Review Questions

1. 

Which of the following is an appropriate name for the network administration account?

  1. super

  2. superuser

  3. tswilliam

  4. administrator

  5. the original name

c.it s considered a best practice to not use the names super, superuser, or administrator because those are default accounts. the best choice is to pick a user and give them administrative privileges. then, delete or disable the built-in administration accounts.

2. 

Which type of firewall checks for a current communication and the next packet needed?

  1. Access control lists

  2. Member control lists

  3. Static state lists

  4. Dynamic packet filtering

  5. Proxy

e. a proxy provides firewall services by keeping track of all communications sessions and fetching the next packets.

3. 

Which version(s) of Windows is/are certified by the DoD?

  1. Windows NT 3.5

  2. Windows NT 3.51

  3. Windows NT 4

  4. Windows 2000

a.the only version of windows that is currently certified as a secure workstation platform is windows nt version 3.5.

4. 

Which version(s) of NetWare is/are certified by the DoD? (Choose all that apply.)

  1. 2

  2. 3.12

  3. 4

  4. 4.1

  5. 4.11

c, e.versions 4 and 4.11 are certified by the dod as secure.

5. 

For security reasons, where should you store backup tapes? (Choose all that apply.)

  1. Next to the server

  2. Next to the monitor

  3. In a drawer

  4. Locked in a cabinet

  5. Sealed in an envelope

  6. Offsite

d, f.the best location for backup tapes is locked in a cabinet offsite. these practices make it difficult for someone to steal the backups.

6. 

Which operating system(s) has/have achieved a National Security Agency certification allowing it/them to be used in a networked B- or C-level certified environment? (Choose all that apply.)

  1. Unix

  2. NetWare

  3. Windows

  4. Linux

a, b.of the oses listed, only unix and netware have been certified for use in a networked environment. windows nt 3.5 was certified, but only as a workstation environment.

7. 

Which group of books does the DoD publish that deal with network security?

  1. The Rainbow Series

  2. The Colored Book Series

  3. The Orange Book Series

  4. The Red Book Series

  5. The Brown Book Series

a.the rainbow series is the series of books that the dod publishes for standards of secure networking.

8. 

Which government agency did the U.S. Department of Defense (DoD) task to handle computer security certification?

  1. EPA

  2. DOE

  3. DIS

  4. DSS

  5. NSA

e.the national security agency (nsa) is responsible for handling computer security certification.

9. 

What is the Diffie-Hellman algorithm used to do?

  1. Encrypt data using public key cryptography

  2. Encrypt data using private key cryptography

  3. Encrypt data using symmetric cryptography

  4. Run a key manager that distributes tokens

  5. Revoke distributed security tokens

a.diffie-hellman is a public key cryptography algorithm.

10. 

What is the strongest bit-strength encryption that the U.S. government normally allows to be exported?

  1. 32-bit

  2. 40-bit

  3. 64-bit

  4. 128-bit

  5. 250-bit

  6. 256-bit

b.at the time of the writing of this exam, a 40-bit encryption algorithm was the strongest you could export. that restriction is currently being revised.

11. 

Which type of security uses a file that identifies predefined IP addresses that are allowed to send data through a router?

  1. Access control lists

  2. Dynamic state list

  3. Proxy

  4. Interpreter

  5. Translator

a.access control list security uses a file (the acl) that identifies which addresses can send data through a particular firewall or router.

12. 

Which of the following passwords are considered weak? (Choose all that apply.)

  1. tempest4@wiND

  2. gwashington

  3. MargeS

  4. MSmith

  5. os2Cys&BtDel?

  6. wwater7D$walkEr

b, c, d.the best passwords are those that don t use any part of a person s name or a dictionary word. thus, since options b, c, and d all are essentially usernames, they would be considered weak passwords.

13. 

How often should regular users be forced to reset their passwords?

  1. Never

  2. Every day

  3. Once a week

  4. Once a month

  5. Once a semester

  6. Once a fiscal quarter

d.it has been found that, for ease of remembrance and maximum possible security, a user should be forced to change their password at least once a month (or every 30 days). any sooner and the user will forget their new password frequently; any later and they may complain that they would just like to keep their same password all the time (as well as increase the chance an unauthorized user might guess the password).

14. 

Which of the following are good criteria for a strong password? (Choose all that apply.)

  1. Three characters or longer

  2. Eight characters or longer

  3. Using both alphanumeric and special characters

  4. Using the license plate number of your truck

  5. Using words not found in a dictionary

b, c, e.the best passwords are eight characters or longer; use numbers, letters, and special characters; and are words not necessarily found in a dictionary. any word that can be found in a dictionary, is a proper name, or is another name of sentimental value is considered a bad/weak password.

15. 

What is the proper action to take before you leave your workstation? You are going to get a glass of water and will return in five minutes.

  1. Power down your workstation.

  2. Log out.

  3. Unplug the monitor.

  4. Unplug the computer.

b.it would be inefficient to shut down your workstation or unplug the computer because it takes so long to restart it. unplugging the monitor would still leave the computer accessible (an intruder could simply plug it back in). the only convenient way to secure the computer for that short a time is to simply log out.

16. 

Whose accounts should immediately be disabled when their employment is terminated? (Choose all that apply.)

