Assessment Test

1. 

Which type of audit determines whether accounts have been established properly and that privilege creep is not occurring?

  1. Privilege audit

  2. Usage audit

  3. Escalation audit

  4. Report audit

a. a privilege audit is used to determine that all groups, users, and other accounts have the appropriate privileges assigned according to the policies of an organization. for more information, see chapter 9 .

2. 

A physical access device that restricts access to a small number of individuals at one time is called?

  1. Checkpoint

  2. Perimeter security

  3. Security zones

  4. Mantrap

d. a mantrap is a device, such as a small room, that limits access to a small number of individuals. mantraps typically use electronic locks and other methods to control access.

3. 

Which of the following is a set of voluntary standards governing encryption?

  1. PKI

  2. PKCS

  3. ISA

  4. SSL

b. public keys cryptography standards are a set of voluntary standards for public key cryptography. this set of standards is coordinated by rsa incorporated.

4. 

Which protocol is used to create a secure environment in a wireless network?

  1. WAP

  2. WEP

  3. WTLS

  4. WML

b. wired equivalent privacy (wep) is designed to provide security equivalent to that of a wired network. wep has is known to have vulnerabilities and is not considered highly secure. for additional information, see chapter 4 .

5. 

An Internet server interfaces with TCP/IP at which layer of the DOD model?

  1. Transport layer

  2. Network layer

  3. Process layer

  4. Internet layer

c. the process layer interfaces with applications and encapsulates traffic through the host-to-host or transport layer, the internet layer and the network access layer. for more information, see chapter 2 .

6. 

You want to establish a network connection between two LANS using the Internet. Which technology would best accomplish that for you?

  1. IPSec

  2. L2TP

  3. PPP

  4. SLIP

b. l2tp is a tunneling protocol that can be used between lans. l2tp is not secure, and you would want to use ipsec with it to provide data security. for more information, see chapter 3 .

7. 

Which design concept limits access to systems from outside users while protecting systems in an inside LAN?

  1. DMZ

  2. VLAN

  3. I&A

  4. Router

a. a dmz is an area in a network that allows restrictive access to untrusted users, and it isolates the internal network from access by external users and systems. this is accomplished using routers and firewalls to limit access to sensitive network resources. for more information, see chapter 1 .

8. 

In the key recovery process, which key must be recoverable?

  1. Rollover key

  2. Secret key

  3. Previous key

  4. Escrow key

c. a key recovery process must be able to recover a previous key. if the previous key can't be recovered, all of the information that used that key will be irrecoverably lost.

9. 

An attack that is designed to overload a particular protocol or service is referred to as which kind of attack?

  1. Spoofing

  2. Back door

  3. Man in the middle

  4. Flood

d. a flood attack is designed to overload a protocol or service by repeatedly initiating a request for service. this type of attack usually results in a dos situation occurring. this may be caused by the protocol freezing or from excessive bandwidth usage in the network as a result of the requests. for more information, see chapter 2 .

10. 

The component of an IDS that collects data is referred to as a what?

  1. Data source

  2. Sensor

  3. Event

  4. Analyzer

b. a sensor collects data from the data source and passes it on to the analyzer. if the analyzer determines that unusual activity has occurred, an alert may be generated. for additional information, see chapter 4 .

11. 

What is the process of making an operating system secure from attack called?

  1. Hardening

  2. Tuning

  3. Sealing

  4. Locking down

a. hardening is the term used to describe the process of securing a system. this is accomplished in many ways, including disabling unneeded protocols. for additional information on hardening, see chapter 5 .

12. 

The integrity objective addresses which characteristic of information security?

  1. Verification that information is accurate

  2. Verification that ethics are properly maintained

  3. Establishment of clear access control of data

  4. Verification that data is kept private and secure

a. the goal of integrity is to verify that information being used is accurate and has not been tampered with. integrity is coupled with accountability to ensure that data is accurate and that a final authority exists to verify this, if needed. for more information, see chapter 1 .

13. 

