CompTIA Security+ Practice Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Kwsherri03
K
Kwsherri03
Community Contributor
Quizzes Created: 1 | Total Attempts: 234
| Attempts: 234 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which if the following technologies would you use if you need to implement a system that simulates a network of vulnerable devices, so that this network can be targeted by attackers ?

Explanation

A honeypot is a technology that would be used to implement a system that simulates a network of vulnerable devices. A honeypot is a decoy system that is intentionally designed to attract attackers. It appears to be a legitimate target, but in reality, it is isolated and closely monitored. By deploying a honeypot, organizations can gather information about attackers' tactics, techniques, and potential vulnerabilities in their systems. This information can then be used to enhance security measures and protect the actual network from real attacks.

Submit
Please wait...
About This Quiz
CompTIA Security+ Practice Exam - Quiz


Comptia Security+ Practice Exam- 1
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam.... see moreTime yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam. see less

2. For which of the following can biometrics be used?

Explanation

Biometrics devices use physical characteristics to identify the user.
Reference: Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda, Sybex, 2004, p 18

Submit
3. With _______________, access decisions are based on the roles that individual users have as part of an organization.

Explanation

With role-based access control, access decisions are based on the roles that individual users have as part of an organization. Users take on assigned roles (such as doctor, nurse, teller, manager). The process of defining roles should be based on a thorough analysis of how an organization operates and should include input from a wide spectrum of users in an organization.

Most access control systems are rule-based -- that is, they use a preset list of rules when deciding whether or not a user should have access to a resource; this is not specific to access control systems based on user role. Most networks use server-based access control to control access to network resources, however, local resources are typically under the control of the local machine. Neither is particularly unique to role-based access control. Some networks may use token-based access control, but that is not a requirement for role-based access control, either.

Submit
4. A password represents:

Explanation

Authentication is accomplished through something you know, something you have and/or something you are. The canonical example of something you know is a password or pass phrase. You might type or speak the value. A number of schemes are possible for obtaining what you know. It might be assigned to you, or you may have picked the value yourself. Constraints may exist regarding the form the value can take, or the alphabet from which you are allowed to construct the value might be limited to letters only. If you forget the value, you may not be able to authenticate yourself to the system.

Something you have, would be a physical item you possess, such as a smartcard. Something you are, would be a personal characteristic of you, not a piece of information you know.

Submit
5. A smartcard represents:

Explanation

Authentication is accomplished through something you know, something you have and/or something you are. One form of authentication requires possession of something ("something you have") such as a key, a smart card, a disk, or some other device. Whatever form it takes, the authenticating item should be difficult to duplicate and may require synchronization with systems other than the one to which you are requesting access. Highly secure environments may require you to satisfy multiple authentication criteria to guarantee authenticity.

Something you know, would be a piece of data known only to you, such as a password. Something you are, would be a physical characteristic of you, like your fingerprint.

Submit
6. You work as the security administrator at Certkiller .com. Certkiller has a RBAC (Role Based Access Control) compliant system for which you are planning the security implementation. There are three types of resources including files, printers, and mailboxes and four distinct departments with distinct functions including Sales, Marketing, Management, and Production in the system. Each department needs access to different resources. Each user has a workstation. Which roles should you create to support the RBAC (Role Based Access Control) model?

Explanation

Each distinct department (sales, marketing, management, and production) has their own role in the company, which probably includes using the: filer server, print server, and mail server. So it would be wise to create roles for each department.

Submit
7. What type of attacks occurs when a rogue application has been planted on an unsuspecting user's workstation?

Explanation

Trojan Horse attacks - This attack involves a rogue, Trojan horse application that has been planted on an unsuspecting user's workstation. The Trojan horse waits until the user submits a valid PIN from a trusted application, thus enabling usage of the private key, and then asks the smartcard to digitally sign some rogue data. The operation completes but the user never knows that their private key was just used against their will.

Physical attacks involve physical access to hardware such as a network cable or keyboard. Social engineering attacks are based on taking advantage of human interaction rather than technology itself. (Frequently, social engineering attacks don't even require access to a computer.) There is no such thing as a "logical" attack, although many attacks do involve the use of logic to figure out how an application works and where its security vulnerabilities may be.

Submit
8. An administrator wishes to enable network auditing policies. Which of the following should the security administrator log?

Explanation

The correct answer is "Both logon successes and logon failures" because by logging both logon successes and failures, the administrator can have a comprehensive view of all the login activities on the network. This will help in identifying any unauthorized access attempts or potential security breaches. Logging only logon failures for non-existent users or only logon successes or failures would provide incomplete information and may lead to overlooking important security incidents.

Submit
9. Microsoft supports the _______________ and ______standards for use in extranet.

Explanation

Netscape, Oracle, and Sun Microsystems have announced an alliance to ensure that their extranet products can work together by standardizing on JavaScript and the Common Object Request Broker Architecture (CORBA). Microsoft supports the Point-to-Point Tunneling Protocol (PPTP) and IPSec.

CORBA and DCOM are programming technologies.

Submit
10. Which of the following is NOT a valid access control mechanism?

Explanation

There is no such thing as a SAC (Subjective Access Control) list.

Submit
11. Which of the following attacks could be the most successful when the security technology is properly implemented and configured?

Explanation

Social Engineering attacks: in computer security systems, this type of attack is usually the most successful, especially when the security technology is properly implemented and configured. Usually, these attacks rely on the faults in human beings. An example of a social engineering attack has a hacker impersonating a network service technician. The serviceman approaches a low-level employee and requests their password for network servicing purposes. When using smartcards instead of passwords, this type of attack is a bit more difficult. Most people would not trust an impersonator wishing to have their smartcard and PIN for service purposes.

Logical, physical and Trojan horse attacks are often much less successful when security is properly implemented on a network.

Submit
12. Which of the following is an example of a task-based control model?

Explanation

not-available-via-ai

Submit
13. Which of the following is the most costly method of an authentication?

Explanation

Biometrics These technologies are becoming more reliable, and they will become widely used over the next few years. Many companies use smart cards as their primary method of access control. Implementations have been limited in many applications because of the high cost associated with these technologies. Reference: Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda, Sybex, 2004, p 265

Submit
14. Which of the following best describes an access control mechanism in which access control decisions are based on the responsibilities that an individual user or process has in an organization?

