Question
1.1.Which of the following is the first step in the digital
signature process where Mike sends a message to Sophie? (Points : 5)
A message digest of
Mike’s message is calculated using a hashing algorithm
Sophie compares the
message digest she calculated to Mikes’s message
Sophie encrypts Mike’s
message with Mike’s public key
The message digest is
encrypted by Mike’s private key
Question
2.2.Which of the following is described as a 64-bit block
cipher composed of a 16-round Feistel network and key-dependent S-box
functions? (Points : 5)
Twofish
RC4
Blowfish
Rijndael
Question
3.3.Which type of function is used in cryptography? (Points
: 5)
Not AND
Permutation
NOR
X-box
Question
4.4.Which of the following is commonly used for verifying message
integrity? (Points : 5)
Registration authority
CRL
Pseudorandom number
generator
Hashing function
Question
5.5.Which of the following is NOT a critical goal of
information security? (Points : 5)
Confidentiality
Scalability
Authentication
Nonrepudiation
Question
6.6.What term is given to a device that is designed to
generate radio signals, not including those from the antenna? (Points :
5)
oscillator
conductive medium
intentional radiator
EIRP
Question
7.7.What is a potential problem with having too many APs in
a given area? (Points : 5)
Refraction
Fading
Multipath
Co-channel interference
Question
8.8.Which digital signal modulation method is a binary
modulation technique in which the carrier signal’s frequency is changed
to represent a 1 or 0 bit? (Points : 5)
ASK
FSK
PSK
FDM
Question
9.9.Which of the following is true about RF transmissions?
(Points : 5)
EM radiation is
measured in volts
Frequency has an
inverse relationship with wavelength
Frequency is the
distance between waves
Cooler objects produce
higher-frequency radiation than hotter objects
Question
10.10.What is used to convert an analog RF signal into
digital format? (Points : 5)
spectrum
EIRP
modulator
carrier
Question
11.11.What is considered to be one of the biggest weaknesses
of WEP? (Points : 5)
24-bit initialization
vector
RC4 encryption
128-bit key
Kerberos authentication
Question
12.12.In which type of attack do attackers intercept the
transmissions of two communicating nodes without the user’s knowledge?
(Points : 5)
Rogue device
Wardriver
Man-in-the-middle
Brute force
Question
13.13.Which of the following is true about IEEE 802.11i?
(Points : 5)
It uses WEP2 for
authentication and encryption
It uses a symmetric
block cipher for encryption
Temporal key integrity
protocol is used for encryption
It uses PMK to generate
data encryption keys
Question
14.14.Which of the following is true about wardriving? (Points
: 5)
Attackers use RF
monitor mode
The hardware is very
expensive
The software is very
expensive
Their goal is simply to
hijack a connection
Question
15.15.What is a WNIC’s equivalent of a NIC’s promiscuous
mode? (Points : 5)
Active scan mode
RF monitor mode
Passive attack mode
Auto-capture mode
Question
16.16.Which type of IDPS can have the problem of getting
disparate systems to work in a coordinated fashion? (Points : 5)
inline
Host-based
Hybrid
Network-based
Question
17.17.Which of the following is an IDPS security best
practice? (Points : 5)
to prevent false
positives, only test the IDPS at initial configuration
communication between
IDPS components should be encrypted
all sensors should be
assigned IP addresses
log files for HIDPSs
should be kept local
Question
18.18.Which of the following is NOT a typical IDPS
component? (Points : 5)
Network sensors
Command console
Database server
Internet gateway
Question
19.19.Which of the following is NOT a method used by passive
sensors to monitor traffic? (Points : 5)
Spanning port
Network tap
Packet filter
load balancer
Question
20.20.Where is a host-based IDPS agent typically placed?
(Points : 5)
On a workstation or
server
At Internet gateways
Between remote users
and internal network
Between two subnets