Drea
2013-03-08 15:24:43 UTC
a. Attacking
b. Port scanning
c. Failing to connect
d. Actively handshaking
19. Which of the following is an Internetwork layer control of the TCP/IP model?
a. Fiber cable
b. SSL
c. WPA
d. IPSec
20. Which of the following activities is the responsibility of the OSI reference model Data Link layer?
a. Physical layer connectivity
b. Flow control
c. Formatting the data
d. Delivery of IP packets
21. The main purposes for using cryptography include all but which one of the following?
a. Privacy
b. Authenticity
c. Integrity
d. Availability
22. Which of the following is an asymmetric encryption algorithm?
a. RSA
b. AES
c. IDEA
d. DES
23. Which of the following is most likely to be broken using a birthday attack?
a. DES
b. RSA
c. PKI
d. MD5
24. Which of the following best describes the purpose of the key zeroization process?
a. To encrypt asymmetric data
b. To create an MD5 hash
c. To clear media of a key value
d. To encrypt symmetric data
25. Which of the following terms best describes the main principle behind PKI?
a. Hashing
b. Established trust
c. Nonreputation
d. Availability
26. Digital signatures are used for all but which one of the following purposes?
a. Authentication
b. Nonrepudiation
c. Integrity
d. Availability
27. Key management includes all but which one of the following processes?
a. Generation
b. Storage
c. Destruction
d. Layering
28. Which of following methods is best suited in a situation where bulk encryption is required?
a. RSA
b. ECC
c. DES
d. MD5
29. Which of the following is a commonly used hashing algorithm?
a. DES
b. MD5
c. AES
d. Twofish
30. Which of the following is a cipher commonly known as a key shift cipher?
a. Vernam
b. Caesar
c. Concealment
d. Vigenere
31. Which of the following biometric authentication methods is most frequently found on laptops?
a. Retina
b. Fingerprint
c. Iris
d. Voice recognition
32. A fence that is at least __________ in height presents a psychological deterrent to most potential intruders.
a. 3 feet
b. 4 feet
c. 6 feet
d. 8 feet
33. A bollard is used as a physical security control against which of the following?
a. Humans
b. Automobiles
c. Automatic weapons
d. Natural disasters
34. When choosing between guards and dogs for physical, which of the following factors must be considered?
a. Liability
b. Discernment
c. Dual role
d. Multifunction
35. CCTV can be used as which of the following type of tools?
a. Detective only
b. Preventive only
c. Detective and reactive
d. Reactive and preventative
36. Which of the following lock grades should be selected in order to appropriately protect critical business assets?
a. Grade 4
b. Grade 2
c. Grade 1
d. Grade 3
37. Focal length defines which of the following camera qualities?
a. Degree of granularity
b. Ability to zoom
c. Scope of color
d. Horizontal and vertical view
38. If an active fax machine is discovered during an assessment, which of the following is of the least concern?
a. The phone number is publicly available.
b. The fax machine is in an open, unsecured area.
c. Faxes frequently sit in the printer tray.
d. The fax machine uses a ribbon.
39. A PIDA is an intrusion detection system used exclusively in conjunction with which of the following?
a. Doors
b. Windows
c. Guard gates
d. Fences
40. A false acceptance rate is also known as which of the following errors?
a. Type A
b. Type B
c. Type 1
d. Type 2
41. Which of the following best describes the first two steps of the footprinting process?
a. Passive information gathering
b. Active information gathering
c. Actively mapping an organization’s vulnerabilities
d. Using vulnerability scanners to map an organization
42. Which of the following examples best portrays passive information gathering?
a. Reviewing job listings posted by the targeted company
b. Port scanning the targeted company
c. Calling the company and asking questions about its services
d. Driving around the targeted company connecting to open wireless connections
43. Web resources used to footprint a company include all but which one of the following?
a. Internet archive
b. SEC EDGAR
c. Company Web site
d. Request for Comments (RFC) archive