Explanation

The RBAC model allows a user to act in a certain predetermined manner based on the role the user holds in the organization. Users can be assigned certain roles system wide.

Reference: Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda, Sybex, 2004, p 12

Submit
15. Which of the following provides the best protection against an intercepted password?

Explanation

A one time password is simply a password that has to be changed every time you log on; effectively making any intercepted password good for only the brief interval of time before the legitimate user happens to login themselves. So by chance, if someone were to intercept a password it would probably already be expired, or be on the verge of expiration within a matter of hours.

Submit
16. A centralized database of remote users for a multi-site network typically uses

Explanation

RADIUS (Remote Authentication Dial-In User Service) lowers administration costs and increases security by having a centralized database for authenticating remote users. PAP is the simplest of authentication protocols, which uses clear text.

Submit
17. From a security perspective a performance baseline is MOST useful for:

Explanation

A performance baseline is most useful for detecting performance anomalies that may be due to security breaches. By establishing a baseline of normal performance, any deviations from this baseline can indicate potential security breaches or unauthorized activities. This allows for timely detection and response to security incidents. Assuring optimal system capacity, knowing when security scans will finish, and predicting the end of useful life for the firewall are not directly related to the security perspective of a performance baseline.

Submit
18. Why are clocks used in a Kerberos authentication system?

Explanation

The actual verification of a client's identity is done by validating an authenticator. The authenticator contains the client's identity and a timestamp. To insure that the authenticator is up-to-date and is not an old one that has been captured by an attacker, the timestamp in the authenticator is checked against the current time. If the timestamp is not close enough to the current time (typically within five minutes) then the authenticator is rejected as invalid. Thus, Kerberos requires your system clocks to be loosely synchronized (the default is 5 minutes, but it can be adjusted in Version 5 to be whatever you want).

Reference: http://www.faqs.org/faqs/kerberos-faq/general/section-22.html

Submit
19. With Discretionary access controls, who determines who has access and what privilege they have?

Explanation

Discretionary access controls can extend beyond limiting which subjects can gain what type of access to which objects. Administrators can limit access to certain times of day or days of the week. Typically, the period during which access would be permitted is 9 a.m. to 5 p.m. Monday through Friday. Such a limitation is designed to ensure that access takes place only when supervisory personnel are present, to discourage unauthorized use of data. Further, subjects' rights to access might be suspended when they are on vacation or leave of absence. When subjects leave an organization altogether, their rights must be terminated rather than merely suspended. Under this type of control, the owner determines who has access and what privilege they have.

If the end users of resources had control of who had access and what privileges they have, they would be able to access any resource, because they'd have the ability to change access controls at will. If only the administrators controlled access to resources, it would be a major job duty (as well as a bureaucratic bottleneck for users) that would take time away from other administrative activities.

Submit
20. Enforcing minimum privileges for general system users can be easily achieved through the use of:

Explanation

Explanation: Ensuring least privilege requires identifying what the user's job is, determining the minimum set of privileges required to perform that job, and restricting the user to a domain with those privileges and nothing more. By denying to subjects transactions that are not necessary for the performance of their duties, those denied privileges couldn't be used to circumvent the organizational security policy. Although the concept of least privilege currently exists within the context of the TCSEC, requirements restrict those privileges of the system administrator. Through the use of RBAC (role based access control), enforced minimum privileges for general system users can be easily achieved.

Submit
21. Which of the following is NOT a good password deployment guideline?

Explanation

Passwords should be easy to memorize, because that minimizes the chance that users will write the password down somewhere that others could see it.

Passwords should not be the same as the user ID, because that is one of the common passwords that common "password cracker" programs try, when attempting to discover passwords for accounts. Passwords must be changed at least once every 60 days (depending on your environment). Password aging or expiration must be enforced on all systems. Upon password expiration, if the password is not changed, only three grace logins must be allowed then the account must be disable until reset by an administrator or the help desk. Password reuse is not allowed (rotating passwords).

Submit
22. Identify the process where users can access numerous resources without needing multiple credentials?

Explanation

Single sign-on is a process where users can access numerous resources without needing multiple credentials. This means that once a user is authenticated into one system or application, they can automatically access other systems or applications without having to provide their credentials again. This simplifies the authentication process for users and improves user experience by eliminating the need to remember and enter multiple usernames and passwords.

Submit
23. A firewall can be classified as a:

Explanation

Rule based access control is based on a specific profile for each user. Information can be easily changed for only one user but this scheme may become a burden in a very large environment. A rule-based access control unit will intercept every request to the server and compare the source specific access conditions with the rights of the user in order to make an access decision. A good example could be a firewall. Here a set of rules defined by the network administrator is recorded in a file. Every time a connection is attempted (incoming or outgoing), the firewall software checks the rules file to see if the connection is allowed. If it is not, the firewall closes the connection.

Lattice-based access control is associated with Mandatory Access Control (MAC). Directory based and ID based access controls are not relevant.

Submit
24. ActiveX controls can be digitally signed using a technology called:

Explanation

The ActiveX code is bundled into a single file called an ActiveX control. ActiveX controls can be digitally signed using Microsoft's Authenticode technology. Internet Explorer can be configured to disregard any ActiveX control that isn't signed, to run only ActiveX controls that have been signed by specific publishers, or to accept ActiveX controls signed by any registered software publisher. ActiveX controls do not run in a sandbox. The burden is on the user to determine which ActiveX controls s/he feels are "safe" to run.

Applets and CGI are alternate types of content, and a sandbox refers to a protected area of the system in which web content runs.

Submit
25. Access controls that are not based on the policy are characterized as:

Explanation

Access controls that are not based on the policy are characterized as discretionary controls by the U.S. government and as need-to-know controls by other organizations. The latter term connotes least privilege - those who may read an item of data are precisely those whose tasks entail the need.

Mandatory controls are based on policy. Secret controls and corrective controls are not related to access control.

Submit
26. What is a protocol used for carrying authentication, authorization, and configuration information between a Network Access Server and a shared Authentication Server?

Explanation

RADIUS is a protocol for carrying authentication, authorization, and configuration information between a Network Access Server, which desires to authenticate its links and a shared Authentication Server. RADIUS uses a centralized database for simplified management. RADIUS is a standard published in RFC2138 as mentioned above.

The other protocols listed are network communication protocols, not authentication protocols responsible for carrying traffic between a NAS and an Authentication Server.

