packet. This means that the authentication information is generated by applying a hash function to all the bytes in the packet, using a secret key. This ensures that any modification to the packet will result in a different hash value, providing connectionless integrity. Additionally, the use of a secret key ensures data origin authentication, as only the sender with the correct key can generate the correct hash value.

    Rate this question:

  • 2. 

      Which port must be open to allow a user to login remotely onto a workstation?

    • A.

      3389

    • B.

      8080

    • C.

      636

    • D.

      53

    Correct Answer
    A. 3389
    Explanation
    Port 3389 must be open to allow a user to login remotely onto a workstation. This port is used by the Remote Desktop Protocol (RDP), which allows users to connect to and control a remote computer over a network connection. By opening port 3389, the necessary communication can take place between the user's device and the remote workstation, enabling remote login functionality. Ports 8080, 636, and 53 are used for different purposes and not specifically for remote login, making them incorrect answers.

    Rate this question:

  • 3. 

      Which of the following is the best description about the method of controlling how and when users can connect in from home?

    • A.

      Remote authentication

    • B.

      Remote access policy

    • C.

      Virtual Private Networking (VPN)

    • D.

      Terminal access control

    Correct Answer
    B. Remote access policy
    Explanation
    A remote access policy is a set of rules and guidelines that dictate how and when users can connect to a network remotely from their homes. It outlines the authentication methods, security protocols, and access privileges that are allowed for remote connections. This policy ensures that only authorized users can connect to the network and helps to protect sensitive data from unauthorized access. It is the best description for controlling how and when users can connect from home as it provides a comprehensive framework for managing remote access to a network.

    Rate this question:

  • 4. 

      Remote authentication allows you to authenticate Zendesk users using a locally hosted script. Which of the following is an example of remote authentication?

    • A.

      A user in one building logs on to the server in the same building

    • B.

      A user on a metropolitan area network (MAN) accesses a host by entering a username and password pair while not connected to the LAN.

    • C.

      A user on a campus area network (CAN) connects to a server in another building and enters a username and password pair.

    • D.

      A user in one city logs onto a network in another city

    Correct Answer
    D. A user in one city logs onto a network in another city
    Explanation
    Remote authentication refers to the process of authenticating users using a locally hosted script. In this scenario, the example of remote authentication is when a user in one city logs onto a network in another city. This means that the user is accessing a network that is physically located in a different location, and they are able to authenticate themselves using a username and password pair. This type of authentication allows users to securely access resources and services from a remote location, ensuring that only authorized individuals can gain access to the network.

    Rate this question:

  • 5. 

      You work as the security administrator at your company. You must configure the firewall to support TACACS. Which port(s) should you open on the firewall?

    • A.

      Port 49

    • B.

      Port 161

    • C.

      Port 21

    • D.

      Port 53

    Correct Answer
    A. Port 49
    Explanation
    To support TACACS, the firewall needs to have Port 49 open. TACACS (Terminal Access Controller Access-Control System) is a remote authentication protocol that allows network devices to communicate with a central authentication server. Port 49 is the designated port for TACACS communication, so opening this port on the firewall will enable the necessary communication between the devices and the authentication server. Ports 161, 21, and 53 are not relevant to TACACS and do not need to be opened for this purpose.

    Rate this question:

  • 6. 

      Which of the following definitions fit correctly to TACACS?

    • A.

      Are used to make connections between private networks across a public network, such as the Internet

    • B.

      Is an older protocol that was used in early remove access environments

    • C.

      It allows credentials to be accepted from multiple methods, including Kerberos

    • D.

      Has largely replaced SLIP and offers multiple protocol support including AppleTalk, IPX, and DECnet

    Correct Answer
    C. It allows credentials to be accepted from multiple methods, including Kerberos
  • 7. 

      Which item can easily create an unencrypted tunnel between two devices?

    • A.

      AES

    • B.

      L2TP

    • C.

      PPTP

    • D.

      HTTPS

    Correct Answer
    B. L2TP
    Explanation
    L2TP (Layer 2 Tunneling Protocol) can easily create an unencrypted tunnel between two devices. L2TP is a protocol that allows the creation of virtual private networks (VPNs) and enables the secure transmission of data over the internet. However, by default, L2TP does not provide encryption, so it can easily create an unencrypted tunnel between devices. It is important to note that for secure communication, encryption should be added to the L2TP tunnel using additional protocols such as IPsec.

    Rate this question:

  • 8. 

      Which of the following has largely replaced SLIP?

    • A.

      RADIUS (Remote Authentication Dial-In User Service)

    • B.

