P.S: This is just a study guide. The questions may not appear exactly like this.
Question 2.2. (TCO 1) Which is the correct malware propagation method combination? (Points : 5)
Virus/Worm: Copies itself to shares and vulnerable services
Trojan: Copies itself to shares and vulnerable services
Virus/Worm: Pretends to be a useful program
Trojan: Encrypts the hard drive and demands payment to unencrypt
Question 3.3. (TCO 2) Which type of firewall examines the request to connection to a resource and permits or denies the connection based on the client and server software requested? (Points : 5)
Application gateway
Circuit level gateway
Packet filter
Stateful packet inspection
Question 4.4. (TCO 2) What is the proper connection design for a DMZ? Consider Internet at the beginning of each answer. (Points : 5)
Public resources-Firewall-Internal resources-Firewall
Firewall-Public resources-Firewall-Internal resources
Firewall-Internal resources-Firewall-Public resources
Firewall-Public resources-Internal resources-Firewall
Question 5.5. (TCO 3) Which type of firewall only protects a single computer? (Points : 5)
SonicWall
Symantec Norton firewall
Checkpoint firewall-1
Cisco PIX 515e
Question 6.6. (TCO 3) Which firewall solution would be best for a home business, running Windows OS Professional, with minimal confidential data? (Points : 5)
Client-Proxy-Destination service
Destination service-Client-Proxy
Proxy-Client-Destination Service
Proxy-Destination Service-Client
Question 7.7. (TCO 4) If an intrusion-detection system detects a series of ICMP packets sent to each port, from the same IP address, it might indicate (Points : 5)
distributed denial of service attack in progress.
scanning of the system for vulnerabilities prior to an attack.
the system has been infiltrated by an outsider.
Trojan horse virus infection sending information back home.
Question 8.8. (TCO 4) Where is the proper placement of an IDS system? (Points : 5)
Internet-IDS-firewall
Firewall-Internet-IDS
Internet-firewall-IDS
IDS-Internet-firewall
Question 9.9. (TCO 5) Which of these technologies is a combination of an encryption algorithm and a hash? (Points : 5)
Digital signature
RSA
Conventional encryption
PGP
Question 10.10. (TCO 5) Which of the following statements is a weakness of symmetric encryption? (Points : 5)
Modern math processors can break it quickly.
It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.
Because the key must be transmitted, the scheme is only as secure as your transport method.
Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.
Question 11.11. (TCO 6) Which common VPN technology supports five authentication methods? (Points : 5)
IPSec
L2TP
PPP
PPTP
Question 12.12. (TCO 6) What does L2TP stand for? (Points : 5)
level 2 transfer protocol
layer 2 transfer protocol
layer 2 tunneling protocol
level 2 transfer protocol
Question 13.13. (TCO 7) What is the purpose of spyware? (Points : 5)
To manage popups and prevent nuisance advertising
To monitor a system, gain access to log on information, and allow access to from the outside
To monitor a system, gather information, and send it to a home system
To prevent others from detecting the presence of your computer on the network
Question 14.14. (TCO 7) Which of the following is the most common method by which viruses spread? (Points : 5)
By reading the e-mail address book and mailing itself to everyone listed
By broadcasting ICMP packets and following network connections
By accessing the web application and cloning sent mail
By users downloading and installing unauthorized files from the Web
Question 15.15. (TCO 8) Which of the following is built into Windows to encrypt files? (Points : 5)
EFS
DES
AES
SSL
Question 16.16. (TCO 8) The best account to have in a Linux system is which of the following? (Points : 5)
Admin
Null
Root
Apache
Question 17.17. (TCO 9) Which is an e-mail attachment that would be acceptable to open? (Points : 5)
It is an animation or movie.
It contains active code.
It comes from an unknown source.
It contains an expected spreadsheet.
Question 18.18. (TCO 9) Regarding security, which of the following areas of user activities should be covered in policies? (Points : 5)
Lunch breaks, personal hygiene, printer use
Passwords, e-mail attachments, instant messaging
Internet use, lunch breaks, time tracking
Telecommunications, VOIP, Internet use
Question 19.19. (TCO 10) Which of the Six Ps of an initial assessment requires an onsite inspection? (Points : 5)
Patch
Policies
Physical
Ports
Question 20.20. (TCO 10) Which of the following is one reason to use a packet sniffer? (Points : 5)
Cyber terrorism
Check for attached mass storage devices
Digital forensics of a hard drive
Establishing a baseline of network activity