Submit
27. All logs are kept on archive for a period of time. What determines this period of time?

Explanation

All logs collected are used in the active and passive monitoring process. All logs are kept on archive for a period of time, called a retention period. This period of time will be determined by your company policies. This allows the use of logs for regular audits, and annual audits if retention is longer then a year. Logs must be secured to prevent modification, deletion, and destruction.

Administrator preference is often used to determine certain things like how long logs are retained ... but since these decisions can affect the ability of the company to go back and research potential security issues, it is a corporate issue that should be governed by a deliberate policy statement.

MTTF and MTTR are not relevant to setting the time for which logs will be retained. MTTF (Mean Time To Failure, sometimes called MTBF, Mean Time Before Failure) is related to the average amount of time a piece of equipment will be in service before it fails. MTTR (Mean Time To Repair) is a measure of how long it will take to repair the equipment when it fails.

Submit
28. Which of the following is an inherent flaw of DAC (Discretionary Access Control)?

Explanation

In a DAC model, network users have some flexibility regarding how information is accessed. This model allows users to dynamically share information with other users. The process allows a more flexible environment, but it increases the risk of unauthorized disclosure of information. Administrators will have a more difficult time ensuring that information access is controlled and that only appropriate access is given.

Reference: Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda, Sybex, 2004, p 440

Submit
29. Identify the access control model that makes use of security labels connected to the objects?

Explanation

The correct answer is that you should make use of the Mandatory Access Control (MAC) model. This model uses security labels connected to objects to determine access control. In MAC, access decisions are based on the sensitivity of the information being accessed and the security clearances of the subjects. This model is often used in environments where strict control over information flow is required, such as military or government organizations.

Submit
30. Which of the following ports does a DNS (Domain Name Service) server require?

Explanation

A DNS (Domain Name Service) server requires port 53. DNS servers are responsible for translating domain names into IP addresses, allowing users to access websites and other resources using human-readable names. Port 53 is specifically designated for DNS traffic, and it is used for both incoming and outgoing DNS queries and responses. By using this port, DNS servers can efficiently communicate with other DNS servers and clients to provide accurate and timely domain name resolution services.

Submit
31. Identify the access decisions based on a Mandatory Access Control (MAC) environment?

Explanation

Sensitivity labels are used in a Mandatory Access Control (MAC) environment to determine the level of sensitivity or classification of data. These labels are assigned to resources such as files, folders, or documents, and are used to control access based on the security clearance or level of authorization of users. By applying sensitivity labels, access decisions can be enforced in a MAC environment to ensure that only users with the appropriate clearance can access certain resources.

Submit
32. A company creates its own application that accesses the company databases and requires a unique login, based on the user’s domain account. The developer has an undocumented login for testing that does not need to be authenticated against the domain. Which of the following is a security issue regarding this scenario?

Explanation

The undocumented login for testing that does not need to be authenticated against the domain can be considered a security issue because it creates a potential backdoor into the company's databases. This means that someone who knows about this login could potentially gain unauthorized access to sensitive information and manipulate the company's data without going through the proper authentication process. This loophole in the application's security measures poses a significant risk to the company's data integrity and confidentiality.

Submit
33. The Certkiller .com network contains of various departments that makes use of an access control model. The finance department only requires access to the personal data of staff and the marketing department only needs access to the production data. Which access control model is MOST suitable?

Explanation

The Role Based Access Control (RBAC) access control model would be most suitable in this scenario. RBAC allows access to be based on the roles or responsibilities of users within an organization. In this case, the finance department only needs access to staff data, and the marketing department only needs access to production data. RBAC can easily assign specific roles to each department, ensuring that they only have access to the data that is relevant to their responsibilities. This model provides a more organized and efficient way to manage access control within the Certkiller.com network.

Submit
34. Which servers should be located on a private network?

Explanation

File and print servers typically contain sensitive data that should not be accessible to the public. Placing them on a private network ensures that only authorized users can access and manage the files and printers. Remote Access Server (RAS), E-mail server, and Web server, on the other hand, are often required to be accessible from the public network in order to provide remote access, email services, and web hosting respectively.

Submit
35. When an attacker captures part of a communication and later sends the communication segment to the server whilst pretending to be the user it is known as a:

Explanation

In a replay attack, an attacker captures a communication segment and later resends it to the server, pretending to be the original user. This allows the attacker to gain unauthorized access or perform malicious actions. TCP/IP hijacking attack refers to the manipulation of TCP/IP packets to gain unauthorized access. Man in the middle attack involves intercepting and altering communication between two parties. Back door attack refers to unauthorized access through a hidden entry point. Therefore, the correct term for this scenario is a replay attack.

Submit
36. Determine the access control model where users are assigned access rights based on their function within the organization?

Explanation

In Role Based Access Control (RBAC), users are assigned access rights based on their function within the organization. This means that users are given permissions based on their roles or job functions, rather than their individual identities. RBAC allows for more efficient and scalable access control management, as it simplifies the process of granting and revoking access rights by associating them with predefined roles. This model ensures that users have the necessary access to perform their job duties, while also maintaining security by limiting access to sensitive information.

Submit
37. Under MAC, a clearance is a

Explanation

MAC is the acronym for Mandatory Access Control. It is important to note that mandatory controls are prohibitive (i.e., all that is not expressly permitted is forbidden), not permissive. Only within that context do discretionary controls operate, prohibiting still more access with the same exclusionary principle. In this type of control system decisions are based on privilege (clearance) of subject (user) and sensitivity (classification) of object (file). It requires labeling.

In MAC, subjects (such as users) are each assigned a clearance (such as "secret" or "top secret"). Objects (containers for information, such as files) are assigned a sensitivity (classification, similar to clearance). When determining whether or not to grant a subject access to an object, the requesting subject's clearance is compared with the sensitivity of the object, and if the clearance is at or higher than the object's sensitivity level, access is granted. Therefore, a clearance functions as a privilege.

Submit
38. Least privilege is defined as giving access to information:

Explanation

Least privilege is a principle in information security that states that users should only have the minimum level of access necessary to perform their job tasks. This means that access to information should be granted based on what is needed to complete the task at hand, rather than factors such as management urgency, tenure at the company, or whether the information may be revealed to the public. Therefore, the correct answer is "needed to complete the task."

