



























































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Security+ Guide to Network Security Fundamentals (Chapter 1-15 Questions)--Mark Ciampa (6th Edition) Multiple Choice Test Bank Correct answers indicated *Chapter 1* - Answer>>*Introduction to Network Security* Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered? - Answer>>*a. Security administrator* b. Security technician c. Security officer d. Security manager Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation? - Answer>>a. Large number of vulnerabilities b. End-of-life systems c. Lack of vendor support *d. Misconfigurations*
Typology: Exams
1 / 67
This page cannot be seen from the preview
Don't miss anything!
Chapter 1 - Answer>>Introduction to Network Security Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered? - Answer>>a. Security administrator b. Security technician c. Security officer d. Security manager Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation? - Answer>>a. Large number of vulnerabilities b. End-of-life systems c. Lack of vendor support d. Misconfigurations Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT covered? - Answer>>a. Default configurations b. Weak configurations c. Vulnerable business processes
d. Misconfigurations What is a race condition? - Answer>>a. When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers. b. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences. c. When an attack finishes its operation before antivirus can complete its work. d. When a software update is distributed prior to a vulnerability being discovered. Which the following is NOT a reason why it is difficult to defend against today's attackers? - Answer>>a. Delay in security updating b. Greater sophistication of defense tools c. Increased speed of attacks d. Simplicity of attack tools Which of the following is NOT true regarding security? - Answer>>a. Security is a goal. b. Security includes the necessary steps to protect from harm. c. Security is a process. d. Security is a war that must be won at all costs. Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use? - Answer>>a. "Security and convenience are not related." b. "Convenience always outweighs security." c. "Security and convenience are inversely proportional." d. "Whenever security and convenience intersect, security always wins." Which of the following ensures that only authorized parties can view protected information? - Answer>>a. Authorization
Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information? - Answer>>a. Sarbanes-Oxley Act (Sarbox) b. Financial and Personal Services Disclosure Act c. Health Insurance Portability and Accountability Act (HIPAA) d. Gramm-Leach-Bliley Act (GLBA) Why do cyberterrorists target power plants, air traffic control centers, and water systems? - Answer>>a. These targets are government-regulated and any successful attack would be considered a major victory. b. These targets have notoriously weak security and are easy to penetrate. c. They can cause significant disruption by destroying only a few targets. d. The targets are privately owned and cannot afford high levels of security. Which tool is most commonly associated with nation state threat actors? - Answer>>a. Closed- Source Resistant and Recurrent Malware (CSRRM) b. Advanced Persistent Threat (APT) c. Unlimited Harvest and Secure Attack (UHSA) d. Network Spider and Worm Threat (NSAWT) An organization that practices purchasing products from different vendors is demonstrating which security principle? - Answer>>a. Obscurity b. Diversity c. Limiting d. Layering What is an objective of state-sponsored attackers? - Answer>>a. To right a perceived wrong b. To amass fortune over of fame c. To spy on citizens
d. To sell vulnerabilities to the highest bidder Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use? - Answer>>a. Obscurity b. Layering c. Diversity d. Limiting What are industry-standard frameworks and reference architectures that are required by external agencies known as? - Answer>>a. Compulsory b. Mandatory c. Required d. Regulatory What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments? - Answer>>a. Cyberterrorists b. Competitors c. Brokers d. Resource managers Chapter 2 - Answer>>Malware and Social Engineering Attacks Which of the following is NOT a primary trait of malware? - Answer>>a. Diffusion b. Circulation c. Infection d. Concealment
