CIS 2354 - Test 2

Document Sample
CIS 2354 - Test 2 Powered By Docstoc
					CIS 2354 - Test 2
Test Due Date: Thursday, October 19
Name:__________________________

True/False
Indicate whether the sentence or statement is true or false.

____    1. Most secure operating systems store user logon credentials in their accounts database system as hash
             values.

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.

____    2. What is the name of the cryptographic security service that ensures that a sender cannot deny she
             initiated the transfer of secured information?
             a. Anti-replay protection
             b. Confidentiality
             c. Integrity
             d. Nonrepudiation
____    3.   You are deploying a public Web site. You want to allow your visitors to communicate using
             encrypted transmissions. Which of the following is not an appropriate option?
             a. Secure sockets layer (SSL)
             b. Symmetric cryptography
             c. Public key cryptography
             d. Asymmetric cryptography
____    4.   What element of modern cryptography prevents knowledge of the algorithm from being the primary
             weakness of a cryptographic method?
             a. The key
             b. Plaintext
             c. The hash value
             d. The message digest
____    5.   When is a cryptography system strong enough to be used for a specific application or purpose?
             a. When 128-bit–length keys are used
             b. When the algorithm is kept secret
             c. When all participants in a communication use different keys
             d. When a brute-force attack is rendered impractical
____    6.   What is the length of Data Encryption Standard (DES) keys?
             a. 56 bits
             b. 64 bits
             c. 128 bits
             d. 256 bits
____    7.   How many bits are in a message digest produced by the Secure Hash Algorithm (SHA-1)?
             a. 64
             b. 128
             c. 160
           d. 256
____   8. What is the primary difficulty with deploying a symmetric cryptography system?
          a. The size of plaintext
          b. Key distribution
          c. The language of the message
          d. The key size
____   9. When a cryptography system prevents unauthorized changes to data while it is in transit, it can
           provide protection from what?
           a. Denial of service (DoS) attacks
           b. Brute-force attacks
           c. Replay attacks
           d. Man-in-the-middle attacks
____ 10.   Which of the following tools is most effective for protecting communications between two distant
           networks connected over the Internet using a virtual private network (VPN)?
           a. Hashing formulas
           b. Asymmetric cryptography
           c. Symmetric cryptography
           d. Randomized sequencing rules
____ 11.   What form of cryptography provides for the four security services of confidentiality, integrity,
           authentication, and nonrepudiation?
           a. Hashing cryptography
           b. Symmetric cryptography
           c. Private key cryptography
           d. Public key cryptography
____ 12.   You need to provide a solution for transmitting or communicating large data files over the Internet
           securely. You want to make the solution as simple and efficient as possible. Which of the following
           is the best option?
           a. Combine symmetric cryptography and hashing cryptography into a single solution.
           b. Combine symmetric cryptography and asymmetric cryptography into a single
                solution.
           c. Use just symmetric cryptography.
           d. Use just asymmetric cryptography.
____ 13.   You need to support Secure Sockets Layer (SSL) to secure traffic over your public Web server.
           Which of the following should you use?
           a. Internet Protocol Security (IPSec)
           b. Symmetric cryptography
           c. Pretty Good Privacy (PGP)
           d. Public key cryptography
____ 14.   You are the security administrator for an organization. You have been encrypting all sensitive files
           with a cryptographic solution using 128-bit keys. Recently a brute-force attack was shown to be
           successful at breaking 128-bit keys within 30 days. You no longer think the security provided by
           your environment is sufficient. What should you do to increase the security of your environment?
           a. Switch to another cryptographic system using the same length keys.
           b. Increase the size of the keys.
           c. Reduce the size of the keys.
           d. Use a hashing algorithm.
____ 15. Several business partners have sent you messages encrypted with their private key and your public
           key. You have lost your private key. What can you do to access these secured messages?
           a. Request a copy of each sender’s private key.
           b. Provide your backdoor password.
           c. Request a new private key public key set.
           d. Recover your private key from escrow.
____ 16.   You want to allow other users to validate the source and integrity of your publicly distributed
           documents. You create a hash of the original document, you digitally sign the hash, and then you
           transmit the document. What step is missing?
           a. Enclose the document in a digital envelope.
           b. Attach the signed hash to the original message.
           c. Exchange private keys using an out-of-band method.
           d. Scan the document for malicious code.