Submit
39. You work as the security administrator at Certkiller .com. You set permissions on a file object in a network operating system which uses DAC (Discretionary Access Control). The ACL (Access Control List) of the file is as follows: Owner: Read, Write, Execute User A: Read, Write, - User B: -, -, - (None) Sales: Read,-, - Marketing: -, Write, - Other Read, Write, - User "A" is the owner of the file. User "B" is a member of the Sales group. What effective permissions does User "B" have on the file?

Explanation

The Owner is allowed to: Read, Write, & Execute User A is allowed to: Read, Write, & - Sales is allowed to: Read, -, - Marketing is allowed to: -, Write, - Others are allowed to: Red, Write, - And User B is allowed to do nothing! -,-,-(None)

Submit
40. Which access controls are based on security labels assigned to every data item and every user?

Explanation

Mandatory Access Control (MAC) is an access control mechanism that uses security labels assigned to both data items and users to determine access permissions. MAC enforces access policies based on the security levels assigned to data and the security clearances of users. This ensures that only authorized users with appropriate clearances can access data with matching security labels. Role Based Access Control (RBAC) is a different access control mechanism that is based on assigning roles to users and granting permissions based on those roles. Discretionary Access Control (DAC) is another access control mechanism that allows data owners to determine access permissions. List Based Access Control (LBAC) is not a commonly used access control mechanism.

Submit
41. Under MAC, which of the following is true?

Explanation

MAC is the acronym for Mandatory Access Control. It is important to note that mandatory controls are prohibitive (i.e., all that is not expressly permitted is forbidden), not permissive. Only within that context do discretionary controls operate, prohibiting still more access with the same exclusionary principle. In this type of control system decisions are based on privilege (clearance) of subject (user) and sensitivity (classification) of object (file). It requires labeling.

Under MAC, you define who is allowed to access objects, and if you haven't defined an access right, access is not permitted. So, it is not the case that All that is expressly permitted is forbidden, or that All that is not expressly permitted is not forbidden

Submit
42. When using network monitoring systems to monitor workstations, which of the following elements should be reviewed because their information could indicate a possible attack ?

Explanation

Network counters and access denied errors should be reviewed because they can provide valuable information about a possible attack. Network counters can help identify abnormal network traffic patterns or spikes in data transfer, which could indicate a malicious activity. Access denied errors can indicate unauthorized attempts to access sensitive information or resources, suggesting a potential intrusion or attack. By monitoring these elements, network administrators can quickly detect and respond to potential security threats.

Submit
43. Which authentication will provide a username, a password and undergo a thumb print scan to access a workstation?

Explanation

Multifactor authentication is the correct answer because it requires multiple forms of identification to access a workstation. In this scenario, the user must provide a username, a password, and undergo a thumb print scan, which demonstrates the use of multiple factors for authentication. Biometric authentication only involves the thumb print scan and does not require a username or password. Kerberos authentication is a network authentication protocol and does not involve a thumb print scan. Mutual authentication involves both the client and the server verifying each other's identities, but does not require a thumb print scan. Therefore, multifactor authentication is the most appropriate choice in this scenario.

Submit
44. How many ports in TCP/IP (Transmission Control Protocol/Internet Protocol) are vulnerable to being scanned, exploited, or attached?

Explanation

The correct answer is 65,535. TCP/IP has a range of 65,535 ports, and each port is a unique identifier for different services or protocols. Some ports are well-known and commonly used, while others are less known and may be vulnerable to scanning, exploitation, or attack. Therefore, all 65,535 ports are potentially vulnerable to being scanned, exploited, or attacked.

Submit
45. Why are non-essential services appealing to attackers? (Choose TWO)

Explanation

Non-essential services are often appealing to attackers because they are less likely to be closely monitored or protected, making it easier for attackers to maintain their attacks without being detected. Additionally, non-essential services are often not configured correctly or secured, providing vulnerabilities that attackers can exploit to gain unauthorized access or control.

Submit
46. With RBAC, roles are:

Explanation

With RBAC (role-based access control), security is managed at a level that corresponds closely to the organization's structure. Each user is assigned one or more roles, and each role is assigned one or more privileges that are permitted to users in that role. Roles can be hierarchical.

Roles are not all equal. The point of RBAC is that different rules can be assigned different security privileges. Labels (such as secret, top secret, etc.) are more usually associated with MAC (Mandatory Access Control). RBAC roles are not typically determined by information flows.

Submit
47. What access control model is a Windows file server an example of?

Explanation

A Windows file server is an example of a Discretionary Access Control (DAC) model because it allows the owner of a file or folder to control access permissions and determine who can access and modify the file or folder. The owner can grant or revoke permissions for specific users or groups, giving them discretion over access rights. This model provides flexibility and allows for granular control over access permissions based on individual user needs and requirements.

Submit
48. Which of the following provides the strongest form of authentication?

Explanation

Biometrics is the use of authenticating a user by scanning on of their unique physiological body parts. Just like in the movies, a user places their hand on a finger print scanner or they put their eyes against a retinal scanner. If the image matches what's on the database, it authenticates the user. Since a persons fingerprint, blood vessel print, or retinal image is unique the only way the system can authenticate is if the proper user is there. The only way an unauthorized user to get access is to physically kidnap the authorized user and force them through the system. For this reason, biometrics are the strongest (and the costliest) for of authentication.

Submit
49. Why would reusing a ticket as a replay attack in Kerberos not be successful?

Explanation

Reusing a ticket as a replay attack in Kerberos would not be successful because the tickets are time stamped. This means that each ticket has a specific expiration time, and once that time has passed, the ticket becomes invalid. Therefore, even if an attacker were able to obtain a valid ticket, they would not be able to reuse it after its expiration time, making the replay attack ineffective.

Submit
50. What authentication model uses a smart card and a User ID/Password for accessing network resources?

Explanation

The correct answer is the Multifactor authentication model. This model uses multiple factors for authentication, such as a smart card and a User ID/Password, to provide a higher level of security. By requiring multiple factors, it reduces the risk of unauthorized access to network resources.

Submit
51. Identify the method that should be used to ensure that the user is able to authenticate to the server and the server to the user?

Explanation

Mutual authentication ensures that both the user and the server authenticate each other. This method requires the user to provide credentials to the server, and the server also presents its credentials to the user. This process establishes trust and verifies the identities of both parties involved in the authentication. By using mutual authentication, both the user and the server can be confident in each other's identity, enhancing the overall security of the authentication process.

