1.
Which access control model allows the owner of a resource to establish
privileges to the information they own and has nonmandatory labels?
Correct Answer
A. DAC
Explanation
The Discretionary Access Control (DAC) model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels. The Mandatory Access Control (MAC) model is a static model that uses a predefined set of access privileges to files on the system. The Role-Based Access Control (RBAC) model allows a user to act in a certain predetermined manner based on the role the user holds in the organization. BAC is not a valid access control model.
2.
Which of the following authentication protocols is the simplest?
Correct Answer
C. PAP
Explanation
Password Authentication Protocol (PAP) offers no true security and is one of the simplest forms of authentication: both the username and the password are sent as clear text and checked for a match. Challenge Handshake Authentication Protocol (CHAP) challenges a system to verify identity and employs an encrypted challenge. Security tokens are forms of certificates that contain rights and access privileges of a token bearer as part of their token. Kerberos authenticates a principal (user, system, program, and so on) and provides it with a ticket.
3.
Which access control model is a static model that uses a predefined set of access privileges to files on the system?
Correct Answer
B. MAC
Explanation
The Mandatory Access Control (MAC) model is a static model that uses a predefined set of access privileges to files on the system. The Discretionary Access Control (DAC) model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels. The Role-Based Access Control (RBAC) model allows a user to act in a certain predetermined manner based on the role the user holds in the organization. BRACK is not a valid access control model.
4.
Which of the following authentication protocols authenticates a
principal (user, system, program, and so on) and provides it with a
ticket?
Correct Answer
D. Kerberos
Explanation
Kerberos authenticates a principal (user, system, program, and so on) and provides it with a ticket. Challenge Handshake Authentication Protocol (CHAP) challenges a system to verify identity and employs an encrypted challenge. Security tokens are forms of certificates that contain rights and access privileges of a token bearer as part of their token. Password Authentication Protocol (PAP) offers no true security and is one of the simplest forms of authentication: both the username and the password are sent as clear text and checked for a match.
5.
Which of the following authentication protocols challenges a system to verify identity and employs an encrypted challenge?
Correct Answer
A. CHAP
Explanation
Challenge Handshake Authentication Protocol (CHAP) challenges a system to verify identity and employs an encrypted challenge. Security tokens are forms of certificates that contain rights and access privileges of a token bearer as part of their token. Password Authentication Protocol (PAP) offers no true security and is one of the simplest forms of authentication: both the username and the password are sent as clear text and checked for a match. Kerberos authenticates a principal (user, system, program, and so on) and provides it with a ticket.
6.
Which of the following access attacks amounts to someone looking through your files in hopes of finding something interesting?
Correct Answer
A. Snooping
Explanation
All the choices listed are various types of access attacks. In a snooping attack, someone looks through your files in hopes of finding something interesting. In an eavesdropping attack, the attacker listens in on or overhears parts of a conversation. In a passive interception attack, someone routinely monitors network traffic. In an active interception attack, a computer is placed between the sender and receiver to capture information while it's sent.
7.
Which of the following is not a valid access control model?
Correct Answer
D. BAC
Explanation
BAC is not a valid access control model. The Discretionary Access Control (DAC) model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels. The Mandatory Access Control (MAC) model is a static model that uses a predefined set of access privileges to files on the system. The Role-Based Access Control (RBAC) model allows a user to act in a certain predetermined manner based on the role the user holds in the organization.
8.
Which access control model allows a user to act in a certain
predetermined manner based on the role the user holds in the
organization?
Correct Answer
C. RBAC
Explanation
The Role-Based Access Control (RBAC) model allows a user to act in a certain predetermined manner based on the role the user holds in the organization. The Mandatory Access Control (MAC) model is a static model that uses a predefined set of access privileges to files on the system. The Discretionary Access Control (DAC) model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels. SAC is not a valid access control model.
9.
Which of the following is an implementation of X.500 that operates on port 389?
