Beruflich Dokumente
Kultur Dokumente
1 CORRECT
Which threats are characterized by possibly long periods of preparation (years is not uncommon),
tremendous financial backing(suport), a large and organized group of attackers, and attempts to
subvert insiders(incercari de a submina din interior) or to plant individuals inside a potential target in
advance of a planned attack?
Information warfare
A)
Hacktivisim
B)
Cyber crusading
C)
Elite hacking
D)
2
CORRECT
Which of the following is an attempt (incercare) to find and attack a site that has hardware or software that
is vulnerable to a specific exploit?
*Target of opportunity attack
A)
Targeted attack
B)
Vulnerability scan attack
C)
Information warfare attack
D)
3
CORRECT
Which of the following threats(amenintari) has not grown over the last decade(deceniu) as a result of
increasing numbers of Internet users?
Viruses
A)
Hackers
B)
Denial-of-service attacks
C)
All of these have seen an increase over the last decade.
D)
4
CORRECT
The rise(cresterea) of which of the following has greatly increased the number of individuals who probe
organizations looking for vulnerabilities to exploit?
Virus writers
A)
Script kiddies
B)
Hackers
C)
Elite hackers
D)
5
CORRECT
Which of the following is generally viewed(vazut=considerat) as the first Internet worm(vierme) to have
caused significant damage(prejudicii) and to have "brought the Internet down"?
Melissa
A)
The "Love Bug"
B)
6
CORRECT
7
CORRECT
According to the CSI/FBI survey(studiu), which of the following statistics decreased in 2003?
The number of organizations reporting the internet as a point of attack
A)
The number of organizations that have reported unauthorized use of their systems
B)
The average loss as a result of theft of proprietary information
C)
Both B and C
D)
8
CORRECT
Which virus/worm was credited(creditat) with reaching(atinge) global proportions in less than ten minutes?
Melissa
A)
Code Red
B)
Morris worm
C)
Slammer
D)
9
CORRECT
The act of deliberately accessing computer systems and networks without authorization is generally known as:
(Actul de a accesa n mod deliberat sisteme de calculator i reele fr autorizaie este, n general, cunoscut
sub numele de)
Computer intrusions
A)
Hacking
B)
Cracking
C)
Probing
D)
10
CORRECT
B)
Hackers
C)
Hacktivists
D)
11
CORRECT
Warfare conducted against(Razboi indreptat impotriva) the information and information processing equipment
used by an adversary is known as:
Hacking
A)
Cyber terrorism
B)
Information warfare
C)
Network warfare
D)
12
CORRECT
An attacker who feels that using animals to make fur coats is unethical and thus defaces the web site of a
company that sells fur coats is an example of: (Un atacator care consider c folosirea de animale pentru a
face haine de blana este lipsit de etic i, prin urmare, strice imaginea site-ul web al unei companii care vinde
haine de blana este un exemplu de)
Information warfare
A)
Hacktivisim
B)
Cyber crusading
C)
Elite hacking
D)
13
CORRECT
14
CORRECT
15
CORRECT
Elite hackers don't account(nu reprezinta) for more than what percentage of the total number of individuals
conducting intrusive activity(desfasoara activitati de intruziune) on the Internet?
1-2 percent
A)
3-5 percent
B)
7-10 percent
C)
15-20 percent
D)
Cap 2
1
CORRECT
2
CORRECT
3
CORRECT
The security principle used in the Bell-LaPadula security model that states that no subject can read from an
object with a higher security classification is the:
Simple Security Rule
A)
Ring policy
B)
Mandatory access control
C)
*-property
D)
4
CORRECT
Which of the following concepts requires users and system processes to use the minimal amount of permission
necessary to function?
Layer defense
A)
Diversified defense
B)
Simple Security Rule
C)
Least privilege
D)
5
CORRECT
Which of the following is an access control method based on changes at preset intervals?