Astrid's computer screen suddenly days that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer? - Answer>>a. Bitcoin malware b. Crypto-malware c. Blocking virus d. Networked worm What is the name of the threat actor's computer that gives instructions to an infected computer? - Answer>>a. Command and control (C&C) server b. Resource server c. Regulating Net Server (RNS) d. Monitoring and Infecting (M&I) server Which of these could NOT be defined as a logic bomb? - Answer>>a. If the company's stock price drops below $100, then credit Juni's account with 10 additional years of retirement credit. b. Erase all data if Matilda's name is removed from the list of employees. c. Reformat the hard drive three months after Sigrid left the company. d. Send spam email to Moa's inbox on Tuesday. Which of the following is NOT correct about a rootkit? - Answer>>a. A rootkit is able to hide its presence of the presence of other malware. b. A rootkit accesses "lower layers" of the operating system. c. A rootkit is always the payload of the Trojan. d. The risk of a rootkit is less today than previously. d. The risk of a rootkit is less today than previously. Which of these is a general term used for describing software that gathers information without the user's consent? - Answer>>a. Gatherware b. Adware
c. Spyware d. Scrapeware Which statement regarding a keylogger is NOT true? - Answer>>a. Keyloggers can be used to capture passwords, credit card numbers, or personal information. b. Software keyloggers are generally easy to detect. c. Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port. d. Software keyloggers can be designed to send captured information automatically back to the attacker through the internet. A watering hole attack is directed against __________. - Answer>>a. wealthy individuals b. a smaller group of specific users c. all users of a large corporation d. attackers who send spam __________ sends phishing message only to wealthy individuals. - Answer>>a. Whaling b. Spear phishing c. Target phishing d. Microing Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use Lykke? - Answer>>a. Familiarity b. Scarcity c. Intimidation d. Consensus
What is term used for a threat actor who controls multiple bots in a botnet? - Answer>>a. Bot herder b. Zombie shepherd c. Rogue IRC d. Cyber-root Chapter 3 - Answer>>Basic Cryptography The Hashed Message Authentication code (HMAC) __________. - Answer>>a. encrypts only the message b. encrypts only the key c. encrypts the key and the message d. encrypts the DHE key only What is the latest version of the Secure Hash Algorithm? - Answer>>a. SHA- b. SHA-3 c. SHA- d. SHA- Alexel was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this? - Answer>>a. AES b. XANDA c. ROT13 d. Alphabetic Abram was asked to explain to one of his coworkers the XOR cipher. he showed his coworkers and example of adding two bits, 1 and 1. What is the result of this sum? - Answer>>a. 2
b. 1 c. 0 d. 16 Which of the following key exchanges uses the same keys each time? - Answer>>a. Diffe- Hellman-RSA (DHRSA) b. Diffe-Hellman Ephemeral (DHE) c. Diffe-Hellman (DH) d. Ellipic-Curve Diffe-Hellman (ECDH) Public key systems that are different for each session are called __________. - Answer>>a. Public Key Exchange (PKE) b. perfect forward secrecy c. Elliptic Curve Diffe-Hellman (ECDH) d. Diffe-Hellman (DH) What is data called that is to be encrypted by imputing it into a cryptographic algorithm? - Answer>>a. Opentext b. Plaintext c. Cleartext d. Ciphertext Which of these is NOT a basic security protection for information that cryptography can provide/ - Answer>>a. Authenticity b. Risk Loss c. Integrity d. Ciphertext
Which of the these is the strongest symmetric cryptographic algorithm? - Answer>>a. Data Encryption Standard b. Triple Data Encryption Standard c. Advanced Encryption Standard d. RC If Bob wants to send a secure message to Alice using a asymmetric algorithm, which key does he use to encrypt the message? - Answer>>a. Alice's private key b. Bob's public key c. Alice's public key d. Bob's private key Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide? - Answer>>a. Verify the sender b. Prove the integrity of the message c. Verify the receiver d. Enforce nonrepudiation Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose? - Answer>>a. SHA- b. ME- c. BTC- d. RSA At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why sis he say that? - Answer>>a. It is an unproven approach and has never been tested.