Which mechanism is used by PKI to allow immediate verification of a certificate's validity?

  1. CRL

  2. MD5

  3. SSHA

  4. OCSP

d. online certificate status protocol (ocsp) is the mechanism used to immediately verify if a certificate is valid. the crl is published on a regular basis, but it is not current once it is published. for additional information, see chapter 7 .

14. 

Which of the following is the equivalent of a VLAN from a physical security perspective?

  1. Perimeter security

  2. Partitioning

  3. Security zones

  4. Physical barrier

b. partitioning is the process of breaking a network into smaller components that can each be individually protected. the concept is the same as building walls in an office building. for additional information, see chapter 6 .

15. 

Your user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was called account.doc. The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?

  1. Your user inadvertently downloaded a virus using IM.

  2. Your user has a potentially defective hard drive.

  3. Your user is hallucinating and should increase his medication.

  4. The system is suffering from power surges.

a. im and other systems allow unsuspecting users to download files that may contain viruses. due to a weakness in the file extensions naming conventions, a file that appears to have one extension may actually have another extension. an example of this might be mydocument.doc.vbs . this file would appear in many applications as mydocument.doc, but it is actually a visual basic script and could contain malicious code. for additional information, see chapter 4 .

16. 

The mechanism used to enable or disable access to a network resource based on an IP address is referred to as what?

  1. NDS

  2. ACL

  3. Hardening

  4. Port blocking

b. access control lists (acls) are used to allow or deny an ip address access to a network. acl mechanisms are implemented in many routers, firewalls, and other network devices. for additional information, see chapter 5 .

17. 

Which of the following would provide additional security to an Internet WWW server?

  1. Changing the port address to 80

  2. Changing the port address to 1019

  3. Adding a firewall to block Port 80

  4. WWW servers cannot be secured.

b. the default port for a www server is port 80. by changing the port to 1019, you force users to specify this port when they are using a browser. this provides a little additional security for your website. adding a firewall to block port 80 would secure your website so much that no one would be able to access it. for more information, see chapter 3 .

18. 

What is a program that exists primarily to propagate and spread to other systems called?

  1. Virus

  2. Trojan horse

  3. Logic bomb

  4. Worm

d. a worm is designed to multiply and propagate. worms may carry viruses that cause systems destruction, but that is not their primary mission. for more information, see chapter 2 .

19. 

An individual presents himself at your office claiming to be a service technician. He wants to discuss your current server configuration. This may be an example of what type of attack?

  1. Social engineering

  2. Access control

  3. Perimeter screening

  4. Behavioral engineering

a. social engineering is the method of using human intelligence methods to gain access or information about your organization. for additional information, see chapter 6 .

20. 

Which of the following is a major security problem with FTP servers?

  1. Password files are stored in an unsecure area on disk.

  2. Memory traces can corrupt file access.

  3. User IDs and passwords are unencrypted.

  4. FTP sites are unregistered.

c. ftp in most environments sends account and password information unencrypted. this makes these accounts vulnerable to network sniffing. for additional information, see chapter 5 .

21. 

Which system would you install to provide active protection and notification of security problems in a network connected to the Internet?

  1. IDS

  2. Network monitoring

  3. Router

  4. VPN

a. an intrusion detection system provides active monitoring and rules-based responses to unusual activities on a network. a firewall provides passive security by preventing access from unauthorized traffic. if the firewall were compromised, the ids would notify you based on rules it is designed to implement. for more information, see chapter 3 .

22. 

The process of verifying the steps taken to maintain the integrity of evidence is called what?

  1. Security investigation

  2. Chain of custody

  3. Three A's of investigation

  4. Security policy

b. the chain of custody ensures that each step taken with evidence is documented and accounted for from the point of collection. chain of custody is the who, what, when, where, and why of evidence storage. for additional information, see chapter 10 .

23. 

The encryption process that uses one message to hide another is called?