      SLIP (Serial Line Internet Protocol)

    • C.

      PPP (Point to Point Protocol)

    • D.

      VPN

    Correct Answer
    C. PPP (Point to Point Protocol)
    Explanation
    PPP (Point to Point Protocol) has largely replaced SLIP (Serial Line Internet Protocol). SLIP was an older protocol used for establishing a direct connection between two devices over a serial line, typically for internet access. However, SLIP had limitations such as lack of error correction and authentication. PPP, on the other hand, is a more advanced protocol that provides error detection and correction, authentication, and multilink capabilities. It became the standard protocol for establishing internet connections and has largely replaced SLIP in modern networking environments. VPN (Virtual Private Network) is a separate technology used for secure remote access, not a replacement for SLIP. RADIUS (Remote Authentication Dial-In User Service) is a protocol used for centralized authentication, authorization, and accounting for remote access users, not a replacement for SLIP.

    Rate this question:

  • 9. 

      Which authentication method does the following sequence: logon request, encrypts value response, server, challenge, compare encrypts results, authorize or fail referred to?

    • A.

      Security Tokens

    • B.

      Certificates

    • C.

      Kerberos

    • D.

      CHAP

    Correct Answer
    D. CHAP
    Explanation
    The given sequence of logon request, encrypts value response, server challenge, compare encrypts results, authorize or fail refers to the CHAP (Challenge Handshake Authentication Protocol) authentication method. CHAP is a protocol used to authenticate a remote user or device to a network. It involves a challenge-response mechanism where the server sends a challenge to the client, the client encrypts the challenge with a shared secret, and the server compares the encrypted results to authenticate the client. If the results match, the client is authorized, otherwise, it fails.

    Rate this question:

  • 10. 

      On a company’s LAN, port 3535 is typically blocked for outbound traffic. An end-user has recently purchased a legitimate business program that needs to make outbound calls through this port. Which step should be taken by a technician to allow this (Select TWO)

    • A.

      Change the user’s subnet mask

    • B.

      Open the port on the user’s personal software firewall

    • C.

      Open the port on the company’s firewall

    • D.

      Open the port on the VLAN

    Correct Answer(s)
    B. Open the port on the user’s personal software firewall
    C. Open the port on the company’s firewall
    Explanation
    To allow the legitimate business program to make outbound calls through port 3535, the technician should take two steps. First, they should open the port on the user's personal software firewall. This will ensure that the program is not blocked by the user's own firewall settings. Secondly, the technician should open the port on the company's firewall. This will allow the program to communicate through the LAN and make outbound calls using port 3535.

    Rate this question:

  • 11. 

      In a secure environment, which authentication mechanism will perform better?

    • A.

      RADIUS because it encrypts client-server passwords

    • B.

      TACACS because it encrypt client-server negotiation dialogs

    • C.

      TACACS because it is a remote access authentication service

    • D.

      RADIUS because it is a remote access authentication service

    Correct Answer
    B. TACACS because it encrypt client-server negotiation dialogs
    Explanation
    TACACS will perform better in a secure environment because it encrypts client-server negotiation dialogs. This means that the communication between the client and server is encrypted, providing an additional layer of security. RADIUS also provides remote access authentication, but it specifically encrypts client-server passwords, which may not be as comprehensive as encrypting the entire negotiation dialogs. Therefore, TACACS is the better authentication mechanism in terms of security in this scenario.

    Rate this question:

  • 12. 

      A VPN typically provides a remote access link from one host to another over:

    • A.

      An intranet

    • B.

      The Internet

    • C.

      A network interface card

    • D.

      A modem

    Correct Answer
    B. The Internet
    Explanation
    A VPN typically provides a remote access link from one host to another over the Internet. This means that users can securely connect to a private network from a remote location using the public Internet as the medium of communication. The VPN establishes a secure and encrypted connection, allowing users to access resources on the private network as if they were directly connected to it. This is a common method used by organizations to enable remote workers to securely access company resources.

    Rate this question:

  • 13. 

      Which authentication method will prevent a replay attack from occurring?

    • A.

      CHAP

    • B.

      L2TP

    • C.

      Kerberos

    • D.

      RADIUS

    Correct Answer
    A. CHAP
    Explanation
    CHAP (Challenge Handshake Authentication Protocol) is an authentication method that prevents replay attacks from occurring. In CHAP, the server challenges the client to prove its identity by sending a random number, and the client responds with a hash of the challenge and its password. This process is repeated periodically to ensure continued authentication. By using a different challenge each time, CHAP prevents an attacker from replaying a previously captured authentication exchange, thereby preventing replay attacks.

