Security + Practice Exam 3

26 Questions | Total Attempts: 856

SettingsSettingsSettings
Security Plus Quizzes & Trivia

This will assist you in port identification, IDS systems, Disaster Recovery, Encryption methods and much more. Good Luck!


Questions and Answers
  • 1. 
    Describe the most two common methods of email encryption
    • A. 

      PGP

    • B. 

      ECC

    • C. 

      RC5

    • D. 

      Blowfish

    • E. 

      S/MIME

  • 2. 
    How many keys are used in Public Key encryption?
    • A. 

      2

    • B. 

      6

    • C. 

      1

    • D. 

      4

  • 3. 
    How much uncompressed data is a SuperDLT tape expected to hold?
    • A. 

      1.2 TB

    • B. 

      200 GB

    • C. 

      400 GB

    • D. 

      100 GB

  • 4. 
    Name the IDS that is more ambitous and informative
    • A. 

      ECC

    • B. 

      Host-Based

    • C. 

      Network-Based

    • D. 

      Firewall-Based

  • 5. 
    What ports does Yahoo use? Choose all that apply
    • A. 

      5010

    • B. 

      2025

    • C. 

      5050

    • D. 

      1843

    • E. 

      161

  • 6. 
    What ports does AIM and ICQ use?
    • A. 

      88

    • B. 

      5190

    • C. 

      161

    • D. 

      67

  • 7. 
    Choose the 3 most common types of common firewalls.  Choose all that apply
    • A. 

      Proxy

    • B. 

      Stateful-inspection

    • C. 

      Packet-Filtering

    • D. 

      None of the above

  • 8. 
    Name two that can function as firewalls.  Choose two
    • A. 

      Proxy

    • B. 

      User

    • C. 

      Router

    • D. 

      Computer

    • E. 

      None of the above

  • 9. 
    Jim wants to set up a VPN for his main site as well as a satellite office.  Since there is no direct point to point connection there is a security risk involved.  What protocol would Jim secure the VPN?
    • A. 

      IDS

    • B. 

      IMAP

    • C. 

      SNMP

    • D. 

      IPsec

    • E. 

      None of the aboce

  • 10. 
    What two types of viruses are commonly transferred by email
    • A. 

      Trojan Horse

    • B. 

      Boot-sector virus

    • C. 

      EXE type virus

    • D. 

      Worm

  • 11. 
    RADIUS stands for Remote Authentication Dial-In User Service
    • A. 

      True

    • B. 

      False

  • 12. 
    Which port does RADIUS use?
    • A. 

      1812

    • B. 

      1512

    • C. 

      443

    • D. 

      88

  • 13. 
    Which port does Kerberos use?
    • A. 

      80

    • B. 

      25

    • C. 

      22

    • D. 

      88

    • E. 

      8080

  • 14. 
    Name a type of attack that is not Social Engineering.  Choose two
    • A. 

      Brute force attack

    • B. 

      Bogus Emails

    • C. 

      Port Scan

    • D. 

      Phone calls reporting need for password reset

  • 15. 
    Asymmetric uses how many keys?
    • A. 

      1

    • B. 

      128 bit stream

    • C. 

      64 bit block

    • D. 

      2

  • 16. 
    Name two protocols used by VPN. Choose two.
    • A. 

      IMAP

    • B. 

      PTPP

    • C. 

      SNMP

    • D. 

      L2TP

  • 17. 
    What is the most effective method of preventing Social Engineer security breaches. Choose two.
    • A. 

      Educate all users

    • B. 

      Fire an employee responsible for the breach

    • C. 

      Install an IDS

    • D. 

      Update and post new security bulletins

    • E. 

      Disable FTP externally

  • 18. 
    Cellular phones use RSA for encryption
    • A. 

      True

    • B. 

      False

  • 19. 
    What algorithm is used to secure an encryption?
    • A. 

      Hashing

    • B. 

      RC5

    • C. 

      Blowfish

    • D. 

      ECC

  • 20. 
    What is needed to implement DAC?
    • A. 

      ACL

    • B. 

      User Database

    • C. 

      Routing Table

    • D. 

      ARP

  • 21. 
    What port does NNTP use?
    • A. 

      143

    • B. 

      119

    • C. 

      53

    • D. 

      67

  • 22. 
    What port does DNS use?
    • A. 

      53

    • B. 

      23

    • C. 

      49

    • D. 

      25

  • 23. 
    What port does Telnet use?
    • A. 

      110

    • B. 

      23

    • C. 

      20

    • D. 

      162

  • 24. 
    How is your hash determined through asymmetric encryption?
    • A. 

      Hash of your password

    • B. 

      Hash of your user name

    • C. 

      Hash of your pass phrase

    • D. 

      Hash of the public key

  • 25. 
    How many hashing functions does CHAP use?
    • A. 

      One-way

    • B. 

      Two-way

    • C. 

      Three-way

    • D. 

      Five-way

Back to Top Back to top