  1. Secretaries

  2. Lab assistants

  3. Engineers

  4. Managers

  5. Security guards

  6. Network administrators

a, b, c, d, e, f.for security reasons, all accounts should be disabled when the employee quits or is terminated. you don t necessarily have to delete the account, but it should be disabled so that the employee can t use it.

17. 

What should be collected in an exit interview of a terminated employee? (Choose all that apply.)

  1. Schematics

  2. Blood sample

  3. Coffee mug

  4. Office keys

  5. Badge

  6. Pager

  7. Spouse’s photo

a, d, e, f.any item that could be used to gain access to a company s resources should be collected during the exit interview of an employee. keys, badges, and important papers (like schematics) should be obtained along with any company property (intellectual or otherwise).

18. 

What types of recording devices are typically allowed inside technology companies?

  1. The Furby doll

  2. Hand-held still cameras

  3. Mounted company security video cameras

  4. Dictation tape recorders

  5. Newspaper reporter tape recorders

c.for an absolutely secure installation, the only recording devices that should be on the premises are company-owned and -operated devices like security cameras.

19. 

Active intrusion-detection systems have which of the following characteristics? (Choose all that apply.)

  1. Capability to scan communications in near real time

  2. Capability to record actions of attackers without raising an alarm

  3. Acting to terminate the communications of the attacker

  4. Shutting themselves down to hide from the attacker

  5. Shutting down the entire network to protect against attacks

a, c.active intrusion systems detect intrusions or possible intrusions the moment they occur and take actions to prevent the intrusion. these systems, if working correctly, should only affect the intruder.

20. 

Which of the following attacks affects only Windows operating systems?

  1. PingNuke

  2. Ping of Death

  3. WinNuke

  4. Win of Death

  5. SYNNuke

  6. SYN of Death

c.although many of these attacks can affect windows systems, only one-winnuke-was designed specifically to attack windows systems. it works because of a bug in the windows tcp/ip stack.

Answers

1. 

C.  It’s considered a “best practice” to not use the names super, superuser, or administrator because those are default accounts. The best choice is to pick a user and give them administrative privileges. Then, delete or disable the built-in administration accounts.

2. 

E.   A proxy provides firewall services by keeping track of all communications sessions and fetching the next packets.

3. 

A.  The only version of Windows that is currently certified as a secure workstation platform is Windows NT version 3.5.

4. 

C, E.  Versions 4 and 4.11 are certified by the DoD as secure.

5. 

D, F.  The best location for backup tapes is locked in a cabinet offsite. These practices make it difficult for someone to steal the backups.

6. 

A, B.  Of the OSes listed, only Unix and NetWare have been certified for use in a networked environment. Windows NT 3.5 was certified, but only as a workstation environment.

7. 

A.  The Rainbow Series is the series of books that the DoD publishes for standards of secure networking.

8. 

E.  The National Security Agency (NSA) is responsible for handling computer security certification.

9. 

A.  Diffie-Hellman is a public key cryptography algorithm.

10. 

B.  At the time of the writing of this exam, a 40-bit encryption algorithm was the strongest you could export. That restriction is currently being revised.

11. 

A.  Access control list security uses a file (the ACL) that identifies which addresses can send data through a particular firewall or router.

12. 

B, C, D.  The best passwords are those that don’t use any part of a person’s name or a dictionary word. Thus, since options B, C, and D all are essentially usernames, they would be considered weak passwords.

13. 

D.  It has been found that, for ease of remembrance and maximum possible security, a user should be forced to change their password at least once a month (or every 30 days). Any sooner and the user will forget their new password frequently; any later and they may complain that they would just like to keep their same password all the time (as well as increase the chance an unauthorized user might guess the password).

14. 

B, C, E.  The best passwords are eight characters or longer; use numbers, letters, and special characters; and are words not necessarily found in a dictionary. Any word that can be found in a dictionary, is a proper name, or is another name of sentimental value is considered a bad/weak password.

15. 

B.  It would be inefficient to shut down your workstation or unplug the computer because it takes so long to restart it. Unplugging the monitor would still leave the computer accessible (an intruder could simply plug it back in). The only convenient way to secure the computer for that short a time is to simply log out.

16. 

A, B, C, D, E, F.  For security reasons, all accounts should be disabled when the employee quits or is terminated. You don’t necessarily have to delete the account, but it should be disabled so that the employee can’t use it.

17. 

A, D, E, F.  Any item that could be used to gain access to a company’s resources should be collected during the exit interview of an employee. Keys, badges, and important papers (like schematics) should be obtained along with any company property (intellectual or otherwise).

18. 

C.  For an absolutely secure installation, the only recording devices that should be on the premises are company-owned and -operated devices like security cameras.

19. 

A, C.  Active intrusion systems detect intrusions or possible intrusions the moment they occur and take actions to prevent the intrusion. These systems, if working correctly, should only affect the intruder.

20. 

C.  Although many of these attacks can affect Windows systems, only one—WinNuke—was designed specifically to attack Windows systems. It works because of a bug in the Windows TCP/IP stack.




Network+ Study Guide
Network+ Study Guide
ISBN: 470427477
EAN: N/A
Year: 2002
Pages: 151

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net