    Rate this question:

  • 14. 

      The CHAP (Challenge Handshake Authentication Protocol) sends a logon request from the client to the server, and the server sends a challenge back to the client. At which stage does the CHAP protocol perform the handshake process? Choose the best complete answer.

    • A.

      At the stage when the connection is established and when the connection is disconnected

    • B.

      At the stage when the connection is established and at which ever time after the connection has been established

    • C.

      At the stage when the connection is established

    • D.

      At the stage when the connection is disconnected

    Correct Answer
    B. At the stage when the connection is established and at which ever time after the connection has been established
    Explanation
    The CHAP protocol performs the handshake process at the stage when the connection is established and at any time after the connection has been established. This means that the logon request and challenge are sent during the initial connection setup, and the authentication process can continue to occur at any point after the connection has been established.

    Rate this question:

  • 15. 

      A company has instituted a VPN to allow remote users to connect to the office. As time progresses multiple security associations are created with each association being more secure. Which of the following should be implemented to automate the selection of the BEST security association for each user?

    • A.

      3DES

    • B.

      SHA

    • C.

      IKE

    • D.

      AES

    Correct Answer
    C. IKE
    Explanation
    To automate the selection of the BEST security association for each user in a VPN, IKE (Internet Key Exchange) should be implemented. IKE is a protocol used to establish a secure and authenticated connection between two devices. It allows the negotiation and selection of the appropriate security parameters, such as encryption algorithms (like 3DES or AES) and hashing algorithms (like SHA), based on the capabilities and requirements of the devices involved. By implementing IKE, the VPN can automatically determine and establish the most secure security association for each user, ensuring the highest level of security for the remote connections.

    Rate this question:

  • 16. 

      Which of the following definitions fit correctly to PPTP?

    • A.

      It is primarily a point-to-point protocol

    • B.

      It supports encapsulation in a single point-to-point environment

    • C.

      It is a tunneling protocol originally designed for UNIX systems

    • D.

      It was created by Cisco as a method of creating tunnels primarily for dial-up connections

    Correct Answer
    B. It supports encapsulation in a single point-to-point environment
    Explanation
    PPTP, or Point-to-Point Tunneling Protocol, supports encapsulation in a single point-to-point environment. This means that it is designed to create a secure connection between two devices or networks, allowing data to be transmitted safely over an untrusted network. It is commonly used for VPN (Virtual Private Network) connections, where it provides encryption and authentication for the data being transmitted between the client and the server. PPTP is not limited to UNIX systems and was not created by Cisco specifically for dial-up connections.

    Rate this question:

  • 17. 

      Which of the following definitions fit correctly to RADIUS?

    • A.

      Is an older protocol that was used in early remote access environments

    • B.

      Are used to make connections between private networks across a public network, such as the Internet

    • C.

      Is a mechanism that allows authentication of dial-in and other network connections

    • D.

      Has largely replaced SLIP and offers multiple protocol support including AppleTalk, IPX, and DECnet

    Correct Answer
    C. Is a mechanism that allows authentication of dial-in and other network connections
    Explanation
    RADIUS is a mechanism that allows authentication of dial-in and other network connections. It is commonly used in remote access environments to authenticate users and authorize their access to a network. RADIUS provides a centralized authentication and authorization service, allowing users to connect to a network using various protocols such as PPP, Ethernet, and Wi-Fi. It is widely used in enterprise networks, ISPs, and wireless networks to ensure secure and controlled access to resources.

    Rate this question:

  • 18. 

      In a secure environment, which authentication mechanism performs better?

    • A.

      RADIUS because it encrypts client-server passwords

    • B.

      TACACS because it encrypts client-server negotiation dialogs

    • C.

      TACACS because it is a remote access authentication service

    • D.

      RADIUS because it is a remote access authentication service

    Correct Answer
    B. TACACS because it encrypts client-server negotiation dialogs
    Explanation
    TACACS performs better in a secure environment because it encrypts client-server negotiation dialogs. This means that the communication between the client and server is protected and cannot be easily intercepted or accessed by unauthorized individuals. This encryption adds an extra layer of security to the authentication process, making it more robust and reliable in maintaining the confidentiality and integrity of the authentication data.

    Rate this question:

  • 19. 

      Recently, your company has implemented a work from home program. Employees should connect securely from home to the corporate network. Which encryption technology can be used to achieve this goal?

    • A.

      PPTP

    • B.

      L2TP

    • C.

      PPPoE

    • D.