Correct Answer
B. LDAP
Explanation
Lightweight Directory Access Protocol (LDAP) is a pared-down X.500 implementation that operates on port 389. The other choices are not valid for this question.
10.
Which of the following exists for every object in Active Directory and must be unique?
Correct Answer
D. DN
Explanation
The domain name (DN) exists for every object in Active Directory and must be unique; it is the full path of the object, including any containers. The relative distinguished name (RDN) is the portion of the name that is unique within the container. The user principal name (UPN) consists of the user account and the user's domain name and is often referred to as the friendly name. The canonical name (CN) is the distinguished name given in a top-down notation.
11.
Which of the following is not a Microsoft protocol?
Correct Answer
A. NFS
Explanation
Network File System (NFS) is the default file-sharing protocol for Unix-based systems. Network Basic Input Output System (NetBIOS) is the native networking protocol of Windows-based PCs. NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN. Windows Internet Naming Service (WINS) translates NetBIOS names to TCP/IP addresses.
12.
Which of the following is the portion of the name that is unique within the container?
Correct Answer
A. RDN
Explanation
The relative distinguished name (RDN) is the portion of the name that is unique within the container. The canonical name (CN) is the distinguished name given in a top-down notation. The user principal name (UPN) consists of the user account and the user's domain name and is often referred to as the friendly name. The domain name (DN) exists for every object in Active Directory and must be unique; it is the full path of the object, including any containers.
13.
Which of the following is often referred to as the friendly name?
Correct Answer
C. UPN
Explanation
The user principal name (UPN) consists of the user account and the user's domain name and is often referred to as the friendly name. The relative distinguished name (RDN) is the portion of the name that is unique within the container. The canonical name (CN) is the distinguished name given in a top-down notation. The domain name (DN) exists for every object in Active Directory and must be unique; it is the full path of the object, including any containers.
14.
Which of the following LDAP/Active Directory names is a distinguished name given in a top-down notation?
Correct Answer
B. CN
Explanation
The canonical name (CN) is the distinguished name given in a top-down notation. The relative distinguished name (RDN) is the portion of the name that is unique within the container. The user principal name (UPN) consists of the user account and the user's domain name and is often referred to as the friendly name. The other option is not a valid choice for a type of LDAP/Active Directory name.
15.
Which of the following is the Novell directory management service that replaced NDS?
Correct Answer
B. EDirectory
Explanation
NDS was replaced by eDirectory. The Novell bindery was replaced by NetWare/Novell Directory Service (NDS).
16.
Which of the following is the native networking protocol of Windows-based PCs?
Correct Answer
B. NetBIOS
Explanation
Network Basic Input Output System (NetBIOS) is the native networking protocol of Windows-based PCs. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a networking protocol proprietary to Novell that was used with NetWare 4.x and earlier versions. NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN. Network File System (NFS) is the default file-sharing protocol for Unix-based systems.
17.
Which protocol is used to manage and monitor devices in a network?
Correct Answer
A. SNMP
Explanation
Simple Network Management Protocol (SNMP) is used to manage and monitor devices in a network. Internet Control Message Protocol (ICMP) is used to report errors and reply to requests from programs such as ping and traceroute. Internet Group Management Protocol (IGMP) is used to manage group or multicasting sessions. Trivial File Transfer Protocol (TFTP) is an anonymous version of FTP.
18.
Which of the following network protocols was proprietary and used in Novell NetWare prior to version 5?
Correct Answer
A. IPX/SPX
Explanation
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a networking protocol proprietary to Novell that was used with NetWare 4.x and earlier versions. Network Basic Input Output System (NetBIOS) was the native networking protocol of Windows-based PCs prior to TCP/IP. NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN. Network File System (NFS) is the default file-sharing protocol for Unix-based systems.
19.
Which of the following is the Novell directory management service that replaced the bindery?
Correct Answer
A. NDS
Explanation
The Novell bindery was replaced by NetWare/Novell Directory Service (NDS). NDS was replaced by eDirectory.
