SEC+ Study Guide I

99 Questions | Total Attempts: 106

SettingsSettingsSettings
Please wait...
Study Guide Quizzes & Trivia

801-900


Questions and Answers
  • 1. 
    QUESTION NO: 801 Which of the following access decisions are based on a Mandatory Access Control (MAC) environment?
    • A. 

      Access control lists

    • B. 

      Ownership

    • C. 

      Group membership

    • D. 

      Sensitivity labels

  • 2. 
    QUESTION NO: 802 Audit log information can BEST be protected by: (Select TWO).
    • A. 

      Using a VPN

    • B. 

      An IDS

    • C. 

      Access controls that restrict usage

    • D. 

      An intrusion prevention system (IPS)

    • E. 

      Recording to write-once media.

    • F. 

      Firewall that creates an enclave

  • 3. 
    QUESTION NO: 803 Non-essential services are often appealing to attackers because non-essential services: (Select TWO)
    • A. 

      Consume less bandwidth

    • B. 

      Are not visible to an IDS

    • C. 

      Provide root level access

    • D. 

      Decrease the surface area for the attack

    • E. 

      Are not typically configured correctly or secured

    • F. 

      Sustain attacks that go unnoticed

  • 4. 
    QUESTION NO: 804 A user downloads and installs a new screen saver and the program starts to rename and delete random files. Which of the following would be the BEST description of this program?
    • A. 

      Worm

    • B. 

      Virus

    • C. 

      Trojan horse

    • D. 

      Logic bomb

  • 5. 
    QUESTION NO: 805 Which of the following types of malicious software travels across computer networks without requiring a user to distribute the software?
    • A. 

      Virus

    • B. 

      Worm

    • C. 

      Trojan horse

    • D. 

      Logic bomb

  • 6. 
    QUESTION NO: 806 Which of the following should be done if an audit recording fails in an information system?
    • A. 

      Log off the user

    • B. 

      Overwrite the oldest audit records

    • C. 

      Stop generating audit records

    • D. 

      Send an alert to the appropriate personnel

  • 7. 
    QUESTION NO: 807 Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
    • A. 

      Multifactor

    • B. 

      Mutual

    • C. 

      Biometric

    • D. 

      Kerberos

  • 8. 
    QUESTION NO: 808 Which of the following steps is MOST often overlooked during the auditing process?
    • A. 

      Reviewing event logs regularly

    • B. 

      Enabling auditing on the system

    • C. 

      Auditing every system event

    • D. 

      Deciding what events to audit

  • 9. 
    QUESTION NO: 809 Kerberos uses which of the following ports by default?
    • A. 

      23

    • B. 

      88

    • C. 

      139

    • D. 

      443

  • 10. 
    QUESTION NO: 810 Turnstiles, double entry doors and security guards are all prevention measures for which of the following types of social engineering?
    • A. 

      Piggybacking

    • B. 

      Looking over a co-workersshould'er to retrieve information

    • C. 

      C. Looking through a co-worker's trash to retrieve information

    • D. 

      Impersonation

  • 11. 
    QUESTION NO: 811 Spam is considered a problem even when deleted before being opened because spam:
    • A. 

      Verifies the validity of an email address

    • B. 

      Corrupts the mail file

    • C. 

      Wastes company bandwidth

    • D. 

      Installs Trojan horse viruses

  • 12. 
    QUESTION NO: 812 Which of the following programming techniques should be used to prevent buffer overflow attacks?
    • A. 

      Input validation

    • B. 

      Nested loops

    • C. 

      Signed applets

    • D. 

      Automatic updates

  • 13. 
    QUESTION NO: 813 Which of the following authentication systems make use of the KDC Key Distribution Center?
    • A. 

      Certificates

    • B. 

      Security Tokens

    • C. 

      CHAP

    • D. 

      Kerberos

  • 14. 
    QUESTION NO: 814 Which of the following authentication methods increases the security of the authentication process because it must be in your physical possession?
    • A. 

