Uploaded by rjeeeeezy

CompTIA SY0601 Practice Test

advertisement
1. Harmful programs used to disrupt computer operation, gather sensitive
information, or gain unauthorized access to computer systems are commonly
referred to as:
A. Adware
B. Malware
C. Ransomware
D. Spyware
2. Which of the following answers refers to malicious software performing
unwanted and harmful actions in disguise of a legitimate and useful
program?
A. Trojan horse
B. Spyware
C. Logic bomb
D. Adware
3. What is adware?
A. Unsolicited or undesired electronic messages
B. Malicious program that sends copies of itself to other computers on the
network
C. Software that displays advertisements
D. Malicious software that collects information about users without their
knowledge
4. A collection of software tools used by a hacker to mask intrusion and
obtain administrator-level access to a computer or computer network is
known as:
A. Backdoor
B. Botnet
C. Rootkit
D. Armored virus
5. Which type of Trojan enables unauthorized remote access to a
compromised system?
A. pcap
B. RAT
C. MaaS
D. pfSense
6. Which of the following answers refers to an undocumented way of gaining
access to a program, online service, or an entire computer system?
A. Tailgating
B. Rootkit
C. Trojan horse
D. Backdoor
7. Phishing scams targeting selected individuals/groups of users are
referred to as:
A.
B.
C.
D.
Vishing
Spear phishing
MITM attack
Whaling
8. What is tailgating?
A. Looking over someone's shoulder to get information
B. Scanning for unsecured wireless networks while driving in a car
C. Manipulating a user into disclosing confidential information
D. Gaining unauthorized access to restricted areas by following another
person
9. An email message containing a warning related to a non-existent
computer security threat, asking a user to delete system files falsely
identified as malware, and/or prompting them to share the message with
others would be an example of:
A. Vishing
B. Impersonation
C. Virus hoax
D. Phishing
10. Which of the following attacks uses multiple compromised computer
systems against its target?
A. Spear phishing
B. DoS
C. Watering hole attack
D. DDoS
11. A type of exploit that relies on overwriting contents of memory to
cause unpredictable results in an application is called:
A. IV attack
B. SQL injection
C. Buffer overflow
D. Fuzz test
12. Zero-day attack exploits:
A. New accounts
B. Patched software
C. Vulnerability that is present in already released software but unknown
to the software developer
D. Well known vulnerability
13. A replay attack occurs when an attacker intercepts user credentials
and tries to use this information later for gaining unauthorized access to
resources on a network.
A. True
B. False
14. URL hijacking is also referred to as:
A. Session hijacking
B. Sandboxing
C. Typo squatting
D. Shoulder surfing
15. Which of the following terms refers to a rogue AP?
A. Computer worm
B. Backdoor
C. Evil twin
D. Trojan horse
16. Which of the following technologies simplifies configuration of new
wireless networks by providing non-technical users with a capability to
easily configure network security settings and add new devices to an
existing network?
A. WPA
B. WPS
C. WEP
D. WAP
17. The practice of sending unsolicited messages over Bluetooth is known
as:
A. Bluejacking
B. Vishing
C. Bluesnarfing
D. Phishing
18. Gaining unauthorized access to a Bluetooth device is referred to as:
A. Xmas attack
B. Bluesnarfing
C. Bluejacking
D. Pharming
19. Which of the terms listed below is used to describe an unskilled
individual exploiting computer security loopholes with the use of code and
software written by someone else?
A. Script kiddie
B. Black hat hacker
C. Hactivist
D. White hat hacker
20. Which of the following facilitate(s) privilege escalation attacks?
(Select all that apply)
A. System/application vulnerability
B. Distributed Denial of Service (DDoS)
C. Social engineering techniques
D. Attribute-Based Access Control (ABAC)
E. System/application misconfiguration
21. A penetration test conducted with the use of prior knowledge on how
the system that is to be tested works is known as:
A. White hat
B. Sandbox
C. White box
D. Black box
22. Penetration testing: (Select all that apply)
A. Bypasses security controls
B. Only identifies lack of security controls
C. Actively tests security controls
D. Exploits vulnerabilities
E. Passively tests security controls
23. An antivirus software identifying non-malicious code as a virus due to
faulty virus signature file is an example of:
A. Fault tolerance
B. False positive error
C. Incident isolation
D. False negative error
24. Which of the terms listed below refers to a situation where no alarm
is raised when an attack has taken place?
A. False negative
B. True positive
C. False positive
D. True negative
25. Which of the following answers refers to a set of rules that specify
which users or system processes are granted access to objects as well as
what operations are allowed on a given object?
A. CRL
B. NAT
C. BCP
D. ACL
26. Which IPsec mode provides whole packet encryption?
A. Tunnel
B. Payload
C. Transport
D. Host-to-host
27. Which type of IDS relies on known attack patterns in order to detect
an intrusion?
A. Behavior-based
B. Heuristic/behavioral
C. Signature-based
D. AD-IDS
28. A protocol that provides protection against switching loops is called:
A. UTP
B. SSH
C. STP
D. HMAC
29. Disabling SSID broadcast:
A. Is one of the measures used for securing networks
B. Makes a WLAN harder to discover
C. Blocks access to WAP
D. Prevents wireless clients from accessing the network
30. A network access control method whereby the 48-bit address assigned to
each network card is used to determine access to the network is known as:
A. EMI shielding
B. Hardware lock
C. MAC filter
D. Quality of Service (QoS)
31. Which of the acronyms listed below refers to a technology that allows
for real-time analysis of security alerts generated by network hardware
and applications?