20.
Which of the following is used to transport NetBIOS across the LAN?
Correct Answer
C. NetBEUI
Explanation
NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a networking protocol proprietary to Novell that was used with NetWare 4.x and earlier versions. Network Basic Input Output System (NetBIOS) is the native networking protocol of Windows-based PCs, and WINS (Windows Internet Name Service) is used to translate NetBIOS names to network addresses. Network File System (NFS) is the default file-sharing protocol for Unix-based systems.
21.
Which of the following sends a message from a single system to the entire network?
Correct Answer
A. Broadcast
Explanation
A broadcast sends a message from a single system to the entire network. A multicast sends a message to multiple addresses. A unicast is multicast formatted but oriented at a single system. There is no such valid messaging option as sudocast.
22.
What is the acronym used for the Remote Access Service (RAS) in the current Microsoft Windows operating systems?
Correct Answer
C. RRAS
Explanation
In the current Microsoft Windows operating systems, RAS is known as Routing and Remote Access Service (RRAS). The other choices are not valid.
23.
Which port does NNTP use?
Correct Answer
C. 119
Explanation
NNTP uses port 119. TACACS uses port 49. POP3 uses port 110. NetBIOS uses port 138 (as well as 137 and 139).
24.
RAS connections can be made using modems and what else?
Correct Answer
C. POTS
Explanation
RAS connections can be made using modems and Plain Old Telephone Service (POTS).
25.
What abbreviation is used in most PBX diagrams to signify the phone company?
Correct Answer
A. CO
Explanation
The telephone company is always abbreviated as the central office (CO). Connections to the CO are often done through T1 and T3 lines.
26.
Virtual private networks (VPNs) employ tunneling at which layer of the OSI model?
Correct Answer
B. 2
Explanation
VPNs employ tunneling at layer 2 of the OSI model.
27.
Which port does TACACS use?
Correct Answer
A. 49
Explanation
TACACS uses port 49. POP3 uses port 110. NNTP uses port 119. NetBIOS uses port 138 (as well as 137 and 139).
28.
You have been instructed by your boss to block all LDAP traffic, with
and without SSL. Which port(s) should you block? (Choose all that
apply.)
Correct Answer(s)
B. 389
D. 636
Explanation
LDAP uses port 389. LDAP with SSL uses port 626. IMAP uses port 143. HTTPS uses port 443.
29.
You want to harden your IIS web server (named blackwater) by placing stricter permissions on all anonymous users. Which user account should you place stricter permissions on?
Correct Answer
A. IUSR_blackwater
Explanation
With IIS, the anonymous account is IUSR_computername, which becomes IUSR_blackwater in this case. The other options are incorrect.
30.
You want to configure your firewall to block all NetBIOS traffic. Which port(s) should you block? (Choose all that apply.)
Correct Answer(s)
A. 137
B. 138
C. 139
Explanation
The NetBIOS session service uses ports 137, 138, and 139. Port 140 is not used by NetBIOS.
31.
What type of access control device can include a scale to weigh the person before allowing them entry?
Correct Answer
A. Mantrap
Explanation
A mantrap can incorporate scales to weigh the individual and make certain no one is sneaking in with them.
32.
RADIUS should be used to improve security by adding a single authentication service for which type of users?
Correct Answer
B. Remote users
Explanation
Remote Authentication Dial-In User Service (RADIUS) is used to authenticate users who connect remotely.
33.
You want to prevent users from being able to change configuration
settings in their Windows-based operating system. Which of the following
will allow you to disable the ability of users from accessing these
settings?
Correct Answer
D. Group policies
Explanation
Group policies can be used to prevent users from making configuration settings to their operating system for Windows-based operating systems.
34.
You have chosen to specifically name certain users who cannot access
server resources while all other users can access those resources. What
is this type of access control known as?
Correct Answer
C. Implicit deny
Explanation
With implicit deny, you deny access to named users. All other users-those not appearing in the deny list-are granted access to the resources.