Simple Security Rule
A)
Job rotation
B)
Two-man rule
C)
Separation of duties
D)
6
CORRECT
The Bell-LaPadula security model is an example of a security model that is based on:
The integrity of the data
A)
The availability of the data
B)
The confidentiality of the data
C)
The authenticity of the data
D)
7
CORRECT
The term used to describe the requirement that different portions of a critical process must be performed by
different people is:
Least privilege
A)
Defense in depth
B)
Separation of duties(Separarea sarcinilor)
C)
Job rotation
D)
8
CORRECT
9
CORRECT
A)
B)
Could ultimately result in all subjects having the integrity level of the least-trusted(fara incredere) object
on the system
Could result in the unauthorized modification of data
C)
Does not adequately prevent users from viewing files they are not entitled to
D)
10
CORRECT
The concept of blocking an action unless it is specifically authorized is: (Conceptul de a bloca o aciune dect
dac este autorizat n mod special este)
Implicit deny (Negare implicita)
A)
Least privilege
B)
Simple security rule
C)
Hierarchical defense model
D)
Capitolul 2
1. What is the most common form of authentication used - Username/password
2. The CIA of security includes: Confidentiality, integrity, availability
3. The security principle used in the Bell-LaPadula security model that states that no subject can read from an object
with a higher security classification is the: Simple Security Rule
4. Which of the following concepts requires users and system processes to use the minimal amount of permission
necessary to function? Least privilege
5. access control method based on changes at preset intervals? Job rotation
6. The Bell-LaPadula security model a security model based on: The confidentiality of the data
7. different portions of a critical process performed by different people is: Separation of duties
8. Hiding information to prevent disclosure is an example of? Security through obscurity
9. problem with the Low-Water-Mark policy : Could ultimately result in all subjects having the integrity level
of the least-trusted object on the system
10. The concept of blocking an action unless it is specifically authorized is: Implicit deny
Capitolul 3
1. a physical security threat? Cleaning crews (echipele de curatare) unsupervised access
2. benefit of fire detection equipment(echipamente de detectare a incendiilor) over fire suppression(suprimare) :
Fire detection equipment will often catch fires at a much earlier stage
3. What security feature is even more common than a lock? Physical barrier
4. During which step of the policy lifecycle does training of users take place?( n care etap a ciclului de via
politic face instruirea utilizatorilor s aib loc) Implement the plans
5. Biometric access controls are typically used in conjunction with another form of access - Biometrics are not
100 percent accurate
6. Procedures : Step-by-step instructions on how to implement the policies
7. protect against electromagnetic eavesdropping-interceptare electromagnetica (known as the van Eck
phenomenon): sufficient distance between the potential target, inside a shielded room, TEMPEST
approved" equipment
8. HVAC systems are important in which of the following locations? Large cubical farms, Server rooms,
Network equipment closets
9. When should a human security guard be used for physical access control : necessary to avoid issues such as
piggybacking
10. protect sensitive equipment from fluctuations in voltage : A surge protector (o protecie la supratensiune)
Capitolul 4
1: Which of the following are considered good practices for password security?
a. Using a combination of upper- and lowercase characters, a number, and a special character in the
password itself
b. Not writing the password down
c. Changing the password on a regular basis
d. All of the above
3: The simple tactic of following closely behind a person who has just used their own access card or
PIN to gain physical access to a room or building is called(simpla tactica de a urma ndeaproape n
spatele unei persoane care a folosit doar propria lor card de acces sau PIN-ul pentru a avea acces fizic la o
camer sau cldire este numit):
a. Shoulder surfing
b. Tagging-along
c. Piggybacking
d. Access drafting
4: The process of going through a target's trash in hopes of finding valuable information that might
be used in a penetration attempt is known as:( Procesul de a merge printr-un gunoi int n sperana de
a gsi informaii valoroase care ar putea fi utilizate ntr-o ncercare de penetrare este cunoscut sub numele
de)
a. Dumpster diving (tomberon de scufundri)
b. Trash trolling
c. Garbage gathering
d. Refuse rolling
5: An avenue (o cale) that can be used to access a system while circumventing normal security
mechanisms is known as a:
a. Master-key code
b. Secret door
When a message is sent, no matter what its format, why do we care about its integrity?