A. LACP
B. DSCP
C. SIEM
D. LWAPP
32. A software or hardware based security solutions designed to detect and
prevent unauthorized use and transmission of confidential information
outside of a corporate network are referred to as:
A. AUP
B. DLP
C. UAT
D. LTO
33. Network Access Control (NAC) defines a set of rules enforced in a
network that the clients attempting to access the network must comply
with. With NAC, policies can be enforced before or after end-stations gain
access to the network. NAC can be implemented as Pre-admission NAC where a
host must, for example, be virus free or have patches applied before it
can be allowed to connect to the network, and/or Post-admission NAC, where
a host is being granted/denied permissions based on its actions after it
has been provided with the access to the network.
A. True
B. False
34. Which of the following tools would be used to check the contents of an
IP packet?
A. Protocol analyzer
B. Secure Shell (SSH)
C. SNMP agent
D. Port scanner
35. What is the most effective way for permanent removal of data stored on
a magnetic drive?
A. Quick format
B. Recycle bin
C. Degaussing
D. Low-level format
36. Steganography allows for:
A. Checking data integrity
B. Calculating hash values
C. Hiding data within another piece of data
D. Data encryption
37. A monitored host or network specifically designed to detect
unauthorized access attempts is known as:
A. Botnet
B. Rogue access point
C. Honeypot
D. Flood guard
38. The practice of connecting to an open port on a remote server to
gather more information about the service running on that port is referred
to as:
A. Bluejacking
B. Banner grabbing
C. Session hijacking
D. eDiscovery
39. What is the name of a command-line utility used for checking the
reachability of a remote host?
A. tracert
B. ping
C. nslookup
D. netstat
40. Windows command-line utility for displaying intermediary points on the
packet route is called:
A. ping
B. netstat
C. ipconfig
D. tracert
41. Which of the terms listed below refers to a security solution
implemented on an individual computer host monitoring that specific system
for malicious activities or policy violations?
A. NIPS
B. Content filter
C. Firewall
D. HIDS
42. Which of the following acronyms refers to a network security solution
combining the functionality of a firewall with additional safeguards such
as URL filtering, content inspection, or malware inspection?
A. MTU
B. STP
C. UTM
D. XML
43. An operating system security feature that ensures safe memory usage by
applications is known as:
A. DEP
B. DLP
C. DSU
D. DRP
44. Which of the terms listed below refers to a mobile device's capability
to share its Internet connection with other devices?
A. Pairing
B. Clustering
C. Tethering
D. Bonding
45. Which of the following acronyms refers to a policy of permitting
employees to bring personally owned mobile devices and to use those
devices for accessing privileged company information and applications?
A. BSOD
B. BYOD
C. JBOD
D. BYOB
46. What is the name of a secure replacement for Telnet?
A. ICMP
B. FTP
C. IPv6
D. SSH
47. A type of protocol used in network management systems to monitor
network-attached devices is known as:
A. SIP
B. SNMP
C. NetBIOS
D. RTP
48. Which version(s) of the SNMP protocol offer(s) only authentication
based on community strings sent in unencrypted form? (Select all that
apply)
A. SNMPv1
B. SNMPv2
C. SNMPv3
D. SNMPv4
49. A lightly protected subnet consisting of publicly available servers
placed on the outside of the company's firewall is known as:
A. VPN
B. Access Point (AP)
C. VLAN
D. DMZ
50. Which of the following solutions is used to hide the internal IP
addresses by modifying IP address information in IP packet headers while
in transit across a traffic routing device?
A. NAC
B. ACL
C. NAT
D. DMZ
51. A logical grouping of computers that may be physically located on
different parts of a LAN is called Virtual Local Area Network (VLAN).
A. True
B. False
52. In computer networks, a computer system or an application that acts as
an intermediary between another computer and the Internet is commonly
referred to as:
A.
B.
C.
D.
Load balancer
Web server
VPN concentrator
Proxy server
53. What is the name of a technology that allows for storing passwords,
certificates, or encryption keys in a hardware chip?
A. Encrypting File System (EFS)
B. Triple Digital Encryption Standard (3DES)
C. Trusted Platform Module (TPM)
D. Advanced Encryption Standard (AES)
54. Which of the answers listed below refers to a firmware interface
designed as a replacement for BIOS?
A. UEFI
B. ACPI
C. CMOS
D. USMT
55. One of the measures used in OS hardening includes disabling
unnecessary ports and services.
A. True
B. False
56. The term trusted OS refers to an operating system:
A. Admitted to a network through NAC
B. Implementing patch management
C. That has been authenticated on the network
D. With enhanced security features
57. An MS Windows account that enables users to have temporary access to a
computer without the capability to install software or hardware, change
settings, or create a user password is called:
A. Guest account
B. Temporary account
C. Standard account
D. Managed user account
58. Which of the answers listed below refers to a control system providing
the capability for real-time monitoring and gathering information related
to industrial equipment?
A. OVAL
B. SCADA
C. TACACS
D. SCAP
59. Which of the following solutions is used for controlling temperature
and humidity?
A. Faraday cage
B. UART
C. EMI shielding
D. HVAC
60. The practice of finding vulnerabilities in an application by feeding
it incorrect input is referred to as:
A. Patching
B. Exception handling
C. Application hardening
D. Fuzzing
61. A software application used to manage multiple guest operating systems
on a single host system is called:
A. ICS server
B. Hypervisor
C. UC server
D. Virtual switch
62. A cloud computing infrastructure type where applications are hosted
over a network (typically Internet) eliminating the need to install and
run the software on the customer's own computers is known as:
A. Thick client
B. SaaS
C. Virtualization
D. IaaS
63. In which of the cloud computing infrastructure types, clients, instead
of buying all the hardware and software, purchase computing resources as
an outsourced service from suppliers who own and maintain all the
necessary equipment?