Submit
52. You deploy a biometric authentication system in the Certkiller .com environment. Identify the tool that is reliable with the lowest cross over problem rate?

Explanation

The retina scanner is the most reliable tool with the lowest cross over problem rate for biometric authentication. Retina scanning technology uses unique patterns in the blood vessels of the retina, which are highly individual and difficult to replicate. This makes it a highly secure method of authentication, with a very low chance of false positives or false negatives. The other options, such as fingerprint, hand, and facial scanners, may have higher cross over problem rates due to the possibility of similarities or changes in the biometric features.

Submit
53. Which of the following is an effective measure against a certain type of brute force password attack?

Explanation

A brute force password attack involves trying many possible password values, to see if any result in access to an account. In order to help prevent dictionary-based attacks, in which the list of password values to try comes from a dictionary, it is useful to have a policy that any password used must not be a word found in a dictionary.

"Password reuse is not allowed" (i.e., rotating passwords), is a good policy, but not the one most closely related to helping prevent brute force password attacks. Password history must be used to prevent users from reusing passwords. For example, on many systems with such a facility the last 12 passwords used will be kept in the history. But as with policies against password re-use, password history is not as relevant to preventing brute force password attacks as is the policy against dictionary words.

Submit
54. Which of the following are used to make access decisions in a MAC (Mandatory Access Control) environment?

Explanation

Mandatory Access Control is a strict hierarchical model usually associated with governments. All objects are given security labels known as sensitivity labels and are classified accordingly. Then all users are given specific security clearances as to what they are allowed to access.

Submit
55. Which of the following best describes an access control mechanism that allows the data owner to create and administer access control?

Explanation

The DAC model allows the owner of a resource to establish privileges to the information they own. The DAC model would allow a user to share a file or use a file that someone else has shared. The DAC model establishes an ACL that identifies the users who have authorization to that information. This allows the owner to grant or revoke access to individuals or groups of individuals based on the situation. This model is dynamic in nature and allows information to be shared easily between users.

Reference: Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda, Sybex, 2004, p 12

Submit
56. Which of the following must be deployed for Kerberos to function correctly?

Explanation

Time synchronization is crucial because Kerberos uses server and workstation time as part of the authentication process.

Submit
57. In the Lattice Based Access Control model, controls are applied to:

Explanation

Information flow is clearly central to confidentiality but to some extent it also applies to integrity. The basic work in this area was done around 1970 and was driven mostly by the defense sector. Information flow in computer systems is concerned with flow from one security class (also called security label) to another. These controls are applied to objects. An object is a container of information; an object can be a directory or file.

Controls are part of the Lattice Based Access Control (Mandatory Access Control) model, not applied to the model. Factors and scripts are not involved in the model.

Submit
58. Which of the following access control methods allows access control decisions to be based on security labels associated with each data item and each user?

Explanation

The MAC model is a static model that uses a predefined set of access privileges to files on the system. The system administrator establishes these parameters and associates them with an account, files or resources. The MAC model can be very restrictive.

Reference: Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda, Sybex, 2004, p 11

Submit
59. Which of the following factors must be considered when implementing Kerberos authentication?

Explanation

If the key distribution centre is down, all of other systems dependent on those keys won't be able to function.

Submit
60. When does CHAP (Challenge Handshake Authentication Protocol) perform the handshake process?

Explanation

CHAP performs the handshake process when first establishing a connection; and then at random intervals during the transaction session.

Submit
61. Identify the authentication system where a unique username and password is used to access multiple systems within a company?

Explanation

Single Sign-on (SSO) is an authentication system where a unique username and password is used to access multiple systems within a company. With SSO, users only need to log in once and their credentials are then shared across multiple applications or systems, eliminating the need for separate logins for each system. This improves user experience and productivity by reducing the number of passwords to remember and simplifying the login process.

Submit
62. Which of the following protocols did Microsoft develop for use in VPNs?

Explanation

A protocol or set of communication rules called Point-to-Point Tunneling Protocol (PPTP) has been proposed that would make it possible to create a virtual private network (VPN) through "tunnels" over the Internet. This would mean that companies would no longer need their own leased lines for wide-area communication but could securely use the public networks. IPSec is more resource intensive, and provides higher security. IPSec is available in Windows 2000 and XP/.Net Operating Systems.

L2TP is a successor to PPTP. Its development was done by an industry coalition, and it includes the best features of PPTP and L2F. OSPF is a routing protocol.

Submit
63. What technology involves the use of electronic wallet?

Explanation

SET (Secure Electronic Transaction) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by MasterCard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality. SET makes use of Netscape's Secure Sockets Layer (SSL (Secure Sockets Layer)), Microsoft's Secure Transaction Technology (STT), and Terisa System's Secure Hypertext Transfer Protocol (S-HTTP). SET uses some but not all aspects of a public key infrastructure (public key infrastructure).

TLS, SSL and SHTTP could all be used for this, but SET is specific to the financial services industry.

Submit
64. Which of the following password generators is based on challenge-response mechanisms?

Explanation

An synchronous password generator, has an authentication server that generates a challenge (a large number or string) which is encrypted with the private key of the token device and has that token device's public key so it can verify authenticity of the request (which is independent from the time factor). That challenge can also include a hash of transmitted data, so not only can the authentication be assured; but also the data integrity.

Submit
65. Which of the following password management systems is designed to provide availability for a large number of users?

Explanation

A self service password reset is a system where if an individual user forgets their password, they can reset it on their own (usually by answering a secret question on a web prompt, then receiving a new temporary password on a pre-specified email address) without having to call the help desk. For a system with many users, this will significantly reduce the help desk call volume.

Submit
66. The majority of commercial intrusion detection systems are:

Explanation

The majority of commercial intrusion detection systems are network-based. These IDSs detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment, thereby protecting those hosts.

Historically, IDS started out as host-based, which is the other major type of IDS. Identity-based and signature-based are not types of IDS.

Submit
67. To allow your Windows clients to connect to your Windows NT Server using the public network as a medium, what technology might you find useful?

