Sie sind auf Seite 1von 4

QUESTION 20: Which of the following is the MOST secure form of authentication? A. Kerberos B. Biometrics C. Smart Cards D.

Username/password QUESTION 21: Which of the following is the LEAST secure form of authentication? A. Kerberos B. Biometrics C. Smart Cards D. Username/password QUESTION 32: One of the below options are correct regarding the DoS (Denial of Service) attack? A. Prevention access to resources by users authorized to use those resources. B. Use of multiple computers to attack a single organization. C. Placing a computer system between the sender and receiver to capture information D. Listening or overhearing parts of a conversation. QUESTION 34: Which of the following attacks would involve bringing down an e-commerce website to prevent or deny usage by legitimate customers? A. DoS B. Inception C. DDoS D. Eavesdropping QUESTION 40: Which of the following options is the correct sequence for the TCP Three-Way Handshake? A. Host A, SYN, SYN/ACK, ACK, Host B B. Host A, ACK, SYN/ACK, Host B, SYN C. Host A, SYN/ACK, ACK, SYN, Host B D. Host A, ACK, SYN/ACK, SYN, Host B QUESTION 43: Which of the following protocols is used to transmit e-mail between an e-mail client and an e-mail server?

A. Hypertext Transfer Protocol (HTTP) B. Post Office Protocol, version 3 (POP3) C. Simple Mail Transfer Protocol (SMTP) D. Internet Control Message Protocol (ICMP) QUESTION 44: Which of the following protocols is used to transmit data between a web browser and a web server? A. SSH B. HTTP C. SFTP D. IMAP4

QUESTION 84: Which of the following are used to make connections between private networks across a public network? A. SLIP (Serial Line Internet Protocol) B. PPP (Point-to-Point Protocol) C. VPN D. RADIUS (Remote Authentication Dial-In User Service) QUESTION 102: Which of the following protocols make use of port 25? A. SMTP B. FTP C. Telnet D. SNMP QUESTION 106: By which means do most network bound viruses spread? A. E-mail. B. Floppy C. CD-Rom D. Mass storage devices QUESTION 116: Which of the following are NOT features of a firewall? (Choose all that apply) A. Access control lists. B. Dynamic packet filtering.

C. Virus protection. D. Authentication.

QUESTION 126: Choose the type of encryption used by SSL (Secure Sockets Layer). A. Asymmetric key exchange. B. Symmetric key exchange. C. Public keys. D. Secret encryption. QUESTION 127: One of these protocols is used to encrypt traffic passed between a web browser and web server. Which is it? A. IPSec (Internet Protocol Security) B. HTTP (Hypertext Transfer Protocol) C. SSL (Secure Sockets Layer) D. VPN (Virtual Private Network)

QUESTION 129: From the list of protocols, which is used to secure web transactions? A. S/MIME (Secure Multipurpose Internet Mail Extensions) B. XML (Extensible Makeup Language) C. SSL (Secure Sockets Layer) D. SMTP (Simple Mail Transfer Protocol) QUESTION 137: Which of the following network devices is considered the simplest in a networking environment and most vulnerable to attacks, because they serve as central connectivity devices between hosts, where traffic sent to one port is sent to all other ports? A. Hubs B. Routers C. Switches and bridges D. All of the above QUESTION 137: Where do most attacks on an organizations computer resources originate? A. From the Internet B. From the inside network C. From universities D. From intruders who gain physical access to the computer resources E. QUESTION 137:

What are the three primary goals of network security? (Choose three.) A. Confidentiality B. Redundancy C. Integrity D. Availability QUESTION 137: Which of the following is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or data on the system? A. Risk B. Exploit C. Mitigation D. Vulnerability

Das könnte Ihnen auch gefallen