____ 17.   What process allows you to prove the identity of the sender of a document or e-mail?
           a. Hashing the document
           b. Digitally signing the document
           c. Enclosing the document in a digital envelope
           d. Encrypting the document with your public key
____ 18.   You need to support secure communications over the Internet between your company’s network and
           several telecommuters. What is the best option for exchanging secret keys in this situation?
           a. Digital signatures
           b. Asymmetric cryptography
           c. Message authenticating code
           d. Hashing formulas
____ 19.   Public key infrastructure (PKI) is based on what form of cryptography?
           a. Symmetric cryptography
           b. Asymmetric cryptography
           c. Hashing cryptography
           d. Private key cryptography
____ 20.   What model is public key infrastructure (PKI) built on?
           a. Standalone trust model
           b. Wide area network (WAN) trust model
           c. Trusted third-party model
           d. Local trust model
____ 21.   Which of the following is not a secure activity that a public key infrastructure (PKI) solution
           supports?
           a. Protecting e-mail communications
           b. Verifying the integrity of stored data files
           c. Preventing the theft of credit card transactions from e-commerce sites
           d. Securing wireless communications
____ 22.   When the owner of a certificate leaves an organization, what process should occur?
           a. Renewal
           b. Enrollment
           c. Revocation
           d. Version update
____ 23. What is the most essential element when a certificate is being constructed for an organization?
         a. Signing the certificate with the certification authority’s (CA’s) certificate
         b. Verifying the identity of the organization
         c. Constructing the certificate for the entity
         d. Lifetime dates
____ 24. Two businesses want to establish a mutually beneficial relationship. They will be exchanging
           communications and data files. In order to ensure that resources are exchanged only with the correct
           entities, what do the businesses need to establish?
           a. Trust
           b. Accountability
           c. A virtual private network (VPN)
           d. Common topologies
____ 25.   A user reports that she cannot establish a secure connection with a Web site in order to complete an
           e-commerce transaction. Every attempt to connect results in an insecure link. Which of the following
           is most likely the problem?
           a. Only ports 80 and 443 are allowed across the firewall.
           b. The lock icon on the Web browser shows a closed lock.
           c. The user’s certificate is expired or revoked.
           d. The Web server’s certificate was issued by a public certification authority (CA).
____ 26.   You are a security manager for a software company. You want to provide a means for your
           customers to verify that the products they download from your site are actually from your
           organization. How can you do this?
           a. Give the users a private key.
           b. Digitally sign all software.
           c. Assign user accounts to customers for downloading software.
           d. Distribute files only by SMTP.
____ 27.   You are the security administrator for your organization. You designed and deployed the certificate
           infrastructure used in your network. What component of the infrastructure must be protected above
           all others?
           a. Users’ private keys
           b. The certificate revocation list (CRL)
           c. The distribution points
           d. The root certification authority (CA)
____ 28.   Your organization establishes a public key infrastructure (PKI) that issues certificates to internal and
           external entities. One of the external entities that obtained a certificate from your certification
           authority (CA) has been charged with distributing malicious code. You discover that the external
           organization was a group of college students attempting to bring down the IT infrastructure of a local
           bank. What could you have done to prevent or stop this situation?
           a. Properly distribute the certificate revocation list (CRL).
           b. Charge a larger fee for the service of using your CA’s certificates.
           c. Thoroughly verify the identity of entities before issuing certificates.
           d. Require external entities to submit both their public and private keys to the CA.
____ 29. Your organization uses an enterprise-wide private certification authority (CA) solution to provide
           identity proofing for all communications within the private network. Due to the nature of your
           business, it is not legal for any one person to have the ability to perform administrative or privileged
           activity alone. Instead, every action requires two or more authorized users to work together. A user
           reports that he accidentally deleted his certificate file from his universal serial bus (USB) memory
           drive dongle. Now he can no longer access his secured files or communicate over the secured
           network. Which of the following is the best way to resolve this problem?
           a. Have the CA administrator issue a new certificate.
           b. Have two CA managers revoke the certificate and redistribute the certificate
               revocation list (CRL).