      Smart Cards

    • B. 

      Kerberos

    • C. 

      CHAP

    • D. 

      Certificate

  • 15. 
    QUESTION NO: 815 Which of the following statements regarding authentication protocols is FALSE?
    • A. 

      PAP is insecure because usernames and passwords are sent over the network in clear text.

    • B. 

      CHAP is more secure than PAP because it encrypts usernames and passwords before they are sent over the network

    • C. 

      RADIUS is a client/server-based system that provides authentication, authorization, and accounting services for remote dial-up access

    • D. 

      MS-CHAP version 1 is capable of mutual authentication of both the client and the server.

  • 16. 
    QUESTION NO: 816 Which password management system best provides for a system with a large number of users?
    • A. 

      Self service password reset management systems

    • B. 

      Locally saved passwords management systems

    • C. 

      Multiple access methods management systems

    • D. 

      Synchronized passwords management systems

  • 17. 
    QUESTION NO: 817 Which definition best defines what a challenge-response session is?
    • A. 

      A challenge-response session is a workstation or system that produces a random challenge string that the user provides, when prompted, in conjunction with the proper PIN (Personal Identification Number).

    • B. 

      A challenge-response session is a workstation or system that produces a random login ID that the user provides, when prompted, in conjunction with the proper PIN (Personal Identification Number)

    • C. 

      A challenge-response session is a special hardware device used to produce random text in a cryptography system.

    • D. 

      A challenge-response session is the authentication mechanism in the workstation or system that does not determine whether the owner should be authenticated.

  • 18. 
    QUESTION NO: 818 For which reason are clocks used in Kerberos authentication?
    • A. 

      Clocks are used to ensure proper connections.

    • B. 

      Clocks are used to ensure that tickets expire correctly.

    • C. 

      Clocks are used to generate the seed value for the encryptions keys.

    • D. 

      Clocks are used to both benchmark and specify the optimal encryption algorithm.

  • 19. 
    QUESTION NO: 819 To reduce vulnerabilities on a web server, an administrator should adopt which of the following preventative measures?
    • A. 

      Use packet sniffing software on all inbound communications

    • B. 

      Apply the most recent manufacturer updates and patches to the server.

    • C. 

      Enable auditing on the web server and periodically review the audit logs

    • D. 

      Block all Domain Name Service (DNS) requests coming into the server.

  • 20. 
    QUESTION NO: 820 Which of the following is a common type of attack on web servers?
    • A. 

      Birthday

    • B. 

      Buffer overflow

    • C. 

      Spam

    • D. 

      Brute force

  • 21. 
    QUESTION NO: 821 The employees at a company are using instant messaging on company networked computers. The MOST important security issue to address when using instant messaging is that instant messaging:
    • A. 

      Communications are a drain on bandwidth

    • B. 

      Communications are open and unprotected

    • C. 

      Has no common protocol

    • D. 

      Uses weak encryption

  • 22. 
    QUESTION NO: 822 A VPN typically provides a remote access link from one host to another over:
    • A. 

      An intranet

    • B. 

      A modem

    • C. 

      A network interface card

    • D. 

      The Internet

  • 23. 
    QUESTION NO: 823 Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received?
    • A. 

      Anti-aliasing

    • B. 

      Data integrity

    • C. 

      Asymmetric cryptography

    • D. 

      Non-repudiation

  • 24. 
    QUESTION NO: 824 Which of the following portions of a company's network is between the Internet and an internal network?
    • A. 

      IDS

    • B. 

      Demilitarized zone (DMZ)

    • C. 

      Filter router

    • D. 

      Bastion host

  • 25. 
    QUESTION NO: 825 Which of the following is MOST often used to allow a client or partner access to a network?
    • A. 

      Extranet

    • B. 

      Intranet

    • C. 

      VLAN

    • D. 

      Demilitarized zone (DMZ)

Back to Top Back to top