A. IaaS
B. SaaS
C. P2P
D. PaaS
64. Which of the following cloud services would provide the best solution
for a web developer intending to create a web app?
A. SaaS
B. API
C. PaaS
D. IaaS
65. Which of the security controls listed below is used to prevent
tailgating?
A. Hardware locks
B. Mantraps
C. Video surveillance
D. EMI shielding
66. A set of physical characteristics of the human body that can be used
for identification and access control purposes is known as:
A. Biometrics
B. PII
C. Physical token
D. ID
67. Solutions providing the AAA functionality include: (Select all that
apply)
A.
B.
C.
D.
MSCHAP
RADIUS
PPTP
TACACS+
68. Which of the following is an example of a multifactor authentication?
A. Password and biometric scan
B. User name and PIN
C. Smart card and identification badge
D. Iris and fingerprint scan
69. An authentication subsystem that enables a user to access multiple,
connected system components (such as separate hosts on a network) after a
single login at only one of the components is known as:
A. SSO
B. SSH
C. SSL
D. SLA
70. An access control model in which every resource has a sensitivity
label matching clearance level assigned to a user is called:
A. RBAC
B. DAC
C. HMAC
D. MAC
71. A type of access control in computer security where every object has
an owner who at his/her own discretion determines what kind of permissions
other users can have to that object is known as:
A. MAC
B. ABAC
C. DAC
D. RBAC
72. Which of the following is an example of a biometric authentication?
A. Password
B. Smart card
C. Fingerprint scanner
D. User name
73. Which of the following answers refers to a key document governing the
relationship between two business organizations?
A. ISA
B. SLA
C. MoU
D. BPA
74. An agreement between a service provider and the user(s) defining the
nature, availability, quality, and scope of the service to be provided is
known as:
A. BPA
B. MoU
C. SLA
D. ISA
75. Which of the following answers refers to an agreement established
between the organizations that own and operate connected IT systems to
document the technical requirements of the interconnection?
A. ISA
B. SLA
C. MoU
D. BPA
76. A document established between two or more parties to define their
respective responsibilities in accomplishing a particular goal or mission
is called:
A. BPA
B. MoU
C. SLA
D. ISA
77. One of the goals behind the mandatory vacations policy is to mitigate
the occurrence of fraudulent activity within the company.
A. True
B. False
78. Which of the answers listed below refers to a concept of having more
than one person required to complete a given task?
A. Acceptable use policy
B. Job rotation
C. Multifactor authentication
D. Separation of duties
79. A sticky note with a password kept on sight in user's cubicle would be
a violation of which of the following policies?
A. Data labeling policy
B. Clean desk policy
C. User account policy
D. Password complexity
80. Which of the following acronyms refers to a set of rules enforced in a
network that restrict the use to which the network may be put?
A. OEM
B. AUP
C. UAT
D. ARO
81. A maximum acceptable period of time within which a system must be
restored after failure is referred to as:
A. Recovery Time Objective (RTO)
B. Mean Time To Restore (MTTR)
C. Maximum Tolerable Period of Disruption (MTPOD)
D. Mean Time Between Failures (MTBF)
82. Which of the terms listed below is used to describe the loss of value
to an asset based on a single security incident?
A. SLE
B. ARO
C. ALE
D. SLA
83. A type of risk assessment formula defining probable financial loss due
to a risk over a one-year period is known as:
A. ARO
B. ALE
C. SLE
D. BPA
84. In quantitative risk assessment, this formula is used for estimating
the likelihood of occurrence of a future threat.
A. ALE
B. SLA
C. ARO
D. SLE
85. Contracting out a specialized technical component when the company's
employees lack the necessary skills is an example of:
A. Risk deterrence
B. Risk avoidance
C. Risk acceptance
D. Risk transference
86. Disabling certain system functions or shutting down the system when
risks are identified is an example of:
A. Risk acceptance
B. Risk avoidance
C. Risk transference
D. Risk deterrence
87. In forensic procedures, a sequence of steps in which different types
of evidence should be collected is known as:
A. Order of volatility
B. Layered security
C. Chain of custody
D. Transitive access
88. In incident response procedures a process that ensures proper handling
of collected evidence is called:
A. Intrusion detection/notification
B. Chain of custody
C. MSDS documentation
D. Equipment grounding
89. Which of the following backup site types allows for fastest disaster
recovery?
A. Cold site
B. Hot site
C. Warm site
D. Cross-site
90. A cold site is the most expensive type of backup site for an
organization to operate.
A. True
B. False
91. Restoring data from an incremental backup requires: (Select 2 answers)
A. Copy of the last incremental backup
B. All copies of differential backups made since the last full backup
C. Copy of the last differential backup
D. All copies of incremental backups made since the last full backup
E. Copy of the last full backup
92. In computer security, the term dumpster diving is used to describe a
practice of sifting through trash for discarded documents containing
sensitive data.
Found documents containing names and surnames of the employees along with
the information about positions held in the company and other data can be
used to facilitate social engineering attacks. Having the documents
shredded or incinerated before disposal makes dumpster diving less
effective and also mitigates the risk of social engineering attacks.
