Home > Articles > Certification > CompTIA

CompTIA Security+ Exam Cram: Domain 3.0: Threats and Vulnerabilities

  • Print
  • + Share This
This chapter provides sample questions (with answers and explanations) to help you prepare for the Domain 3 portion of the Security+ exam.
This chapter is from the book

Securing your resources is a challenge in any working environment. After all, resources are now commonly attacked through software, hardware, and peripherals. Domain 3 of the Security+ exam requires that you understand how to identify and minimize system threats to thwart would-be attackers and that you recognize the different types of assessment tools that are available to discover security threats and vulnerabilities. Be sure to give yourself plenty of time to review all these concepts because there are quite a few. The following list identifies the key areas from Domain 3.0 (which counts as 21% of the exam) that you need to master:

  • Analyze and differentiate among types of malware
  • Analyze and differentiate among types of attacks
  • Analyze and differentiate among types of social engineering attacks
  • Analyze and differentiate among types of wireless attacks
  • Analyze and differentiate among types of application attacks
  • Analyze and differentiate among types of mitigation and deterrent techniques
  • Implement assessment tools and techniques to discover security threats and vulnerabilities
  • Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning

Practice Questions

Objective 3.1: Analyze and differentiate among types of malware.

  1. Which of the following is the most common result of a buffer overflow?

    • circle.jpg A. Privilege escalation
    • circle.jpg B. Disguised malicious programs
    • circle.jpg C. Code replication
    • circle.jpg D. Collection of personal data

    Quick Answer: 180

    Detailed Answer: 184

  2. Which of the following best describes a virus?

    • circle.jpg A. An action that exceeds the storage-space allocation of an application
    • circle.jpg B. A program disguised as a useful application
    • circle.jpg C. A program designed to attach itself to other code and replicate
    • circle.jpg D. Software that communicates information from a user’s system without notifying the user

    Quick Answer: 180

    Detailed Answer: 184

  3. Which of the following is best describes a Trojan?

    • circle.jpg A. It infects other systems only after a user executes the application that it is buried in.
    • circle.jpg B. It sends messages to a computer with an IP address indicating that the message is coming from a trusted host.
    • circle.jpg C. It collects personal information, or changes your computer configuration without appropriately obtaining prior consent.
    • circle.jpg D. It is self-replicating and therefore needs no user intervention.

    Quick Answer: 180

    Detailed Answer: 184

  4. Which of the following best describes a rootkit?

    • circle.jpg A. Software used for the collection of personal data
    • circle.jpg B. Software hidden on a computer for the purpose of compromising the system
    • circle.jpg C. Software that provides the originator with the venue to propagate
    • circle.jpg D. Software that reports data such as surfing habits and sites visited

    Quick Answer: 180

    Detailed Answer: 185

  5. Which of the following is considered a worm?

    • circle.jpg A. Melissa
    • circle.jpg B. Acid Rain
    • circle.jpg C. Code Red
    • circle.jpg D. Mocmex

    Quick Answer: 180

    Detailed Answer: 185

  6. A disgruntled employee creates a utility for purging old emails from the server. Inside the utility is code that will erase the server’s hard drive contents on January 1, 2012. This is an example of which of the following attacks?

    • circle.jpg A. Virus
    • circle.jpg B. Logic bomb
    • circle.jpg C. Spoofing
    • circle.jpg D. Trojan horse

    Quick Answer: 180

    Detailed Answer: 185

  7. Which of the following best describes spyware?

    • circle.jpg A. Software used for the collection of personal data
    • circle.jpg B. Software hidden on a computer for the purpose of compromising the system
    • circle.jpg C. Software that provides the originator with the venue to propagate
    • circle.jpg D. Software that reports data such as surfing habits and sites visited

    Quick Answer: 180

    Detailed Answer: 185

  8. Which of the following is the best reason not to request to be removed from a mailing list in a reply to an unsolicited email?

    • circle.jpg A. It allows the sender to spoof your email address.
    • circle.jpg B. It is a waste of time because the sender very seldom removes you from the list.
    • circle.jpg C. It verifies that you have a legitimate, working email address.
    • circle.jpg D. It allows the sender to collect personal data.

    Quick Answer: 180

    Detailed Answer: 185

  9. Which of the following are methods by which email spam lists are created? (Select all correct answers.)

    • circle.jpg A. Searching the Web for addresses
    • circle.jpg B. Scanning newsgroup postings
    • circle.jpg C. Stealing Internet mailing lists
    • circle.jpg D. Stealing user email address books

    Quick Answer: 180

    Detailed Answer: 185

  10. Which of the following best describes programming errors that result in allowing someone to gain unauthorized administrative access?

    • circle.jpg A. Buffer overflow
    • circle.jpg B. Virus
    • circle.jpg C. Trojan
    • circle.jpg D. Logic bomb

    Quick Answer: 180

    Detailed Answer: 186

  11. Which of the following best describes malware that takes advantage of a security hole, and then automatically replicates to other systems running the same software?

    • circle.jpg A. Spyware
    • circle.jpg B. Virus
    • circle.jpg C. Trojan
    • circle.jpg D. Worm

    Quick Answer: 180

    Detailed Answer: 186

  12. Which of the following is a type of malware that is disguised as a useful application?

    • circle.jpg A. Spyware
    • circle.jpg B. Virus
    • circle.jpg C. Trojan
    • circle.jpg D. Worm

    Quick Answer: 180

    Detailed Answer: 186

  13. Which of the following is a type of malware associated with collecting personal information without appropriately obtaining prior consent?

    • circle.jpg A. Spyware
    • circle.jpg B. Virus
    • circle.jpg C. Trojan
    • circle.jpg D. Worm

    Quick Answer: 180

    Detailed Answer: 186

  14. Which of the following is a type of malware hidden on a computer mainly for the purpose of compromising the system and getting escalated privileges?

    • circle.jpg A. Spyware
    • circle.jpg B. Spam
    • circle.jpg C. Adware
    • circle.jpg D. Rootkit

    Quick Answer: 180

    Detailed Answer: 187

  15. Which of the following is a type of malware that provides the spam or virus originator with a venue to propagate?

    • circle.jpg A. Logic bomb
    • circle.jpg B. Botnet
    • circle.jpg C. Adware
    • circle.jpg D. Rootkit

    Quick Answer: 180

    Detailed Answer: 187

  16. Which of the following is true with regard to antispyware programs?

    • circle.jpg A. They must be updated regularly.
    • circle.jpg B. They can detect rootkits.
    • circle.jpg C. They can detect botnets.
    • circle.jpg D. They do not have to be updated.

    Quick Answer: 180

    Detailed Answer: 187

  17. Which of the following best describes the primary security issue with botnets?

    • circle.jpg A. They are malicious.
    • circle.jpg B. They can remain undetected.
    • circle.jpg C. They can execute code.
    • circle.jpg D. They are remotely controlled.

    Quick Answer: 180

    Detailed Answer: 187

  18. Which of the following is also referred to as slag code?

    • circle.jpg A. Logic bomb
    • circle.jpg B. Botnet
    • circle.jpg C. Adware
    • circle.jpg D. Rootkit

    Quick Answer: 180

    Detailed Answer: 187

  19. A buffer overflow can result in which of the following? (Select all correct answers.)

    • circle.jpg A. Overwriting of data or memory storage
    • circle.jpg B. A denial of service
    • circle.jpg C. Automatic code replication to other hosts
    • circle.jpg D. Execution of arbitrary code at a privileged level

    Quick Answer: 180

    Detailed Answer: 187

  20. Which of the following are virus types? (Select all correct answers.)

    • circle.jpg A. Polymorphic
    • circle.jpg B. Polynomial
    • circle.jpg C. Stealth
    • circle.jpg D. Covert

    Quick Answer: 180

    Detailed Answer: 188

  21. Which of the following best describes a boot sector virus?

    • circle.jpg A. Can change each time it is executed to avoid detection
    • circle.jpg B. Uses techniques to avoid detection
    • circle.jpg C. Is placed into the first sector of the hard drive
    • circle.jpg D. Infects executable program files and becomes active in memory

    Quick Answer: 180

    Detailed Answer: 188

  22. Which of the following is another name for a botnet?

    • circle.jpg A. Privilege escalation
    • circle.jpg B. Global hook
    • circle.jpg C. Honeynet
    • circle.jpg D. Zombie army

    Quick Answer: 180

    Detailed Answer: 188

  23. Which of the following is most like spyware?

    • circle.jpg A. Virus
    • circle.jpg B. Trojan
    • circle.jpg C. Spam
    • circle.jpg D. Worm

    Quick Answer: 180

    Detailed Answer: 188

  24. Which of the following best describes what rootkits use for stealth activity?

    • circle.jpg A. Global hooks
    • circle.jpg B. Tracking software/adware
    • circle.jpg C. Privilege escalation
    • circle.jpg D. Social engineering

    Quick Answer: 180

    Detailed Answer: 188

  25. Which of the following is the most effective method to avoid rootkit infection?

    • circle.jpg A. Never responding to the sender of an unsolicited email message
    • circle.jpg B. Running operating systems from an account with lesser privileges
    • circle.jpg C. Properly disabling the accounts of all terminated employees
    • circle.jpg D. Only downloading trusted applications

    Quick Answer: 180

    Detailed Answer: 188

  26. Which of the following best describes a botnet?

    • circle.jpg A. A program designed to execute malicious actions when a certain event occurs or a period of time goes by
    • circle.jpg B. A large number of programs disguised as useful applications
    • circle.jpg C. A large number of computers that forward transmissions to other computers on the Internet
    • circle.jpg D. Exploitation in software code that takes advantage of a programming flaw

    Quick Answer: 180

    Detailed Answer: 188

  27. Which of the following terms is most closely related to software exploitation that crashes the system and leaves it in a state where arbitrary code can be executed?