      IPSec

    Correct Answer
    D. IPSec
    Explanation
    IPSec (Internet Protocol Security) is the correct answer because it is a widely used encryption technology that provides secure communication over the internet. It can be used to establish a secure connection between the employee's home network and the corporate network, ensuring that data transmitted between the two is encrypted and protected from unauthorized access. IPSec can be implemented through VPN (Virtual Private Network) protocols to create a secure tunnel for remote access, making it an ideal choice for employees connecting securely from home to the corporate network.

    Rate this question:

  • 20. 

      Which of the following could cause communication errors with an IPSec VPN tunnel because of changes made to the IP header?

    • A.

      DNS

    • B.

      SOCKS

    • C.

      NAT

    • D.

      Private addressing

    Correct Answer
    C. NAT
    Explanation
    NAT (Network Address Translation) could cause communication errors with an IPSec VPN tunnel because it modifies the IP header by replacing the private IP address with a public IP address. This alteration can disrupt the IPSec VPN tunnel, as the original IP header information is changed and may not be recognized by the receiving end of the tunnel. DNS, SOCKS, and private addressing do not directly affect the IP header and therefore would not cause communication errors with an IPSec VPN tunnel due to changes made to the IP header.

    Rate this question:

  • 21. 

      From the list of protocols, which two are VPN (Virtual Private Network) tunneling protocols? (Select two)

    • A.

      PPP (Point-to-Point Protocol)

    • B.

      SLIP (Serial Line Internet Protocol)

    • C.

      L2TP (Layer Two Tunneling Protocol)

    • D.

      SMTP (Simple Mail Transfer Protocol

    • E.

      PPTP (Point-to-Point Tunneling Protocol)

    Correct Answer(s)
    C. L2TP (Layer Two Tunneling Protocol)
    E. PPTP (Point-to-Point Tunneling Protocol)
    Explanation
    L2TP (Layer Two Tunneling Protocol) and PPTP (Point-to-Point Tunneling Protocol) are both VPN tunneling protocols. L2TP is a protocol that allows the creation of virtual private networks over the internet, providing secure communication between remote networks or users. PPTP is another protocol that enables the creation of VPN tunnels, allowing secure and encrypted communication between remote clients and a private network. Both protocols are commonly used in VPN implementations to ensure the confidentiality and integrity of data transmitted over the network.

    Rate this question:

  • 22. 

      Which of the following definitions should BEST suit the functions of an email server?

    • A.

      Makes use of a port used specifically for messages to be sent through

    • B.

      Detect the viruses in the messages received from various sources and send warnings to the recipient to warn him/her of the risky mail

    • C.

      Forms a platform on which messages are sent

    • D.

      Notify you that a message carries a virus

    Correct Answer
    C. Forms a platform on which messages are sent
    Explanation
    An email server is a computer program or software that forms a platform on which messages are sent. It acts as a central hub for sending, receiving, and storing email messages. It manages the transmission of messages between different email clients and ensures that messages are delivered to the intended recipients. The email server also provides features like authentication, encryption, and spam filtering to enhance the security and reliability of email communication.

    Rate this question:

  • 23. 

      An SMTP server is the source of email spam in an organization. Which of the following is MOST likely the cause

    • A.

      The administrator account was not secured

    • B.

      X.400 connectors have not been password protected

    • C.

      Anonymous relays have not been disabled

    • D.

      Remote access to the email application’s install directory has not been removed

    Correct Answer
    C. Anonymous relays have not been disabled
    Explanation
    Anonymous relays allow anyone to send emails through the SMTP server without authentication. This can be exploited by spammers to send spam emails. Therefore, if anonymous relays have not been disabled, it is most likely the cause of the email spam in the organization.

    Rate this question:

  • 24. 

      The employees at a company are using instant messaging on company networked computers. The MOST important security issue to address when using instant messaging is that instant messaging:

    • A.

      Uses weak encryption

    • B.

      Communications are open and unprotected

    • C.

      Communications are a drain on bandwidth

    • D.

      Has no common protocol

    Correct Answer
    B. Communications are open and unprotected
    Explanation
    The most important security issue to address when using instant messaging is that communications are open and unprotected. This means that the messages being sent can be intercepted and read by unauthorized individuals, posing a risk to the confidentiality of sensitive information. It is crucial to implement encryption measures to ensure that the messages are securely transmitted and only accessible to the intended recipients.

    Rate this question:

  • 25. 

      Which of the following would be the MOST common method of attackers to spoof email:

    • A.

      Web proxy

    • B.

      Trojan horse programs

    • C.