A. True
B. False
93. Any type of information pertaining to an individual that can be used
to uniquely identify that individual is known as:
A. PIN
B. PII
C. ID
D. Password
94. What are the features of Elliptic Curve Cryptography (ECC)? (Select 2
answers)
A. Asymmetric encryption
B. Shared key
C. Suitable for small wireless devices
D. High processing power requirements
E. Symmetric encryption
95. Advanced Encryption Standard (AES): (Select all that apply)
A. Is a symmetric encryption algorithm
B. Uses 128-, 192-, and 256-bit keys
C. Is an asymmetric encryption algorithm
D. Uses block cipher algorithm
E. Requires multiple passes to encrypt data
96. Which of the following wireless encryption schemes offers the highest
level of protection?
A. WEP
B. WPA2
C. WAP
D. WPA
97. AES-based encryption mode implemented in WPA2 is known as:
A. CCMP
B. 3DES
C. TKIP
D. HMAC
98. Which of the answers listed below refers to a security solution
allowing administrators to block Internet access for users until they
perform required action?
A. Access logs
B. Mantrap
C. Post-admission NAC
D. Captive portal
99. Which of the following solutions would be the fastest in validating
digital certificates?
A. IPX
B. OCSP
C. CRL
D. OSPF
100. What is the name of a storage solution used to retain copies of
private encryption keys?
A. Trusted OS
B. Key escrow
C. Proxy
D. Recovery agent
ANSWERS
1. Answer: B. Malware
Explanation: The term malware (short for malicious software) describes a
wide category of harmful computer programs used to disrupt computer
operation, gather sensitive information, or gain unauthorized access to
computer systems.
2. Answer: A. Trojan horse
Explanation: Software that performs unwanted and harmful actions in
disguise of a legitimate and useful program is referred to as a Trojan
horse. This type of malware may act like a legitimate program and have all
the expected functionalities, but apart from that it will also contain a
portion of malicious code appended to it that the user is unaware of.
3. Answer: C. Software that displays advertisements
Explanation: Adware is a type of software that displays advertisements on
the user system, often in the form of a pop-up window. Unsolicited or
undesired electronic messages are known as spam. Malicious program that
sends copies of itself to other computers on the network is called a
computer worm (or simply a worm). Malicious software that collects
information about users without their knowledge is referred to as spyware.
4. Answer: C. Rootkit
Explanation: The term rootkit refers to a collection of software tools
used by a hacker to mask intrusion and obtain administrator-level access
to a computer or computer network.
5. Answer: B. RAT
Explanation: Remote Access Trojan (RAT) is a type of Trojan horse malware
that enables unauthorized remote access to a compromised system.
6. Answer: D. Backdoor
Explanation: The term backdoor refers to an undocumented way of gaining
access to a program, online service, or an entire computer system.
7. Answer: B. Spear phishing
Explanation: Phishing scams targeting selected individuals/groups of users
are referred to as spear phishing.
8. Answer: D. Gaining unauthorized access to restricted areas by following
another person
Explanation: The practice of gaining unauthorized access to restricted
areas by following another person is called tailgating. Looking over
someone's shoulder to get information is known shoulder surfing. The term
war driving refers to scanning for unsecured wireless networks while
driving in a car. Manipulating/deceiving users into disclosing
confidential information is known as social engineering.
9. Answer: C. Virus hoax
Explanation: An email message containing a warning related to a nonexistent computer security threat, asking a user to delete system files
falsely identified as malware, and/or prompting them to share the message
with others would be an example of a virus hoax.
10. Answer: D. DDoS
Explanation: As opposed to the simple Denial of Service (DoS) attacks that
usually are performed from a single system, a Distributed Denial of
Service (DDoS) attack uses multiple compromised computer systems to
perform an attack against its target. The intermediary systems that are
used as platform for the attack are the secondary victims of the DDoS
attack; they are often referred to as zombies, and collectively as a
botnet. The goal of DoS and DDoS attacks is to flood the bandwidth or
resources of a targeted system so that it becomes overwhelmed with false
requests and in result doesn't have time or resources to handle legitimate
requests.
11. Answer: C. Buffer overflow
Explanation: Buffer overflow is a type of exploit that relies on
overwriting contents of memory to cause unpredictable results in an
application.
12. Answer: C. Vulnerability that is present in already released software
but unknown to the software developer
Explanation: Zero-day attacks exploit vulnerabilities that are present in
already released software but unknown to the software developer.
13. Answer: A. True
Explanation: A replay attack occurs when an attacker intercepts user
credentials and tries to use this information later for gaining
unauthorized access to resources on a network.
14. Answer: C. Typo squatting
Explanation: URL hijacking is also known as typo squatting. The term
refers to a practice of registering misspelled domain name closely
resembling other well established and popular domain name in hopes of
getting Internet traffic from users who would make errors while typing in
the web address in their browsers.
15. Answer: C. Evil twin
Explanation: An access point (AP) deployed by a hacker in order to steal
user credentials or for the purpose of traffic eavesdropping is commonly
referred to as rogue access point or evil twin.
16. Answer: B. WPS
Explanation: Wi-Fi Protected Setup (WPS) is a network security standard
which simplifies configuration of new wireless networks by providing nontechnical users with a capability to easily configure network security
settings and add new devices to an existing network. WPS has known
vulnerabilities and disabling this functionality is one of the recommended
ways of securing the network.
17. Answer: A. Bluejacking
Explanation: Sending unsolicited messages over Bluetooth is known as
bluejacking.
18. Answer: B. Bluesnarfing
Explanation: Gaining unauthorized access to a Bluetooth device is referred
to as bluesnarfing.
19. Answer: A. Script kiddie
Explanation: Unskilled individuals exploiting computer security loopholes
with the use of code and software written by someone else are called
script kiddies.
