Question 1.1. (TCO 2) When creating a password, users tend to use _____ (Points : 4)
all capital letters
passwords that are too long
names of family, pets, or teams
Question 2.2. (TCO 2) Social engineers attempt to exploit the natural tendencies of people. They do this by _____. (Points : 4)
First trying to evoke sympathy; if this fails, then by fear of confrontation
First trying to evoke fear of confrontation and then by sympathy
First trying to guess passwords and then use a password cracker
First trying to evoke passion and then fear
Question 3.3. (TCO 2) What is IPsec? (Points : 4)
A collection of IP security features designed to introduce security at the network or packet-processing layer
An application that encrypts e-mail
A standard setting group that dictates internet security standards
The company to first introduce the concept of encryption
Question 4.4. (TCO 2) What is PKCS? (Points : 4)
One of the standards used in implementing a public-key infrastructure
A method of private cryptography used by the military
A method of encrypting e-mail from the IRS
The method of encryption that uses a 40-bit encryption key
Question 5.5. (TCO 2) What is Wired Equivalent Privacy (WEP)? (Points : 4)
A method used to encrypt wireless communications in an 802.11environment
A signal that jams other wireless devices attempting to access the system
A method to change encryption standards during a transmission
An encryption method used to secure bank passwords
Question 6.6. (TCO 2) What is CMP? (Points : 4)
This protocol defines the messages and operations required to provide certificate management services.
An encryption protocol used to verify a key length
An application that decrypts encrypted e-mail
A common message protocol that is used in e-mail
Question 7.7. (TCO 3) Network components connected to the same cable are often called "the backbone" in which topology? (Points : 4)
Question 8.8. (TCO 3) What is the main difference between TCP and UDP packets? (Points : 4)
UDP packets are a more widely used protocol.
TCP packets are smaller and thus more efficient to use.
TCP packets are connection oriented, whereas UPD packets are connectionless.
UDP is considered to be more reliable because it performs error checking.
Question 9.9. (TCO 3) Unfortunately, hackers abuse the ICMP protocol by using it to _____. (Points : 4)
Send internet worms
Launch denial-of-service (DoS) attacks
Steal passwords and credit card numbers
Question 10.10. (TCO 3) Which of the following is a benefit provided by Network Address Translation (NAT)? (Points : 4)
Compensates for the lack of IP addresses
Allows devices using two different protocols to communicate
It creates a DMZ
Translates MAC addresses to IP addresses
Question 11.11. (TCO 3) Which protocol is based on transferring data in fixed-size packets? (The fixed packet sizes help ensure that no single data type monopolizes the available bandwidth.) (Points : 4)
Question 12.12. (TCO 3) Which transport layer protocol is connection oriented? (Points : 4)
Question 13.13. (TCO 3) Which protocol is responsible for resolving an IP address to a MAC address? (Points : 4)
Question 14.14. (TCO 4) A way of backing up cryptographic keys is by _____. (Points : 4)
making copies in one location
making multiple copies in multiple locations
Question 15.15. (TCO 4) All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT which one? (Points : 4)
Make copies of the private key and keep it in several locations for redundancy.
The lifetime of the key should correspond with how often it is used and the sensitivity of the data it is protecting.
The key should be changed at the end of its lifetime and not used past its allowed lifetime.
The key should be properly destroyed at the end of its lifetime.
Question 16.16. (TCO 4) Outsourced CAs are different from public CAs in what way? (Points : 4)
Outsourced services can be used by hundreds of companies.
Outsourced services provide dedicated services and equipment to individual companies.
Outsourced services do not maintain specific servers and infrastructures for individual companies.
Outsourced services are different in name only. They are essentially the same thing
Question 17.17. (TCO 4) Cryptographic algorithms are used for all of the following EXCEPT _____. (Points : 4)
Question 18.18. (TCO 4) Keeping a copy of an encryption key with a trusted third party is known as _____. (Points : 4)
Question 19.19. (TCO 6) Which device converts analog signals to digital signals and vice versa? (Points : 4)
Question 20.20. (TCO 6) A hub operates at which of the following? (Points : 4)
Layer 1, the physical layer
Layer 2, the data-link layer
Question 21.21. (TCO 6) The following are steps in securing a workstation EXCEPT _____. (Points : 4)
install NetBIOS and IPX
remove unnecessary software
disable unnecessary user accounts
Question 22.22. (TCO 8) Centralized monitoring of the health of the network is the function of a(n) _____. (Points : 4)
Question 23.23. (TCO 8) The electronic signatures in the Global and National Commerce Act _____. (Points : 4)
Implement the principle that a signature, contract, or other record may not be denied legal effect, validity, or enforceability solely because it is electronic form
Address a myriad of legal privacy issues resulting from the increased use of computers and other technology specific to telecommunications
Make it a violation of federal law to knowingly use another's identity
Are a major piece of legislation affecting the financial industry, and contains significant privacy provisions for individuals
Question 24.24. (TCO 8) What do you call a law based on previous events or precedents? (Points : 4)
Question 25.25. (TCO 8) What is the Convention on Cybercrime? (Points : 4)
A convention of black hats who trade hacking secrets
The first international treaty on crimes committed via the Internet and other computer networks
A convention of white hats who trade hacker prevention knowledge
A treaty regulating international conventions