Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Networking
Q:
Which authentication method employs a unique set of digital information or a digital signature with a communication or a file as a means to verify the source and uses public-key asymmetrical encryption?a. SSL b. TLS c. Digital certificatesd. Kerberos
Q:
Which authentication method is a physical device that enables the generation of a unique password each time a user logs on to a server or network?a. SSH b. Security token c. Digital certificated. Session
Q:
Which authentication method is used on networks and in remote communications, typically employing Remote Authentication Dial-in User Servers and is compatible with many encryption methods?a. SSL b. Kerberos c. EAPd. TLS
Q:
Which authentication method authenticates by using tickets to verify client and server communications, and employs private-key encryption?a. Digital certificates b. Secure Sockets Layer c. Kerberosd. Security Token
Q:
Why is SSH particularly suited to UNIX/Linux systems?a. It uses native code b. It uses pipes c. It is based on the UNIX kerneld. None of the above
Q:
What does SSH use to authenticate a communications session that uses passwords?a. Digital certificates b. RSAc. EAPd. Both a and be. Both a and c
Q:
What authentication method was designed using SSL as a model and is supported by the IETF as an Internet standard for secure communications?a. EAP b. SSL+ c. TLSd. IPSec
Q:
What size of keys can be used with SSL authentication?a. 40 bit only b. 40 bit and 128 bit c. 40 bit, 56 bit, and 128 bitd. 40 bit and 56 bit
Q:
_____ is an authenticating server for EAP.a. IAS b. IIS c. ISAd. RADIUS
Q:
What needs to be installed in order for Windows 95 and Windows 98 to use NTLM v2?a. Service pack 1 b. Directory Service Client c. NTLM v2 client installd. Nothing
Q:
Which of the following operating systems recognizes the original NTLM logon authentication?a. Windows 3.11 b. Windows 95 c. Windows Server 2003d. Both a and be. a, b, and c
Q:
When following the ISO _____ format, a digital certificate includes a basic set of encrypted information.a. X10 b. X.502 c. X.509d. X 802.3
Q:
_____ authentication works by giving each frame or packet an identification or sequence number. This ensures the accuracy of ongoing communications and the authenticity of the communications source.a. Network b. Session c. Systemd. Frame
Q:
Which of the following encryption techniques is employed in UNIX/Linux systems to enable encryption in file systems, using DES, 3DES, and other encryption techniques?a. RSA b. PAM c. CFSd. AES
Q:
Which of the following cipher command-line parameters copies encryption key and certificate data to a file that is encrypted for use by the cipher user?a. /? b. /k c. /ed. /x
Q:
Which of the following cipher command-line parameters provides the account employing cipher with a new encryption key?a. /n b. /uc. /k d. /x
Q:
Which of the following cipher command-line parameters decrypts the contents of the specified folder and sets the folder so that any files added to the folder are not encrypted?a. /? b. /e c. /dd. /n
Q:
What command can be used from the command prompt window to configure EFS?a. hash b. efsconfig c. msconfigd. cipher
Q:
What is the RSA key size used by MPPE when it is configured for strongest encryption?a. 40 bitsb. 54 bits c. 128 bitsd. 254 bits
Q:
What type of encryption is used for remote connections into Windows 2000 Server and Windows Server 2003?a. DES b. PPP c. PPTPd. MPPE
Q:
What encryption method does Red Hat Linux use by default?a. RSA b. DES c. DES3d. PAM
Q:
Which of the following encryption algorithms is considered to be the most secure?a. MD5 b. DES c. RSAd. 3DES
Q:
When was the RSA encryption method created?a. 1967 b. 1977 c. 1987d. 1997
Q:
Which version of hashing algorithm uses a mathematical formula to reduce a message to 160 bits and then hashes a digital signature to go with the message?a. MD2 b. MD4 c. MD5d. SHA-1
Q:
Which version of hashing algorithm takes 8-bit (one-byte) chunks and creates an encrypted message that is padded until its length can be divided by 16?a. MD2 b. MD4 c. MD5d. SHA-1
Q:
What encryption method is often used to create a digital signature?a. Secret key b. Hashing c. DESd. CFS
Q:
Which of the following sniffer application can be used in Windows-based operating systems?a. The Sniffer b. windump c. Sniffitd. Both a and be. a, b, and c
Q:
_____ is the use of a secret code or other means to disguise data that is stored on a computer or transported across a network.a. Encryption b. Authentication c. Hashingd. Ciphering
Q:
Message Digest 4 takes the original data and adds padded spaces until the length of the data section is 456 bytes. _________________________
Q:
When the hashing method of encryption is used, each password has a unique digital signature. _________________________
Q:
Secret key encryption uses a public key and a private key. _________________________
Q:
Authentication makes data unintelligible to everyone except its intended recipients. _________________________
Q:
In TCP/IP communications using IPv4, the authentication header is placed after the traditional IP header field in a packet and before the TCP (or UDP) field. _________________________
Q:
When an SSL communication session begins between two computers, the computers first exchange certificates to authenticate the receiver and sender. _________________________
Q:
TLS uses private-key symmetric data encryption and the TLS Handshake Protocol for secure communications. _________________________
Q:
Today, Kerberos is the most commonly used form of security for communications and transactions over the Web. _________________________
Q:
When a network consists of Windows 2000 or later operating systems, Kerberos is the preferred logon authentication method. _________________________
Q:
A random generator starts with a base or seed number and generates the same sequence of random numbers time after time. _________________________
Q:
Session authentication works by giving each frame or packet an identification or sequence number.
