1.
Which term refers to a phone system supporting TDM and IP voice services?
Correct Answer
A. Hybrid PBX
Explanation
A Hybrid PBX refers to a phone system that supports both Time Division Multiplexing (TDM) and IP voice services. This means that it can handle traditional analog or digital phone lines as well as voice over IP (VoIP) calls. The term "Hybrid" indicates the combination of these two technologies, allowing for flexibility and compatibility with different types of phone services.
2.
What company sells the Firebox XTM security appliance?
Correct Answer
B. WatchGuard
Explanation
WatchGuard is the correct answer because they are known for selling the Firebox XTM security appliance. WatchGuard is a well-known company in the cybersecurity industry and their Firebox XTM is a popular security appliance that offers advanced threat protection, network firewall, VPN connectivity, and other security features.
3.
What type of network assault is a "SYN Flood Attack"?
Correct Answer
D. Denial Of Service
Explanation
A "SYN Flood Attack" is a type of network assault that falls under the category of Denial of Service (DoS) attacks. In this attack, the attacker floods the target system with a large number of SYN requests, overwhelming the system's resources and preventing it from responding to legitimate requests. This results in a denial of service for legitimate users trying to access the system or network.
4.
OFDM, used in 802.11 networking, refers to what type of multiplexing?
Correct Answer
B. Orthogonal Frequency Division
Explanation
OFDM, used in 802.11 networking, refers to Orthogonal Frequency Division multiplexing. This is a technique that allows multiple signals to be transmitted simultaneously over a single channel by dividing the available frequency spectrum into multiple subcarriers. Each subcarrier is orthogonal to the others, meaning they do not interfere with each other. This allows for efficient and reliable transmission of data, even in environments with high levels of interference.
5.
What trade show planned to greatly expand its iPhone and iPod exhibit space in 2010?
Correct Answer
D. CES
Explanation
CES, also known as the Consumer Electronics Show, is a trade show that is known for showcasing the latest innovations and advancements in consumer electronics. In 2010, CES planned to greatly expand its iPhone and iPod exhibit space, indicating that it was focusing on showcasing Apple's popular devices. This expansion suggests that CES recognized the growing importance and popularity of the iPhone and iPod and wanted to provide a larger platform for companies to showcase their products related to these devices.
6.
What cryptographic technique is abbreviated "ECC"?
Correct Answer
B. Elliptic Curve Cryptosystem
Explanation
The correct answer is Elliptic Curve Cryptosystem. ECC is an abbreviation for Elliptic Curve Cryptosystem, which is a type of public key cryptography that is based on the mathematics of elliptic curves. It is widely used in modern cryptographic systems due to its efficiency and strong security properties. ECC is used in various applications such as secure communications, digital signatures, and encryption.
7.
In 2008, researchers from what company produced functioning memory transistors?
Correct Answer
C. HP
Explanation
In 2008, researchers from HP (Hewlett-Packard) produced functioning memory transistors.
8.
What type of attack attempts to execute arbitrary code by causing a buffer overflow?
Correct Answer
C. Stack Mashing
Explanation
Stack Mashing is the correct answer because it refers to a type of attack that attempts to execute arbitrary code by overflowing a buffer in the stack of a program. This occurs when more data is written into a buffer than it can handle, causing the excess data to overwrite adjacent memory locations. By carefully crafting the overflow, an attacker can manipulate the program's execution and inject malicious code, potentially gaining unauthorized access or causing the program to crash.
9.
What former NSA staffer won $10,000 at a 2008 hacker conference by cracking a MacBook Air?
Correct Answer
A. Charlie Miller
Explanation
Charlie Miller is the correct answer because he is a former NSA staffer who won $10,000 at a 2008 hacker conference by successfully cracking a MacBook Air.
10.
Which RFC documents the standard for SIP used in VoIP and Unified Communication?
Correct Answer
D. 3261
Explanation
RFC 3261 documents the standard for Session Initiation Protocol (SIP) used in VoIP and Unified Communication. This RFC defines the protocol's message format, call setup, termination, and other functionalities. It is crucial for implementing SIP-based communication systems and ensuring interoperability between different devices and services.
11.
When referring to a person responsible for enforcing security, what does SSO stand for?
Correct Answer
A. System Security Officer
Explanation
SSO stands for System Security Officer. This term refers to a person responsible for enforcing security measures within a system. They are in charge of ensuring the protection of sensitive information, implementing security protocols, and monitoring the system for any potential threats or breaches. The System Security Officer plays a crucial role in maintaining the overall security and integrity of the system.
12.
Cisco adds what to a router to make it act more like a stateful firewall?
Correct Answer
D. Reflexive ACLs
Explanation
Reflexive ACLs are added to a router to make it act more like a stateful firewall. Reflexive ACLs monitor the outgoing traffic from the internal network and dynamically create temporary access control entries to allow the corresponding incoming traffic. This allows the router to keep track of the state of each connection and apply the appropriate security policies. By using reflexive ACLs, the router can effectively control and secure the network traffic, providing similar functionality to a stateful firewall.
13.
Which VoIP protocol consists of a "Call Agent" and a set of gateways?
Correct Answer
A. Media Gateway Control
Explanation
Media Gateway Control (MGC) is the correct answer because it is a VoIP protocol that consists of a "Call Agent" and a set of gateways. The Call Agent is responsible for controlling and managing the gateways, which are responsible for converting voice signals between the traditional telephone network and IP networks. MGC enables the establishment, control, and termination of VoIP calls, making it an essential component in VoIP communication systems.
14.
What term refers to a hardened box outside a firewall to provide public Internet services?
Correct Answer
B. Bastion Host
Explanation
A bastion host is a hardened box outside a firewall that provides public Internet services. It acts as a gateway between the internal network and the public network, allowing specific services to be exposed to the internet while protecting the internal network from unauthorized access. This term is commonly used in network security to refer to a highly secured and monitored server that is designed to withstand attacks and provide a secure entry point for external access to a network.
15.
What proposed standard is used to automate VPN key management?
Correct Answer
D. Internet Key Exchange
Explanation
Internet Key Exchange (IKE) is a proposed standard that is used to automate VPN key management. IKE is a protocol that allows two parties to authenticate each other and establish a secure communication channel by automatically negotiating and exchanging cryptographic keys. It provides a secure and efficient way to establish and maintain VPN connections, ensuring the confidentiality and integrity of data transmitted over the network. The other options, Private Key Hierarchy System, Key Control Standard, and Virus Protection Protocol, are not directly related to VPN key management.