Chat with us, powered by LiveChat com530 all quizes | Writedemy

com530 all quizes

com530 all quizes

Question

quizes

Question 1.1.An activist can best be described as which of the following? (Points : 5)

 
 
 
 

Question 2.2.Which type of firewall policy calls for a firewall to deny all traffic by default? (Points : 5)

 
 
 
 

Question 3.3.What is a program that appears to do something useful but is actually malware? (Points : 5)

 
 
 
 

Question 4.4.In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated? (Points : 5)

 
 
 
 

Question 5.5.Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications? (Points : 5)

 
 
 
 

Question 6.6.How large is the IPv6 address space? (Points : 5)

 
 
 
 

Question 7.7.Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped? (Points : 5)

 
 
 
 

Question 8.8.Which protocol is responsible for automatic assignment of IP addresses? (Points : 5)

 
 
 
 

Question 9.9.Which of the following is not an advantage of IPv6 versus IPv4? (Points : 5)

 
 
 
 

Question 10.10.Which of the following is a valid IPv6 address? (Points : 5)

 
 
 
 

Question 11.11.Which TCP flag can be the default response to a probe on a closed port? (Points : 5)

 
 
 
 

Question 12.12.Which of the following is the description of a land attack? (Points : 5)

 
 
 
 

Question 13.13.What is the typical packet sequence for closing a TCP session? (Points : 5)

 
 
 
 

Question 14.14.Which of the following is an element of the TCP header that can indicate that a connection has been established? (Points : 5)

 
 
 
 

Question 15.15.Of what category of attack is a DoS attack an example? (Points : 5)

 
 
 
 

Question 16.16.What uses mathematical calculations to compare routes based on some measurement of distance? (Points : 5)

 
 
 
 

Question 17.17.Which protocol that runs on Cisco routers shares information between Cisco devices? (Points : 5)

 
 
 
 

Question 18.18.Which of the following is true about ACLs on Cisco routers? (Points : 5)

 
 
 
 

Question 19.19.Which of the following types of traffic does NOT travel through routers? (Points : 5)

 
 
 
 

Question 20.20.Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router? (Points : 5)

 
 
 
 

Question 1.1.Which of the following is the first step in the digital signature process where Mike sends a message to Sophie? (Points : 5)

 A message digest of Mike’s message is calculated using a hashing algorithm
 Sophie compares the message digest she calculated to Mikes’s message
 Sophie encrypts Mike’s message with Mike’s public key
 The message digest is encrypted by Mike’s private key

Question 2.2.Which of the following is described as a 64-bit block cipher composed of a 16-round Feistel network and key-dependent S-box functions? (Points : 5)

 Twofish
 RC4
 Blowfish
 Rijndael

Question 3.3.Which type of function is used in cryptography? (Points : 5)

 Not AND
 Permutation
 NOR
 X-box

Question 4.4.Which of the following is commonly used for verifying message integrity? (Points : 5)

 Registration authority
 CRL
 Pseudorandom number generator
 Hashing function

Question 5.5.Which of the following is NOT a critical goal of information security? (Points : 5)

 Confidentiality
 Scalability
 Authentication
 Nonrepudiation

Question 6.6.What term is given to a device that is designed to generate radio signals, not including those from the antenna? (Points : 5)

 oscillator
 conductive medium
 intentional radiator
 EIRP

Question 7.7.What is a potential problem with having too many APs in a given area? (Points : 5)

 Refraction
 Fading
 Multipath
 Co-channel interference

Question 8.8.Which digital signal modulation method is a binary modulation technique in which the carrier signal’s frequency is changed to represent a 1 or 0 bit? (Points : 5)

 ASK
 FSK
 PSK
 FDM

Question 9.9.Which of the following is true about RF transmissions? (Points : 5)

 EM radiation is measured in volts
 Frequency has an inverse relationship with wavelength
 Frequency is the distance between waves
 Cooler objects produce higher-frequency radiation than hotter objects

Question 10.10.What is used to convert an analog RF signal into digital format? (Points : 5)

 spectrum
 EIRP
 modulator
 carrier

Question 11.11.What is considered to be one of the biggest weaknesses of WEP? (Points : 5)

 24-bit initialization vector
 RC4 encryption
 128-bit key
 Kerberos authentication

Question 12.12.In which type of attack do attackers intercept the transmissions of two communicating nodes without the user’s knowledge? (Points : 5)

 Rogue device
 Wardriver
 Man-in-the-middle
 Brute force

Question 13.13.Which of the following is true about IEEE 802.11i? (Points : 5)

 It uses WEP2 for authentication and encryption
 It uses a symmetric block cipher for encryption
 Temporal key integrity protocol is used for encryption
 It uses PMK to generate data encryption keys

Question 14.14.Which of the following is true about wardriving? (Points : 5)

 Attackers use RF monitor mode
 The hardware is very expensive
 The software is very expensive
 Their goal is simply to hijack a connection

Question 15.15.What is a WNIC’s equivalent of a NIC’s promiscuous mode? (Points : 5)