  1. Steganography

  2. Hashing

  3. MDA

  4. Cryptointelligence

a. steganography is the process of hiding one message in another. steganography may also be referred to as electronic watermarking. for additional information, see chapter 7 .

24. 

The policy that dictates how computers are used in an organization is called what?

  1. Security policy

  2. User policy

  3. Use policy

  4. Enforcement policy

c. the use policy is also referred to as the usage policy. it should state acceptable uses of computer and organizational resources by employees. this policy should outline consequences of noncompliance. for additional information, see chapter 10 .

25. 

Which algorithm is used to create a temporary secure session for the exchange of key information?

  1. KDC

  2. KEA

  3. SSL

  4. RSA

b. the key exchange algorithm (kea) is used to create a temporary session to exchange key information. this session creates a secret key that is used. when the key has been exchanged, the regular session begins.

26. 

You are being asked to consult on security for hand-held devices, such as a PDA. You are told you must use an asymmetric system. Which security standard would you recommend?

  1. ECC

  2. PKI

  3. SHA

  4. MD

a. elliptical curve cryptosystem (ecc) would probably be your best choice for a pda. ecc is designed to work with smaller processors. the other systems may be options, but they require more computing power than ecc. for additional information, see chapter 7 .

27. 

Which of the following backup methods will generally provide the fastest backup times?

  1. Full backup

  2. Incremental backup

  3. Differential backup

  4. Archival backup

b. an incremental backup will generally be the fastest of the back methods because it backs up only the files that have changed since the last incremental or full backup. see chapter 9 for more information.

28. 

Which security method uses physical characteristics as a method of determining identity?

  1. Smart Card

  2. I&A

  3. Biometrics

  4. CHAP

c. biometrics is the authentication process that uses physical characteristics, such as a palm print or retinal pattern, to establish identification. for more information, see chapter 1 .

29. 

Which access control method is primarily concerned with the role that individuals have in the organization?

  1. MAC

  2. DAC

  3. RBAC

  4. STAC

c. role-based access control (rbac) is primarily concerned with providing access to systems that a user needs based on the role they have in the organization. for more information, see chapter 9 .

30. 

The process of investigating a computer system for clues into an event is called what?

  1. Computer forensics

  2. Virus scanning

  3. Security policy

  4. Evidence gathering

a. computer forensics is the process of investigating a computer system to determine the cause of an incident. part of this process would be gathering evidence. for additional information, see chapter 10 .

Answers

1. 

A. A privilege audit is used to determine that all groups, users, and other accounts have the appropriate privileges assigned according to the policies of an organization. For more information, see Chapter 9.

2. 

D. A mantrap is a device, such as a small room, that limits access to a small number of individuals. Mantraps typically use electronic locks and other methods to control access.

3. 

B. Public Keys Cryptography Standards are a set of voluntary standards for public key cryptography. This set of standards is coordinated by RSA Incorporated.

4. 

B. Wired Equivalent Privacy (WEP) is designed to provide security equivalent to that of a wired network. WEP has is known to have vulnerabilities and is not considered highly secure. For additional information, see Chapter 4.

5. 

C. The Process layer interfaces with applications and encapsulates traffic through the Host-to-Host or Transport layer, the Internet layer and the Network Access layer. For more information, see Chapter 2.

6. 

B. L2TP is a tunneling protocol that can be used between LANs. L2TP is not secure, and you would want to use IPSec with it to provide data security. For more information, see Chapter 3.

7. 

A. A DMZ is an area in a network that allows restrictive access to untrusted users, and it isolates the internal network from access by external users and systems. This is accomplished using routers and firewalls to limit access to sensitive network resources. For more information, see Chapter 1.

8. 

C. A key recovery process must be able to recover a previous key. If the previous key can't be recovered, all of the information that used that key will be irrecoverably lost.

9. 

D. A flood attack is designed to overload a protocol or service by repeatedly initiating a request for service. This type of attack usually results in a DoS situation occurring. This may be caused by the protocol freezing or from excessive bandwidth usage in the network as a result of the requests. For more information, see Chapter 2.

10. 