Explanation

A protocol or set of communication rules called Point-to-Point Tunneling Protocol (PPTP) has been proposed that would make it possible to create a virtual private network (VPN) through "tunnels" over the Internet. This would mean that companies would no longer need their own leased lines for wide-area communication but could securely use the public networks. IPSec is more resource intensive, and provides higher security. IPSec is available in Windows 2000 and XP/.Net Operating Systems.

L2TP is a successor to PPTP. Its development was done by an industry coalition, and it includes the best features of PPTP and L2F. OSPF is a routing protocol.

Submit
68. Which of the following intrusion detection technologies work by monitoring the file structure of a system to determine whether any system files were deleted or modified by an attacker ?

Explanation

System integrity verifier (SIV) is an intrusion detection technology that works by monitoring the file structure of a system. It checks whether any system files have been deleted or modified by an attacker. This technology helps to identify unauthorized changes to system files, which can be an indication of an intrusion or compromise. By regularly verifying the integrity of system files, SIV can alert administrators to potential security breaches and allow them to take appropriate action to mitigate the risk.

Submit
69. Which of the following access control methods provides the most granular access to protected objects?

Explanation

Access control lists enable devices in your network to ignore requests from specified users or systems, or grant certain network capabilities to them. ACLs allow a stronger set of access controls to be established in your network. The basic process of ACL control allows the administrator to design and adapt the network to deal with specific security threats.

Reference: Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda, Sybex, 2004, p 235

Submit
70. What is based upon an authentication server that allocates tickets to users?

Explanation

The Kerberos authentication method is based upon an authentication server that allocates tickets to users. Kerberos is a network authentication protocol that uses tickets to authenticate users to services and verify their identities. It provides secure communication over a non-secure network by using a trusted third party (the authentication server) to issue tickets that are used for authentication.

Submit
71. Which of the following is a feature of the Rule based access control?

Explanation

Rule based access control is based on a specific profile for each user. Information can be easily changed for only one user but this scheme may become a burden in a very large environment. A rule-based access control unit will intercept every request to the server and compare the source specific access conditions with the rights of the user in order to make an access decision. A good example could be a firewall. Here a set of rules defined by the network administrator is recorded in a file. Every time a connection is attempted (incoming or outgoing), the firewall software checks the rules file to see if the connection is allowed. If it is not, the firewall closes the connection.

Information flow labels are usually associated with Mandatory Access Control (MAC). Data flow diagrams are most commonly used in software development, not in rule-based access control. Tokens are usually used for authentication, a function which is important for any type of access control.

Submit
72. A passive response is the most common type of response to a number of intrusions. Which of the following is not a passive response strategy ?

Explanation

Deception is not a passive response strategy. Passive response strategies typically involve avoiding or ignoring the intrusion, such as with shunning or logging. Deception, on the other hand, is an active response strategy where false information or actions are used to mislead the intruder.

Submit
73.   Covert channel is a communication channel that can be used for:

Explanation

Covert channels: indirect ways for transmitting information with no explicit reading of confidential information. In other words, the communication is out in plain view, but "invisible" to those who don't know how to look for it. This kind of difficulty has induced some researchers to rethink from scratch the whole problem of guaranteeing security in computer systems. Some obscure techniques which can be utilized to create covert channels include hiding messages using the first letters of each word in a longer communication, blinking eyes in "Morse code" during a conversation, etc. Even something as mundane as some of the "signals" used by a baseball team, if non-obvious enough, could be considered a covert channel.

Covert channels are not a way to strengthen the security policy of an organization, hardening the system or protecting the DMZ -- they are a security risk, not a security-enhancing technique.

Submit
74. Which of the following services should be logged for security purpose?

Explanation

Requests for the following services should be logged on all systems: systat, bootp, tftp, sunrpc, snmp, snmp-trap, nfs. This list is rather UNIX-centric, nevertheless, it's possible for many of those services to be running on Windows as well (if you're running them, log them!).

Submit
75. In a RADIUS architecture, which of the following acts as a client?

Explanation

A Network Access Server (NAS) operates as a client of RADIUS. The client is responsible for passing user information to a designated RADIUS server, and then acting on the response, which is returned. Radius uses a centralized database, simplifying password management. The end user's computer does not make the RADIUS request. The NAS makes the request after receiving the network connection request from the end user.

Submit
76. Which of the following is a drawback of Network-based IDSs?

Explanation

Network-based IDSs cannot analyze encrypted information. This problem is increasing as more organizations (and attackers) use virtual private networks. Most network-based IDSs cannot tell whether or not an attack was successful; they can only discern that an attack was initiated. This means that after a network-based IDS detects an attack, administrators must manually investigate each attacked host to determine whether it was indeed penetrated.

Submit
77. With Java, what can be embedded in a web browser, allowing programs to be executed as they are downloaded from the World Wide Web?

Explanation

Java is a modern, object-oriented language that has a syntax similar to C++. It also has dynamic binding, garbage collection, and a simple inheritance model. Java is a general-purpose computer language and is not limited to writing web applications. References to java bytecode can be embedded in a web browser, allowing programs to be executed as they are downloaded from the World Wide Web. The JVM on the user's machine can execute the Java bytecode using an interpreter, or use a just-in-time compiler to convert the bytecode into native machine code.

Submit
78. With regard to DAC (Discretionary Access Control), which of the following statements are true?

Explanation

The DAC model allows the owner of a resource to establish privileges to the information they own. The DAC model would allow a user to share a file or use a file that someone else has shared. The DAC model establishes an ACL that identifies the users who have authorized to that information. This allows the owner to grant or revoke access to individuals or group of individuals based on the situation. This model is dynamic in nature and allows information to be shared easily between users.

Reference: Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda, Sybex, 2004, p 12

Submit
79. What model assigns sensitivity labels to users and their data?

Explanation

The Mandatory Access Control (MAC) access control model assigns sensitivity labels to users and their data. In this model, access decisions are based on predefined rules and policies set by the system administrator, rather than by individual users or roles. The sensitivity labels determine the level of access that users have to certain data or resources, and these labels are enforced by the system. This model is commonly used in highly secure environments where strict control over data access is necessary.

Submit
80. Which services is provided by message authentication codes?

Explanation

Message authentication codes (MACs) are cryptographic algorithms used to verify the integrity of a message. They ensure that the message has not been tampered with during transmission or storage. By generating a unique code or tag for each message, MACs provide a way to detect any unauthorized modifications to the message. Therefore, the correct answer is that message authentication codes are used to provide the Integrity service.

