Practice Questions

Question 1

Between which layers of the OSI model does the SSL protocol function? [Choose the two best answers.]

  • A. Application layer

  • B. Presentation layer

  • C. Session layer

  • D. Transport layer

  • E. Network layer

  • F. Data Link layer

  • G. Physical layer

A1:

Answers A and D are correct. SSL connections occur between the Application and Transport layers. Answers B and C are incorrect because the SSL transport effectively fills the same role as these OSI model layers. Answers E, F, and G are incorrect because the data has been abstracted (encapsulated) beyond the level at which SSL operates.

Question 2

Which of the following encryption protocols are used in Secure Shell connections? [Choose the three best answers.]

  • A. International Data Encryption Algorithm (IDEA)

  • B. Blowfish

  • C. Rivest Cipher 4 (RC4)

  • D. Digital Encryption Standard (DES)

  • E. Message Digest 5 (MD5)

A2:

Answers A, B, and D are correct. SSH connections can use the IDEA, Blowfish, and DES encryption methods . Answer C is incorrect because the RC4 protocol is used by the SSL protocol. Answer E is incorrect because the MD5 hashing algorithm is not used by SSH connectivity.

Question 3

Which term best describes email that is received without the desire or request of the recipient?

  • A. Hoax

  • B. Virus

  • C. Trojan horse

  • D. Spam

A3:

Answer D is correct. Spam is the name given to electronic junk mail and includes any items not requested or desired by the receiver. A hoax is email that includes messages that contain incorrect or misleading information; therefore, answer A is incorrect. A virus is a small chunk of code designed to attach to other code; therefore, answer B is incorrect. A Trojan horse appears to be useful software but has code hidden inside it that will attack your system directly or allow the system to be infiltrated by the originator of the code once it is executed; therefore, answer C is incorrect.

Question 4

Which of the following encryption methods are available when using Pretty Good Privacy? [Choose the two best answers.]

  • A. International Data Encryption Algorithm (IDEA)

  • B. Blowfish

  • C. Diffie-Hellman

  • D. Digital Encryption Standard (DES)

  • E. Rivest-Shamir-Adleman (RSA)

A4:

Answers C and E are correct. PGP can use either the Diffie-Hellman or the RSA public key encryption method. Answers A, B, and D are incorrect because these protocols are not available within PGP.

Question 5

Which standard port is used to establish a Web connection using the 40-bit RC4 encryption protocol?

  • A. 21

  • B. 80

  • C. 443

  • D. 8250

A5:

Answer C is correct. A connection using the HTTP protocol over SSL (HTTPS) is made using the RC4 cipher and port 443. Answer A is incorrect because port 21 is used for FTP connections. Answer B is incorrect because port 80 is used for unsecure plaintext HTTP communications. Answer D is incorrect because port 8250 is not designated to a particular TCP/IP protocol.

Question 6

Which of the Secure Shell utilities is used to establish a secure command-line connection to a remote server?

  • A. rlogin

  • B. slogin

  • C. rsh

  • D. ssh

  • E. rcp

  • F. scp

A6:

Answer B is correct. The slogin SSH utility provides secured command-line connections to a remote server. Answers A, C, and E are incorrect because rlogin , rsh , and rcp do not use secured connections. Answer D is incorrect because the ssh utility is used to establish a secured environment link to a remote server, whereas answer F is incorrect because the scp utility is used for secure file copying.

Question 7

When RADIUS is used to authenticate a dial-in user , which of the following is the RADIUS client?

  • A. Dial-in user's computer

  • B. RAS server

  • C. RADIUS server

  • D. Client's ISP

  • E. VPN

A7:

Answer B is correct. The RAS server functions as the RADIUS client, authenticating dial-in user attempts against the RADIUS server. Answer A is incorrect because the dial-in user does not directly contact the RADIUS server. Answer C is incorrect because the RADIUS server would not be its own client. Answer D is incorrect because a client dialing in to an RAS server would not connect through a separate ISP. Answer E is incorrect because a VPN connection establishes a secured tunnel between two systems and is not involved in RADIUS authentication.

Question 8

Which of the following is true of TACACS?

  • A. It is an advanced protocol that allows for both authentication and authorization.

  • B. It is an advanced protocol used to encrypt data sent by VPN clients .

  • C. It is an older protocol used to pass authentication requests sent by dial-up clients.

  • D. It is a protocol used for authorizing dial-in clients and setting access control.

A8:

Answer C is correct. TACACS is an older protocol that forwards logon information to an authentication server but cannot provide authentication by itself. Answers A and D are incorrect because they describe RADIUS. Answer B is a made up statement; therefore, it is incorrect.

Question 9

At which layer of the OSI model does the IPSec protocol function?

  • A. Application layer

  • B. Presentation layer

  • C. Session layer

  • D. Transport layer

  • E. Network layer

  • F. Data Link layer

  • G. Physical layer

A9:

Answer E is correct. IPSec validation and encryption function at the Network layer of the OSI model. Answers A, B, C, and D are incorrect because IPSec functions at a lower level of the OSI model. Answers F and G are incorrect because they define a more abstracted level of data manipulation than is managed by the IPSec standard.

Question 10

Which of the following are possible dangers of using instant messaging clients? [Choose the best answers.]

  • A. Spam

  • B. Hoaxes

  • C. Viruses

  • D. File-sharing

  • E. File execution

A10:

Answers A, B, C, D, and E are all correct. IM solutions have many potential security problems, including the receipt of spam and hoax messages, the possible execution of files and viruses bypassing operating system protections , and the possible exposure of file shares to public access.

Question 11

Which of the following are asymmetric encryption standards? [Choose the two best answers.]

  • A. IDEA

  • B. MD5

  • C. RSA

  • D. SHA

  • E. Diffie-Hellman

  • F. DES

A11:

Answers C and E are correct. The Rivest-Shamir-Adleman and Diffie-Hellman encryption standards specify public key (asymmetric) encryption methods. Answers A and F are incorrect because the Digital Encryption Standard and International Data Encryption Algorithm standards specify private key (symmetric) encryption methods. Answers B and D are incorrect because the Message Digest 5 and Secure Hash Algorithm standards specify hashing algorithms.



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net