    • circle.jpg A. Logic bomb
    • circle.jpg B. Privilege escalation
    • circle.jpg C. Spam
    • circle.jpg D. Trojan

    Quick Answer: 180

    Detailed Answer: 189

  28. Which of the following are the most effective ways to prevent an attacker from exploiting software? (Select all correct answers.)

    • circle.jpg A. Apply current patches
    • circle.jpg B. Do not allow Internet access
    • circle.jpg C. Apply current service packs
    • circle.jpg D. Monitor the Web for newly discovered vulnerabilities

    Quick Answer: 180

    Detailed Answer: 189

  29. Which of the following virus is a hybrid of boot and program viruses?

    • circle.jpg A. Polymorphic
    • circle.jpg B. Macro
    • circle.jpg C. Stealth
    • circle.jpg D. Multipartite

    Quick Answer: 180

    Detailed Answer: 189

  30. Which of the following malware finds other systems running the same vulnerable software and then replicates itself without any user interaction?

    • circle.jpg A. Virus
    • circle.jpg B. Trojan
    • circle.jpg C. Worm
    • circle.jpg D. Logic bomb

    Quick Answer: 180

    Detailed Answer: 189

  31. Which of the following is the main difference between a Trojan and a virus?

    • circle.jpg A. A Trojan requires user interaction and a virus does not.
    • circle.jpg B. A Trojan does not replicate itself and a virus does.
    • circle.jpg C. A virus does not require user interaction and a Trojan does.
    • circle.jpg D. A virus does not replicate itself and a Trojan does.

    Quick Answer: 180

    Detailed Answer: 189

  32. Which of the following are indications that a computer may contain spyware? (Select all correct answers.)

    • circle.jpg A. The browser home page changes.
    • circle.jpg B. It takes a long time for the Windows desktop to come up.
    • circle.jpg C. Clicking a link does nothing or goes to an unexpected website.
    • circle.jpg D. The email inbox contains an unsolicited email message.

    Quick Answer: 180

    Detailed Answer: 189

  33. Which of the following are acceptable ways of dealing with spam? (Select all correct answers.)

    • circle.jpg A. Delete the email without opening it.
    • circle.jpg B. Reply back and try to identify the spammer.
    • circle.jpg C. Turn off the preview function of your email software.
    • circle.jpg D. Immediately call the local law enforcement office.

    Quick Answer: 180

    Detailed Answer: 190

  34. Which of the following are ways a rootkit can be installed? (Select all correct answers.)

    • circle.jpg A. By accessing documents on the local intranet.
    • circle.jpg B. Included as part of software package.
    • circle.jpg C. An unpatched vulnerability.
    • circle.jpg D. The user downloads it.

    Quick Answer: 180

    Detailed Answer: 190

  35. Which of the following is a type of malware that can use encryption to protect outbound communications and piggyback on commonly used ports to communicate without interrupting other applications that use that port?

    • circle.jpg A. Logic bomb
    • circle.jpg B. Botnet
    • circle.jpg C. Adware
    • circle.jpg D. Rootkit

    Quick Answer: 180

    Detailed Answer: 190

  36. The system administrator abruptly leaves the organization after being passed over for a promotion. Two weeks later, employees report they cannot access files. It has been determined that at midnight the system suddenly began deleting files. Which of the following is the most likely type of malicious code that caused this event?

    • circle.jpg A. Logic bomb
    • circle.jpg B. Botnet
    • circle.jpg C. Adware
    • circle.jpg D. Rootkit

    Quick Answer: 180

    Detailed Answer: 190

  37. Which of the following would best describe the type of malicious code that enters a system through a freeware program that the user installed?

    • circle.jpg A. Virus
    • circle.jpg B. Trojan
    • circle.jpg C. Worm
    • circle.jpg D. Logic bomb

    Quick Answer: 180

    Detailed Answer: 190

  38. Which of the following type of virus avoids antivirus software detection by changing form each time it is executed?

    • circle.jpg A. Polymorphic
    • circle.jpg B. Macro
    • circle.jpg C. Stealth
    • circle.jpg D. Multipartite

    Quick Answer: 180

    Detailed Answer: 190

  39. Which of the following is an automated computer program controlled by outside sources with the intention of forwarding transmissions to other computers on the Internet?

    • circle.jpg A. Logic bomb
    • circle.jpg B. Adware
    • circle.jpg C. Bot
    • circle.jpg D. Virus

    Quick Answer: 180

    Detailed Answer: 191

  40. Which of the following are steps taken to protect a network from malicious code? (Select all correct answers.)
    • circle.jpg A. Do not use any type of removable media from another user without first scanning the disk.
    • circle.jpg B. Open all attachments sent to you by people you might know.
    • circle.jpg C. Install firewalls or intrusion-prevention systems on client machines.
    • circle.jpg D. Subscribe to security newsgroups.

    Quick Answer: 180

    Detailed Answer: 191

Objective 3.2: Analyze and differentiate among types of attacks.

  1. Which of the following ports should be blocked when it has been determined that an intruder has been using Telnet for unauthorized access?

    • circle.jpg A. 110
    • circle.jpg B. 21
    • circle.jpg C. 23
    • circle.jpg D. 443

    Quick Answer: 180

    Detailed Answer: 191

  2. Which of the following ports should be blocked when it has been determined that an intruder has been using SNMP for unauthorized access? (Select all correct answers.)

    • circle.jpg A. 161
    • circle.jpg B. 162
    • circle.jpg C. 443
    • circle.jpg D. 4445

    Quick Answer: 180

    Detailed Answer: 191

  3. Which of the following best describes TCP/IP hijacking?

    • circle.jpg A. Providing false identity information to gain unauthorized access
    • circle.jpg B. An established connection without specifying a username or password
    • circle.jpg C. An attacker takes control of a session between the server and a client
    • circle.jpg D. Redirecting traffic by changing the IP record for a specific domain

    Quick Answer: 180

    Detailed Answer: 191

  4. Which of the following best describes spoofing?

    • circle.jpg A. Providing false identity information to gain unauthorized access
    • circle.jpg B. An established connection without specifying a username or password
    • circle.jpg C. An attacker takes control of a session between the server and a client
    • circle.jpg D. Redirecting traffic by changing the IP record for a specific domain

    Quick Answer: 180

    Detailed Answer: 191

  5. Which of the following best describes a null session?

    • circle.jpg A. Providing false identity information to gain unauthorized access
    • circle.jpg B. An established connection without specifying a username or password
    • circle.jpg C. An attacker takes control of a session between the server and a client
    • circle.jpg D. Redirecting traffic by changing the IP record for a specific domain

    Quick Answer: 180

    Detailed Answer: 192

  6. Which of the following best describes DNS poisoning?

    • circle.jpg A. Providing false identity information to gain unauthorized access
    • circle.jpg B. An established connection without specifying a username or password
    • circle.jpg C. An attacker taking control of a session between the server and a client
    • circle.jpg D. Redirecting traffic by changing the IP record for a specific domain

    Quick Answer: 180

    Detailed Answer: 192

  7. Which of the following best describes a man-in-the-middle attack?

    • circle.jpg A. An attacker takes advantage of the add/grace period to monopolize names without ever paying for them.
    • circle.jpg B. Packets are captured, the pertinent information is extracted, and then packets are placed back on the network.
    • circle.jpg C. An attack that typically involves flooding a listening port on a machine with packets to disrupt service.
    • circle.jpg D. An attacker intercepts traffic and then tricks the parties at both ends into believing that they are communicating with each other.

    Quick Answer: 180

    Detailed Answer: 192

  8. Which of the following best describes a replay attack?

    • circle.jpg A. An attacker takes advantage of the add/grace period to monopolize names without ever paying for them.
    • circle.jpg B. Packets are captured, the pertinent information is extracted, and then packets are placed back on the network.
    • circle.jpg C. An attack that typically involves flooding a listening port on a machine with packets to disrupt service.
    • circle.jpg D. An attacker intercepts traffic and then tricks the parties at both ends into believing that they are communicating with each other.