Submit
81. Determine the authentication mechanisms that use key fob based identification systems? (Choose TWO)

Explanation

The correct answers are Token and Username/password. Token refers to a physical device, such as a key fob, that generates a unique code for authentication. Username/password is a common authentication mechanism that can be combined with a key fob for added security. Kerberos, Biometrics, and Certificates are not specifically mentioned as using key fob based identification systems.

Submit
82. Which of the Following is an item most likely to be addressed in an Acceptable Use Policy

Explanation

An Acceptable Use Policy typically outlines the guidelines and rules for using a system or network. It includes the acceptable password length as a security measure to protect the system. It also includes the security measures that users are expected to follow, such as not sharing passwords or downloading unauthorized software. Additionally, the policy may address the authority and conditions for monitoring user activities to ensure compliance with the policy. Therefore, "Security Measures users are expected to Follow" is most likely to be addressed in an Acceptable Use Policy.

Submit
83. You work as the security administrator at Certkiller .com. You want to ensure that only encrypted passwords are used during authentication. Which authentication protocol should you use?

Explanation

CHAP is commonly used to encrypt passwords. It provides for on-demand authentication within an ongoing data transmission, that is repeated at random intervals during a session. The challenge response uses a hashing function derived from the Message Digest 5 (MD5) algorithm.

Submit
84. DAC are characterized by many organizations as:

Explanation

DAC is the acronym for Discretionary Access Controls. Access controls that are not based on the policy are characterized as discretionary controls by the U.S. government and as need-to-know controls by other organizations. The latter term connotes least privilege - those who may read an item of data are precisely those whose tasks entail the need.

Preventive controls and mandatory adjustable controls do not characterize DAC.

Submit
85. Which of the following terms represents a MAC (Mandatory Access Control) model?

Explanation

The word lattice is used to describe the upper and lower level bounds of a user' access permission.

Submit
86. Determine the two-factor authentication for an information system?

Explanation

The correct answer is "You should identify ATM card and PIN." Two-factor authentication involves using two different types of credentials to verify the identity of a user. In this case, the ATM card serves as the first factor, which is something the user possesses, and the PIN serves as the second factor, which is something the user knows. This combination provides an added layer of security to the information system, as it requires both the physical card and the knowledge of the PIN to gain access.

Submit
87. Creating a basic standard for application settings, security settings, and active services on every company laptop would be considered

Explanation

Creating a basic standard for application settings, security settings, and active services on every company laptop would be considered a security template. A security template is a predefined set of security configurations that can be applied to multiple systems to ensure consistency and enforce security policies. It helps in simplifying the process of securing systems by providing a baseline configuration that can be easily applied and managed.

Submit
88. Identify from the list below the access control models that makes use of subject and object labels?

Explanation

Mandatory Access Control (MAC) is an access control model that uses subject and object labels. In MAC, each subject and object is assigned a security label, and access is granted based on the comparison of these labels. The labels determine the level of sensitivity or classification of the subject or object, and access is allowed only if the subject's label has sufficient clearance to access the object's label. This ensures that access is controlled based on the security classification of the information or resources being accessed.

Submit
89. Which of the following best describes a challenge-response session?

Explanation

A common authentication technique whereby an individual is prompted (the challenge) to provide some private information (the response). Most security systems that rely on smart cards are based on challenge-response. A user is given a code (the challenge) which he or she enters into the smart card. The smart card then displays a new code (the response) that the user can present to log in. Reference: http://www.webopedia.com/TERM/C/challenge_response.html

Submit
90. Which of the following represents the best method for securing a web browser?

Explanation

Features that make web surfing more exciting like: ActiveX, Java, JavaScript, CGI scripts, and cookies all poise security concerns. Disabling them (which is as easy as setting your browser security level to High) is the best method of securing a web browser, since its simple, secure, and within every users reach

Submit
91. Which of the following is more of an irritation than a security threat?

Explanation

Adware is more of an irritation than a security threat. Unlike rootkits and Trojans, which are malicious software designed to gain unauthorized access or control over a computer system, adware is primarily focused on delivering unwanted advertisements. While adware can be intrusive and annoying, it does not typically pose a direct security risk to the user's personal information or system integrity. Therefore, adware is considered more of a nuisance rather than a significant security threat.

Submit
92. All of the following are correct about LDAP EXCEPT:

Explanation

The given correct answer is "all attributes will be encrypted". This means that in LDAP, not all attributes will be encrypted. While some implementations of LDAP may use x.509 certificates for securing communications, it does not guarantee that all attributes will be encrypted. Encryption of attributes is not a mandatory requirement in LDAP and can vary depending on the specific implementation and configuration.

Submit
93. In order to perform a TCP hijacking attack, an attacker would be required to:

Explanation

To perform a TCP hijacking attack, the attacker needs to know the IP addresses of both hosts and the sequence numbers of the TCP/IP packets. This information is crucial for the attacker to successfully intercept and manipulate the communication between the two hosts. By knowing the IP addresses, the attacker can target specific hosts, and by knowing the sequence numbers, they can insert their own malicious packets into the communication stream, potentially gaining unauthorized access or control over the connection. The other options mentioned, such as using a protocol analyzer, performing a man-in-the-middle attack, or obtaining MAC addresses, may be part of the overall attack strategy but are not specifically required for TCP hijacking.

Submit
94. Which of the following access control methods relies on user security clearance and data classification?

Explanation

Mandatory Access Control is a strict hierarchical model, first developed by governments and it is based on classifying data on importance and categorizing data by department. Users receive specific security clearances to access this data. For instance, the most important piece of data would have the highest classification, where only the President would of that department would have access; while the least important resources would be classified at the bottom where everyone in the organization including the janitors could access it.

Submit
95. Which of the following is a characteristic of MAC (Mandatory Access Control)?

Explanation

Mandatory Access Control is a strict hierarchical model, first developed by governments and it is based on classifying data on importance and categorizing data by department. Users receive specific security clearances to access this data. For instance, the most important piece of data would have the highest classification, where only the President would of that department would have access; while the least important resources would be classified at the bottom where everyone in the organization including the janitors could access it.

Submit
96. Which of the following are the main components of a Kerberos server?