A)
B)
C)
D)
2
CORRECT
B)
C)
D)
B)
C)
D)
5
CORRECT
If a message has a hash, how does the hash protect the message in transit?
A)
4
CORRECT
How is 3DES different from many other types of encryption listed here?
A)
3
CORRECT
IDEA
RC6
ECC
Rijndael
B)
C)
D)
6
CORRECT
B)
C)
D)
B)
C)
D)
B)
C)
D)
IDEA
DES
Diffie-Hellman
MD5
10
CORRECT
9
CORRECT
It uses a hash.
8
CORRECT
7
CORRECT
Asymmetric
Hash functions
Linear cryptanalysis
Authentication
A)
B)
C)
D)
11
CORRECT
B)
C)
D)
B)
C)
D)
Authentication
128
64
512
1024
14
CORRECT
13
CORRECT
SHA
12
CORRECT
Asymmetric encryption
Brute-forcing
Rainbow tables
Interception
Collisions
D)
15
CORRECT
Easy to remember
Long and random
Long and predictable
Short
Sumar:
1. C
3. A
5. B
7. A
9. B
11. C
13.D
2. C
4. D
6. C
8. B
10. A
12.B
14.C
15. B
Chapter 6 - Results
The correct answer for each question is indicated by a
B)
C)
D)
2
How does a user validate a digital certificate that is received
from another user?
A)
B)
C)
D)
Feedback: A digital certificate is validated by the receiver by first determining whether her
system has been configured to trust the CA that digitally signed the certificate. If this has
been configured, the user's software uses the CA's public key and validates the CA's
digital signature that is embedded within the certificate.
3
What is the purpose of a digital certificate?
A)
B)
C)
D)
4
What steps does a user's software take to validate a CA's
digital signature on a digital certificate?
A)
B)
C)
D)
Feedback: The user's software calculates a message digest for the digital certificate and
decrypts the encrypted message digest value included with the certificate, which is the
digital signature. The message digest is decrypted using the CA's public key. If the two
message digest values match, the user knows that the certificate has not been modified in
an unauthorized manner, and since the encrypted message digest can be decrypted
properly with the CA's public key, the user is assured that this CA created the certificate.
5
What is a bridge CA, and what is its function?
A)
B)
C)
D)
6
Why would a company implement a key archiving and
recovery system within the organization?
A)
B)
C)
D)
Feedback: To protect itself, the company will make backups of the data encryption keys its
employees use for encrypting company information. If an employee is no longer available,
the company must make sure that it still has access to its own business data. Companies
should not need to back up digital signature keys, since they are not used to encrypt data.
7
Within a PKI environment, where does the majority of the
trust actually lie?
A)
B)
C)
D)
8
Which of the following properly explains the m of n control?
A)
B)
C)
D)
9
Which of the following certificate characteristics was
expanded upon with version 3 of the X.509 standard?
A)
B)
C)
D)
Subject
Extensions
Digital signature
Serial number
10
What is a certification practices statement (CPS), and what is
its purpose?
A)
B)
C)
D)
Feedback: The CPS outlines the certificate classes the CA uses and the CA's procedures for verifying
end-entity identities, generating certificates, and maintaining the certificates throughout their
lifetimes. Any company that will be using a specific CA needs to make sure it is going through these
procedures with the level of protection the company would require of itself. The company will be
putting a lot of trust in the CA, so the company should do some homework and investigate how the
CA actually accomplishes its tasks.
11
Which of the following properly describes what a public key
infrastructure (PKI) actually is?
A)
B)
C)
D)
12
Once an individual validates another individual's certificate,
what is the use of the public key that is extracted from this
digital certificate?
A)
B)
C)
D)
13
Why would a digital certificate be added to a certificate
revocation list (CRL)?
A)
B)
C)
D)
14
If an extension is marked as critical, what does this indicate?
A)
B)
C)
D)
15
How can users have faith that the CRL was not modified to
present incorrect information?
