Question details

SEC280 Week 8 Final Exam
$ 21.00

Question 1.1. (TCO 2) When creating a password, users tend to use _____ (Points : 4)

all capital letters       

passwords that are too long       

names of family, pets, or teams       

numbers only

Question 2.2. (TCO 2) Social engineers attempt to exploit the natural tendencies of people. They do this by _____. (Points : 4)

First trying to evoke sympathy; if this fails, then by fear of confrontation 
First trying to evoke fear of confrontation and then by sympathy 
First trying to guess passwords and then use a password cracker 
First trying to evoke passion and then fear

Question 3.3. (TCO 2) What is IPsec? (Points : 4)

A collection of IP security features designed to introduce security at the network or packet-processing layer

An application that encrypts e-mail

A standard setting group that dictates internet security standards

The company to first introduce the concept of encryption

Question 4.4. (TCO 2) What is PKCS? (Points : 4)

One of the standards used in implementing a public-key infrastructure

A method of private cryptography used by the military

A method of encrypting e-mail from the IRS

The method of encryption that uses a 40-bit encryption key

Question 5.5. (TCO 2) What is Wired Equivalent Privacy (WEP)? (Points : 4)

A method used to encrypt wireless communications in an 802.11environment

A signal that jams other wireless devices attempting to access the system

A method to change encryption standards during a transmission

An encryption method used to secure bank passwords

Question 6.6. (TCO 2) What is CMP? (Points : 4)

This protocol defines the messages and operations required to provide certificate management services.

An encryption protocol used to verify a key length       

An application that decrypts encrypted e-mail       

A common message protocol that is used in e-mail

Question 7.7. (TCO 3) Network components connected to the same cable are often called "the backbone" in which topology? (Points : 4)

Star 
Bus 
Ring 
Hybrid

Question 8.8. (TCO 3) What is the main difference between TCP and UDP packets? (Points : 4)

UDP packets are a more widely used protocol. 
TCP packets are smaller and thus more efficient to use. 
TCP packets are connection oriented, whereas UPD packets are connectionless. 
UDP is considered to be more reliable because it performs error checking.

Question 9.9. (TCO 3) Unfortunately, hackers abuse the ICMP protocol by using it to _____. (Points : 4)

Send internet worms 
Launch denial-of-service (DoS) attacks 
Steal passwords and credit card numbers 
Send spam

Question 10.10. (TCO 3) Which of the following is a benefit provided by Network Address Translation (NAT)? (Points : 4)

Compensates for the lack of IP addresses 
Allows devices using two different protocols to communicate 
It creates a DMZ 
Translates MAC addresses to IP addresses

Question 11.11. (TCO 3) Which protocol is based on transferring data in fixed-size packets? (The fixed packet sizes help ensure that no single data type monopolizes the available bandwidth.) (Points : 4)

AppleTalk 
ATM 
FDDI 
Token Ring

Question 12.12. (TCO 3) Which transport layer protocol is connection oriented? (Points : 4)

UDP 
TCP 
IP 
ICMP

Question 13.13. (TCO 3) Which protocol is responsible for resolving an IP address to a MAC address? (Points : 4)

DNS 
ARP 
RARP 
ICMP

Question 14.14. (TCO 4) A way of backing up cryptographic keys is by _____. (Points : 4)

making copies in one location       

making multiple copies in multiple locations       

key archiving       

key recovery

Question 15.15. (TCO 4) All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT which one? (Points : 4)

Make copies of the private key and keep it in several locations for redundancy.       

The lifetime of the key should correspond with how often it is used and the sensitivity of the data it is protecting.       

The key should be changed at the end of its lifetime and not used past its allowed lifetime.       

The key should be properly destroyed at the end of its lifetime.

Question 16.16. (TCO 4) Outsourced CAs are different from public CAs in what way? (Points : 4)

Outsourced services can be used by hundreds of companies.       

Outsourced services provide dedicated services and equipment to individual companies.       

Outsourced services do not maintain specific servers and infrastructures for individual companies.       

Outsourced services are different in name only. They are essentially the same thing

Question 17.17. (TCO 4) Cryptographic algorithms are used for all of the following EXCEPT _____. (Points : 4)

confidentiality

integrity       

availability       

authentication

Question 18.18. (TCO 4) Keeping a copy of an encryption key with a trusted third party is known as _____. (Points : 4)

CYA       

key escrow       

key redundancy       

key management

Question 19.19. (TCO 6) Which device converts analog signals to digital signals and vice versa? (Points : 4)

Switch

Hub

Modem

VPN

Question 20.20. (TCO 6) A hub operates at which of the following? (Points : 4)

Layer 1, the physical layer       

Layer 2, the data-link layer       

Question 21.21. (TCO 6) The following are steps in securing a workstation EXCEPT _____. (Points : 4)

install NetBIOS and IPX

install antivirus

remove unnecessary software

disable unnecessary user accounts

Question 22.22. (TCO 8) Centralized monitoring of the health of the network is the function of a(n) _____. (Points : 4)

file server

SNMP

NOC

TOC

Question 23.23. (TCO 8) The electronic signatures in the Global and National Commerce Act _____. (Points : 4)

Implement the principle that a signature, contract, or other record may not be denied legal effect, validity, or enforceability solely because it is electronic form
Address a myriad of legal privacy issues resulting from the increased use of computers and other technology specific to telecommunications
Make it a violation of federal law to knowingly use another's identity 
Are a major piece of legislation affecting the financial industry, and contains significant privacy provisions for individuals

Question 24.24. (TCO 8) What do you call a law based on previous events or precedents? (Points : 4)

Statutory law 
Administrative law 
Common law 
Blue law

Question 25.25. (TCO 8) What is the Convention on Cybercrime? (Points : 4)

A convention of black hats who trade hacking secrets 
The first international treaty on crimes committed via the Internet and other computer networks
A convention of white hats who trade hacker prevention knowledge 
A treaty regulating international conventions

 

 

 

Category: Law, General Law
Available solutions
  • SEC280 Week 8 Final Exam
    $21.00

    Question 1.1. (TCO 2) When creating a password, users tend to use _____ (Points : 4) all capital letters passwords that are too long names of family, pets, or teams numbers only Question 2.2. (TCO 2) Social engineers attempt to exploit the natural tendencies of people. They do this by _____. (Points : 4) Fi

    Submitted on: 08 Mar, 2018 03:25:52 This tutorial has not been purchased yet .