    Quick Answer: 180

    Detailed Answer: 192

  9. Which of the following best describes a DDoS attack?

    • circle.jpg A. An attacker takes advantage of the add/grace period to monopolize names without ever paying for them.
    • circle.jpg B. Packets are captured, the pertinent information is extracted, and then packets are placed back on the network.
    • circle.jpg C. An attack that typically involves flooding a listening port on a machine with packets to disrupt the resources.
    • circle.jpg D. An attacker intercepts traffic and then tricks the parties at both ends into believing that they are communicating with each other.

    Quick Answer: 180

    Detailed Answer: 192

  10. Which of the following methods can be used to mitigate DDoS attacks? (Select all correct answers.)

    • circle.jpg A. Setting up filters on external routers to drop all ICMP packets
    • circle.jpg B. Reducing the amount of time before the reset of an unfinished TCP connection
    • circle.jpg C. Increasing the amount of time before the reset of an unfinished TCP connection
    • circle.jpg D. Setting up a filter that denies traffic originating from the Internet that shows an internal network address

    Quick Answer: 180

    Detailed Answer: 192

  11. Which of the following best describes ARP poisoning?

    • circle.jpg A. Broadcasting a fake reply to an entire network
    • circle.jpg B. Changing the IP record for a specific domain
    • circle.jpg C. Sending fragmented UDP packets
    • circle.jpg D. Distributing zombie software

    Quick Answer: 180

    Detailed Answer: 193

  12. Which of the following attacks is associated with services using an interprocess communication share such as network file and print-sharing services?

    • circle.jpg A. DNS spoofing
    • circle.jpg B. Null sessions
    • circle.jpg C. ARP poisoning
    • circle.jpg D. DNS kiting

    Quick Answer: 180

    Detailed Answer: 193

  13. Which of the following sends hundreds of ICMP packets to the host to block or reduce activity?

    • circle.jpg A. DNS spoofing
    • circle.jpg B. ARP poisoning
    • circle.jpg C. Man-in-the-middle
    • circle.jpg D. Denial of service

    Quick Answer: 180

    Detailed Answer: 193

  14. Which of the following type of attacks is most likely being executed when an unauthorized service is relaying information to a source outside the network?

    • circle.jpg A. DNS spoofing
    • circle.jpg B. ARP poisoning
    • circle.jpg C. Man-in-the-middle
    • circle.jpg D. Denial of service

    Quick Answer: 180

    Detailed Answer: 193

  15. Which of the following best describes the primary security issue with null sessions?

    • circle.jpg A. The sessions are not terminated properly.
    • circle.jpg B. The connection is not authenticated.
    • circle.jpg C. The connection is not encrypted.
    • circle.jpg D. The sessions are remotely controlled.

    Quick Answer: 180

    Detailed Answer: 193

  16. Which of the following is the most effective way to reduce null session vulnerability?

    • circle.jpg A. Reducing the reset time of an unfinished TCP connection
    • circle.jpg B. Using the signing capabilities of certificates
    • circle.jpg C. Setting up filters to drop all ICMP packets
    • circle.jpg D. Disabling NetBIOS over TCP/IP

    Quick Answer: 180

    Detailed Answer: 193

  17. Which of the following are effective ways to mitigate spoofing attacks? (Select all correct answers.)

    • circle.jpg A. Editing the Registry on Windows-based computers to restrict anonymous access
    • circle.jpg B. Using IPsec to secure transmissions between critical servers and clients
    • circle.jpg C. Denying traffic originating from the Internet that shows an internal network address
    • circle.jpg D. Using the signing capabilities of certificates on servers and clients

    Quick Answer: 180

    Detailed Answer: 194

  18. Which of the following is the most effective method to mitigate session hijacking?

    • circle.jpg A. Denying traffic originating from the Internet that shows an internal network address
    • circle.jpg B. Forcing users to reauthenticate before allowing transactions to occur
    • circle.jpg C. Reducing the amount of time before the reset of an unfinished TCP connection
    • circle.jpg D. Setting up filters on external routers to drop all incoming ICMP packets

    Quick Answer: 180

    Detailed Answer: 194

  19. When mitigating null session vulnerability, which of the following ports should be closed? (Select all correct answers.)

    • circle.jpg A. 161
    • circle.jpg B. 162
    • circle.jpg C. 139
    • circle.jpg D. 445

    Quick Answer: 180

    Detailed Answer: 194

  20. Which of the following sessions can typically result in a man-in-the-middle attack? (Select all correct answers.)

    • circle.jpg A. Telnet
    • circle.jpg B. Wireless
    • circle.jpg C. Email
    • circle.jpg D. Samba

    Quick Answer: 180

    Detailed Answer: 194

  21. Which of the following are ways to minimize the effects of DNS poisoning when hosting your own DNS? (Select all correct answers.)

    • circle.jpg A. Checking that the hosting server is not open-recursive
    • circle.jpg B. Running operating systems from an account with lesser privileges
    • circle.jpg C. Using different servers for authoritative and recursive lookups
    • circle.jpg D. Disabling recursive access for networks to resolve names that are not in zone files

    Quick Answer: 180

    Detailed Answer: 194

  22. Which of the following are the most effective methods to mitigate ARP poisoning on a large network? (Select all correct answers.)

    • circle.jpg A. Using equipment that offers port security
    • circle.jpg B. Using static mapping for IP addresses and ARP tables
    • circle.jpg C. Using script-based mapping for IP addresses and ARP tables
    • circle.jpg D. Deploying monitoring tools or an intrusion detection system (IDS)

    Quick Answer: 180

    Detailed Answer: 194

  23. Which of the following best describes privilege escalation?

    • circle.jpg A. A default set of user credentials
    • circle.jpg B. Data transmitted that can be easily sniffed
    • circle.jpg C. Accidental or intentional access to resources
    • circle.jpg D. Application code functions allowing unauthorized access

    Quick Answer: 180

    Detailed Answer: 195

  24. Which of the following best describes a back door?

    • circle.jpg A. A default set of user credentials
    • circle.jpg B. Data transmitted that can be easily sniffed
    • circle.jpg C. Accidental or intentional access to resources
    • circle.jpg D. Application code functions allowing unauthorized access

    Quick Answer: 180

    Detailed Answer: 195

  25. In a corporate environment, which of the following is most vulnerable to DoS attacks?

    • circle.jpg A. Internal user systems
    • circle.jpg B. Network resources
    • circle.jpg C. Network storage
    • circle.jpg D. Internal servers

    Quick Answer: 180

    Detailed Answer: 195

  26. Which of the following best describes a denial-of-service (DoS) attack?

    • circle.jpg A. Intentional access to resources not intended for access by the user
    • circle.jpg B. Application code functions that allow unauthorized access to network resources
    • circle.jpg C. Attempt to block access by overwhelming network availability
    • circle.jpg D. Attempt to directly access the resources through unauthorized means

    Quick Answer: 180

    Detailed Answer: 195

  27. Which of the following is the best method to mitigate attacks against networking devices and services installed with a default set of user credentials?

    • circle.jpg A. Replacing them on an as-needed basis
    • circle.jpg B. Replacing them when an attack has been detected
    • circle.jpg C. Replacing them with unique strong logon credentials
    • circle.jpg D. Replacing them with the same strong logon credential

    Quick Answer: 180

    Detailed Answer: 195

  28. Which of the following is the most common origin of back doors?

    • circle.jpg A. Created during application development
    • circle.jpg B. Created during system certification
    • circle.jpg C. Created during user interface testing
    • circle.jpg D. Created during implementation

    Quick Answer: 180

    Detailed Answer: 196

  29. Which of the following should be performed when implementing distributed wireless network configurations spanning multiple buildings or open natural areas?

    • circle.jpg A. Land survey
    • circle.jpg B. Building inspection
    • circle.jpg C. OSHA inspection
    • circle.jpg D. Site survey

    Quick Answer: 180

    Detailed Answer: 196

  30. Which of the following is most closely linked to privilege escalation?

    • circle.jpg A. SSID broadcast
    • circle.jpg B. Application flaws
    • circle.jpg C. Application development
    • circle.jpg D. Automated attacks

    Quick Answer: 180

    Detailed Answer: 196

  31. Which of the following is most closely linked to weak passwords?

    • circle.jpg A. SSID broadcast
    • circle.jpg B. Application flaws
    • circle.jpg C. Application development
    • circle.jpg D. Automated attacks

    Quick Answer: 181

    Detailed Answer: 196

  32. Which of the following is most closely linked to back doors?

    • circle.jpg A. SSID broadcast
    • circle.jpg B. Application flaws
    • circle.jpg C. Application development
    • circle.jpg D. Automated attacks

    Quick Answer: 181

    Detailed Answer: 197

  33. Which of the following is most closely linked to default accounts?

    • circle.jpg A. Network resources
    • circle.jpg B. Application flaws
    • circle.jpg C. Network credentials
    • circle.jpg D. Automated attacks

    Quick Answer: 181

    Detailed Answer: 197

  34. Which of the following is most closely linked to denial of service?

    • circle.jpg A. Network resources
    • circle.jpg B. SSID broadcast
    • circle.jpg C. Network credentials
    • circle.jpg D. Application development

    Quick Answer: 181

    Detailed Answer: 197

  35. Which of the following best describes the situation where User A can read User B’s email without specific authorization?