20. Answers: A, C, and E. System/application vulnerability, Social
engineering techniques, and System/application misconfiguration
Explanation: Unpatched system/application vulnerabilities, social
engineering, and system/application configuration errors are all factors
facilitating privilege escalation attacks.
21. Answer: C. White box
Explanation: A penetration test conducted with the use of prior knowledge
on how the system that is to be tested works is known as white box
testing.
22. Answers: A, C, and D. Bypasses security controls, Actively tests
security controls, and Exploits vulnerabilities
Explanation: Penetration testing bypasses security controls and actively
tests security controls by exploiting vulnerabilities. Passive testing of
security controls, identification of vulnerabilities and missing security
controls or common misconfigurations are the characteristic features of
vulnerability scanning.
23. Answer: B. False positive error
Explanation: An antivirus software identifying non-malicious code as a
virus due to faulty virus signature file is an example of a false positive
error.
24. Answer: A. False negative
Explanation: A situation where no alarm is raised when an attack has taken
place is an example of a false negative error.
25. Answer: D. ACL
Explanation: An Access Control List (ACL) contains a set of rules that
specify which users or system processes are granted access to objects as
well as what operations are allowed on a given object.
26. Answer: A. Tunnel
Explanation: IPsec can be implemented in a host-to-host transport mode
(where only the payload of the IP packet is usually encrypted and/or
authenticated) or in a network tunnel mode (where the entire IP packet is
encrypted and/or authenticated).
27. Answer: C. Signature-based
Explanation: Signature-based Intrusion Detection System is a type of IDS
that relies on known attack patterns in order to detect intrusions.
28. Answer: C. STP
Explanation: Spanning Tree Protocol (STP) is used to prevent switching
loops. Switching loop occurs when there's more than one active link
between two network switches, or when two ports on the same switch become
connected to each other.
29. Answer: B. Makes a WLAN harder to discover
Explanation: Service Set Identifier (SSID) is another term for the name of
a Wireless Local Area Network (WLAN). Wireless networks advertise their
presence by regularly broadcasting the SSID in a special packet called
beacon frame. In wireless networks with disabled security features knowing
the network SSID is enough to get access to the network. SSID can be
hidden by disabling the SSID broadcast on the Wireless Access Point (WAP),
but hidden SSID makes a WLAN only harder to discover and is not a true
security measure. Wireless networks with hidden SSID can still be
discovered with the use of a packet sniffing software. Security measures
that help in preventing unauthorized access to a wireless network include
strong encryption schemes such as WPA and WPA2.
30. Answer: C. MAC filter
Explanation: Network Access Control (NAC) method based on the physical
address (MAC address) of the Network Interface Card (NIC) is called MAC
filtering or MAC address filtering. 48-bit MAC address is a unique number
assigned to every network adapter. Devices acting as network access points
can have certain MAC addresses blacklisted or whitelisted and based on the
entry on either of the lists grant or deny access to the network.
31. Answer: C. SIEM
Explanation: Security Information and Event Management (SIEM) solutions
are used for real-time analysis of security alerts generated by network
hardware and applications.
32. Answer: B. DLP
Explanation: Data Loss Prevention (DLP) solutions are software or hardware
based security solutions designed to detect and prevent unauthorized use
and transmission of confidential information outside of a corporate
network.
33. Answer: A. True
Explanation: Network Access Control (NAC) defines a set of rules enforced
in a network that the clients attempting to access the network must comply
with. With NAC, policies can be enforced before or after end-stations gain
access to the network. NAC can be implemented as Pre-admission NAC where a
host must, for example, be virus free or have patches applied before it
can be allowed to connect to the network, and/or Post-admission NAC, where
a host is being granted/denied permissions based on its actions after it
has been provided with the access to the network.
34. Answer: A. Protocol analyzer
Explanation: Protocol analyzer (also known as packet sniffer) is a tool
used for capturing and analyzing contents of network packets.
35. Answer: C. Degaussing
Explanation: Degaussing provides the most effective way for permanent
removal of data stored on a magnetic drive.
36. Answer: C. Hiding data within another piece of data
Explanation: Steganography allows for hiding data within another piece of
data.
37. Answer: C. Honeypot
Explanation: A monitored host or network specifically designed to detect
unauthorized access attempts is known as a honeypot. This type of system
contains no valuable data and is used to divert the attacker's attention
from the corporate network. Multiple honeypots set up on a network are
known as a honeynet.
38. Answer: B. Banner grabbing
Explanation: The practice of connecting to an open port on a remote server
to gather more information about the service running on that port is
referred to as banner grabbing.
39. Answer: B. ping
Explanation: Command-line utility used for checking the reachability of a
remote host is called ping. Ping operates by sending Internet Control
Message Protocol (ICMP) echo request packets to the destination host and
waiting for a reply.
40. Answer: D. tracert
Explanation: Windows command-line utility for displaying intermediary
points (routers) the packet is passed through on its way to a destination
host is called tracert. Command-line program for testing the reachability
of a remote host is called ping. Windows command-line program for
displaying TCP/IP configuration details is called ipconfig. Command-line
utility used for displaying active TCP/IP connections is called netstat.
41. Answer: D. HIDS
Explanation: Host Based Intrusion Detection System (HIDS) is a security
application designed to monitor and analyze the local computer system for
malicious or anomalous activity. Common examples of HIDS are antivirus
software and anti-spyware applications.