B. A sensor collects data from the data source and passes it on to the analyzer. If the analyzer determines that unusual activity has occurred, an alert may be generated. For additional information, see Chapter 4.

11. 

A. Hardening is the term used to describe the process of securing a system. This is accomplished in many ways, including disabling unneeded protocols. For additional information on hardening, see Chapter 5.

12. 

A. The goal of integrity is to verify that information being used is accurate and has not been tampered with. Integrity is coupled with accountability to ensure that data is accurate and that a final authority exists to verify this, if needed. For more information, see Chapter 1.

13. 

D. Online certificate status protocol (OCSP) is the mechanism used to immediately verify if a certificate is valid. The CRL is published on a regular basis, but it is not current once it is published. For additional information, see Chapter 7.

14. 

B. Partitioning is the process of breaking a network into smaller components that can each be individually protected. The concept is the same as building walls in an office building. For additional information, see Chapter 6.

15. 

A. IM and other systems allow unsuspecting users to download files that may contain viruses. Due to a weakness in the file extensions naming conventions, a file that appears to have one extension may actually have another extension. An example of this might be mydocument.doc.vbs. This file would appear in many applications as mydocument.doc, but it is actually a Visual Basic script and could contain malicious code. For additional information, see Chapter 4.

16. 

B. Access Control Lists (ACLs) are used to allow or deny an IP address access to a network. ACL mechanisms are implemented in many routers, firewalls, and other network devices. For additional information, see Chapter 5.

17. 

B. The default port for a WWW server is Port 80. By changing the port to 1019, you force users to specify this port when they are using a browser. This provides a little additional security for your website. Adding a firewall to block Port 80 would secure your website so much that no one would be able to access it. For more information, see Chapter 3.

18. 

D. A worm is designed to multiply and propagate. Worms may carry viruses that cause systems destruction, but that is not their primary mission. For more information, see Chapter 2.

19. 

A. Social engineering is the method of using human intelligence methods to gain access or information about your organization. For additional information, see Chapter 6.

20. 

C. FTP in most environments sends account and password information unencrypted. This makes these accounts vulnerable to network sniffing. For additional information, see Chapter 5.

21. 

A. An Intrusion Detection System provides active monitoring and rules-based responses to unusual activities on a network. A firewall provides passive security by preventing access from unauthorized traffic. If the firewall were compromised, the IDS would notify you based on rules it is designed to implement. For more information, see Chapter 3.

22. 

B. The chain of custody ensures that each step taken with evidence is documented and accounted for from the point of collection. Chain of custody is the Who, What, When, Where, and Why of evidence storage. For additional information, see Chapter 10.

23. 

A. Steganography is the process of hiding one message in another. Steganography may also be referred to as electronic watermarking. For additional information, see Chapter 7.

24. 

C. The use policy is also referred to as the usage policy. It should state acceptable uses of computer and organizational resources by employees. This policy should outline consequences of noncompliance. For additional information, see Chapter 10.

25. 

B. The Key Exchange Algorithm (KEA) is used to create a temporary session to exchange key information. This session creates a secret key that is used. When the key has been exchanged, the regular session begins.

26. 

A. Elliptical Curve Cryptosystem (ECC) would probably be your best choice for a PDA. ECC is designed to work with smaller processors. The other systems may be options, but they require more computing power than ECC. For additional information, see Chapter 7.

27. 

B. An incremental backup will generally be the fastest of the back methods because it backs up only the files that have changed since the last incremental or full backup. See Chapter 9 for more information.

28. 

C. Biometrics is the authentication process that uses physical characteristics, such as a palm print or retinal pattern, to establish identification. For more information, see Chapter 1.

29. 

C. Role-Based Access Control (RBAC) is primarily concerned with providing access to systems that a user needs based on the role they have in the organization. For more information, see Chapter 9.

30. 

A. Computer forensics is the process of investigating a computer system to determine the cause of an incident. Part of this process would be gathering evidence. For additional information, see Chapter 10.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net