    • circle.jpg A. Privilege escalation
    • circle.jpg B. Default accounts
    • circle.jpg C. Weak passwords
    • circle.jpg D. Back door

    Quick Answer: 181

    Detailed Answer: 197

  36. Which of the following best describes the situation where a software designer puts in shortcut entry points to allow rapid code evaluation and testing?

    • circle.jpg A. Privilege escalation
    • circle.jpg B. Default accounts
    • circle.jpg C. Weak passwords
    • circle.jpg D. Back door

    Quick Answer: 181

    Detailed Answer: 198

  37. Which of the following attacks are associated with weak passwords? (Select all correct answers.)

    • circle.jpg A. Packet sniffing
    • circle.jpg B. Automated attacks
    • circle.jpg C. Social engineering
    • circle.jpg D. Denial of service

    Quick Answer: 181

    Detailed Answer: 198

  38. Which of the following attacks are associated with fringe service industries such as online casinos?

    • circle.jpg A. Packet sniffing
    • circle.jpg B. Automated attacks
    • circle.jpg C. Social engineering
    • circle.jpg D. Denial of service

    Quick Answer: 181

    Detailed Answer: 198

  39. Which of the following is an email attack that is targeted toward a specific individual?

    • circle.jpg A. Spear Phishing
    • circle.jpg B. Vishing
    • circle.jpg C. Smishing
    • circle.jpg D. Pharming

    Quick Answer: 181

    Detailed Answer: 199

  40. Which of the following is an attack where the attacker will often use a fake caller-ID to appear as a trusted organization and attempt to get the individual to enter account details via the phone?

    • circle.jpg A. Spear Phishing
    • circle.jpg B. Vishing
    • circle.jpg C. Smishing
    • circle.jpg D. Pharming

    Quick Answer: 181

    Detailed Answer: 199

  41. Which of the following is an attack that redirects victims to a bogus website, even if they correctly entered the intended site?

    • circle.jpg A. Spear Phishing
    • circle.jpg B. Vishing
    • circle.jpg C. Smishing
    • circle.jpg D. Pharming

    Quick Answer: 181

    Detailed Answer: 199

  42. Which of the following attacks involves using phishing methods through text messaging?

    • circle.jpg A. Spear Phishing
    • circle.jpg B. Vishing
    • circle.jpg C. Smishing
    • circle.jpg D. Pharming

    Quick Answer: 181

    Detailed Answer: 199

  43. Which of the following is a type of advertising message that targets users of instant messaging (IM) services?

    • circle.jpg A. Vishing
    • circle.jpg B. Spim
    • circle.jpg C. Spam
    • circle.jpg D. Phishing

    Quick Answer: 181

    Detailed Answer: 199

  44. Which of the following observing attacks observes how a host responds to an odd TCP/IP packet?

    • circle.jpg A. DNS spoofing
    • circle.jpg B. Null sessions
    • circle.jpg C. ARP poisoning
    • circle.jpg D. Xmas attack

    Quick Answer: 181

    Detailed Answer: 200

  45. Which of the following attacks is accomplished by gaining the trust of a computer that is trusted by the target network?
    • circle.jpg A. Packet sniffing
    • circle.jpg B. Transitive access
    • circle.jpg C. Social engineering
    • circle.jpg D. Denial of service

    Quick Answer: 181

    Detailed Answer: 200

Objective 3.3: Analyze and differentiate among types of social engineering attacks.

  1. A help desk employee receives a call from someone who is posing as a technical aide attempting to update some type of information, and asks for identifying user details that may then be used to gain access. Which of the following type of attack has occurred?

    • circle.jpg A. Pharming
    • circle.jpg B. Social engineering
    • circle.jpg C. Phishing
    • circle.jpg D. Shoulder surfing

    Quick Answer: 181

    Detailed Answer: 200

  2. A help desk employee receives a call from the administrative assistant. She has received an email stating if she doesn’t respond within 48 hours with certain personal information, the corporate bank account will be closed. Which of the following type of attack has occurred?

    • circle.jpg A. Pharming
    • circle.jpg B. Social engineering
    • circle.jpg C. Phishing
    • circle.jpg D. Shoulder surfing

    Quick Answer: 181

    Detailed Answer: 200

  3. The help desk is flooded with calls from users that received an email warning them of a new virus. The mail instructed the users to search for and delete several files from their systems. Many of the users who attempted to reboot their systems after deleting the specified files are having difficulties and the machines are not rebooting properly. Which of the following type of attack has occurred?

    • circle.jpg A. Pharming
    • circle.jpg B. Hoax
    • circle.jpg C. Phishing
    • circle.jpg D. Spam

    Quick Answer: 181

    Detailed Answer: 200

  4. An organization discovers that many employees have been responding to chain letter emails. Which of the following is the greatest concern to the organization?

    • circle.jpg A. Undue burden on resources.
    • circle.jpg B. They may contain viruses.
    • circle.jpg C. Theft of proprietary information.
    • circle.jpg D. Nothing. Chain letters are harmless.

    Quick Answer: 181

    Detailed Answer: 200

  5. An organization allows employees to access confidential data remotely. Many of the sales staff spend extended time in public places and use this downtime to catch up on work. Which of the following is the greatest concern to the organization?

    • circle.jpg A. Virus infection
    • circle.jpg B. Social engineering
    • circle.jpg C. Dumpster diving
    • circle.jpg D. Shoulder surfing

    Quick Answer: 181

    Detailed Answer: 201

  6. Which of the following type of attacks is intended to go after high-profile targets such as an executive within a company?

    • circle.jpg A. Spear Phishing
    • circle.jpg B. Vishing
    • circle.jpg C. Smishing
    • circle.jpg D. Whaling

    Quick Answer: 181

    Detailed Answer: 201

  7. An employee receives an automated call from the organization’s bank asking the employee to enter the bank account number and pin on the telephone keypad to verify account information for their records. Which of the following type of attack has occurred?

    • circle.jpg A. Spear Phishing
    • circle.jpg B. Vishing
    • circle.jpg C. Smishing
    • circle.jpg D. Whaling

    Quick Answer: 181

    Detailed Answer: 201

  8. The employees in the financial department of your organization have received emails from the local credit union, asking them to click on a link inside the email to update their passwords and user IDs because of a recent security breach. Which of the following type of attack has occurred?

    • circle.jpg A. Spear Phishing
    • circle.jpg B. Vishing
    • circle.jpg C. Smishing
    • circle.jpg D. Whaling

    Quick Answer: 181

    Detailed Answer: 201

  9. An organization does not have a policy on proper document disposal. When Mary goes outside to empty her trash, a nice young man has been offering to do it for her. Which of the following best describes the attack that is taking place?

    • circle.jpg A. Virus infection
    • circle.jpg B. Social engineering
    • circle.jpg C. Dumpster diving
    • circle.jpg D. Shoulder surfing

    Quick Answer: 181

    Detailed Answer: 202

  10. As Joe is about to enter a secured building, a nice young woman runs up behind him, smiles, and follows him into the building without using her own ID. Which of the following type of attack has occurred?
    • circle.jpg A. Pharming
    • circle.jpg B. Social engineering
    • circle.jpg C. Shoulder surfing
    • circle.jpg D. Tailgating

    Quick Answer: 181

    Detailed Answer: 202

Objective 3.4: Analyze and differentiate among types of wireless attacks.

  1. Which of the following best describes a major security issue when implementing WAPs?

    • circle.jpg A. WEP is the default encryption.
    • circle.jpg B. The SSID is broadcast in plain text.
    • circle.jpg C. They are hard to physically locate.
    • circle.jpg D. Any node can view the data of another node.

    Quick Answer: 181

    Detailed Answer: 202

  2. Which of the following best describes why data emanation is a security risk in wireless networks? (Select all correct answers.)

    • circle.jpg A. It uses 802.1x transmissions that generate detectable radio-frequency signals funneled into one direction.
    • circle.jpg B. Sniffing the data may use many solutions to increase the distance over which detection is possible.
    • circle.jpg C. Sniffing the data may use many solutions to reduce the distance over which transmission is possible.
    • circle.jpg D. It uses 802.1x transmissions that generate detectable radio-frequency signals in all directions.

    Quick Answer: 181

    Detailed Answer: 202

  3. Which of the following is the primary method to mitigate the vulnerabilities associated with communication over an 802.1x wireless link?

    • circle.jpg A. Authorization
    • circle.jpg B. Authentication
    • circle.jpg C. Encryption
    • circle.jpg D. Identification

    Quick Answer: 181

    Detailed Answer: 203

  4. Which of the following type of attacks is associated with the use of wireless communication? (Select all correct answers.)

