1.
Who is responsible for access control in the MAC model?
Correct Answer
A. Mandatory Access Control
Explanation
System administrator is responsible for access control in the MAC model. The owner will be responsible for DAC. The RBAC is dependent on the role played by the user in the organization.
2.
Access Control list contains information relating to user to resource access mapping. T/F?
Correct Answer
A. True
Explanation
The information of mapping users to their permissions for resource access would be available in the ACL.
3.
MAC allows dynamic sharing of resources. T/F?
Correct Answer
B. False
Explanation
MAC uses a static or predefined set of access privileges and hence cannot allow dynamic sharing of resources.
4.
Which of the following would provide security for Web site access?
Correct Answer
C. Certificate
Explanation
Certificates are best used during WAN access. For ex: when using web sites that require you to provide confidential information about yourself, or when you are logging in to the Intranet, from an unknown location.
5.
Which of the following use clear text password for authentication?
Correct Answer
A. PAP
Explanation
PAP uses clear text and is a two-way handshake protocol.
6.
A token is authentication protocol. T/F?
Correct Answer
B. False
Explanation
A token is generated when a user has been successfully authenticated. This token is attached to the users� session and will be destroyed once the session is terminated or after the user has logged out. This token will contain user access permission assigned on the network resources for that user. Token is a system and not a protocol.
7.
Which of the following is a key component in the Kerberos system?
Correct Answer
A. Key Distribution Center
Explanation
The Kerberos system requires a Key Distribution Center (KDC) which is responsible for authenticating any network user, Computer or Service. Depending on whether the authentication fails or succeeds the ticket will be granted to the end user, Computer or Service.
8.
Which of the following does relates to Biometricsy?
Correct Answer
A. Finger print
Explanation
The Biometrics uses finger prints, retinal scan and some times the DNA structure too to establish user Id.
9.
To allow access to a campus you would use smart card. T/F?
Correct Answer
A. True
Explanation
To allow access to a campus you would use smart cards.
10.
Which of the following is an advantage with clear text authentication?
Correct Answer
B. Advantage is that it is easy to implement
Explanation
Clear text authentication is very simple and easy to implement and verify. But a network that has implemented clear text security is not very secure as it is very easy to decipher clear text passwords.
11.
Which of the following is the best way to ascertain unique identification of an employee?
Correct Answer
C. Biometric
Explanation
Biometric will authenticate or establish User ID depending on the physical attribute of the user. For ex: Finger print, hand scan or retina scan.
12.
RADIUS is a dial-up protocol. T/F?
Correct Answer
B. False
Explanation
RADIUS is a RAS authentication Service.
13.
Which of the following is used to establish an error free IP-based network?
Correct Answer
B. DHCP
Explanation
It is imperative that users be assigned IP addresses for the purpose of connecting to the company resources. This dynamic allocation will be possible only with the help of DHCP service.
14.
Which of the following services when placed on the edge of the network, will provide security to the entire network?
Correct Answer
A. Firewall
Explanation
Router is a gateway and antivirus resides on all systems. Firewall is meant to safe guard the network from external attacks.
15.
Which of the following is a disadvantage when using a Wireless LAN?
Correct Answer
B. Eavesdropping
Explanation
Wireless LANs is dependent on frequency for transmission and reception. This makes the media very susceptible to overhearing or eavesdropping.
16.
Which of the following is an example of the DoS?
Correct Answer
C. Your Web server has gone into a loop trying to service a client request.
Explanation
DoS is a way of engaging a Web Server continuously in one specific task by outing it on a loop and ensuring it is unable to respond to any further requests.
17.
DDoS is a best way for testing Web server vulnerabilities. T/F?
Correct Answer
A. True
Explanation
DDoS (Distributed DoS) would test for more vulnerabilities on the server than the DoS would.
18.
When debugging an Operating system, a programmer would make use of a back door door. T/F?
Correct Answer
A. True
Explanation
A programmer makes use of back doors in the program for the purpose of debugging or observing the performance of the program.
19.
Which of the following services relates to acknowledgment-less data transfer?
Correct Answer
C. TFTP
Explanation
TFTP (trivial File Transfer Protocol) uses UDP for data transfer and hence does not facilitate acknowledgements.
20.
To transfer mails between email servers and respective clients you would require POP3 service. T/F?
Correct Answer
A. True
Explanation
To transfer mails between email servers and their respective clients POP3 (Post Office Protocol Version 3) is used.