           c. Have the user generate a new public and private key pair.
           d. Have three key escrow agents recover the key from escrow.
____ 30.   Your organization is very concerned about security. Every transaction must be secured. Every file
           must be encrypted. Every access to a terminal must be verified with at least a two-factor
           authentication mechanism. Even physical access into the building requires authentication. Which of
           the following solutions supports each of these security features while simplifying the processes for
           users?
           a. Use complex passwords and biometrics.
           b. Use cognitive passwords and ID badges.
           c. Use smart card-based certificates.
           d. Use single-sign on with one-time passwords.
____ 31.   You have accessed a Web site. This Web site has several Microsoft ActiveX controls that support
           the complex functions offered by the host company. Your Web browser prompts you whether or not
           to accept the certificate attached to the controls. If you select Yes, what are you actually doing?
           a. Stating that you trust the root certification authority (CA)
           b. Stating that you trust the Web server host company
           c. Stating that you know the ActiveX controls are not malicious
           d. Stating that you accept all certificates issued by the root CA
____ 32.   You are deploying a public key infrastructure (PKI) solution for a global enterprise corporation. The
           corporation has hundreds of offices around the world. Each office might periodically connect to up
           to six other offices simultaneously by means of an Internet virtual private network (VPN) over
           Digital Subscriber Line (DSL) or Integrated Services Digital Network (ISDN) lines. VPNs are
           established only when communications must take place. The corporation requires that all
           communications be secured and that all communication partners mutually authenticate with
           certificates before data is transferred. Which of the following is the best option for this environment?
           a. A hierarchy of trust
           b. A root certification authority (CA) at a single office and a subordinate CA at all
               other offices
           c. Standalone CAs at each office
           d. A mesh of trust
____ 33.   Your company is a government subcontractor. Your employees must often exchange information
           with several government offices about regulations, safety codes, design specifications, and system
           requirements. The contract requires your company to secure all their communications against
           eavesdropping and to provide a method of supporting nonrepudiation. However, since you must pay
           for the security solution, you want to deploy only what is absolutely necessary to comply with the
           contract’s requirements. Which of the following is the best solution for this situation?
           a. Deploy an e-mail solution that signs all messages with a digital certificate and
              encrypts every message before transmission.
           b. Deploy an e-mail solution that signs all messages with a digital certificate.
           c. Deploy an e-mail solution that encrypts every message before transmission.
           d. Deploy an e-mail solution that encrypts every message before transmission and has
               a short lifetime date for the certificates.
____ 34.   When data is moved down the OSI model and a new header and footer (when applicable) are added,
           what is this known as?
           a. Translation
           b. Encapsulation
           c. Spoofing
           d. Caching
____ 35.   What protocol model consists of seven distinct layers and is commonly used to compare and control
           commercial protocols?
           a. OSI model
           b. DARPA model
           c. TCP/IP model
           d. ATM model
____ 36.   The ____ layer (Layer ____) provides routing and switching capabilities and creates logical paths
           between two computers to create virtual circuits. This layer is responsible for routing, forwarding,
           addressing, internetworking, error handling, congestion control, and packet sequencing.
           a. session, 5
           b. transport, 4
           c. network, 3
           d. data-link, 2
____ 37.   Which IP feature allows a single IP datagram to be broken into several smaller datagrams for
           transport across the network?
           a. Encapsulation
           b. Compression
           c. Decryption
           d. Fragmentation
____ 38.   A fiber optic cable connects two networks located in different buildings. This fiber optic cable is
           constantly in use. While reviewing the network’s activity logs for the last week, you notice an 18-
           minute period when the fiber optic line was unavailable. What could this indicate?
           a. Electromagnetic interception
           b. A disconnected terminator
           c. Insertion of a fiber optic eavesdropping device
           d. Too much network traffic
____ 39.   An attacker attempts to alter the Address Resolution Protocol (ARP) cache on your switches in order
           to redirect traffic to a compromised client. However, the attacker discovers that his attempts at
           poisoning the ARP cache are failing to make any changes to the ARP table. What is a possible
           explanation for this?
           a. Physical access controls
           b. Static administrative password
           c. Manual ARP mappings
           d. Thorough network configuration documentation