    • circle.jpg A. Packet sniffing
    • circle.jpg B. Session hijacking
    • circle.jpg C. Man-in-the-middle
    • circle.jpg D. Spam relaying

    Quick Answer: 181

    Detailed Answer: 203

  5. Which best describes why session hijacking is possible in wireless communication?

    • circle.jpg A. There is no authorization mechanism.
    • circle.jpg B. There is no authentication mechanism.
    • circle.jpg C. The authentication mechanism is one-way.
    • circle.jpg D. The authorization mechanism is one-way.

    Quick Answer: 181

    Detailed Answer: 203

  6. Which of the following best describes why a man-in-the-middle attack is possible in wireless communication?

    • circle.jpg A. The request for connection by the client is a bidirectional open broadcast.
    • circle.jpg B. The request for connection by the access point is a bidirectional open broadcast.
    • circle.jpg C. The request for connection by the access point is an omnidirectional open broadcast.
    • circle.jpg D. The request for connection by the client is an omnidirectional open broadcast.

    Quick Answer: 181

    Detailed Answer: 203

  7. Which of the following best describes war-driving?

    • circle.jpg A. Driving around with a laptop system configured to listen for open access points
    • circle.jpg B. Dialing a large range of telephone numbers in search of devices that can be exploited
    • circle.jpg C. Marking landmarks to indicate the presence of an available access point
    • circle.jpg D. Accessing an open public WAP for a monthly fee or commission from the end user

    Quick Answer: 181

    Detailed Answer: 203

  8. Which of the following best describes war-chalking?

    • circle.jpg A. Driving around with a laptop system configured to listen for open access points
    • circle.jpg B. Dialing a large range of telephone numbers in search of devices that can be exploited
    • circle.jpg C. Marking landmarks to indicate the presence of an available access point
    • circle.jpg D. Accessing an open public for a monthly fee or commission from the end user

    Quick Answer: 181

    Detailed Answer: 203

  9. Which of the following best describes bluejacking?

    • circle.jpg A. Driving around with a laptop configured to listen for open access points
    • circle.jpg B. Sending broadcast spam from a nearby Bluetooth-enabled device
    • circle.jpg C. Deleting data on a Bluetooth device that has opened a connection
    • circle.jpg D. Marking landmarks to indicate an available open access point

    Quick Answer: 181

    Detailed Answer: 203

  10. Which of the following best describes bluesnarfing?

    • circle.jpg A. Driving around with a laptop configured to listen for open access points
    • circle.jpg B. Sending broadcast spam from a nearby Bluetooth-enabled device
    • circle.jpg C. Deleting data on a Bluetooth device that has opened a connection
    • circle.jpg D. Marking landmarks to indicate an available open access point

    Quick Answer: 181

    Detailed Answer: 204

  11. Which of the following best describes a WLAN technology that uses Ethernet protocols?

    • circle.jpg A. Wi-Fi
    • circle.jpg B. i-Mode
    • circle.jpg C. Bluetooth
    • circle.jpg D. WAP

    Quick Answer: 181

    Detailed Answer: 204

  12. Which of the following best describes the situation that allows using reflective tube waveguides such as a Pringle’s can to capture data?

    • circle.jpg A. Weak encryption
    • circle.jpg B. Session hijacking
    • circle.jpg C. War-driving
    • circle.jpg D. Data emanation

    Quick Answer: 181

    Detailed Answer: 204

  13. Which of the following best describes the situation that allows a hijacker to wait until the authentication cycle is completed, then generate a signal that causes the client to think it has been disconnected from the access point?

    • circle.jpg A. Weak encryption
    • circle.jpg B. Session hijacking
    • circle.jpg C. War-driving
    • circle.jpg D. Data emanation

    Quick Answer: 181

    Detailed Answer: 204

  14. Which of the following best describes what might allow data transacted over an 802.1x wireless link to be passed in clear form?

    • circle.jpg A. Weak encryption
    • circle.jpg B. Session hijacking
    • circle.jpg C. War-driving
    • circle.jpg D. Data emanation

    Quick Answer: 181

    Detailed Answer: 205

  15. Which of the following best describes the situation where an attack is aimed at pairing with the attacker’s device for unauthorized access, modification, or deletion of data?

    • circle.jpg A. Bluejacking
    • circle.jpg B. Bluesnarfing
    • circle.jpg C. War-driving
    • circle.jpg D. War-chalking

    Quick Answer: 181

    Detailed Answer: 205

  16. Which of the following best describes the situation that allows an attack aimed at the identification of existing wireless networks, the SSID used, and any known WEP keys?

    • circle.jpg A. Weak encryption
    • circle.jpg B. Session hijacking
    • circle.jpg C. War-driving
    • circle.jpg D. Data emanation

    Quick Answer: 181

    Detailed Answer: 205

  17. Which of the following best describes the situation where an attack is aimed at generating messages that appear to be from the device itself?

    • circle.jpg A. Bluejacking
    • circle.jpg B. Bluesnarfing
    • circle.jpg C. War-driving
    • circle.jpg D. War-chalking

    Quick Answer: 181

    Detailed Answer: 205

  18. In which of the following attacks would the implementation of a rogue AP with stronger signal strength than more remote permanent installations be found?

    • circle.jpg A. Weak encryption
    • circle.jpg B. Man-in-the-middle
    • circle.jpg C. War-driving
    • circle.jpg D. Data emanation

    Quick Answer: 181

    Detailed Answer: 206

  19. The Wi-Fi Protected Access standards were developed by the Wi-Fi Alliance to replace which of the following?

    • circle.jpg A. DES
    • circle.jpg B. WAP
    • circle.jpg C. AES
    • circle.jpg D. WEP

    Quick Answer: 181

    Detailed Answer: 206

  20. WSL is equivalent to which of the following layers of the OSI model?
    • circle.jpg A. Session
    • circle.jpg B. Transport
    • circle.jpg C. Network
    • circle.jpg D. Presentation

    Quick Answer: 181

    Detailed Answer: 205

Objective 3.5: Analyze and differentiate among types of application attacks.

  1. Which of the following are identified vulnerabilities of the Java language? (Select all correct answers.)

    • circle.jpg A. Buffer overflows
    • circle.jpg B. Unauthorized file upload
    • circle.jpg C. Email exposure
    • circle.jpg D. Unexpected redirection

    Quick Answer: 181

    Detailed Answer: 206

  2. Which of the following most accurately describes how Java applets execute?

    • circle.jpg A. When the web server retrieves the directory web page
    • circle.jpg B. When the web server’s browser loads the hosting web page
    • circle.jpg C. When the client machine’s browser loads the hosting web page
    • circle.jpg D. When the operating system loads the hosting web page

    Quick Answer: 181

    Detailed Answer: 206

  3. Which of the following best describes the reason Java applets are a security risk?

    • circle.jpg A. Java is compiled on the client browser.
    • circle.jpg B. Java is a precompiled language.
    • circle.jpg C. Java is compiled by the client operating system.
    • circle.jpg D. Java applets execute on the hosting web server.

    Quick Answer: 181

    Detailed Answer: 207

  4. Which of the following are identified vulnerabilities of JavaScript? (Select all correct answers.)

    • circle.jpg A. Buffer overflows
    • circle.jpg B. Unauthorized file upload
    • circle.jpg C. Email exposure
    • circle.jpg D. Unexpected redirection

    Quick Answer: 181

    Detailed Answer: 207

  5. Which of the following is the most effective method to mitigate vulnerabilities exposed by earlier forms of Java?

    • circle.jpg A. Keeping machines up-to-date with new version releases
    • circle.jpg B. Disabling third-party browser extensions
    • circle.jpg C. Setting the pop-up blocker setting to high
    • circle.jpg D. Enabling Integrated Windows Authentication

    Quick Answer: 181

    Detailed Answer: 207

  6. ActiveX and its controls share many of the same vulnerabilities present in which of the following?

    • circle.jpg A. Cookies
    • circle.jpg B. JavaScript
    • circle.jpg C. Embedded Java applets
    • circle.jpg D. Common Gateway Interface script

    Quick Answer: 181

    Detailed Answer: 207

  7. Which of the following is the most realistic method to mitigate having cookies expose long-term browsing habits?

    • circle.jpg A. Disabling third-party browser extensions
    • circle.jpg B. Regularly clearing the browser cookie cache
    • circle.jpg C. Configuring client browsers to block all cookies
    • circle.jpg D. Disabling automatic code execution on client browsers

    Quick Answer: 181

    Detailed Answer: 207

  8. Which of the following is the most effective method to mitigate buffer overflows or cross-site scripting attacks?

    • circle.jpg A. Blocking third-party cookies
    • circle.jpg B. Accepting only numeric data input
    • circle.jpg C. Disabling third-party browser extensions
    • circle.jpg D. Validating data input

    Quick Answer: 181

    Detailed Answer: 207

  9. Which of the following is most likely to use a tracking cookie?

    • circle.jpg A. Spyware
    • circle.jpg B. Credit Union
    • circle.jpg C. Trojan
    • circle.jpg D. Shopping cart

    Quick Answer: 181

    Detailed Answer: 208

  10. Which of the following best describes what the exploitation of Simple Mail Transfer Protocol (SMTP) relay agents is used for?

