Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
Does each security token have a unique identification number built into it, so that the authentication server can verify the security token before issuing a password?
Q:
Was SSH developed by Netscape to provide authentication security for TCP/IP applications such as FTP and Telnet?
Q:
In session authentication, is each packet given a sequence number when it is constructed at the source computer?
Q:
Does the Encrypting File System (EFS) employ public- and private-key asymmetrical encryption and a trapdoor function to manipulate prime numbers?
Q:
Does Microsoft's MPPE use a 40-bit RSA encryption key for its basic encryption?
Q:
Was AES originally developed for the U.S. National Security Agency?
Q:
Is the maximum size of the private key in AES 256 bits in length?
Q:
Are user passwords in Red Hat Linux encrypted using 3DES and stored in the /etc/passwd file?
Q:
Did the original version of DES use a 56-bit encryption key combined with 8-bit parity?
Q:
Is MD4 incorporated into Microsoft's MS-CHAP v2 hashing algorithm?
Q:
If getting users to log off when they go home at night is a problem, which option should you modify in the figure above?a. Enforce user logon restrictionsb. Maximum lifetime for a service ticketc. Maximum lifetime for a user ticketd. Maximum lifetime for user ticket renewal
Q:
Which option in the figure above turns Kerberos encryption on and off?a. Enforce user logon restrictionsb. Maximum lifetime for a service ticketc. Maximum lifetime for user ticket renewald. Maximum tolerance for computer clock synchronization
Q:
What form of encryption is being enabled in the figure above?a. EFS b. MPPE c. DESd. CFS
Q:
With which version(s) of IP is IPSec compatible?a. IPv4 b. IPv5 c. IPv6d. Both a and ce. Both a and b
Q:
At what TCP/IP layer does IPSec secure communications?a. Transport b. Application c. Networkd. Physical
Q:
_____ is a set of IP-based secure communications and encryption standards created by the IETF, and was developed to provide secure network communications.a. SSL b. IPSec c. PPTPd. LDAP
Q:
Which authentication method is used in Internet and network communications, and employs a handshaking protocol for authentication plus RSA for encryption?a. EAP b. TLS c. SSHd. SSL
Q:
Which authentication method employs a unique set of digital information or a digital signature with a communication or a file as a means to verify the source and uses public-key asymmetrical encryption?a. SSL b. TLS c. Digital certificatesd. Kerberos
Q:
Which authentication method is a physical device that enables the generation of a unique password each time a user logs on to a server or network?a. SSH b. Security token c. Digital certificated. Session
Q:
Which authentication method is used on networks and in remote communications, typically employing Remote Authentication Dial-in User Servers and is compatible with many encryption methods?a. SSL b. Kerberos c. EAPd. TLS
Q:
Which authentication method authenticates by using tickets to verify client and server communications, and employs private-key encryption?a. Digital certificates b. Secure Sockets Layer c. Kerberosd. Security Token
Q:
Why is SSH particularly suited to UNIX/Linux systems?a. It uses native code b. It uses pipes c. It is based on the UNIX kerneld. None of the above
Q:
What does SSH use to authenticate a communications session that uses passwords?a. Digital certificates b. RSAc. EAPd. Both a and be. Both a and c
Q:
What authentication method was designed using SSL as a model and is supported by the IETF as an Internet standard for secure communications?a. EAP b. SSL+ c. TLSd. IPSec
Q:
What size of keys can be used with SSL authentication?a. 40 bit only b. 40 bit and 128 bit c. 40 bit, 56 bit, and 128 bitd. 40 bit and 56 bit
Q:
_____ is an authenticating server for EAP.a. IAS b. IIS c. ISAd. RADIUS
Q:
What needs to be installed in order for Windows 95 and Windows 98 to use NTLM v2?a. Service pack 1 b. Directory Service Client c. NTLM v2 client installd. Nothing
Q:
Which of the following operating systems recognizes the original NTLM logon authentication?a. Windows 3.11 b. Windows 95 c. Windows Server 2003d. Both a and be. a, b, and c
Q:
When following the ISO _____ format, a digital certificate includes a basic set of encrypted information.a. X10 b. X.502 c. X.509d. X 802.3
Q:
_____ authentication works by giving each frame or packet an identification or sequence number. This ensures the accuracy of ongoing communications and the authenticity of the communications source.a. Network b. Session c. Systemd. Frame
Q:
Which of the following encryption techniques is employed in UNIX/Linux systems to enable encryption in file systems, using DES, 3DES, and other encryption techniques?a. RSA b. PAM c. CFSd. AES
Q:
Which of the following cipher command-line parameters copies encryption key and certificate data to a file that is encrypted for use by the cipher user?a. /? b. /k c. /ed. /x
Q:
Which of the following cipher command-line parameters provides the account employing cipher with a new encryption key?a. /n b. /uc. /k d. /x
Q:
Which of the following cipher command-line parameters decrypts the contents of the specified folder and sets the folder so that any files added to the folder are not encrypted?a. /? b. /e c. /dd. /n
Q:
What command can be used from the command prompt window to configure EFS?a. hash b. efsconfig c. msconfigd. cipher