b. It would be too closely to have one isolated server by itself. c. It would be essential impossible to keep its location a secret from everyone. d. It depends too heavily upon non-repudiation in order for it to succeed. What is a characteristic of the Trusted Platform Module (TPM)? - Answer>>a. It provides cryptographic services in hardware instead of software b. It allows the user to boot a corrupted disk and repair it. c. It is available only on Windows computers running BitLocker. d. It includes a pseudorandom number generator (PRNG). Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? - Answer>>a. Trusted Platform Module (TPM) b. Hardware Security Module (HSM) c. Self-encrypting hard disk drives (SED) d. Encrypted hardware-based USB devices Chapter 4 - Answer>>Advanced Cryptography and PKI Which of the following is NOT a method for strengthening a key? - Answer>>a. Randomness b. Cryptoperiod c. Length d. Variability Which of the following clock ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted? - Answer>>a. Electronic Code Book (ECB) b. Galois/Counter (GCM) c. Counter (CTR)
c. a user's private key with the public key d. a private key with a digital signature Digital certificates can be used for each of these EXCEPT __________. - Answer>>a. to verify the authenticity of the Registration Authorizer. b. to encrypt channels to provide secure communication between clients and servers c. to verify the identity of clients and servers on the Web d. to encrypt messages for secure email communication An entity that issues digital certificates is a __________. - Answer>>a. certificate signatory (CS) b. digital signer (DN) c. certificate authority (CA) d. signature authority (SA) A centralized directory of digital certificates is called a(n) ___________. - Answer>>a. Digital Signature Permitted Authorization (DSPA) b. Digital Signature Approval List (DSAP) c. Certificate Repository (CR) d. Authorized Digital Signature (ADS) __________ performs a real-time lookup of a digital certificate's status. - Answer>>a. Certificate Revocation List (CRL) b. Real-Time CA Verification (RTCAV) c. Online Certificate Status Protocol (OCSP) d. CA Registry Database (CARD) __________ is a protocol for securely accessing a remote computer. - Answer>>a. Transport Layer Security (TLS)
b. Secure Shell (SSH) c. Secure Sockets layer (SSL) d. Secure Hypertext Transport Protocol (SHTTP) What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest? - Answer>>a. Algorithm b. Initialization vector (IV) c. Nonce d. Salt Which digital certificate displays the name of the entity behind the website? - Answer>>a. Online Certificate Status Certificate b. Extended Validation (EV) Certificate c. Session Certificate d. X.509 Certificate Which trust model has multiple CAs, one of which acts as a facilitator? - Answer>>a. Bridge b. Hierarchical c. Distributed d. Web Which statement is NOT true regarding hierarchical trust models? - Answer>>a. It is designed for use on a large scale. b. The root signals all digital certificate authorities with a signal key. c. It assigns a single hierarchy with one master CA. d. The master CA is called the root.
c. Replay d. ARP poisoning Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect? - Answer>>a. Web server buffer and host DNS server b. Reply referrer and domain buffer b. Web browser and browser add-on d. Host table and external DNS server Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about? - Answer>>a. Privilege escalation b. Session replay c. Scaling exploit d. Amplification Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser? - Answer>>a. Extensions b. Scripts c. Plug-ins d. Add-ons An attacker who manipulates the maximum size of an integer type would be performing what kind of attack? - Answer>>a. integer overflow b. buffer overflow c. number overflow d. heap overflow
What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another? - Answer>>a. privilege escalation b. cross-site attack c. horizontal access attack d. transverse attack Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks? - Answer>>a. The complex nature of TCP/IP allows for too many ping sweeps to be blocked. b. Web application attacks use web browsers that cannot be controlled on a local computer. c. Network security devices cannot prevent attacks from web resources. d. Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks. What is the difference between a DoS and a DDoS attack? - Answer>>a. DoS attacks are faster than DDoS attacks b. DoS attacks use fewer computers than DDoS attacks c. DoS attacks do not use DNS servers as DDoS attacks do d. DoS attacks user more memory than a DDoS attack John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing? - Answer>>a. SQL b. XSS c. XSRF d. DDoS DNS Which attack uses the user's web browser settings to impersonate that user? - Answer>>a. XDD b. XSRF