1.
Which of the following accepts authentication requests from remote clients?
Correct Answer
B. RADIUS Server
Explanation
The RADIUS server would be challenging the users request first, the request may then be received by any of the internal servers later.
2.
Which of the following can be used to provide security for a VPN?
Correct Answer
B. IPSec
Explanation
IPSec is a security protocol that can be implemented on any IP-based setup. It is ideal VPN security solution.
3.
Which of the following would not help with dedicated authentication to dial-in clients?
Correct Answer
A. RRAS
Explanation
RRAS is a Microsoft based Router-cum-RAS service.
4.
L2TP can work over IPX based networks. Y/N?
Correct Answer
A. Yes
Explanation
L2TP (Layer 2 Tunneling Protocol) was created by Cisco as well as Microsoft. It is meant to function over IP, IPX and SNA networks.
5.
Which of the following is the best way to obtain vulnerability related information for database servers?
Correct Answer
B. Look up related web sites
Explanation
There are web sites that keep updating vulnerability information for different platforms. It is ideal to constantly browse these sites to obtain required information.
6.
Infrared rays have a wide and far reachability. T/F?
Correct Answer
B. False
Explanation
The Infrared communication requires line of sight. The device that intends communication will have to be placed in the line of sight for communication to be possible.
7.
A Modem modulates and demodulates data signals. T/F?
Correct Answer
A. True
Explanation
As the name suggests the modem mainly modulates and demodulates signals, it is responsible for converting the analog signals of the telephone to the digital signals required by the PC and vice versa.
8.
An RJ-11 connector would belong to which of the following layers?
Correct Answer
A. pHysical layer
Explanation
RJ-11 connector belongs to the physical layer. The physical layer sets rules for connectivity and signal strength.
9.
Which of the following communications does not use the 2.4 GHz frequency?
Correct Answer
C. Radio frequency
Explanation
The microwave and the Wireless 802.11g and b all operate on the 2.4 GHz range. Radio frequency does not use the 2.4 GHz range.
10.
Which of the following firewall types will allow for port security?
Correct Answer
B. Packet filtering
Explanation
Port filtering is done in packet filtering firewall types. Application filtering is irrelevant.
11.
Which of the following is capable of functioning as a Firewall?
Correct Answer
B. Router
Explanation
The Router is capable of acting as a firewall as it can do filtering using ACL.
12.
The Stateful inspection firewall, monitors connection status based on the routing table. T/F?
Correct Answer
B. False
Explanation
The Stateful inspection firewall, monitors connection status based on the state table.
13.
Stateful inspection firewall will operate on all the 7 layers of the OSI reference model. T/F?
Correct Answer
B. False
Explanation
Stateful Inspection firewall will not operate on all the & layers of OSI reference mode.
14.
An Access policy is nothing but the access control list. T/F?
Correct Answer
B. False
Explanation
The access control list may be created based on what the access policy dictates.
15.
Which of the following firewall policies is most restrictive?
Correct Answer
B. Deny all
Explanation
The �deny all� is the most restrictive statement that is implicitly defined in the fireall when no other statement is configured. This will get applied to all packets that do not match with the criteria mentioned in the list above the �deny all� statement.
16.
Which of the following will be verified first for an incoming packet?
Correct Answer
C. Destination address
Explanation
The firewall will first look at the destination address.
17.
Port number 110 relates to Web services. T/F?
Correct Answer
B. False
Explanation
Port number 80 relates to Web services
18.
OS hardening is not possible on web servers. T/F?
Correct Answer
B. False
Explanation
OS hardening is very much possible and essential for Web server.
19.
Which of the following models for hosting a Database server is most secure?
Correct Answer
B. Three-tier model
Explanation
A three-tier model ensures security to your database server as the database server cannot be directly accessed in this model.
20.
Which of the following accounts should be renamed for network resources safety?
Correct Answer
A. Guest account
Explanation
A guest account has to be renamed so that an intruder cannot guess the user name for the guest account and try to use it to access the network. Renaming admin account is also recommended (but that is not an option stated in the question)
21.
Port number for internal web server is 80. T/F?
Correct Answer
A. True
Explanation
The port number 80 is the default HTTP port to which clients connect. This is also used for internal webserver.
22.
FAT is the most secure of all Microsoft based file system. Y/N?
Correct Answer
B. No
Explanation
NTFS is the most secure of all Microsoft based file system.