SEC370 Final Exam MCQs – 20 solved mcqs – Instant Delivery – Perfect Solution

Lab Price = $20
Please feel free to send us your queries at: [email protected]
P.S: This is just a study guide. The questions may not appear exactly like this.
Payment methods

Add to Cart

Buy Now

View Cart

Problem Statement

1. (TCO 1) Which of the following is an application-based attack? (Points : 5)
ICMP flood
SYN flood
SQL injection
Distributed reflection denial of service

Question 2.2. (TCO 1) Which is the correct malware propagation method combination? (Points : 5)
Virus/Worm: Copies itself to shares and vulnerable services
Trojan: Copies itself to shares and vulnerable services
Virus/Worm: Pretends to be a useful program
Trojan: Encrypts the hard drive and demands payment to unencrypt

Question 3.3. (TCO 2) Which type of firewall examines the request to connection to a resource and permits or denies the connection based on the client and server software requested? (Points : 5)
Application gateway
Circuit level gateway
Packet filter
Stateful packet inspection

Question 4.4. (TCO 2) What is the proper connection design for a DMZ? Consider Internet at the beginning of each answer. (Points : 5)
Public resources-Firewall-Internal resources-Firewall
Firewall-Public resources-Firewall-Internal resources
Firewall-Internal resources-Firewall-Public resources
Firewall-Public resources-Internal resources-Firewall

Question 5.5. (TCO 3) Which type of firewall only protects a single computer? (Points : 5)
Symantec Norton firewall
Checkpoint firewall-1
Cisco PIX 515e

Question 6.6. (TCO 3) Which firewall solution would be best for a home business, running Windows OS Professional, with minimal confidential data? (Points : 5)
Client-Proxy-Destination service
Destination service-Client-Proxy
Proxy-Client-Destination Service
Proxy-Destination Service-Client

Question 7.7. (TCO 4) If an intrusion-detection system detects a series of ICMP packets sent to each port, from the same IP address, it might indicate (Points : 5)
distributed denial of service attack in progress.
scanning of the system for vulnerabilities prior to an attack.
the system has been infiltrated by an outsider.
Trojan horse virus infection sending information back home.

Question 8.8. (TCO 4) Where is the proper placement of an IDS system? (Points : 5)

Question 9.9. (TCO 5) Which of these technologies is a combination of an encryption algorithm and a hash? (Points : 5)
Digital signature
Conventional encryption

Question 10.10. (TCO 5) Which of the following statements is a weakness of symmetric encryption? (Points : 5)
Modern math processors can break it quickly.
It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.
Because the key must be transmitted, the scheme is only as secure as your transport method.
Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.

Question 11.11. (TCO 6) Which common VPN technology supports five authentication methods? (Points : 5)

Question 12.12. (TCO 6) What does L2TP stand for? (Points : 5)
level 2 transfer protocol
layer 2 transfer protocol
layer 2 tunneling protocol
level 2 transfer protocol

Question 13.13. (TCO 7) What is the purpose of spyware? (Points : 5)
To manage popups and prevent nuisance advertising
To monitor a system, gain access to log on information, and allow access to from the outside
To monitor a system, gather information, and send it to a home system
To prevent others from detecting the presence of your computer on the network

Question 14.14. (TCO 7) Which of the following is the most common method by which viruses spread? (Points : 5)
By reading the e-mail address book and mailing itself to everyone listed
By broadcasting ICMP packets and following network connections
By accessing the web application and cloning sent mail
By users downloading and installing unauthorized files from the Web

Question 15.15. (TCO 8) Which of the following is built into Windows to encrypt files? (Points : 5)

Question 16.16. (TCO 8) The best account to have in a Linux system is which of the following? (Points : 5)

Question 17.17. (TCO 9) Which is an e-mail attachment that would be acceptable to open? (Points : 5)
It is an animation or movie.
It contains active code.
It comes from an unknown source.
It contains an expected spreadsheet.

Question 18.18. (TCO 9) Regarding security, which of the following areas of user activities should be covered in policies? (Points : 5)
Lunch breaks, personal hygiene, printer use
Passwords, e-mail attachments, instant messaging
Internet use, lunch breaks, time tracking
Telecommunications, VOIP, Internet use

Question 19.19. (TCO 10) Which of the Six Ps of an initial assessment requires an onsite inspection? (Points : 5)

Question 20.20. (TCO 10) Which of the following is one reason to use a packet sniffer? (Points : 5)
Cyber terrorism
Check for attached mass storage devices
Digital forensics of a hard drive
Establishing a baseline of network activity

Relevant Material
* If you want to purchase multiple products then click on “Buy Now” button which will give you ADD TO CART option.Please note that the payment is done through PayPal.
* You can also use 2CO option if you want to purchase through Credit Cards/Paypal but make sure you put the correct billing information otherwise you wont be able to receive any download link.
* Your paypal has to be pre-loaded in order to complete the purchase or otherwise please discuss it with us at [email protected].
* As soon as the payment is received, download link of the solution will automatically be sent to the address used in selected payment method.
* Please check your junk mails as the download link email might go there and please be patient for the download link email. Sometimes, due to server congestion, you may receive download link with a delay.
* All the contents are compressed in one zip folder.
* In case if you get stuck at any point during the payment process, please immediately contact us at [email protected] and we will fix it with you.
* We try our best to reach back to you on immediate basis. However, please wait for atleast 8 hours for a response from our side. Afterall, we are humans.
* Comments/Feedbacks are truely welcomed and there might be some incentives for you for the next lab/quiz/assignment.
* In case of any query, please donot hesitate to contact us at [email protected].
* MOST IMPORTANT Please use the tutorials as a guide and they need NOT to be used for any submission. Just take help from the material.
******************************************** Good Luck ***************************************************
Privacy Policy
We take your privacy seriously and will take all measures to protect your personal information.
Any personal information received will only be used to fill your order. We will not sell or redistribute your information to anyone.
Refund Policy
Incase you face any issues with the tutorial, please free to contact us on [email protected]
We will try our best to resolve the issue and if still persists we can discuss for a refund in case its required.
Lab Price = $20
Please feel free to send us your queries at: [email protected]

Payment methods

Add to Cart

Buy Now

View Cart

Leave a Reply