A)
B)
C)
D)
Feedback: The CRL contains all of the certificates that have been revoked. Only the CA can post
information to this list. The CA then digitally signs the list to ensure that any modifications will be
detected. When an end-entity receives a CRL, it verifies the CA's digital signature, which tells the
end-entity whether the list has been modified in an unauthorized manner and guarantees that the
correct CA signed the list.
Capitol 7
Your Results:
The correct answer for each question is indicated by a
Standards and Protocols
1
CORRECT
2
CORRECT
B)
C)
D)
ISO
RSA
IEEE
A substitution cipher
The Certificate Revocation List (CRL)
The Certificate Authority (CA)
Certificates
4
CORRECT
OSI
3
CORRECT
A Qualified Certificate
A Control Certificate
An Attribute Certificate
An Optional Certificate
B)
C)
D)
5
CORRECT
B)
C)
D)
B)
C)
D)
8
CORRECT
7
CORRECT
6
CORRECT
EISA
ISAKMP
ISA
ISAKEY
PKIX
B)
C)
D)
9
CORRECT
B)
C)
D)
B)
C)
D)
A three-way handshake
A security association
A three-way agreement
A security agreement
12
CORRECT
X.509
11
CORRECT
FIPS
A relationship where two or more entities define how they will communicate
securely is known as what?
A)
10
CORRECT
ISO/IEC 27002
B)
C)
D)
13
CORRECT
B)
C)
D)
POP3
IMAP
SMTP
S/MIME
Which of the following is a joint set of security processes and standards used by
approved laboratories to award an Evaluation Assurance Level (EAL) from
EAL1 to EAL7?
A)
B)
C)
D)
15
CORRECT
14
CORRECT
Common Criteria
FIPS
ISO 17700
IEEE X.509
53
80
143
443
Chapter 9
1. Which of the following topologies connects all the network devices to a central point?
a. Mixed
b. Ring
c. Bus
d. Star
2. As it relates to networking, what does WAN stand for?
a. Wide area node
b. Wide alternate network
c. Wide area network
d. Wide automated network
3. What is Layer 1 of the OSI model called?
a. The physical layer
b. The network layer
c. The initial layer
d. The presentation layer
4. The UDP protocol:
a. Provides excellent error-checking algorithms
b. Is a connectionless protocol
c. Guarantees delivery of packets
d. Requires a permanent connection between source and destination
5. The process that dynamically assigns an IP address to a network device is called:
a. NAT
b. DNS
c. DHCP
d. Routing
6. What is the three-way handshake sequence used to initiate TCPconnections?
a. ACK, SYN/ACK, ACK
b. SYN, SYN/ACK, ACK
c. SYN, SYN, ACK/ACK
d. ACK, SYN/ACK, SYN
7. For transmission, larg amounts of data are normally broken up into smaller pieces known as:
a. UDPs
b. ICMPs
c. Packets
d. Subnets
8. Which as the following is a control and information protocol used by network devices to
determine such things as a remote networks availability and the length of time required to
reach a remote network?
a. UDP
b. NAT
9.
10.
11.
12.
13.
14.
15.
c. TCP
d. ICMP
What is the name of the protocol that translates names into IP addresses?
a. TCP
b. DNS
c. ICMP
d. DHCP
Dividing a network address space into smaller, separate networks is called what?
a. Translating
b. Network configuration
c. Subnetting
d. Address translation
Which protocol translates private (nonroutable) IP addresses into public (routable) IP
addresses?
a. NAT
b. DHCP
c. DNS
d. ICMP
The TCP protocol:
a. Is connectionless
b. Provides no error checking
c. Allows for packets to be processed in the order they were sent
d. Has no overhead
What is the most widely used network protocol?
a. SS7
b. Token Ring
c. Ethernet
d. SNA
Which of the following would be a valid MAC address?
a. 00:07:e9
b. 00:07:e9:7c:c8
c. 00:07:e9:7c:c8:aa
d. 00:07:e9:7c:c8:aa:ba
To divide a single swich into multiple broadcast domains and/or multiple network segments, you
might use:
a. DHCP
b. Tunneling
c. NAT
d. VLANs