Review Questions

1. 

What is the process of establishing a standard for security referred to as?

  1. Common criteria

  2. Security evaluation

  3. Hardening

  4. Methods research

a. common criteria is a standard adopted internationally forcomputer security. the recommended level for commercial systems is eal 4.

2. 

What is the process of improving security in a NOS referred to as?

  1. Common criteria

  2. Hardening

  3. Encryption

  4. Networking

b. hardening is the process of improving the security of an operatingsystem or application. one of the primary methods of hardening anoperating system is to eliminate unneeded protocols.

3. 

What is the method of establishing a protocol connection to a controller called?

  1. Linkage

  2. Networking

  3. Binding

  4. Access control

c. binding is the process of associating one protocol with anotherprotocol or to a network card.

4. 

Which of the following protocols should not be bound to TCP/IP if at all possible?

  1. IPX/SPX

  2. TCP/IP

  3. NetBIOS

  4. LDAP

c. netbios should not be bound to tcp/ip if at all possible. netbiosis a well-established target of attackers.

5. 

What tool is used in Windows NT to monitor systems logs?

  1. Event viewer

  2. Syslog

  3. IDS

  4. Event timer

a. event viewer is the primary tool used to monitor systems event inwindows nt.

6. 

Which of the following operating systems is an open source product?

  1. Windows 2000

  2. Novell NetWare

  3. Linux

  4. Mac OS

c. the open source movement makes system source code available todevelopers and programmers.

7. 

Which file system was primarily intended for desktop system use and offers limited security?

  1. NTFS

  2. NFS

  3. FAT

  4. AFS

c. fat technology was originally intended for dosdesktop systems.this file system offers limited security options.

8. 

Which file system is used in NetWare servers?

  1. NSS

  2. NTFS

  3. AFS

  4. FAT

a. nss is novell's newest file system. nss is a proprietary environmentfor servers.

9. 

Which file system allows remote mounting of file systems?

  1. NTFS

  2. FAT

  3. AFS

  4. NFS

d. network file systems (nfs) is the unix standard for remote filesystems.

10. 

What is the process of bundling one or more system fixes into a single package called?

  1. Service pack

  2. Hotfix

  3. Patch

  4. System install

a. a service pack is one or more repairs to system problems bundledinto a single process or function.

11. 

Which of the following statements is not true?

  1. You should never share the root directory of a disk.

  2. You should share the root directory of a disk.

  3. You should apply the most restrictive access necessary for a shared directory.

  4. File systems are frequently based on hierarchical models.

b. never share the root directory of a disk if at all possible. this opensthe entire disk to potential exploitation.

12. 

What is the process of applying a repair to an operating system while the system stays in operations called?

  1. Upgrading

  2. Service pack installation

  3. Hotfix

  4. File update

c. a hotfix is done while a system is operating. this reduces thenecessity to take a system out of service to fix a problem.

13. 

What is the process of applying manual changes to a program called?

  1. Hotfix

  2. Service pack

  3. Patching

  4. Replacement

c. a patch is a temporary workaround of a bug or problem in codethat is applied manually. patches are usually replaced by completeprograms at a later date.

14. 

Which of the following best describes an ACL?

  1. ACLs provide individual access control to resources.

  2. ACLs are not used in modern systems.

  3. The ACL process is dynamic in nature.

  4. ACLs are used to authenticate users.

a. access control lists allow individual and highly controllableaccess to resources in a network. an acl can also be used to excludea particular system, ip address, or user.

15. 

What product verifies that files being received by an SMTP server contain no suspicious code?

  1. E-mail virus filter

  2. Web virus filter

  3. Packet filter firewall

  4. IDS

a. smtp is the primary protocol used in e-mail. an smtp virusscanner would check all incoming and outgoing e-mails for suspiciouscode. if a file is potentially infected, the scanner notifies the originatorand quarantines the file.

16. 

What is one of the primary ways in which an attacker uses DNS?

  1. Network footprinting

  2. Network sniffing

  3. Database server lookup

  4. Registration counterfeiting

a. dns records in a dns server provide insights into the nature andstructure of a network. dns records should be kept to a minimumin public dns servers.

17. 

LDAP is an example of which of the following?

  1. Directory access protocol

  2. IDS

  3. Tiered model application development environment

  4. File server

a. lightweight directory access protocol (ldap) is a directoryaccess protocol used to publish information about users. this isthe computer equivalent of a phone book.

18. 

What is the primary database used in applications today?

  1. Hierarchical

  2. Relational

  3. Network

  4. Archival

b. relational database systems are the most frequently installeddatabase environments in use today.

19. 

The flexibility of relational databases in use today is a result of which of the following?

  1. SQL

  2. Hard-coded queries

  3. Forward projection

  4. Mixed model access

a. sql is a very powerful database access language used by mostrelational database systems.

20. 

Which model is used to provide an intermediary server between the end user and the database?

  1. One-tiered

  2. Two-tiered

  3. Three-tiered

  4. Relational database

c. a three-tiered model puts a server between the client and thedatabase.

Answers

1. 

A. Common Criteria is a standard adopted internationally for computer security. The recommended level for commercial systems is EAL 4.

2. 

B. Hardening is the process of improving the security of an operating system or application. One of the primary methods of hardening an operating system is to eliminate unneeded protocols.

3. 

C. Binding is the process of associating one protocol with another protocol or to a network card.

4. 

C. NetBIOS should not be bound to TCP/IP if at all possible. NetBIOS is a well-established target of attackers.

5. 

A. Event Viewer is the primary tool used to monitor systems event in Windows NT.

6. 

C. The open source movement makes system source code available to developers and programmers.

7. 

C. FAT technology was originally intended for DOSdesktop systems. This file system offers limited security options.

8. 

A. NSS is Novell's newest file system. NSS is a proprietary environment for servers.

9. 

D. Network File Systems (NFS) is the UNIX standard for remote file systems.

10. 

A. A service pack is one or more repairs to system problems bundled into a single process or function.

11. 

B. Never share the root directory of a disk if at all possible. This opens the entire disk to potential exploitation.

12. 

C. A hotfix is done while a system is operating. This reduces the necessity to take a system out of service to fix a problem.

13. 

C. A patch is a temporary workaround of a bug or problem in code that is applied manually. Patches are usually replaced by complete programs at a later date.

14. 

A. Access Control Lists allow individual and highly controllable access to resources in a network. An ACL can also be used to exclude a particular system, IP address, or user.

15. 

A. SMTP is the primary protocol used in e-mail. An SMTP virus scanner would check all incoming and outgoing e-mails for suspicious code. If a file is potentially infected, the scanner notifies the originator and quarantines the file.

16. 

A. DNS records in a DNS server provide insights into the nature and structure of a network. DNS records should be kept to a minimum in public DNS servers.

17. 

A. Lightweight Directory Access Protocol (LDAP) is a directory access protocol used to publish information about users. This is the computer equivalent of a phone book.

18. 

B. Relational database systems are the most frequently installed database environments in use today.

19. 

A. SQL is a very powerful database access language used by most relational database systems.

20. 

C. A three-tiered model puts a server between the client and the database.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net