      Man in the middle attacks

    • D.

      Open relays

    Correct Answer
    D. Open relays
    Explanation
    Open relays are the most common method for attackers to spoof email. Open relays are mail servers that allow anyone to send emails through them, without requiring any authentication or verification. Attackers can exploit these open relays to send emails that appear to come from a different source, making it difficult to trace the origin of the email or identify the attacker. This method is often used for phishing attacks, spamming, and spreading malware.

    Rate this question:

  • 26. 

      Which of the following attacks are being referred to if someone is accessing your email server and sending inflammatory information to others?

    • A.

      Trojan Horse

    • B.

      Repudiation Attack

    • C.

      Polymorphic Virus

    • D.

      Phage Virus

    Correct Answer
    B. Repudiation Attack
    Explanation
    A repudiation attack refers to the unauthorized access of an email server by an individual who then uses it to send inflammatory information to others. This attack allows the attacker to deny their involvement or claim that they did not send the malicious emails. It is a form of cyber attack that aims to manipulate or deceive recipients by sending false or harmful information from someone else's account, causing reputational damage or spreading false information. This attack can be detrimental to both individuals and organizations, as it can lead to legal consequences and damage relationships.

    Rate this question:

  • 27. 

      Users on a network report that they are receiving unsolicited emails from the same email address. Which action should be performed to prevent this from occurring?

    • A.

      Install an ACL on the firewall to block traffic from the sender and filter the IP address

    • B.

      Configure rules on the users host and restart the host

    • C.

      Install an anti-spam filter on the domain mail servers and filter the email address

    • D.

      Configure a rule in each users router and restart the router

    Correct Answer
    C. Install an anti-spam filter on the domain mail servers and filter the email address
    Explanation
    To prevent users from receiving unsolicited emails from the same email address, the best action to take is to install an anti-spam filter on the domain mail servers and filter the email address. This will allow the mail servers to identify and block spam emails coming from the specific email address, effectively preventing them from reaching the users' inboxes. This solution targets the root of the problem by filtering the emails at the server level, ensuring that all users on the network are protected from receiving these unsolicited emails.

    Rate this question:

  • 28. 

      Which of the following is the MOST significant flaw in Pretty Good Privacy (PGP) authentication?

    • A.

      A user must trust the public key that is received

    • B.

      Weak encryption can be easily broken

    • C.

      Private keys can be compromised

    • D.

      It is subject to a man-in-the-middle attack

    Correct Answer
    A. A user must trust the public key that is received
    Explanation
    The most significant flaw in Pretty Good Privacy (PGP) authentication is that a user must trust the public key that is received. This means that if an attacker is able to intercept and replace the public key, the user would unknowingly be encrypting their messages with the attacker's key instead of the intended recipient's key. This flaw compromises the security and confidentiality of the communication, as the attacker can decrypt and read the intercepted messages.

    Rate this question:

  • 29. 

      To aid in preventing the execution of malicious code in email clients, which of the following should be done by the email administrator?

    • A.

      Spam and anti-virus filters should be used

    • B.

      Regular updates should be performed

    • C.

      Preview screens should be disabled

    • D.

      Email client features should be disabled

    Correct Answer
    D. Email client features should be disabled
    Explanation
    To prevent the execution of malicious code in email clients, the email administrator should disable email client features. This is because certain features in email clients, such as automatic execution of scripts or opening attachments without user confirmation, can be exploited by malicious code. By disabling these features, the risk of executing malicious code is significantly reduced.

    Rate this question:

  • 30. 

      Choose the primary disadvantage of using a third party mail relay:

    • A.

      A third party mail relay limits access to specific users

    • B.

      Spammers can utilize the third party mail relay

    • C.

      A third party mail relay restricts spammers from gaining access

    • D.

      A third party mail relay restricts the types of email that may be sent

    Correct Answer
    B. Spammers can utilize the third party mail relay
    Explanation
    Using a third party mail relay can be disadvantageous because spammers can take advantage of it. This means that spammers can use the third party mail relay to send unsolicited and unwanted emails to a large number of recipients, which can lead to an increase in spam emails that users receive. This can be frustrating for users and can also cause issues such as clogging up email servers and potentially compromising the security of the system.

    Rate this question:

  • 31. 

      Choose the option that details one of the primary benefits of using S/MIME/Secure Multipurpose Internet Mail Extension?

    • A.

      S/MIME expedites the delivery of email messages

    • B.

      S/MIME allows users to send both encrypted an digitally signed email messages

    • C.

      S/MIME allows users to send email messages with a return receipt

    • D.