42. Answer: C. UTM
Explanation: The term Unified Threat Management (UTM) refers to a network
security solution (commonly in the form of a dedicated device called UTM
appliance) which combines the functionality of a firewall with additional
safeguards such as for example URL filtering, spam filtering, gateway
antivirus protection, intrusion detection or prevention, content
inspection, or malware inspection.
43. Answer: A. DEP
Explanation: Data Execution Prevention (DEP) is a security feature in
modern operating systems that monitors applications to make sure they use
system memory safely. In Microsoft environment, DEP is defined as a set of
hardware and software technologies that perform additional checks on
memory to help protect against malicious code exploits. If a program tries
to execute code from memory in an incorrect way, DEP closes the program.
44. Answer: C. Tethering
Explanation: The term tethering refers to a mobile device's capability to
share its Internet connection with other devices.
45. Answer: B. BYOD
Explanation: The term Bring Your Own Device (BYOD) refers to a policy of
permitting employees to bring personally owned mobile devices and to use
those devices for accessing privileged company information and
applications.
46. Answer: D. SSH
Explanation: Secure Shell (SSH) is a tunneling protocol for secure remote
login and other secure network services designed as a replacement for
Telnet and other insecure remote shells.
47. Answer: B. SNMP
Explanation: Simple Network Management Protocol (SNMP) is a UDP-based,
Application Layer protocol used in network management systems to monitor
network-attached devices. SNMP is typically integrated into most modern
network infrastructure devices such as routers, bridges, switches,
servers, printers, copiers, fax machines, and other network-attached
devices. An SNMP-managed network consists of three key components: a
managed device, a network-management software module that resides on a
managed device (Agent), and a network management system (NMS) which
executes applications that monitor and control managed devices and collect
SNMP information from Agents. All SNMP-compliant devices include a virtual
database called Management Information Base (MIB) containing information
about configuration and state of the device that can be queried by the
SNMP management station.
48. Answers: A and B. SNMPv1 and SNMPv2
Explanation: Of the three existing versions of the Simple Network
Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and SNMPv2) offer
authentication based on community strings sent in unencrypted form (in
cleartext). SNMPv3 provides packet encryption, authentication, and hashing
mechanisms that allow for checking whether data has changed in transit.
49. Answer: D. DMZ
Explanation: In the context of computer security, the term Demilitarized
Zone (DMZ) refers to a lightly protected subnet consisting of publicly
available servers placed on the outside of the company's firewall.
50. Answer: C. NAT
Explanation: Network Address Translation (NAT) is a technology that
provides an IP proxy between a private Local Area Network (LAN) and a
public network such as the Internet. Computers on the private LAN can
access the Internet through a NAT-capable router which handles the IP
address translation. NAT hides the internal IP addresses by modifying IP
address information in IP packet headers while in transit across a traffic
routing device.
51. Answer: A. True
Explanation: A logical grouping of computers that may be physically
located on different parts of a LAN is called Virtual Local Area Network
(VLAN). VLANs allow computer hosts to act as if they were attached to the
same broadcast domain, regardless of their physical location. VLAN
membership can be configured through software instead of physically
relocating devices or connections, and VLANs are often created with the
use of switches equipped with additional software features.
52. Answer: D. Proxy server
Explanation: In computer networks, a computer system or an application
that acts as an intermediary between another computer and the Internet is
commonly referred to as a proxy server.
53. Answer: C. Trusted Platform Module (TPM)
Explanation: The Trusted Platform Module (TPM) is a specification,
published by the Trusted Computing Group (TCG), for a microcontroller that
can store secured information, and also the general name of
implementations of that specification. Trusted Platform Modules are
hardware based security microcontrollers that store keys, passwords and
digital certificates and protect this data from external software attacks
and physical theft. TPMs are usually embedded on the motherboard of a
personal computer or laptop, but they can also be used in other devices
such as mobile phones or network equipment. The nature of hardware-based
cryptography ensures that the information stored in hardware is better
protected from external attacks executed with the use of software.
54. Answer: A. UEFI
Explanation: Unified Extensible Firmware Interface (UEFI) is a firmware
interface designed as a replacement for BIOS. UEFI offers a variety of
improvements over BIOS including Graphical User Interface (GUI), mouse
support, network access capability, or security boot functionality
designed to prevent the loading of malware and unauthorized operating
systems during the computer start-up process.
55. Answer: A. True
Explanation: Disabling unnecessary ports and services is one of the
measures for securing an Operating System (OS) software.
56. Answer: D. With enhanced security features
Explanation: The term Trusted OS refers to an operating system with
enhanced security features. The most common access control model used in
Trusted OS is Mandatory Access Control (MAC). Examples of Trusted OS
implementations include Security Enhanced Linux (SELinux) and FreeBSD with
the TrustedBSD extensions.
57. Answer: A. Guest account
Explanation: An MS Windows account that enables users to have temporary
access to a computer without the capability to install software or
hardware, change settings, or create a user password is called Guest. Due
to the fact that the Guest account in Windows allows a user to log on to a
network, browse the Internet, and shut down the computer, it is
recommended to keep it disabled when it isn't needed.
58. Answer: B. SCADA
Explanation: Supervisory Control And Data Acquisition (SCADA) is a control
system providing the capability for real-time monitoring and gathering
information related to industrial equipment.
59. Answer: D. HVAC
Explanation: Heating, Ventilation, and Air Conditioning (HVAC) systems are
used for controlling temperature and humidity.
60. Answer: D. Fuzzing
Explanation: Finding vulnerability in an application by feeding it
incorrect input is known as fuzzing, or fuzz test.
61. Answer: B. Hypervisor
Explanation: A software application used to manage multiple guest
operating systems on a single host system is called hypervisor.