Q:
What is the RSA key size used by MPPE when it is configured for strongest encryption?a. 40 bitsb. 54 bits c. 128 bitsd. 254 bits
Q:
What type of encryption is used for remote connections into Windows 2000 Server and Windows Server 2003?a. DES b. PPP c. PPTPd. MPPE
Q:
What encryption method does Red Hat Linux use by default?a. RSA b. DES c. DES3d. PAM
Q:
Which of the following encryption algorithms is considered to be the most secure?a. MD5 b. DES c. RSAd. 3DES
Q:
When was the RSA encryption method created?a. 1967 b. 1977 c. 1987d. 1997
Q:
Which version of hashing algorithm uses a mathematical formula to reduce a message to 160 bits and then hashes a digital signature to go with the message?a. MD2 b. MD4 c. MD5d. SHA-1
Q:
Which version of hashing algorithm takes 8-bit (one-byte) chunks and creates an encrypted message that is padded until its length can be divided by 16?a. MD2 b. MD4 c. MD5d. SHA-1
Q:
What encryption method is often used to create a digital signature?a. Secret key b. Hashing c. DESd. CFS
Q:
Which of the following sniffer application can be used in Windows-based operating systems?a. The Sniffer b. windump c. Sniffitd. Both a and be. a, b, and c
Q:
_____ is the use of a secret code or other means to disguise data that is stored on a computer or transported across a network.a. Encryption b. Authentication c. Hashingd. Ciphering
Q:
Message Digest 4 takes the original data and adds padded spaces until the length of the data section is 456 bytes. _________________________
Q:
When the hashing method of encryption is used, each password has a unique digital signature. _________________________
Q:
Secret key encryption uses a public key and a private key. _________________________
Q:
Authentication makes data unintelligible to everyone except its intended recipients. _________________________
Q:
In TCP/IP communications using IPv4, the authentication header is placed after the traditional IP header field in a packet and before the TCP (or UDP) field. _________________________
Q:
When an SSL communication session begins between two computers, the computers first exchange certificates to authenticate the receiver and sender. _________________________
Q:
TLS uses private-key symmetric data encryption and the TLS Handshake Protocol for secure communications. _________________________
Q:
Today, Kerberos is the most commonly used form of security for communications and transactions over the Web. _________________________
Q:
When a network consists of Windows 2000 or later operating systems, Kerberos is the preferred logon authentication method. _________________________
Q:
A random generator starts with a base or seed number and generates the same sequence of random numbers time after time. _________________________
Q:
Session authentication works by giving each frame or packet an identification or sequence number.
Q:
CFS can be used for remote file access through the NFS used by Netware systems.
Q:
The purpose of EFS is to protect folder and file contents on a hard disk, in case a hard disk is stolen from a server or workstation, or a portable computer is lost or stolen.
Q:
Triple DES is a standard adopted by the U.S. government to replace AES.
Q:
The original version of DES used a 56-bit encryption key combined with 8-bit parity.
Q:
The public key/private key method uses an encryption algorithm developed by Joan Daemen and Vincent Rijmen.
Q:
A secret key is used to both encrypt and decrypt data.
Q:
In stream cipher, a specific key size is used for encryption.
Q:
The ethereal sniffer software only functions on Linux/UNIX computers.
Q:
Sniffer software turns the NIC on its host computer into a virtual listening ear, capturing the network traffic that goes across that NIC on a particular network segment.
Q:
What basic steps should be taken to protect an operating system from malicious software?
Q:
List five of the services, applications, systems, or functions that are known to be vulnerable in which attackers may look for problems.
Q:
List the three steps in the process of the initial bootup from a disk.
Q:
List eight examples of executable-type file extensions and the operating systems that use them..
Q:
What are the six typical methods used in malicious software attacks?
Q:
What is a benign virus?
Q:
What is a destructive virus?
Q:
Viruses can be classified by the way they protect themselves from detection or from a virus scanner. List the four classifications.
Q:
One way to classify viruses is by how they infect systems. List the four different classifications.
Q:
A(n) ____________________ is a program that replicates and replicates on the same computer, or one that sends itself to many other computers on a network or the Internet.
Q:
____________________ are one of the most vulnerable points of attack in an organization.
Q:
In the ____________________ operating system, you can display the boot process by booting into either single user mode or verbose mode.
Q:
Windows XP Professional and Windows Server 2003 come with the ____________________ Setup Wizard which is designed to help you remember to obtain new updates, or even to obtain them for you.
Q:
____________________ may operate without being installed on a user's computer by capturing information related to the user's Internet communications.
Q:
Code Red and Code Red II use a buffer overflow to attack weaknesses in ____________________ Services on Microsoft servers.