 Active scan mode
 RF monitor mode
 Passive attack mode
 Auto-capture mode

Question 16.16.Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion? (Points : 5)

 inline
 Host-based
 Hybrid
 Network-based

Question 17.17.Which of the following is an IDPS security best practice? (Points : 5)

 to prevent false positives, only test the IDPS at initial configuration
 communication between IDPS components should be encrypted
 all sensors should be assigned IP addresses
 log files for HIDPSs should be kept local

Question 18.18.Which of the following is NOT a typical IDPS component? (Points : 5)

 Network sensors
 Command console
 Database server
 Internet gateway

Question 19.19.Which of the following is NOT a method used by passive sensors to monitor traffic? (Points : 5)

 Spanning port
 Network tap
 Packet filter
 load balancer

Question 20.20.Where is a host-based IDPS agent typically placed? (Points : 5)

 On a workstation or server
 At Internet gateways
 Between remote users and internal network
 Between two subnets

Question 1.1.What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy?
(Points : 4)

Router

VPN server

ICMP monitor

Proxy server

Question 2.2.The Cisco PIX line of products is best described as which of the following? (Points : 4)

software firewall

PC with firewall installed

firewall appliance

VPN gateway
Question 3.3.Which of the following is a typical drawback of a free firewall program? (Points : 4)

cannot monitor traffic in real time

oversimplified configuration

have centralized management

more expensive than hardware firewalls

Question 4.4.Which of the following is an advantage of hardware firewalls? (Points : 4)

not scalable compared to software firewalls

not dependent on a conventional OS

less expensive than software firewalls

easy to patch
Question 5.5.What are the two standard ports used by FTP along with their function? (Points : 4)

UDP 23 control, TCP 20 data

UDP 20 data, TCP 21 control

TCP 21 control, TCP 20 data

TCP 23 data, TCP 21 control

Question 6.6.Which of the following is true about private IP addresses? (Points : 4)

they are assigned by the IANA

they are not routable on the Internet

they are targeted by attackers

NAT was designed to conserve them

Question 7.7.Which type of security device can speed up Web page retrieval and shield hosts on the internal network? (Points : 4)

caching firewall

proxy server

caching-only DNS server

DMZ intermediary
Question 8.8.Which of the following is true about a dual-homed host? (Points : 4)

serves as a single point of entry to the network

its main objective is to stop worms and viruses

uses a single NIC to manage two network connections

it is used as a remote access server in some configurations

Question 9.9.Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address? (Points : 4)

one-to-one NAT

port address translation

one-to-many NAT

DMZ proxy translation

Question 10.10.Which of the following is a disadvantage of using a proxy server? (Points : 4)

shields internal host IP addresses
slows Web page access

may require client configuration

can’t filter based on packet content

Question 11.11.Which of the following is a type of VPN connection? (Points : 4)

site-to-server

client-to-site

server-to-client

remote gateway

Question 12.12.Which of the following is NOT a factor a secure VPN design should address? (Points : 4)

Encryption

Authentication

Nonrepudiation

performance
Question 13.13.Which IPsec component authenticates TCP/IP packets to ensure data integrity? (Points : 4)

AH

ESP

IKE

ISAKMP

Question 14.14.Which of the following is NOT an essential element of a VPN? (Points : 4)

VPN server

Tunnel

VPN client

authentication server

Question 15.15.Which of the following is NOT true about a hardware VPN? (Points : 4)

should be the first choice for fast-growing networks

can handle more traffic than software VPNs

have more security vulnerabilities than software VPNs

create a gateway-to-gateway VPN

Question 16.16.Which of the following is true about the Internet? (Points : 4)

it is the same as the World Wide Web

it was established in the mid-1960s

it was developed by a network of banks and businesses

it was originally built on an extended star topology
Question 17.17.Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data? (Points : 4)

ISP

POP

NAP

NSF

Question 18.18.What makes IP spoofing possible for computers on the Internet? (Points : 4)

network address translation

the lack of authentication

the 32-bit address space

the DNS hierarchy

Question 19.19.What type of attack displays false information masquerading as legitimate data? (Points : 4)

Java applet

Phishing

Buffer overflow

SQL injection

Question 20.20.Which of the following best describes ROI? (Points : 4)

the chance that a threat will result in lost money

how long before an investment will pay for itself

the cost of mitigating a threat
the benefits of setting security priorities

Question 21.21.What is considered the first step in formulating a security policy? (Points : 4)

risk analysis

elimination of threats

risk reduction

system monitoring

Question 22.22.Which of the following best describes a Monte Carlo simulation? (Points : 4)

a technique for simulating an attack on a system

a formula that estimates the cost of countermeasures

a procedural system that simulates a catastrophe

an analytical method that simulates a real-life system for risk analysis
Question 23.23.Which of the following is a security-related reason for monitoring and evaluating network traffic? (Points : 4)

to determine if your IDPS signatures are working well

to create substantial data to analyze

to optimize your router and switch protocols

to see how many files employees download form the Internet
Question 24.24.Which of the following is NOT typically an aspect of a security event management program? (Points : 4)

monitoring events

managing IDPS firmware

managing data from sensors

managing change

Question 25.25.What should an outside auditing firm be asked to sign before conducting a security audit? (Points : 4)

subpoena
nondisclosure agreement

search and seizure contract

social engineering covenant

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order