____ 40. Which one of the following types of attacks does not have the potential to cause a form of denial of
           service (DoS) attack against a company with a Private Branch Exchange (PBX) system?
           a. Enabling remote maintenance modems
           b. Changing configuration and administrator passwords
           c. Listening to confidential voice mails
           d. Causing significant long distance toll charges
____ 41.   Where do user applications, such as e-mail clients, fit in the OSI model?
           a. Above the application layer
           b. Above the presentation layer
           c. Within the session layer
           d. Below the physical layer
____ 42.   Your computer is receiving packets from another system on the network. When you try to view the
           contents of the packets, all you see is garbage. You think the packets are being corrupted while in
           transit. What element of the packet can you use to test this theory?
           a. The header
           b. The data
           c. The footer
           d. The Frame Check Sequence (FCS)
____ 43.   To establish Transmission Control Protocol (TCP) communication, two computers use a three-way
           handshake. This exchange of three packets establishes a starting sequence number for the data being
           sent, the size of the receive buffer, the maximum segment size, and the TCP options supported. You
           want to exploit this standard function in order to consume all of the system resources on a remote
           system. What should you do to accomplish this task?
           a. Spoof the destination address in all SYN packets.
           b. Don’t respond with any ACK packets.
           c. Block receipt of SYN/ACK packets.
           d. Redirect all SYN/ACK packets to an alternate host.
____ 44.   A significantly higher level of network traffic is flowing toward the mission-critical servers on your
           network than normal. When you inspect this traffic, you discover that most of the packets contain
           source media access control (MAC) addresses from a system that has been offline for three weeks.
           What does this indicate?
           a. A duplicate network interface card (NIC) is present on the network.
           b. The mission critical servers need additional network bandwidth.
           c. A network interface layer attack is occurring.
           d. The Domain Name System (DNS) has been poisoned.
____ 45.   Your offices are in a building that has preinstalled coaxial cabling in the walls. Before you moved
           into the building, contractors rearranged the prefabricated walls to meet your needs for offices,
           storage, and other rooms. Your rented space is only 200 by 250 meters. The building is a single
           story. After connecting the proper systems to the coaxial cabling to establish a standard backbone
           network link, you discover that systems in rooms A through F can communicate but systems in
           rooms G through J cannot communicate. The network servers are located in room E. What is the
           problem?
           a. The cable length is too long.
           b. Electromagnetic interference (EMI) is causing the problem.
           c. The coaxial cable cannot support network communications.
           d. The cable was severed somewhere in the walls.
____ 46. Your organization has a security policy that prohibits unauthorized software or hardware from being
         installed onto or connected to any system, device, or cable on the network. What does this security
         policy protect against?
         a. Physical theft
         b. Eavesdropping
         c. Address Resolution Protocol (ARP) poisoning
         d. Operator error
____ 47. You want to perform traffic analysis against your own network to determine whether your network
         is vulnerable to certain types of eavesdropping or emanation interception attacks. You try to capture
         data about the network traffic passing through a cable, using an electromagnetic interference/radio
         frequency interference (EMI/RFI) detector. However, your tests show nothing. You confirm that
         data is being transmitted over the cable. What could be the problem?
         a. The cable is fiber optic.
         b. Encryption is being used.
         c. The cable is disconnected.
         d. The cable is being used at its maximum capacity.


Short Answer

      48. In most implementations, cryptography can be used to provide which security services? (Choose all
           answers that are correct.)
           a. Availability
           b. Confidentiality
           c. Delivery verification
           d. Integrity
      49. What is the length of Advanced Encryption Standard (AES) keys? (Choose all answers that are
           correct.)
           a. 64 bits
           b. 128 bits
           c. 192 bits
           d. 256 bits
      50. You are the security manager for your organization. The city where your office is located has
           recently renamed and renumbered your street, so your physical address has changed. Which of the
           following actions is a valid means to update your certificates? (Choose all answers that are correct.)
           a. Have the certification authority (CA) issue a new certificate.
           b. Edit your certificate directly to update the information.
           c. Have the CA revoke your old certificate.
           d. Add a new subelement to the certificate.

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:138
posted:8/7/2011
language:English
pages:8