1.
You have created a folder on your server that will be holding confidential data. You wish to assign privilege access to the same. You will be choosing which of the following control systems?
Correct Answer
B. Discretionary Access Control
Explanation
System administrator is responsible for access control in the MAC model. The owner of the organization will be responsible for DAC. The RBAC is dependent on the role played by the user in the organization.
2.
While assigning access privilege using the RBAC model, which of the following will you be needing?
Correct Answer
A. Responsibilities attached to the role played by the user
Explanation
The mandatory information required while assigning privilege access in the RBAC model would be the responsibilities attached to the role in the organization that the user has assumed.
3.
Which of the following statements about password encryption is true? Choose all that apply.
Correct Answer(s)
B. CHAP allows maximum security
C. PAP is a two-way handshake
D. CHAP is a three-way handshake.
Explanation
Password encryption allows for security during authentication. PAP is a two-way handshake that is least secure. CHAP is a three-way handshake that is most secure.
4.
Certificates can be assigned to which of the following? Choose all that apply
Correct Answer(s)
A. User
B. Computer
C. Web site
Explanation
User, Computer as well as Websites need to be certified as �secure� by a third party at times depending on the scenario. Hence assigning certificates to any of these objects can improve the credibility of that individual object.
5.
Which of the following about the Kerberos system is true? Choose all that apply.
Correct Answer(s)
B. Kerberos uses a ticket to attach credentials to users.
D. Kerberos is ideally meant for LAN
Explanation
Kerberos is ideally meant for LAN security. It uses tickets to assign credentials to users who need to be authenticated to the LAN and then need to use the network resources.
6.
Which of the following is true about the Certificates? Choose all that apply.
Correct Answer(s)
B. A Certificate enhances the credibility of the end object to which it has been assigned.
D. A Certificate requires a Certification authority to be generated.
E. A Certificate is used for secure authentication.
Explanation
A Certificate is ideally used for secure authentication. Whenever a Certificate has been assigned to a User, Computer or a Web site, it enhances the credibility for that individual object of reference and makes it easy for the other communicating end to trust this user, computer or web site. A Certificate need not be assigned only by a third party. You may configure a Certificate Server in your network that is capable of generating Certificates. But a third party verification is always better trusted as it is unbiased.
7.
Which of the following can be enabled to issue certificates in a network that requires Certificates for security? Choose two.
Correct Answer(s)
A. Certificate Server
D. Third party Certificate Server
Explanation
The Certificate Server component that is hosting the Certificate service is responsible for generating certificates. This Certificate Server can be local to the network or can be a third party Certification authority.
8.
If you wanted to provide a user limited access to network, which of the following authentication methods would you use? Choose the best answer.
Correct Answer
C. Certificate
Explanation
Smart Card and token are not the correct choices here. Username/Password could have been considered if the option also carried the term �with limited permissions�, but since that is not he case the ideal choice here would be the Certificate. Certificates allow the user to roam the network but with limited access.
9.
MS-CHAP is abbreviation for Most Secure � Challenge Handshake Authentication Protocol. T/F?
Correct Answer
B. False
Explanation
MS-CHAP is abbreviation for Microsoft Challenge Handshake Authentication Protocol.
10.
If you were implementing a network that required users to be assigned certificates for authentication, which of the following services would be most important?
Correct Answer
A. Certificate Service
Explanation
Certificate service will be responsible for generating and maintaining certificates.
11.
Which of the following services is capable of hiding internal network IP addresses?
Correct Answer
A. Proxy
Explanation
Proxy, firewall and Router are all capable of Network Address Translation (NAT). NAT helps to hide internal network IP addresses from the external world.
12.
Which of the following can ensure that eavesdropping does not occur on wireless LANs?
Correct Answer
D. Encrypting data as well as passwords.
Explanation
If it is practical and achievable on the network, the best way to implement security on Wireless LAns would be to encrypt passwords as well as data.
13.
Which of the following could give rise to DoS on the destination end of the command?
Correct Answer
B. Ping
Explanation
Putting the ping command on a continuous loop to a given destination IP address can cause that destination end system to hang thus causing the DoS state.
14.
Which of the following would indicate that the Web Server in your organization has been subjected to the DoS attack? Choose the best answer.
Correct Answer
B. The user would not be able to access the Web Server.
Explanation
As the name suggests, the services or the access to resources may be denied. This is not to say that the resources will themselves stop functioning. Any user who is currently logging in may be denied authentication, or users who are already logged in may not have resources available to them. The entire network connected to the Web Server cannot stop functioning as the network is usually hidden behind the firewall and will not be accessible to the outside world.
15.
Super imposing the internal IP address of a network on to your own for the purpose of gaining access to the network is referred to as Eavesdropping. T/F?
Correct Answer
B. False
Explanation
Super imposing the internal IP address of a network on to your own for the purpose of gaining access to the network is referred to as �IP Masquerading� or �Spoofing�.
16.