62. Answer: B. SaaS
Explanation: Software as a Service (SaaS) is a type of cloud computing
infrastructure where applications are hosted over a network (typically
Internet) eliminating the need to install and run the software on the
customer's own computers which simplifies maintenance and support.
Compared to conventional software deployment which requires licensing fee
and often investment in additional hardware on the client side, SaaS can
be delivered at a lower cost by providing remote access to applications
and pricing based on monthly or annual subscription fee.
63. Answer: A. IaaS
Explanation: Infrastructure as a Service (IaaS) is one of the cloud
computing infrastructure types where clients, instead of buying all the
hardware and software, purchase computing resources as an outsourced
service from suppliers who own and maintain all the necessary equipment.
The clients usually pay for computational resources on a per-use basis. In
IaaS, cost of the service depends on the amount of consumed resources.
64. Answer: C. PaaS
Explanation: Platform as a Service (PaaS) is a category of cloud computing
services providing cloud-based application development tools, in addition
to services for testing, deploying, collaborating on, hosting, and
maintaining applications.
65. Answer: B. Mantraps
Explanation: Mantraps are two-door entrance points connected to a guard
station. A person entering mantrap from the outside remains inside until
he/she provides authentication token required to unlock the inner door.
Mantraps are used to prevent tailgating, which is the practice of gaining
unauthorized access to restricted areas by following another person.
66. Answer: A. Biometrics
Explanation: In computer security, biometrics refers to physical
characteristics of the human body that can be used for identification and
access control purposes.
67. Answers: B and D. RADIUS and TACACS+
Explanation: Authentication, Authorization, and Accounting (AAA) is a
security architecture framework designed for verification of the identity
of a person or process (authentication), granting or denying access to
network resources (authorization), and tracking the services users are
accessing as well as the amount of network resources they are consuming
(accounting). Remote Authentication Dial-In User Service (RADIUS) and
Terminal Access Controller Access Control System Plus (TACACS+) are
examples of protocols providing the AAA functionality.
68. Answer: A. Password and biometric scan
Explanation: Authentication is proving user identity to a system.
Authentication process can be based on different categories of
authentication factors, including unique physical traits of each
individual such as fingerprints ("something you are"), physical tokens
such as smart cards ("something you have"), or user names and passwords
("something you know"). Additional factors might include geolocation
("somewhere you are"), or user-specific activity patterns such as for
example keyboard typing style ("something you do"). Multi-factor
authentication systems require implementation of authentication factors
from two or more different categories.
69. Answer: A. SSO
Explanation: An authentication subsystem that enables a user to access
multiple, connected system components (such as separate hosts on a
network) after a single login at only one of the components is known as
Single Sign-On (SSO). A single sign-on subsystem typically requires a user
to log in once at the beginning of a session, and then during the session
grants further access to multiple, separately protected hosts,
applications, or other system resources without further login action by
the user.
70. Answer: D. MAC
Explanation: Mandatory Access Control (MAC) is an access control model
where every resource has a sensitivity label matching a clearance level
assigned to a user (to be able to access the resource, user's clearance
level must be equal or higher than the sensitivity level assigned to the
resource). With mandatory access control users cannot set or change access
policies at their own discretion; labels and clearance levels can only be
applied and changed by an administrator.
71. Answer: C. DAC
Explanation: In Discretionary Access Control (DAC) model every object has
an owner who at his/her own discretion determines what kind of permissions
other users can have to that object. DAC is also referred to as an access
control method based on user identity.
72. Answer: C. Fingerprint scanner
Explanation: In computer security, user's identity can be verified either
by examining something that the user knows (a user name or password),
something that the user has (a physical object such as smart card), or
something that the user is (unique trait of every single person such as
finger print or pattern of a human eye iris). Biometric authentication
systems are based on examining the unique traits of a user and fingerprint
scanner is an example of a biometric device.
73. Answer: D. BPA
Explanation: Business Partners Agreement (BPA) is a key document governing
the relationship between two business organizations.
74. Answer: C. SLA
Explanation: An agreement between a service provider and the user(s)
defining the nature, availability, quality, and scope of the service to be
provided is known as Service Level Agreement (SLA).
75. Answer: A. ISA
Explanation: The term Interconnection Security Agreement (ISA) refers to
an agreement established between the organizations that own and operate
connected IT systems to document the technical requirements of the
interconnection.
76. Answer: B. MoU
Explanation: A document established between two or more parties to define
their respective responsibilities in accomplishing a particular goal or
mission is known as Memorandum of Understanding (MoU).
77. Answer: A. True
Explanation: One of the goals behind the mandatory vacations policy is to
mitigate the occurrence of fraudulent activity within the company.
78. Answer: D. Separation of duties
Explanation: A concept of having more than one person required to complete
a given task is known as separation of duties. By delegating tasks and
associated privileges for a specific process among multiple users this
internal control type provides a countermeasure against fraud and errors.
79. Answer: B. Clean desk policy
Explanation: A sticky note with a password kept on sight in user's cubicle
would be a violation of clean desk policy.
80. Answer: B. AUP
Explanation: Acceptable Use Policy (AUP) is a set of rules enforced in a
network that restrict the use to which the network may be put.