    • circle.jpg A. Buffer overflow
    • circle.jpg B. Logic bomb
    • circle.jpg C. Spyware
    • circle.jpg D. Spam

    Quick Answer: 181

    Detailed Answer: 208

  11. Which of the following best describes a tracking cookie?

    • circle.jpg A. Beneficial
    • circle.jpg B. Permanent
    • circle.jpg C. Temporary
    • circle.jpg D. Valuable

    Quick Answer: 181

    Detailed Answer: 208

  12. S-HTTP communicates over which of the following ports?

    • circle.jpg A. 80
    • circle.jpg B. 443
    • circle.jpg C. 110
    • circle.jpg D. 4445

    Quick Answer: 181

    Detailed Answer: 208

  13. HTTPS communicates over which of the following ports?

    • circle.jpg A. 80
    • circle.jpg B. 443
    • circle.jpg C. 110
    • circle.jpg D. 4445

    Quick Answer: 181

    Detailed Answer: 208

  14. Which of the following exploits are associated with SSL certificates? (Select all correct answers.)

    • circle.jpg A. Ill-formatted requests
    • circle.jpg B. Small key sizes
    • circle.jpg C. Outdated CRLs
    • circle.jpg D. Buffer overflows

    Quick Answer: 181

    Detailed Answer: 208

  15. Which of the following vulnerabilities are associated with LDAP? (Select all correct answers.)

    • circle.jpg A. Ill-formatted requests
    • circle.jpg B. Small key sizes
    • circle.jpg C. Outdated CRLs
    • circle.jpg D. Buffer overflows

    Quick Answer: 181

    Detailed Answer: 209

  16. Which of the following vulnerabilities are associated with FTP? (Select all correct answers.)

    • circle.jpg A. Buffer overflows
    • circle.jpg B. Anonymous file access
    • circle.jpg C. Unencrypted authentication
    • circle.jpg D. Improper formatted requests

    Quick Answer: 181

    Detailed Answer: 208

  17. FTP over SSL communicates over which of the following ports?

    • circle.jpg A. 21
    • circle.jpg B. 80
    • circle.jpg C. 22
    • circle.jpg D. 81

    Quick Answer: 181

    Detailed Answer: 208

  18. Which of the following are security concerns when allowing IM applications on the network? (Select all correct answers.)

    • circle.jpg A. The capture of cached logs containing conversations
    • circle.jpg B. Malware spreading through IM contacts
    • circle.jpg C. Unauthorized data and video sharing
    • circle.jpg D. Improper formatted requests

    Quick Answer: 181

    Detailed Answer: 209

  19. Which of the following are exploits for CGI scripts? (Select all correct answers.)

    • circle.jpg A. Buffer overflows.
    • circle.jpg B. Anonymous file access.
    • circle.jpg C. Arbitrary commands may be executed on the server.
    • circle.jpg D. Arbitrary commands may be executed on the client.

    Quick Answer: 182

    Detailed Answer: 209

  20. An attacker places code within a web page that redirects the client’s browser to attack yet another site when a client’s browser opens the web page. This is an example of what type of attack?

    • circle.jpg A. Unencrypted authentication
    • circle.jpg B. Session hijacking
    • circle.jpg C. Buffer overflow
    • circle.jpg D. Cross-site scripting

    Quick Answer: 182

    Detailed Answer: 209

  21. Which of the following best describes Java or JavaScript?

    • circle.jpg A. Java applets allow access to cache information.
    • circle.jpg B. JavaScript can provide access to files of known name.
    • circle.jpg C. JavaScript runs even after the applet is closed.
    • circle.jpg D. Java applets can execute arbitrary instructions on the server.

    Quick Answer: 182

    Detailed Answer: 210

  22. Which of the following is another name for identification of configuration details of the server that may be helpful to later identify unauthorized access attempts?

    • circle.jpg A. Profiling
    • circle.jpg B. Reporting
    • circle.jpg C. Abstracting
    • circle.jpg D. Hyperlinking

    Quick Answer: 182

    Detailed Answer: 210

  23. Which of the following is the most likely reason it is dangerous to maintain cookie session information?

    • circle.jpg A. It provides custom user configuration settings.
    • circle.jpg B. It may expose sensitive information about secured sites.
    • circle.jpg C. It allows multiple actual connections to a web server.
    • circle.jpg D. It may allow automatic code execution on client browsers.

    Quick Answer: 182

    Detailed Answer: 210

  24. Which of the following are browser-based vulnerabilities? (Select all correct answers.)

    • circle.jpg A. Session hijacking
    • circle.jpg B. SQL injection
    • circle.jpg C. Buffer overflows
    • circle.jpg D. Social engineering

    Quick Answer: 182

    Detailed Answer: 210

  25. Which of the following is of most concern for a security administrator when allowing peer-to-peer networking?

    • circle.jpg A. Buffer-overflow attacks can go unnoticed.
    • circle.jpg B. Unauthorized file upload to network servers.
    • circle.jpg C. Connections are negotiated directly between clients.
    • circle.jpg D. Arbitrary commands may be executed on the server.

    Quick Answer: 182

    Detailed Answer: 210

Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques.

  1. Physically unsecured equipment is vulnerable to which of the following type of attacks?

    • circle.jpg A. Brute force
    • circle.jpg B. Social engineering
    • circle.jpg C. Malware
    • circle.jpg D. Rootkits

    Quick Answer: 182

    Detailed Answer: 210

  2. Which of the following is the primary goal of a physical security plan?

    • circle.jpg A. To deny access to most users allowing only corporate officers
    • circle.jpg B. To allow access to all visitors without causing undue duress
    • circle.jpg C. To allow only trusted use of resources via positive identification
    • circle.jpg D. To deny access to all except users deemed credible

    Quick Answer: 182

    Detailed Answer: 211

  3. Which of the following may be used to prevent an intruder from monitoring users in very high-security areas? (Select all correct answers.)

    • circle.jpg A. Picket fencing
    • circle.jpg B. Painted glass
    • circle.jpg C. Frosted glass
    • circle.jpg D. Chain-link fencing

    Quick Answer: 182

    Detailed Answer: 211

  4. Which of the best describes the physical area known as no-man’s land?

    • circle.jpg A. An area of cleared land surrounding a building
    • circle.jpg B. An area of bushes surrounding a building
    • circle.jpg C. A holding area between two entry points
    • circle.jpg D. A receiver mechanism that reads an access card

    Quick Answer: 182

    Detailed Answer: 211

  5. Which of the following best describes a mantrap?

    • circle.jpg A. An area of cleared land surrounding a building
    • circle.jpg B. An area of bushes surrounding a building
    • circle.jpg C. A holding area between two entry points
    • circle.jpg D. A receiver mechanism that reads an access card

    Quick Answer: 182

    Detailed Answer: 211

  6. Which of the following best describes the difference between a cipher lock and a wireless lock?

    • circle.jpg A. A cipher lock is opened by a receiver mechanism, whereas a wireless lock has a punch code entry.
    • circle.jpg B. A cipher lock is opened with a key, whereas a wireless lock has a remote control mechanism.
    • circle.jpg C. A cipher lock is opened with a remote control mechanism, whereas a wireless lock is opened with a key.
    • circle.jpg D. A cipher lock has a punch code entry, whereas a wireless lock is opened by a receiver mechanism.

    Quick Answer: 182

    Detailed Answer: 211

  7. Which of the following type of surveillance would the organization implement if it was required that the parking lot be constantly monitored?

    • circle.jpg A. CCTV cameras
    • circle.jpg B. Security guards
    • circle.jpg C. Keycard gate
    • circle.jpg D. Motion detectors

    Quick Answer: 182

    Detailed Answer: 211

  8. Which of the following technologies are used in external motion detectors? (Select all correct answers.)

    • circle.jpg A. Infrared
    • circle.jpg B. Sound
    • circle.jpg C. RFID
    • circle.jpg D. Ultrasonic

    Quick Answer: 182

    Detailed Answer: 211

  9. Which of the following best describes mandatory physical control?

    • circle.jpg A. User access is closely monitored and very restricted with no exceptions.
    • circle.jpg B. Common needs are predetermined, and access is allowed with the same key.
    • circle.jpg C. Access is delegated to parties responsible for that building or room.
    • circle.jpg D. Each individual has a unique key that corresponds to his or her access needs.