Which of the following protocol helps to address and IP multicast group?
Correct Answer
B. IGMP
Explanation
IGRP and EIGRP are routing protocols. ICMP is responsible for path determination. IGMP is responsible for maintaining IP multicast group information.
17.
To transfer mails between email servers and client of the same domain you would require POP3 service. T/F?
Correct Answer
A. True
Explanation
POP3 (Post office Protocol) is a mail retrieval protocol that helps the client to retrieve mails from the mail server.
18.
Which of the following protocols is used for connecting UNIX hosts or terminals?
Correct Answer
C. SLIP
Explanation
PPP and SLIP are the only two protocols mentioned. The other two are related to standards and not protocols. SLIP is the protocol used in UNIX networks.
19.
If you required a dedicated service to authenticate remote users on your network, which of the following would you choose?
Correct Answer
D. RADIUS
Explanation
RADIUS (Remote Access Dial In User Service) is meant for authenticating remote users on a network.
20.
Which of the following is true about the RADIUS server?
Correct Answer
B. It can be managed by the central administrator
Explanation
The RADIUS server can be managed by the central administrator or by the administrator who manages the other servers. It need not be configured on the Central server to be centrally manged.
21.
Which of the following port numbers is used by POP3?
Correct Answer
C. 110
Explanation
POP3 uses port number 110.
22.
Which of the following statements about the email client is/are true? Choose only answer(s) that apply.
Correct Answer(s)
A. An email client can retrieve mails only from an email server
B. An email client needs a retrieval protocol as well as an email application
Explanation
An email client application usually has the client component that is configured with a protocol (POP3) for retrieving mails from an email server.
23.
Which of the following is true about cellular communication? Choose three.
Correct Answer(s)
A. It uses radio frequency for main communication.
B. Advanced pHones use Infrared for data transfer.
C. Its reception/transmission range will depend upon the service providers� signal strength
Explanation
Cellular phones mainly communicate on radio frequency. The range of reception and transmission will depend upon the number of towers as well as the signal strength provided by the cellular service provider. Advanced cellular devices have data transfer feature that can be used with PCs or printers that are Infrared enabled.
24.
Which of the following devices may require a modem for WAN communication? Choose two.
Correct Answer(s)
A. PC
B. Routers
Explanation
Connecting a modem to the switch is the same as connecting it to the PC. Switch is a transparent device on the network and is not intelligent enough to independently drive a modem to perform any function. The PC and the router require a modem for dial up or leased line connectivity to the WAN.
25.
Which of the following layers is responsible for assigning the correct standard of signal strength to the communicating devices?
Correct Answer
A. pHysical layer
Explanation
The responsibility of the physical layer is to assign correct standards of physical connection as well as the signal strengths required for operation.
26.
Which of the following devices use Infrared? Choose three.
Correct Answer(s)
A. Small range LAN
B. Remote control devices
C. Advanced cellular devices
Explanation
Small range LAN that can afford placement of devices within line of sight may go in for Infrared communication. Remote control devices such as television or home theater sets do also use Infrared. Advanced cellular devices use Infrared for data transfer between themselves and PCs or Printers.
27.
Routers perform filtering based on which of the following?
Correct Answer
A. Information presented by the Access List.
Explanation
Filtering can be performed only if certain rules for filtering is decided upon. These rules or conditions for filtering are available in the Access List in case of the routers. The routing table or the header information of packets on their own cannot present any information that is required for filtering.
28.
Which of the following is/are the firewall capable of? Choose two.
Correct Answer(s)
A. NAT
B. PAT
Explanation
The firewall is capable of Nat (Network Address Translation) as well as PAT (Port Address Translation).
MAC is an addressing scheme and DAC is Digital to Analog conversion, which the firewall is not capable of.
29.
Which of the following protocols will the Circuit-level filtering firewall relate to? Choose two
Correct Answer(s)
A. UDP
B. TCP
Explanation
Circuit level filtering firewall relates to transport/session layers and will hence relate to TCP and UDP. It can make up for the shortcomings of the ultra-simple UDP protocol, wherein the source address is never validated as a function of the protocol. IP spoofing can be rendered much more difficult.
30.
Packet filtering firewall will operate Application layer of the OSI reference model. T/F?
Correct Answer
B. False
Explanation
Packet filtering firewall operates on the network layer of the OSI reference model.
31.
Which of the following is the correct authority to decide on the firewall design policy?
Correct Answer
A. Administrator
Explanation
Based on the network policy and the access policy the administrator will be required to design an accurate firewall policy. The Government will have no role to play here.
32.
Which of the following firewall policies is least restrictive?
Correct Answer
C. Permit any
Explanation
The �Permit any� is the most restrictive statement that can be defined in the firewall. This statement should not be configured on the top of the list ideally as it will over rule any other restriction that may follow this statement.
33.
When faced with an incoming packet, which of the following header components would a firewall look at first?
