Review Questions

 < Day Day Up > 



1. 

Which protocol is used to transfer files and directories between two systems?

  1. Simple Mail Transfer Protocol (SMTP).

  2. File Transfer Protocol (FTP).

  3. Telnet.

  4. Simple Network Management Protocol (SNMP).

correct answer = b file transfer protocol (ftp) is an application-layer protocol used to transfer riles, folders, or web pages between two systems on a network. simple mail transport protocol (smtp) is a tcp/ip protocol used in the transferring and receiving of e-mail messages. telnet is a tcp/ip protocol or command used for accessing remote computing systems. simple network management protocol (snmp) is a protocol used to manage and monitor network-related devices.

2. 

What does S/MIME do?

  1. It synchronizes messages in MIME format.

  2. It provides protection for e-mail messages in MIME format.

  3. It replaces the need for e-mail antivirus programs.

  4. It provides the ability for a two-way encrypted key exchange.

correct answer = b s/mime (secure multipurpose internet mail extensions) is provided in most modern day browsers. it is based on the rivest-shamir-adleman encryption system and provides a secure method for exchanging e-mail messages. all other choices are invalid.

3. 

Using PGP, what does the user, or creator, protect with a pass phrase?

  1. Public key.

  2. Private key.

  3. IDEA.

  4. Key block.

correct answer = b with pgp, a user creates a key pair and protects the private key with what is known as a pass phrase. the public key part of the key pair is used for the encryption of messages for other users. pgp uses the idea (international data encryption algorithm), which uses a block cipher or symmetric cipher and a 128-bit key to encrypt the message. key block is an invalid selection.

4. 

Which of the following are true regarding computer-related hoaxes? (Choose two)

  1. A hoax is a virus.

  2. You should always follow all instructions provided with any hoax.

  3. A false virus warning.

  4. Never take a possible hoax seriously.

  5. A form of social engineering.

correct answers = c and e a computer-related hoax is a myth or false representation regarding a computer-related virus. it is a false warning. a hoax is also a commonly used form of social engineering used for nonproductive purposes. a hoax can resemble a virus and many times hoaxes have names similar to viruses. however, a hoax is not a virus. you do not follow the instructions provided by a hoax until you have done your research and verified its validity. until you know it is really a just a hoax, you should always take the hoax and other threats seriously. just remember to do your research before you act!

5. 

What tool should be used during a wireless network site survey to detect possible interference in RF bands?

  1. Packet sniffer.

  2. Network monitor.

  3. Spectrum analyzer.

  4. Performance Monitor.

correct answer = c certified site survey technicians can detect potential interference between rf bands with a tool called a spectrum analyzer. a packet sniffer is a program or device that collects and monitors data packets on a network. a network monitor keeps track of specific events that occur on a network. a network monitor has the ability to can produce reports and provide alerts to network administrators when critical network errors occur. performance monitor is a performance-management tool included with windows nt. it allows administrators to measure the system performance of such items as memory, cpu, and hard drive utilization.

6. 

Secure Sockets Layer (SSL) is a security protocol made up of two protocols. The SSL Record Protocol and the

  1. Extensible Authentication Protocol.

  2. Secure Sockets Layer Handshake protocol.

  3. Extensible Handshake Sockets protocol.

  4. Secure Sockets Layer Salute protocol.

correct answer = b ssl uses a combination of the ssl record protocol and the ssl handshake protocol to provide security. the handshake protocol provides authentication services while the record protocol provides for a secure connection. 802.1x uses the extensible authentication protocol (eap), which enables the technology to work with wireless, ethernet, and token ring networks. extensible handshake sockets protocol and secure sockets layer salute protocol are invalid selections.

7. 

Please select the recommended ways to help secure your home or office network from Instant Messaging vulnerabilities? (Choose three)

  1. Purchase and install an intra company messaging system.

  2. Disallow at-home VPN connections.

  3. Disable IM client FTP capabilities.

  4. Scan IM file transfers with your corporate antivirus solution.

  5. Install a personal firewall at every desktop.

correct answers = a, c, and e a, c, and e are in fact, correct. although disallowing vpn connections would reduce the threat of infiltration of a corporate network from a home system, it is not a very productive solution and not recommended. an antivirus solution does not offer the ability to scan im file transfers.

8. 

What is the proper UNC path to access a share named security on a server named CompTIA?

  1. \\security\CompTIA.

  2. \CompTIA\\security.

  3. \\CompTIA\security.

  4. \security\\CompTIA.

correct answer = c the correct answer is \\comptia\security. all other choices are invalid.