    Quick Answer: 182

    Detailed Answer: 211

  10. Which of the following best describes role-based physical control?

    • circle.jpg A. User access is closely monitored and very restricted with no exceptions.
    • circle.jpg B. Common needs are predetermined and access is allowed with the same key.
    • circle.jpg C. Access is delegated to parties responsible for that building or room.
    • circle.jpg D. Each individual has a unique key that corresponds to his or her access need.

    Quick Answer: 182

    Detailed Answer: 212

  11. Which of the following physical safeguards would provide the best protection for a building that houses top-secret sensitive information and systems? (Choose all that apply.)

    • circle.jpg A. Mantrap
    • circle.jpg B. No-man’s land
    • circle.jpg C. Wooden fence
    • circle.jpg D. Door access system

    Quick Answer: 182

    Detailed Answer: 212

  12. Which of the following physical safeguards would be most commonly implemented in security for banks?

    • circle.jpg A. Mantraps
    • circle.jpg B. Security dogs
    • circle.jpg C. Painted glass
    • circle.jpg D. Video surveillance

    Quick Answer: 182

    Detailed Answer: 212

  13. Which of the following is the main security concern of implementing motion detectors?

    • circle.jpg A. They can easily be deactivated.
    • circle.jpg B. They can easily be fooled.
    • circle.jpg C. They are extremely sensitive.
    • circle.jpg D. They are extremely expensive.

    Quick Answer: 182

    Detailed Answer: 212

  14. Running which of the following commands is the quickest way to tell which ports are open and which services are running on the machine?

    • circle.jpg A. netstat
    • circle.jpg B. nbtstat
    • circle.jpg C. ipconfig
    • circle.jpg D. msconfig

    Quick Answer: 182

    Detailed Answer: 212

  15. Which of the following protocols is used for monitoring the health of network equipment, computer equipment, and devices?

    • circle.jpg A. SNAP
    • circle.jpg B. SMTP
    • circle.jpg C. SDLC
    • circle.jpg D. SNMP

    Quick Answer: 182

    Detailed Answer: 212

  16. Which of the following are effective ways to protect the network infrastructure from attacks aimed at antiquated or unused ports and protocols? (Select all correct answers.)

    • circle.jpg A. Keeping only protocols installed by default
    • circle.jpg B. Allowing traffic only on necessary ports
    • circle.jpg C. Removing any unnecessary protocols
    • circle.jpg D. Allowing only traffic requested by users

    Quick Answer: 182

    Detailed Answer: 212

  17. Which of the following would be considered a best practice for improved server performance when deciding where to store log files?

    • circle.jpg A. Store in the system directory of a machine in the DMZ
    • circle.jpg B. Store in the system directory on the local machine
    • circle.jpg C. Store on a nonsystem striped or mirrored disk volume
    • circle.jpg D. Store on a nonsystem disk volume on the local machine

    Quick Answer: 182

    Detailed Answer: 213

  18. Which of the following would be considered a best security practice when deciding where to store log files?

    • circle.jpg A. Stored in the system directory on the local machine
    • circle.jpg B. Stored in a data directory on a server in the intranet
    • circle.jpg C. Stored in the system directory of a machine in the DMZ
    • circle.jpg D. Stored in a centralized repository of an offline volume

    Quick Answer: 182

    Detailed Answer: 213

  19. An organization requires the implementation of an enterprise application logging strategy. Which of the following would be a critical analysis consideration when choosing a solution?

    • circle.jpg A. A proprietary custom-built solution
    • circle.jpg B. Already built-in application logging solutions
    • circle.jpg C. A solution that uses standard protocols and formats
    • circle.jpg D. A variety of solutions that each use different formats

    Quick Answer: 182

    Detailed Answer: 213

  20. Internet Information Services (IIS) logs can be used for which of the following purposes? (Select all correct answers.)

    • circle.jpg A. Assess content
    • circle.jpg B. Identify bottlenecks
    • circle.jpg C. End processes
    • circle.jpg D. Investigate attacks

    Quick Answer: 182

    Detailed Answer: 213

  21. Which of the following most accurately describes best practice for using Microsoft DNS logging?

    • circle.jpg A. Only the user events should be logged.
    • circle.jpg B. Only pertinent events should be logged.
    • circle.jpg C. All events should be logged so nothing is missed.
    • circle.jpg D. Nothing should be logged until there is a need for it.

    Quick Answer: 182

    Detailed Answer: 213

  22. Which of the following would be the first place an administrator would look when troubleshooting UNIX- or Linux-based systems?

    • circle.jpg A. Mtools.conf
    • circle.jpg B. Msconfig
    • circle.jpg C. Event Viewer
    • circle.jpg D. Syslogd

    Quick Answer: 182

    Detailed Answer: 213

  23. Which of the following would be considered best practices for system logging? (Select all correct answers.)

    • circle.jpg A. For easy compilation, keep log files in plain text.
    • circle.jpg B. When permissible, encrypt the log files.
    • circle.jpg C. Store log files on a standalone system.
    • circle.jpg D. Store log files on individual system data partitions.

    Quick Answer: 182

    Detailed Answer: 213

  24. Which of the following would an administrator use to end applications that get hung up without having to reboot the machine?

    • circle.jpg A. Network Monitor
    • circle.jpg B. Task Manager
    • circle.jpg C. Event Viewer
    • circle.jpg D. Performance Console

    Quick Answer: 182

    Detailed Answer: 213

  25. Which of the following would provide information for troubleshooting remote-access policy issues?

    • circle.jpg A. Internet Information Services logging
    • circle.jpg B. Critical and error-level logging
    • circle.jpg C. Authentication and accounting logging
    • circle.jpg D. Event Viewer Application logging

    Quick Answer: 182

    Detailed Answer: 214

  26. Which of the following types of logging events are most commonly found in antivirus software? (Select all correct answers.)

    • circle.jpg A. Updates
    • circle.jpg B. Dropped packets
    • circle.jpg C. Quarantined viruses
    • circle.jpg D. Update history

    Quick Answer: 182

    Detailed Answer: 214

  27. An organization primarily contracts workers and is concerned about remote-access usage and remote-authentication attempts. Which of the following would the organization implement to track this type of activity?

    • circle.jpg A. Firewall logging
    • circle.jpg B. RRAS logging
    • circle.jpg C. IIS logging
    • circle.jpg D. System logging

    Quick Answer: 182

    Detailed Answer: 214

  28. Which of the following best describes auditing?

    • circle.jpg A. The process of measuring the performance of a network
    • circle.jpg B. The process of collecting data to be used for monitoring
    • circle.jpg C. The process of tracking users and actions on the network
    • circle.jpg D. The process of observing the state of a system

    Quick Answer: 182

    Detailed Answer: 214

  29. Which of the following are unintended consequences when auditing is not clear-cut or built around the organizational goals and policies? (Select all correct answers.)

    • circle.jpg A. Irrelevant information is gathered.
    • circle.jpg B. Important security events are deleted.
    • circle.jpg C. User hard drives quickly run out of space.
    • circle.jpg D. System administrators have reduced workloads.

    Quick Answer: 182

    Detailed Answer: 214

  30. A systems administrator is tasked with auditing user privileges. Which of the following steps must be taken? (Select two correct answers.)

    • circle.jpg A. Enable logging within the operating system.
    • circle.jpg B. Enable auditing within the operating system.
    • circle.jpg C. Specify the resources to be audited.
    • circle.jpg D. Specify the audit file storage directory.

    Quick Answer: 182

    Detailed Answer: 214

  31. An organization has primarily contract workers and is concerned about unauthorized and unintentional access on these accounts. Which of the following would the organization audit to track this type of activity?

    • circle.jpg A. Group policies
    • circle.jpg B. Retention policies
    • circle.jpg C. DHCP events and changes
    • circle.jpg D. Access use and rights changes

    Quick Answer: 182

    Detailed Answer: 214

  32. Which of the following is true about the auditing of failed logon events and successful login events?

    • circle.jpg A. Only failed events should be audited.
    • circle.jpg B. Only successful events should be audited.
    • circle.jpg C. Both successful and failed events should be audited.
    • circle.jpg D. Neither one should be audited unless absolutely necessary.

    Quick Answer: 182

    Detailed Answer: 214

  33. Which of the following best describes the activity that involves collecting information used for monitoring and reviewing purposes?

    • circle.jpg A. Auditing
    • circle.jpg B. Logging
    • circle.jpg C. Baselining
    • circle.jpg D. Inspecting

    Quick Answer: 182

    Detailed Answer: 215

  34. Which of the following best describes the unintended consequence of turning on all auditing counters for all objects?

    • circle.jpg A. Reduced user productivity
    • circle.jpg B. Reduced I/O activity on user machines
    • circle.jpg C. Reduced administrative overhead
    • circle.jpg D. Reduced server performance

    Quick Answer: 182

    Detailed Answer: 215

  35. Which of the following best describes how settings will actually be applied to an object in a group policy?

    • circle.jpg A. Individually applied to the object and only from the last policy
    • circle.jpg B. A combination of all the settings that can affect the object
    • circle.jpg C. Only from settings within the domain where the object is located
    • circle.jpg D. A combination of only local group policies that affect the object

    Quick Answer: 182

    Detailed Answer: 215

  36. An administrator is attempting to resolve some issue with multiple group policies on several computers. Which of the following tools would be used to script GPO troubleshooting of multiple computers?