Correct Answer
B. Source address
Explanation
The firewall will first look at the source address to verify which network has sent the packet and then see if any firewall restriction is applicable to this packet.
34.
If you have implemented a FTP server in your network and you would wish to secure this service so that no external user will be able perform FTP and obtain secure data, which of the following would you ensure?
Correct Answer
A. Block port numbers 20 and 21 on the external interface for incoming connections
Explanation
Blocking port numbers 20 and 21 on the external interface of the firewall for incoming connections will ensure that no external user will be able to access the FTP service.
35.
If you wish to block the external users from accessing your Mail server you must block port number 110. T/F?
Correct Answer
B. False
Explanation
If you wish to block the external users from accessing your Mail server you must block port number 25.
36.
Which of the following can help with Web Server hardening? Choose all that apply.
Correct Answer(s)
B. Web servers should have most restrictive permissions on resources that need not be accessible to the external user.
C. Verifying that only relevant resources can be accessible through URLs
D. Verify if all services have been updated with latest patches or service packs.
Explanation
To harden the Web server, it is essential that all services running on the server be updated with latest patches as and when required. Resources that should not be accessible to the external user must have the most restrictive permissions. Static files and other resources that are not relevant to external users must not be accessible through URLs.
37.
Which of the following is true about a three-tier model? Choose two.
Correct Answer(s)
A. In this model the Database server is the core component.
C. This is the most secure model for a database server.
Explanation
In a three-tier model, the client is the superficial component, the middle server provides the required security and the database server forms the core component. Since the middle level server receives client requests first and then passes it on to the database server, the database server is not directly exposed to the client and is hence the most secure way of hosting the web server.
38.
To prevent News servers from being accessed you must block TCP port 21. T/F?
Correct Answer
B. False
Explanation
The port number 119 must also be blocked.
39.
Does NTFS provide file system security?
Correct Answer
A. Yes
Explanation
NTFS supports EFS (Encrypted File System) which allows data stored on a mass storage device to be saved in encrypted format.
40.
Which of the following statements about the MDA (Message Digest algorithm) are true? Choose two.
Correct Answer(s)
A. It offers 128-bit hash
C. Its latest version is MD#5
Explanation
MDA is also a hash algorithm that can be used during encryption. It provides 128-bit hash. Its latest version is MD#5.
41.
Which of the following can RSA be used for? Choose two.
Correct Answer(s)
A. Encryption
B. Digital signatures
Explanation
RSA can be used for Encryption and Digital signatures. It is not relevant to certificates and tokens.
42.
Which of the following statements relating to Digital signatures are true? Choose two.
Correct Answer(s)
A. It is ideal security for emails
B. It can be used for Identification establishment.
Explanation
It is ideally meant to establish Identity of the sender and receiver of the information and not to encrypt the information. The most practical implementation of digital signatures would be in emails. It is not any encryption standard.
43.
ECC and diffe-Hellman are both asymmetric using public/private keys. T/F?
Correct Answer
A. True
Explanation
ECC, RSA, Diffie-Hellman, and El Gamal are all asymmetric systems using public/private keys
44.
Which of the following relate to information or message integrity? Choose two.
Correct Answer(s)
A. Prevent information modification during transmission.
B. Verification through check sum algorithms.
Explanation
Message integrity ensures that he message being transmitted is not being modified enroute. To ensure this, a checksum algorithm may be employed at the sending and the receiving end to ensure the message being sent is received in tact.
45.
Which of the following is the function of IETF?
Correct Answer
B. Propose and develop standards relating to computers, networks and Internet
Explanation
IETF (Internet Engineering Task Force) is responsible for proposing and developing standards relating to computers, networks and the Internet.
46.
Which of the following is true about Ciphertext? Choose three.
Correct Answer(s)
A. It is a result of strong cryptograpHy
C. It makes it impossible to retrieve clear text without the help of correct decoding tools.
E. Requires extensive computing capability to decode.
Explanation
Ciphertext is a result of strong cryptography. It is meant to be so complex that it is impossible to decode without appropriate decoding tools in spite of using extensive computing capabilities.
47.
Cipher is a mathematical function used for secure authentication. T/F?
Correct Answer
B. False
Explanation
Cipher is a cryptography algorithm. It is a mathematical function used for the purpose of encryption and decryption.
48.
If �Hi Kid� is being represented as �Kl Nlg�, then which of the following is the correct offset value or key value being used here?
Correct Answer
C. 4
Explanation
H when offset by 4 will be represented as K, I as L, K as N, D as G. Hence key value or offset value being used here is 4.
49.
Which of the following is a disadvantage when using conventional encryption?
Correct Answer
B. Key distribution
Explanation
When using conventional encryption for transmitting data, key distribution between the sending and the receiving end can be a problem.
50.
In Public-key cryptography, one key is used for encryption as well as decryption. T/F?
Correct Answer
B. False
Explanation
In Public-key cryptography, Public key is used for encryption and Private key is used for decryption.