81. Answer: A. Recovery Time Objective (RTO)
Explanation: A maximum acceptable period of time within which a system
must be restored after failure is also known as Recovery Time Objective
(RTO). RTOs are established at the Business Impact Analysis (BIS) stage of
the Business Continuity Planning (BCP). The goal of a Business Impact
Analysis is to determine the impact of any disruption of the activities
that support the organization's key products and services. A key aspect of
determining the impact of a disruption is identifying the so called
Maximum Tolerable Period of Disruption (MTPOD), which is the maximum
amount of time that an enterprise's key products or services can be
unavailable or undeliverable after an event that causes disruption to
operations. The goal of Recovery Time Objective is to ensure that the
Maximum Tolerable Period of Disruption (MTPD) for each activity is not
exceeded.
82. Answer: A. SLE
Explanation: The term Single Loss Expectancy (SLE) is used to describe the
loss of value to an asset based on a single security incident.
83. Answer: B. ALE
Explanation: Annual Loss Expectancy (ALE) risk assessment formula defines
probable financial loss due to a risk over a one-year period.
84. Answer: C. ARO
Explanation: Annualized Rate of Occurrence (ARO) formula is an estimate
based on the historical data of how often a threat would be successful in
exploiting a vulnerability. In quantitative risk assessment, this term is
used for estimating the likelihood of occurrence of a future threat.
85. Answer: D. Risk transference
Explanation: Contracting out a specialized technical component when the
company's employees lack the necessary skills is an example of risk
transference.
86. Answer: B. Risk avoidance
Explanation: Disabling certain system functions or shutting down the
system when risks are identified is an example of risk avoidance.
87. Answer: A. Order of volatility
Explanation: In forensic procedures, a sequence of steps in which
different types of evidence should be collected is known as order of
volatility.
88. Answer: B. Chain of custody
Explanation: In incident response procedures a process that ensures proper
handling of collected evidence is called chain of custody.
89. Answer: B. Hot site
Explanation: A hot site is a type of backup site that allows for fastest
disaster recovery. Hot site constitutes a mirror copy of the original
site, with all the facilities, equipment, and data readily available for
use in case of emergency.
90. Answer: B. False
Explanation: A cold site is the least expensive type of backup site for an
organization to operate. It is a type of an alternate site that offers
only the basic facilities, which means that in case of emergency all the
equipment and data must be moved to the site first to make it operational.
91. Answers: D and E. All copies of incremental backups made since the
last full backup and Copy of the last full backup
Explanation: Restoring data from an incremental backup requires a copy of
the last full backup as well as all copies of incremental backups made
since the last full backup.
92. Answer: A. True
Explanation: In computer security, the term dumpster diving is used to
describe a practice of sifting through trash for discarded documents
containing sensitive data. Found documents containing names and surnames
of the employees along with the information about positions held in the
company and other data can be used to facilitate social engineering
attacks. Having the documents shredded or incinerated before disposal
makes dumpster diving less effective and also mitigates the risk of social
engineering attacks.
93. Answer: B. PII
Explanation: Personally Identifiable Information (PII) includes any type
of information pertaining to an individual that can be used to uniquely
identify that individual. Identity of a person can be established by
tracing their most basic attributes such as name, surname, phone number or
traditional mailing address, but also through their social security or
credit card numbers, IP or email addresses, or data collected via
biometric devices. Security of PII has become major concern for companies
and organizations due to the accessibility of this type of data over the
Internet, but also due to misuse of personal electronic devices such as
USB drives or smartphones that are easily concealable and can carry large
amounts of data.
94. Answers: A and C. Asymmetric encryption and Suitable for small
wireless devices
Explanation: Elliptic Curve Cryptography (ECC) is a type of asymmetric
encryption. ECC provides strong encryption while requiring less processing
power than other encryption methods which makes it suitable for small
wireless devices such as handhelds and cell phones.
95. Answers: A, B, and D. Is a symmetric encryption algorithm, Uses 128-,
192-, and 256-bit keys, and Uses block cipher algorithm
Explanation: Advanced Encryption Standard (AES) is a strong symmetric
encryption algorithm. AES uses block cipher algorithm with the block size
of 64 bits (compared to stream ciphers which process data by encrypting
individual bits, block cipher divides data into separate fragments and
encrypts each fragment separately). AES uses 128-, 192-, and 256-bit
encryption keys
96. Answer: B. WPA2
Explanation: Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy
(WEP) are encryption standards designed for securing wireless networks.
WEP is an older standard and due to its vulnerabilities is not
recommended. WPA was designed as an interim replacement for WEP, and WPA2
was introduced as the official standard offering the strongest security of
the three.
97. Answer: A. CCMP
Explanation: Counter Mode Cipher Block Chaining Message Authentication
Code Protocol (CCMP) is an encryption mode implemented in the Wi-Fi
Protected Access II (WPA2) security protocol. CCMP relies on the Advanced
Encryption Standard (AES) providing much stronger security than the Wired
Equivalent Privacy (WEP) protocol and Temporal Key Integrity Protocol
(TKIP) implemented in Wi-Fi Protected Access (WPA).
98. Answer: D. Captive portal
Explanation: Captive portals allow administrators to block Internet access
for users until they perform required action. An example captive portal
could be a web page requiring authentication and/or payment (e.g. at a
public Wi-Fi hotpot) before a user is allowed to proceed and use the
Internet access service.
99. Answer: B. OCSP
Explanation: Online Certificate Status Protocol (OCSP) allows for querying
Certificate Authority (CA) for validity of a digital certificate. Another
solution for checking whether a certificate has been revoked is
Certificate Revocation List (CRL). CRLs are updated regularly and sent out
to interested parties. Compared to CRL, OCSP allows for querying the CA at
any point in time and retrieving information without any delay.
100. Answer: B. Key escrow
Explanation: Key escrow is a storage solution used to retain copies of private encryption keys.
Download