Explanation

The main components of a Kerberos server are the authentication server, security database, and privilege server. The authentication server is responsible for verifying the identities of users and granting them access to the system. The security database stores information about users, their credentials, and permissions. The privilege server manages user privileges and determines what actions they are allowed to perform. These components work together to ensure secure authentication and authorization processes in a Kerberos server.

Submit
97. Identify the different types of certificate-based authentication? (Choose TWO)

Explanation

The question asks for the different types of certificate-based authentication. The correct answer states that many-to-one mapping and one-to-one mapping are two types of certificate-based authentication.

Submit
98. Certkiller .com deploy Kerberos authentication on the network. What does Kerberos need to function properly? (Choose TWO)

Explanation

not-available-via-ai

Submit
99. Which of the following will you consider as clear-text protocols?

Explanation

There are many clear-text protocols still in use today. Telnet is still alive and well. FTP and POP email both use clear-text protocols. Creating a server to emulate any of these services is trivial. Combining that and some DNS spoofing can cause "normal" traffic to come to your fake servers where the usernames and passwords can be obtained.

Submit
100. What is the access control model that explicitly assigns access rights to users?

Explanation

Discretionary Access Control (DAC) is an access control model where the owner of a resource has the ability to assign access rights to other users. In this model, the owner has discretion over who can access the resource and what level of access they have. This is different from Mandatory Access Control (MAC), where access rights are determined by a central authority, and Role Based Access Control (RBAC), where access rights are assigned based on predefined roles. Therefore, the correct answer is that assigning access rights to a client is a Discretionary Access Control (DAC) characteristic.

Submit
View My Results

Quiz Review Timeline (Updated): May 28, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 11, 2014
    Quiz Created by
    Kwsherri03
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which if the following technologies would you use if you need to...
For which of the following can biometrics be used?
With _______________, access decisions are based on the roles that...
A password represents:
A smartcard represents:
You work as the security administrator at Certkiller .com. Certkiller...
What type of attacks occurs when a rogue application has been planted...
An administrator wishes to enable network auditing policies. Which of...
Microsoft supports the _______________ and ______standards for use in...
Which of the following is NOT a valid access control mechanism?
Which of the following attacks could be the most successful when the...
Which of the following is an example of a task-based control model?
Which of the following is the most costly method of an authentication?
Which of the following best describes an access control mechanism in...
Which of the following provides the best protection against an...
A centralized database of remote users for a multi-site network...
From a security perspective a performance baseline is MOST useful for:
Why are clocks used in a Kerberos authentication system?
With Discretionary access controls, who determines who has access and...
Enforcing minimum privileges for general system users ...
Which of the following is NOT a good password deployment guideline?
Identify the process where users can access numerous resources without...
A firewall can be classified as a:
ActiveX controls can be digitally signed using a technology called:
Access controls that are not based on the policy are characterized as:
What is a protocol used for carrying authentication, authorization,...
All logs are kept on archive for a period of time. What determines...
Which of the following is an inherent flaw of DAC (Discretionary...
Identify the access control model that makes use of security labels...
Which of the following ports does a DNS (Domain Name Service) server...
Identify the access decisions based on a Mandatory Access Control...
A company creates its own application that accesses the company ...
The Certkiller .com network contains of various departments that makes...
Which servers should be located on a private network?
When an attacker captures part of a communication and later sends the...
Determine the access control model where users are assigned access...
Under MAC, a clearance is a
Least privilege is defined as giving access to information:
You work as the security administrator at Certkiller .com. You set...
Which access controls are based on security labels assigned to every...
Under MAC, which of the following is true?
When using network monitoring systems to monitor workstations, which...
Which authentication will provide a username, a password and undergo a...
How many ports in TCP/IP (Transmission Control Protocol/Internet...
Why are non-essential services appealing to attackers? (Choose TWO)
With RBAC, roles are:
What access control model is a Windows file server an example of?
Which of the following provides the strongest form of authentication?
Why would reusing a ticket as a replay attack in Kerberos not be...
What authentication model uses a smart card and a User ID/Password for...
Identify the method that should be used to ensure that the user is...
You deploy a biometric authentication system in the Certkiller .com...
Which of the following is an effective measure against a certain type...
Which of the following are used to make access decisions in a MAC...
Which of the following best describes an access control mechanism that...
Which of the following must be deployed for Kerberos to function...
In the Lattice Based Access Control model, controls are applied to:
Which of the following access control methods allows access control...
Which of the following factors must be considered when implementing...
When does CHAP (Challenge Handshake Authentication Protocol) perform...
Identify the authentication system where a unique username and...
Which of the following protocols did Microsoft develop for use in...
What technology involves the use of electronic wallet?
Which of the following password generators is based on...
Which of the following password management systems is designed to...
The majority of commercial intrusion detection systems are:
To allow your Windows clients to connect to your Windows NT Server...
Which of the following intrusion detection technologies work by...
Which of the following access control methods provides the most...
What is based upon an authentication server that allocates tickets to...
Which of the following is a feature of the Rule based access control?
A passive response is the most common type of response to a number of...
  Covert channel is a communication channel that can be used ...
Which of the following services should be logged for security purpose?
In a RADIUS architecture, which of the following acts as a client?
Which of the following is a drawback of Network-based IDSs?
With Java, what can be embedded in a web browser, allowing programs to...
With regard to DAC (Discretionary Access Control), which of the...
What model assigns sensitivity labels to users and their data?
Which services is provided by message authentication codes?
Determine the authentication mechanisms that use key fob based...
Which of the Following is an item most likely to be addressed in an...
You work as the security administrator at Certkiller .com. You want to...
DAC are characterized by many organizations as:
Which of the following terms represents a MAC (Mandatory Access...
Determine the two-factor authentication for an information system?
Creating a basic standard for application settings, security settings,...
Identify from the list below the access control models that makes use...
Which of the following best describes a challenge-response session?
Which of the following represents the best method for securing a web...
Which of the following is more of an irritation than a security ...
All of the following are correct about LDAP EXCEPT:
In order to perform a TCP hijacking attack, an attacker would be ...
Which of the following access control methods relies on user security...
Which of the following is a characteristic of MAC (Mandatory Access...
Which of the following are the main components of a Kerberos server?
Identify the different types of certificate-based authentication?...
Certkiller .com deploy Kerberos authentication on the network. What...
Which of the following will you consider as clear-text protocols?
What is the access control model that explicitly assigns access rights...
Alert!

Advertisement