9. 

What is the 8.3 associated file name for the long file name Securityplus.DOC?

  1. Securi~1.DOC.

  2. Security+.DOC.

  3. Secur~1.DOC.

  4. Securit.txt.

correct answer = a for backward 8.3 file name compatibility newer operating systems automatically remove any space or invalid character and truncate the filename. please refer to the long file names (lfns) section in the chapter for more examples. all other choices are invalid.

10. 

Using 802.1X authentication, what names are used to identify the client and the access point?

  1. Port requestor and port enabler.

  2. Requestor and acceptor.

  3. Applicant and authentication server.

  4. Supplicant and authenticator.

correct answer = d with 802.1x authentication, a wireless client that wishes to connect to and be authenticated on a network is called a supplicant. the supplicant must first request access from an access point, which is also known as an authenticator. all other choices are invalid. the authentication server in 802.1x is not called the authenticator.

11. 

When you access a Web page on the Internet, what can be placed in your system that is used as a sort of tracking device to uniquely identify you?

  1. Acceptor.

  2. Cookie.

  3. A Multipurpose Internet Extension.

  4. UNC.

correct answer = b a cookie is a unique identifier that web servers place in your system to identify you. choices a and c are invalid. a unc name is used to access a particular share on a particular workstation or server on a network.

12. 

Which of the following are potentially harmful to the welfare of a system?

  1. Cookies.

  2. Signed applets.

  3. Java scripts.

  4. All of the above.

  5. None of the above.

correct answer = d many web servers use trusted cookies as their only form of authentication. this is a major security risk. hijackers and attackers often create scripts and applets, which at times are able to circumvent network security parameters. they can be used to manipulate files on users computers. choice f is invalid.

13. 

Concerning applet security levels, please select the choice that best represents the most restrictive to the least restrictive applet security level.

  1. Low, Untrusted, Medium, High.

  2. Untrusted, High, Medium, Low.

  3. High, Medium, Low, Untrusted.

  4. None of the above.

correct answer = b applets can be assigned various security levels, which include untrusted, high, medium, and low levels of security. please refer to table 3.1 for the various levels of unsigned applet security and their levels of restriction. all other choices are invalid.

14. 

There are known vulnerabilities that exist with certain versions of LDAP. Name three results of these vulnerabilities mentioned in this chapter.

  1. Man-in-the-Middle, Backdoor7, Netbus.Patcher.

  2. Backdoor7, Netbus.Patcher, Netbus.2.Trojan.

  3. Buffer overflow attacks, unauthorized access, denial of service.

  4. None of the above.

correct answer = c known vulnerabilities exist with certain versions of ldap that have lead to buffer overflow attacks, unauthorized access conditions, and denial of service. you will most likely face questions very similar to this on the real exam. again, do not read too far into the question. it is very possible that you might see the other choices in this question on the real exam. know your viruses for the exam!

15. 

What is typically used to resolve a domain name to an IP address?

  1. Forward DNS.

  2. DNS.

  3. NDS.

  4. None of the above.

correct answer = b dns (domain name server or service) is used to resolve fully qualified domain names to node or ip address. choice a is invalid. nds (novell directory service) is a novell product used for managing users and resources on a novell network.

16. 

Excessively Long file names are known to cause what?

  1. Errors on UDP port 69.

  2. Eight dot three errors.

  3. Man-in-the-Middle attacks.

  4. Buffer overruns.

correct answer = d exceptionally long file names are often intentionally used to exploit network software vulnerabilities and cause buffer overruns. all other choices are invalid.

17. 

What is WEP used for?

  1. Wireless security.

  2. Protocol used for connecting to NT 4.0 Server.

  3. Used to connect a VLAN to a wireless network.

  4. Security replacement for a secure access point.

correct answer = a wep is a wireless security protocol intended to provide a wlan with a similar security level as the protection that can be found in traditional lans. ras is a service provided with windows nt 4.0, 2000, and xp that allows remote clients to access services and resources located on a network using an analog modem, wan, or isdn connection. answers c and d are invalid.

Answers

1. 

Correct answer = B

File Transfer Protocol (FTP) is an application-layer protocol used to transfer riles, folders, or Web pages between two systems on a network. Simple Mail Transport Protocol (SMTP) is a TCP/IP protocol used in the transferring and receiving of e-mail messages. Telnet is a TCP/IP protocol or command used for accessing remote computing systems. Simple Network Management Protocol (SNMP) is a protocol used to manage and monitor network-related devices.

2. 