    • circle.jpg A. Gpupdate
    • circle.jpg B. Gpresult
    • circle.jpg C. Resultant Set of Policy
    • circle.jpg D. Group Policy object

    Quick Answer: 182

    Detailed Answer: 215

  37. Which of the following tools is used to review the effects of Group Policy settings on a particular computer?

    • circle.jpg A. Resultant Set of Policy
    • circle.jpg B. Group Policy object
    • circle.jpg C. Gpupdate
    • circle.jpg D. Local Security settings

    Quick Answer: 182

    Detailed Answer: 215

  38. An organization is concerned with unusual activity indicating that an intruder is attempting to gain access to the network. Which of the following event categories should be audited?

    • circle.jpg A. Audit success events in the account management
    • circle.jpg B. Success events in the policy change on domain controllers
    • circle.jpg C. Success and failure events in the system events
    • circle.jpg D. Audit success events in the logon event category

    Quick Answer: 182

    Detailed Answer: 215

  39. An organization wants a record of when each user logs on to or logs off from any computer. Which of the following event categories should be audited?

    • circle.jpg A. Audit success events in the account management event
    • circle.jpg B. Success events in the policy change on domain controllers
    • circle.jpg C. Success and failure events in the system events
    • circle.jpg D. Audit success events in the logon event category

    Quick Answer: 182

    Detailed Answer: 215

  40. An organization wants to verify when users log on to or log off from the domain. Which of the following event categories should be audited?
    • circle.jpg A. Audit success events in the account management event
    • circle.jpg B. Success events in the policy change on domain controllers
    • circle.jpg C. Success events in the account logon on domain controllers
    • circle.jpg D. Audit success events in the logon event category

    Quick Answer: 182

    Detailed Answer: 216

Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities.

  1. Which of the following is a software utility that will scan a single machine or a range of IP addresses checking for a response on service connections?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 216

  2. Which of the following is a software utility that will scan a range of IP addresses testing for the presence of known weaknesses in software configuration and accessible services?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 216

  3. Which of the following is a software utility that is used on a hub, a switch supervisory port, or in line with network connectivity to allow the analysis of network communications?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 216

  4. Which of the following is a software utility that is used to conduct network assessments over a range of IP addresses and compiles a listing of all systems, devices, and hardware present within a network segment?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 217

  5. Which of the following best describes the purpose of OVAL?

    • circle.jpg A. An abstract description for layered communications and computer network protocol design
    • circle.jpg B. A family of standards dealing with local area networks and metropolitan area networks
    • circle.jpg C. An international standard setting body composed of representatives from various national standards organizations
    • circle.jpg D. An international language for representing vulnerability information allowing the development of vulnerability test tools

    Quick Answer: 182

    Detailed Answer: 217

  6. An administrator working in the Department of Homeland Security needs to document standards for the assessment process of systems. Which of the following would be most useful to the administrator?

    • circle.jpg A. OVAL
    • circle.jpg B. IEEE
    • circle.jpg C. ISO
    • circle.jpg D. ISSA

    Quick Answer: 182

    Detailed Answer: 217

  7. An organization wants to select an assessment tool for creating an inventory of services hosted on networked systems. Which of the following should the organization choose?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 217

  8. An organization wants to select an assessment tool that will examine individual protocols and specific endpoints. Which of the following should the organization choose?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 217

  9. An organization wants to select an assessment tool for checking particular versions and patch levels of a service. Which of the following should the organization choose?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 218

  10. Which of the following assessment techniques are typically conducted using automated software programs designed to check code, as well as manual human checks, by someone not associated with development?

    • circle.jpg A. Architecture reviews
    • circle.jpg B. Code reviews
    • circle.jpg C. Design reviews
    • circle.jpg D. Attack Surface determination

    Quick Answer: 182

    Detailed Answer: 218

  11. Which of the following refers to the amount of running code, services, and user-interaction fields and interfaces?

    • circle.jpg A. Architecture reviews
    • circle.jpg B. Code reviews
    • circle.jpg C. Design reviews
    • circle.jpg D. Attack Surface determination

    Quick Answer: 182

    Detailed Answer: 218

  12. Which of the following assessment techniques typically provides the capability to identify faulty components and interaction between various elements?

    • circle.jpg A. Architecture reviews
    • circle.jpg B. Code reviews
    • circle.jpg C. Design reviews
    • circle.jpg D. Attack Surface determination

    Quick Answer: 182

    Detailed Answer: 218

  13. When using a password cracker to test mandatory complexity guidelines, which of the following should the password cracker provide?

    • circle.jpg A. The password only
    • circle.jpg B. The password and hash value
    • circle.jpg C. The username and password
    • circle.jpg D. The strength of the password

    Quick Answer: 182

    Detailed Answer: 219

  14. An organization wants to select an assessment tool that will report information used to identify single points of failure. Which of the following should the organization choose?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 219

  15. Which of the following tools is often referred to as a packet sniffer?
    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 182

    Detailed Answer: 219

Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.

  1. Which of the following is best described as a friendly attack against a network to test the security measures put into place?

    • circle.jpg A. Vulnerability assessment
    • circle.jpg B. Penetration test
    • circle.jpg C. Security assessment
    • circle.jpg D. Compliance test

    Quick Answer: 183

    Detailed Answer: 219

  2. Which of the following are the most serious downsides to conducting a penetration test? (Select all correct answers.)

    • circle.jpg A. They can cause some disruption to network operations.
    • circle.jpg B. The help desk can be flooded by affected users.
    • circle.jpg C. They can generate false data in IDS systems.
    • circle.jpg D. External users can have difficulty accessing resources.

    Quick Answer: 183

    Detailed Answer: 220

  3. Which of the following is true about inexperienced internal systems administrators performing penetration tests against the organizational network? (Select all correct answers.)

    • circle.jpg A. It is a safe practice.
    • circle.jpg B. It is a bad practice.
    • circle.jpg C. It may be a violation of privacy laws.
    • circle.jpg D. It does not violate any privacy laws.

    Quick Answer: 183

    Detailed Answer: 220

  4. Which of the following is true about the relationship between vulnerability assessment and penetration testing?

    • circle.jpg A. They are inversely related.
    • circle.jpg B. They are contradictory.
    • circle.jpg C. They are separate functions.
    • circle.jpg D. They are complementary.

    Quick Answer: 183

    Detailed Answer: 220

  5. Which of the following is the main security risk of penetration testing?

    • circle.jpg A. It can conceal aggression that is unrelated to the test.
    • circle.jpg B. It can affect user connectivity and resource access.
    • circle.jpg C. It can disrupt the normal business environment.
    • circle.jpg D. It can weaken the network’s security level.

    Quick Answer: 183

    Detailed Answer: 220

  6. Which of the following is conducted with the assessor having no information or knowledge about the inner workings of the system or knowledge of the source code?

    • circle.jpg A. Black box
    • circle.jpg B. White box
    • circle.jpg C. Gray box
    • circle.jpg D. Green box

    Quick Answer: 183

    Detailed Answer: 220

  7. In which of the following types of testing would a developer test if programming constructs are placed correctly and carry out the required actions?

    • circle.jpg A. Black box
    • circle.jpg B. White box
    • circle.jpg C. Gray box
    • circle.jpg D. Green box

    Quick Answer: 183

    Detailed Answer: 220

  8. An organization wants to select an assessment tool that will create graphical details suitable for reporting on network configurations. Which of the following should the organization choose?

    • circle.jpg A. Port scanner
    • circle.jpg B. Network mapper
    • circle.jpg C. Protocol analyzer
    • circle.jpg D. Vulnerability scanner

    Quick Answer: 183

    Detailed Answer: 221

  9. An organization wants to select an assessment tool that will directly test user logon password strength. Which of the following should the organization choose?

    • circle.jpg A. Password Locker
    • circle.jpg B. Password generator
    • circle.jpg C. Password cracker
    • circle.jpg D. Password keychain

    Quick Answer: 183

    Detailed Answer: 221

  10. Which of the following best describes the difference between a port scanner and a vulnerability scanner?
    • circle.jpg A. Port scanners test only for the availability of services; vulnerability scanners check for a particular version or patch level of a service.
    • circle.jpg B. Port scanners compile a listing of all hardware present within a network segment; vulnerability scanners check for the availability of services.
    • circle.jpg C. Vulnerability scanners test only for the availability of services; port scanners check for a particular version or patch level of a service.
    • circle.jpg D. Vulnerability scanners compile a listing of all hardware present within a network segment; port scanners test for the availability of services.

    Quick Answer: 183

    Detailed Answer: 221

  • + Share This
  • 🔖 Save To Your Account