      S/MIME allows users to send anonymous email messages

    Correct Answer
    B. S/MIME allows users to send both encrypted an digitally signed email messages
    Explanation
    S/MIME allows users to send both encrypted and digitally signed email messages, which ensures the security and authenticity of the email communication. Encrypting email messages protects the content from unauthorized access, while digital signatures verify the identity of the sender and ensure the integrity of the message. This provides confidentiality, privacy, and trust in email communication, making it one of the primary benefits of using S/MIME.

    Rate this question:

  • 32. 

      A network administrator advises the server administrator of his company to implement whitelisting, blacklisting, closing open relays and strong authentication techniques. What threat is being addressed?

    • A.

      Viruses

    • B.

      Spam

    • C.

      Adware

    • D.

      Spyware

    Correct Answer
    B. Spam
    Explanation
    The network administrator's advice to implement whitelisting, blacklisting, closing open relays, and strong authentication techniques indicates that the threat being addressed is spam. These measures are commonly used to prevent unwanted and unsolicited emails from reaching the company's servers and networks. Whitelisting allows only approved senders to deliver emails, blacklisting blocks known spam sources, closing open relays prevents unauthorized use of the server to send spam, and strong authentication ensures that only legitimate users can access the email system.

    Rate this question:

  • 33. 

      Which of the following types of publicly accessible servers should have anonymous logins disabled to prevent an attacker from transferring malicious data?

    • A.

      DNS

    • B.

      Web

    • C.

      Email

    • D.

      FTP

    Correct Answer
    D. FTP
    Explanation
    FTP (File Transfer Protocol) is a type of publicly accessible server that allows users to transfer files between computers. Disabling anonymous logins on an FTP server is important to prevent attackers from accessing the server without authentication and potentially transferring malicious data. By disabling anonymous logins, only authorized users with valid credentials can access the FTP server, reducing the risk of unauthorized access and data breaches.

    Rate this question:

  • 34. 

      A peer-to-peer computer network uses diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application. Which of the following is a security risk while using peer-to-peer software?

    • A.

      Data leakage

    • B.

      Cookies

    • C.

      Multiple streams

    • D.

      Licensing

    Correct Answer
    A. Data leakage
    Explanation
    Peer-to-peer software allows for direct communication and file sharing between participants in a network, without the need for centralized servers. This decentralized nature can increase the risk of data leakage, as there may not be strict control over who has access to the shared data. Additionally, participants in the network may have varying levels of security measures in place, making it easier for unauthorized individuals to access and leak sensitive information.

    Rate this question:

  • 35. 

      Which of the following statements are true regarding File Sharing?

    • A.

      FTP is a protocol, a client, and a server

    • B.

      As discussed earlier, SSH is a program that allows connections to be secured by encrypting the session between the client and the server

    • C.

      Security was based on the honor system

    • D.

      When files are stored on a workstation, the connection is referred to as a peer-to-peer connection

    Correct Answer
    D. When files are stored on a workstation, the connection is referred to as a peer-to-peer connection
    Explanation
    The statement "When files are stored on a workstation, the connection is referred to as a peer-to-peer connection" is true. In a peer-to-peer connection, files are stored on individual workstations and can be directly shared between those workstations without the need for a central server. This is different from client-server connections where files are stored on a server and accessed by clients.

    Rate this question:

  • 36. 

      Which of the following ports are typically used by email clients (Select TWO)

    • A.

      110

    • B.

      143

    • C.

      194

    • D.

      3389

    • E.

      49

    Correct Answer(s)
    A. 110
    B. 143
    Explanation
    Ports 110 and 143 are typically used by email clients. Port 110 is used for the Post Office Protocol version 3 (POP3), which is a protocol used to retrieve email from a mail server. Port 143 is used for the Internet Message Access Protocol (IMAP), which is a protocol used to access and manage email on a remote mail server.

    Rate this question:

  • 37. 

      Which of the following identifies the layer of the OSI model where SSL provides encryption?

    • A.

      Application

    • B.

      Transport

    • C.

      Session

    • D.

      Network

    Correct Answer
    C. Session
    Explanation
    SSL (Secure Sockets Layer) provides encryption at the session layer of the OSI model. This layer is responsible for establishing, managing, and terminating connections between applications. SSL ensures secure communication by encrypting the data exchanged between the client and the server. It establishes a secure session and provides authentication, confidentiality, and integrity of the data transmitted.

    Rate this question:

  • 38. 

      Which practice can best code applications in a secure manner?

    • A.

      Object oriented coding

    • B.