Q:
CFS can be used for remote file access through the NFS used by Netware systems.
Q:
The purpose of EFS is to protect folder and file contents on a hard disk, in case a hard disk is stolen from a server or workstation, or a portable computer is lost or stolen.
Q:
Triple DES is a standard adopted by the U.S. government to replace AES.
Q:
The original version of DES used a 56-bit encryption key combined with 8-bit parity.
Q:
The public key/private key method uses an encryption algorithm developed by Joan Daemen and Vincent Rijmen.
Q:
A secret key is used to both encrypt and decrypt data.
Q:
In stream cipher, a specific key size is used for encryption.
Q:
The ethereal sniffer software only functions on Linux/UNIX computers.
Q:
Sniffer software turns the NIC on its host computer into a virtual listening ear, capturing the network traffic that goes across that NIC on a particular network segment.
Q:
What basic steps should be taken to protect an operating system from malicious software?
Q:
List five of the services, applications, systems, or functions that are known to be vulnerable in which attackers may look for problems.
Q:
List the three steps in the process of the initial bootup from a disk.
Q:
List eight examples of executable-type file extensions and the operating systems that use them..
Q:
What are the six typical methods used in malicious software attacks?
Q:
What is a benign virus?
Q:
What is a destructive virus?
Q:
Viruses can be classified by the way they protect themselves from detection or from a virus scanner. List the four classifications.
Q:
One way to classify viruses is by how they infect systems. List the four different classifications.
Q:
A(n) ____________________ is a program that replicates and replicates on the same computer, or one that sends itself to many other computers on a network or the Internet.
Q:
____________________ are one of the most vulnerable points of attack in an organization.
Q:
In the ____________________ operating system, you can display the boot process by booting into either single user mode or verbose mode.
Q:
Windows XP Professional and Windows Server 2003 come with the ____________________ Setup Wizard which is designed to help you remember to obtain new updates, or even to obtain them for you.
Q:
____________________ may operate without being installed on a user's computer by capturing information related to the user's Internet communications.
Q:
Code Red and Code Red II use a buffer overflow to attack weaknesses in ____________________ Services on Microsoft servers.
Q:
Viruses, worms, and Trojan horses all represent malicious software that use _________________________ to find weaknesses or holes in operating systems and networks.
Q:
The ____________________ virus did not destroy data, but instead inserted the following line in the virus-carrying document when it was opened: "Twenty-two points, plus triple-word-score, plus fifty points for using all my letters. Game's over. I'm outta here."
Q:
One way to spread a(n) ____________________ virus is to attach it to a template that many users share, enabling it to spread each time the template is opened in a new document.
Q:
Typically, eradicating boot or partition sector viruses involves recreating the ____________________ and Partition Boot Sector instructions.
Q:
Can a boot or partition sector virus corrupt the address of the primary partition that is specified in the partition table of a disk?
Q:
Does the AOL4FREE e-mail hoax contain the AOL4FREE.com attachment?
Q:
Is Windows the only operating system that is vulnerable to a macro virus?
Q:
In its destructive mode, will the INIT 1984 virus rename files using random characters and delete files on hard drives?
Q:
Does an organizational policy work best if users are not included in the policy creation process?
Q:
Should you create a new ASR set each time you add a protocol or install a new driver for a network interface card?
Q:
Does Windows 2000 use an ASR set to recover from a system failure?
Q:
Is one advantage of a digital signature that it helps ensure the security of your system by allowing only drivers and system files that have been verified by Microsoft?
Q:
Is Sophos Anti-virus free software that can be used in Macintosh, Netware, UNIX/Linux, and Windows-based systems?
Q:
Can the VCatch Basic Anti-virus program be used both in Windows and Linux environments?
Q:
Which of the following operating systems would use the commands listed in the figure above?a. Windows XP b. Netware 6.x c. Red Hat Linuxd. Mac OS X
Q:
What is displayed in the figure above?a. A bashrc file in Red Hat Linux c. A startup.ncf file in Netwareb. A win.ini file in Windows XP d. The kernel file in Mac OS X
Q:
What is displayed in the figure above?a. Windows Update Setup Wizardb. Red Hat Network Alert Notification Toolc. Mac OS X Software Update Toold. None of the above