Correct answer = B

S/MIME (Secure Multipurpose Internet Mail Extensions) is provided in most modern day browsers. It is based on the Rivest-Shamir-Adleman encryption system and provides a secure method for exchanging e-mail messages. All other choices are invalid.

3. 

Correct answer = B

With PGP, a user creates a key pair and protects the private key with what is known as a pass phrase. The public key part of the key pair is used for the encryption of messages for other users. PGP uses the IDEA (International Data Encryption Algorithm), which uses a block cipher or symmetric cipher and a 128-bit key to encrypt the message. Key block is an invalid selection.

4. 

Correct answers = C and E

A computer-related hoax is a myth or false representation regarding a computer-related virus. It is a false warning. A hoax is also a commonly used form of social engineering used for nonproductive purposes. A hoax can resemble a virus and many times hoaxes have names similar to viruses. However, a hoax is not a virus. You do not follow the instructions provided by a hoax until you have done your research and verified its validity. Until you know it is really a just a hoax, you should always take the hoax and other threats seriously. Just remember to do your research before you act!

5. 

Correct answer = C

Certified site survey technicians can detect potential interference between RF bands with a tool called a spectrum analyzer. A packet sniffer is a program or device that collects and monitors data packets on a network. A network monitor keeps track of specific events that occur on a network. A network monitor has the ability to can produce reports and provide alerts to network administrators when critical network errors occur.

Performance Monitor is a performance-management tool included with Windows NT. It allows administrators to measure the system performance of such items as memory, CPU, and hard drive utilization.

6. 

Correct answer = B

SSL uses a combination of the SSL Record protocol and the SSL Handshake protocol to provide security. The Handshake protocol provides authentication services while the Record protocol provides for a secure connection. 802.1X uses the Extensible Authentication Protocol (EAP), which enables the technology to work with wireless, Ethernet, and Token Ring networks. Extensible Handshake Sockets Protocol and Secure Sockets Layer Salute Protocol are invalid selections.

7. 

Correct answers = A, C, and E

A, C, and E are in fact, correct. Although disallowing VPN connections would reduce the threat of infiltration of a corporate network from a home system, it is not a very productive solution and not recommended. An antivirus solution does not offer the ability to scan IM file transfers.

8. 

Correct answer = C

The correct answer is \\CompTIA\security. All other choices are invalid.

9. 

Correct answer = A

For backward 8.3 file name compatibility newer operating systems automatically remove any space or invalid character and truncate the filename. Please refer to the Long File Names (LFNs) section in the chapter for more examples. All other choices are invalid.

10. 

Correct answer = D

With 802.1X authentication, a wireless client that wishes to connect to and be authenticated on a network is called a supplicant. The supplicant must first request access from an access point, which is also known as an authenticator. All other choices are invalid. The authentication server in 802.1X is not called the authenticator.

11. 

Correct answer = B

A cookie is a unique identifier that Web servers place in your system to identify you. Choices A and C are invalid. A UNC name is used to access a particular share on a particular workstation or server on a network.

12. 

Correct answer = D

Many Web servers use trusted cookies as their only form of authentication. This is a major security risk. Hijackers and attackers often create scripts and applets, which at times are able to circumvent network security parameters. They can be used to manipulate files on users’ computers. Choice F is invalid.

13. 

Correct answer = B

Applets can be assigned various security levels, which include Untrusted, High, Medium, and Low levels of security. Please refer to Table 3.1 for the various levels of unsigned applet security and their levels of restriction. All other choices are invalid.

14. 

Correct answer = C

Known vulnerabilities exist with certain versions of LDAP that have lead to buffer overflow attacks, unauthorized access conditions, and Denial of Service. You will most likely face questions very similar to this on the real exam. Again, do not read too far into the question. It is very possible that you might see the other choices in this question on the real exam. Know your viruses for the exam!

15. 

Correct answer = B

DNS (Domain Name Server or Service) is used to resolve fully qualified domain names to node or IP address. Choice A is invalid. NDS (Novell Directory Service) is a Novell product used for managing users and resources on a Novell network.

16. 

Correct answer = D

Exceptionally long file names are often intentionally used to exploit network software vulnerabilities and cause buffer overruns. All other choices are invalid.

17. 

Correct answer = A

WEP is a wireless security protocol intended to provide a WLAN with a similar security level as the protection that can be found in traditional LANs. RAS is a service provided with Windows NT 4.0, 2000, and XP that allows remote clients to access services and resources located on a network using an analog modem, WAN, or ISDN connection. Answers C and D are invalid.



 < Day Day Up > 



The Security+ Exam Guide (TestTaker's Guide Series)
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net