      Rapid Application Development (RAD)

    • C.

      Cross-site scripting

    • D.

      Input validation

    Correct Answer
    D. Input validation
    Explanation
    Input validation is the practice that can best code applications in a secure manner. Input validation involves checking and filtering user input to ensure that it meets the expected criteria and does not contain any malicious or unexpected data. By validating input, developers can prevent common security vulnerabilities such as SQL injection and cross-site scripting attacks. This helps to ensure that the application only processes valid and safe data, reducing the risk of security breaches and protecting user information.

    Rate this question:

  • 39. 

      Which of the following definitions BEST suit Java Applet?

    • A.

      The client browser must have the ability to run Java applets in a virtual machine on the client

    • B.

      It can also include a digital signature to verify authenticity

    • C.

      It is a programming language that allows access to system resources of the system running the script

    • D.

      It allows customized controls, icons, and other features to increase the usability of web enabled systems

    Correct Answer
    A. The client browser must have the ability to run Java applets in a virtual machine on the client
    Explanation
    Java Applet is a program that runs within a web browser and requires the client browser to have the capability to run Java applets in a virtual machine on the client. This definition accurately describes the nature of Java Applet, as it is a client-side technology that relies on the browser's ability to execute Java code. The other definitions do not specifically address the requirement of running Java applets in a virtual machine, making them less suitable as definitions for Java Applet.

    Rate this question:

  • 40. 

      Which of the following is a common type of attack on web servers?

    • A.

      Spam

    • B.

      Brute force

    • C.

      Buffer overflow

    • D.

      Birthday

    Correct Answer
    C. Buffer overflow
    Explanation
    Buffer overflow is a common type of attack on web servers where a program or process tries to store more data in a buffer than it can handle. This can lead to the overflow of data into adjacent memory locations, potentially allowing an attacker to execute malicious code or gain unauthorized access to the system.

    Rate this question:

  • 41. 

      The concept that a web script is run in its own environment and cannot interfere with any other process is known as a :

    • A.

      Sandbox

    • B.

      Honey pot

    • C.

      VLAN

    • D.

      Quarantine

    Correct Answer
    A. Sandbox
    Explanation
    The concept that a web script is run in its own environment and cannot interfere with any other process is known as a sandbox. A sandbox is a security mechanism that isolates running programs, preventing them from accessing resources or data outside of their designated area. This ensures that any malicious or faulty code executed within the sandbox does not affect the rest of the system. Sandboxing is commonly used in web browsers and operating systems to enhance security and protect against potential threats.

    Rate this question:

  • 42. 

      Which of the following would be an easy way to determine whether a secure webpage has a valid certificate?

    • A.

      Contact Thawte or Versign and ask about the web page

    • B.

      Contact the web page’s web master

    • C.

      Right click on the lock at the bottom of the browser and check the certificate information

    • D.

      Ensure that the web URL starts with ‘https://’

    Correct Answer
    C. Right click on the lock at the bottom of the browser and check the certificate information
    Explanation
    Right-clicking on the lock at the bottom of the browser and checking the certificate information would be an easy way to determine whether a secure webpage has a valid certificate. This action allows the user to view the details of the certificate, such as the issuer, expiration date, and any warnings or errors associated with it. By examining this information, the user can verify the authenticity and validity of the certificate, ensuring that the webpage is secure.

    Rate this question:

  • 43. 

      A PC is rejecting push updates from the server; all other PCs on the network are accepting the updates successfully. What should be examined first?

    • A.

      Pop-up blocker

    • B.

      Anti-spyware

    • C.

      Local firewall

    • D.

      Password expiration

    Correct Answer
    C. Local firewall
    Explanation
    The local firewall should be examined first because it is responsible for controlling the network traffic on the PC. If the local firewall is blocking the push updates from the server, it could be the reason why the PC is rejecting them while other PCs on the network are accepting them successfully. By checking the local firewall settings and ensuring that it is not blocking the updates, the issue can potentially be resolved.

    Rate this question:

  • 44. 

      Which of the following uses private key/public key technology to secure web sites?

    • A.

      SSL

    • B.

      Access Control List (ACL)

    • C.

      Media Access Control (MAC)

    • D.

      TCP

    Correct Answer
    A. SSL
    Explanation
    SSL (Secure Sockets Layer) uses private key/public key technology to secure web sites. It encrypts the data transmitted between a web server and a client, ensuring that it cannot be intercepted or tampered with by unauthorized parties. The private key is used to encrypt the data, and the public key is used to decrypt it. This ensures that only the intended recipient can access the encrypted data. SSL is widely used to provide secure communication over the internet, particularly for e-commerce websites and other sites that handle sensitive information.

    Rate this question:

  • 45. 

      To reduce vulnerabilities on a web server, an administrator should adopt which of the following preventative measures?

    • A.

      Block all Domain Name Service (DNS) requests coming into the server.

    • B.

      Apply the most recent manufacturer updates and patches to the server

    • C.

      Enable auditing on the web server and periodically review the audit logs.

    • D.

      Use packet sniffing software on all inbound communications

    Correct Answer
    B. Apply the most recent manufacturer updates and patches to the server
    Explanation
    Applying the most recent manufacturer updates and patches to the server is a preventative measure to reduce vulnerabilities on a web server. Manufacturers regularly release updates and patches to fix security vulnerabilities and improve the server's overall performance. By keeping the server up to date with these updates, the administrator ensures that any known vulnerabilities are addressed and patched, reducing the risk of exploitation by attackers. This measure is essential for maintaining the security and integrity of the web server.

    Rate this question:

  • 46. 

      Which of the following connectivity is required for a web server that is hosting an SSL based web site?

    • A.

      Port 443 outbound

    • B.

      Port 80 inbound

    • C.

      Port 80 outbound

    • D.

      Port 443 inbound

    Correct Answer
    D. Port 443 inbound
    Explanation
    A web server hosting an SSL based website requires inbound connectivity on port 443. Port 443 is the default port for HTTPS (HTTP over SSL/TLS) communication. Inbound connectivity on this port allows the server to receive incoming HTTPS requests from clients and establish secure connections. This is necessary for the server to serve the SSL based website and encrypt the data transmitted between the server and the clients.

    Rate this question:

  • 47. 

      A technician is helping an organization to correct problems with staff members unknowingly downloading malicious code from Internet websites.Which of the following should the technician do to resolve the problem?

    • A.

      Implement a policy to minimize the problem

    • B.

      Use Java virtual machines to reduce impact

    • C.

      Install a NIDS

    • D.

      Disable unauthorized ActiveX controls

    Correct Answer
    D. Disable unauthorized ActiveX controls
    Explanation
    To resolve the problem of staff members unknowingly downloading malicious code from Internet websites, the technician should disable unauthorized ActiveX controls. ActiveX controls are a common target for malware and disabling unauthorized ones will prevent staff members from inadvertently downloading malicious code. This action will help protect the organization's network and systems from potential security threats.

    Rate this question:

  • 48. 

      In computer programming, DLL injection is a technique used to run code within the address space of another process by forcing it to load a dynamic-link library. Which activity is MOST closely associated with DLL injection?

    • A.

      Vulnerability assessment

    • B.

      Penetration testing

    • C.

      SQL servers

    • D.

      Network mapping

    Correct Answer
    C. SQL servers
    Explanation
    DLL injection is most closely associated with penetration testing. Penetration testing involves actively testing the security of a system by attempting to exploit vulnerabilities, such as DLL injection, to gain unauthorized access or perform malicious activities. SQL servers, vulnerability assessment, and network mapping are also important activities in computer programming and security, but they are not directly related to DLL injection.

    Rate this question:

  • 49. 

      Which types of keys will be used if a server and workstation communicate via SSL (Select TWO)

    • A.

      Recovery key

    • B.

      Public key

    • C.

      Keylogger

    • D.

      Session key

    Correct Answer(s)
    B. Public key
    D. Session key
    Explanation
    When a server and workstation communicate via SSL, they use public keys and session keys. Public key encryption is used to establish a secure connection between the server and the workstation. The server's public key is used to encrypt data that can only be decrypted using the server's private key. Session keys are then used for the actual encryption and decryption of data during the SSL session. These session keys are randomly generated for each session and are used to encrypt and decrypt the data exchanged between the server and the workstation.

    Rate this question:

  • 50. 

      Which of the following programming techniques should be used to prevent buffer overflow attacks?

    • A.

      Automatic updates

    • B.

      Signed applets

    • C.

      Nested loops

    • D.

      Input validation

    Correct Answer
    D. Input validation
    Explanation
    Input validation is the correct answer because it involves checking and validating user input to ensure it meets the expected criteria and does not exceed the allocated buffer size. By implementing proper input validation techniques, such as length checks, data type checks, and sanitization, potential buffer overflow vulnerabilities can be mitigated. This helps to prevent attackers from injecting malicious code or overwriting adjacent memory locations, thus protecting the system from buffer overflow attacks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 19, 2010
    Quiz Created by
    Vtgamer
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.