JK0 015 CompTIA E2C Security+ (2008 Edition) Exam



Similar documents
form approved June/2006 revised Page 1 of 7

Eleventh Hour Security+

Chapter 15: Computer and Network Security

Section 12 MUST BE COMPLETED BY: 4/22

SonicWALL PCI 1.1 Implementation Guide

Description: Objective: Attending students will learn:

Networking: EC Council Network Security Administrator NSA

CompTIA Security+ (Exam SY0-410)

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

INTRUSION DETECTION SYSTEMS and Network Security

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Security + Certification (ITSY 1076) Syllabus

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Achieving PCI-Compliance through Cyberoam

GE Measurement & Control. Cyber Security for NEI 08-09

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Securing Cisco Network Devices (SND)

Introduction of Intrusion Detection Systems

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Network Access Security. Lesson 10

Firewalls, Tunnels, and Network Intrusion Detection

Chapter 1 Network Security

Networking for Caribbean Development

Payment Card Industry Self-Assessment Questionnaire

Network Defense Tools

8. Firewall Design & Implementation

Certification Exam Objectives: SY0-201

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

IINS Implementing Cisco Network Security 3.0 (IINS)

Implementing Cisco IOS Network Security

74% 96 Action Items. Compliance

Guidance Regarding Skype and Other P2P VoIP Solutions

Network Instruments white paper

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Fundamentals of Network Security - Theory and Practice-

Network Security Guidelines. e-governance

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Chapter 9 Firewalls and Intrusion Prevention Systems

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS5008: Internet Computing

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Tim Bovles WILEY. Wiley Publishing, Inc.

Windows 7, Enterprise Desktop Support Technician

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

CTS2134 Introduction to Networking. Module Network Security

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Consensus Policy Resource Community. Lab Security Policy

Recommended Wireless Local Area Network Architecture

Developing Network Security Strategies

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Security Policy JUNE 1, SalesNOW. Security Policy v v

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Locking down a Hitachi ID Suite server

How To Secure An Rsa Authentication Agent

Did you know your security solution can help with PCI compliance too?

A Guide to New Features in Propalms OneGate 4.0

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

GFI White Paper PCI-DSS compliance and GFI Software products

Security. TestOut Modules

Configuration Information

Linux Network Security

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Windows Remote Access

Network Incident Report

Chapter 4 Application, Data and Host Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

INTRODUCTION TO FIREWALL SECURITY

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Concierge SIEM Reporting Overview

Lesson Plans Managing a Windows 2003 Network Infrastructure

General Network Security

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

IT Security Standard: Network Device Configuration and Management

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Transcription:

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1

QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router B. Vampire tap C. Firewall D. Fiber-optic splicer QUESTION NO: 2 After disabling SSID broadcast for all wireless routers on the network, the administrator noticed that the Same unauthorized users were still accessing the network. Which of the following did the administrator fail to do? A. Re-enable the SSID. B. Disallow 802.11a traffic on the network. C. Change the SSID. D. Enable ARP cache spoofing protection. QUESTION NO: 3 Exploitation of the 5-day grace period for domain name registration is referred to as: A. domain name poisoning. B. domain name kiting. C. domain name lookup. D. domain name service. QUESTION NO: 4 Which of the following ports is susceptible to DNS poisoning? A. 23 B. 53 C. 80 D. 8080 QUESTION NO: 5 Why is an ad-hoc network a security risk?

A. An ad-hoc network allows access to another computer at the same level of the logged in user, compromising information. B. An ad-hoc network allows access to the nearest access point which may allow a direct connection to another computer. C. An ad-hoc network allows access to the nearest access point which may give elevated rights to the connecting user. D. An ad-hoc network allows access to another computer but with no rights so files cannot be copied or changed. Explanation: A wireless network operates in one of two modes, ad-hoc or infrastructure. In the ad hoc mode, each station is a peer to the other stations and communicates directly with other stations within the network. No AP is involved. All stations can send Beacon and Probe frames. QUESTION NO: 6 Which of the following is a benefit of network access control (NAC)? A. A user is able to distribute connections to the network for load balancing using a centralized list of approved devices. B. A user is able to distribute connections to the network using cached credentials on a local machine. C. A user is able to control connections to the network using a centralized list of approved devices. D. A user is able to control connections to the network using cached credentials on a local machine. QUESTION NO: 7 Which of the following is the FINAL phase of disaster recovery? A. Notify all personnel that a disaster has taken place. B. Hold a follow-up meeting to review lessons learned. C. Perform a full recovery so all devices are back in working order. D. Restore all network connectivity. QUESTION NO: 8 Which of the following security threats MOST frequently uses IRC to communicate with a remote host?

A. Botnets B. Phishing C. Spam D. Worm QUESTION NO: 9 When used properly, a one time pad is considered an unbreakable algorithm because: A. the key is not reused. B. it is a symmetric key. C. it uses a stream cipher. D. it is based on the generation of random numbers. QUESTION NO: 10 Which of the following allows remote access servers to authenticate to a central server? A. WLAN properties B. Authentication protocols C. Password authentication D. RADIUS QUESTION NO: 11 Which of the following is the BEST course of action to ensure an email server is not an open relay? A. Require authentication for all outbound SMTP traffic. B. Require authentication for all inbound and outbound SMTP traffic. C. Block all inbound traffic on SMTP port 25. D. Require authentication for all inbound SMTP traffic. QUESTION NO: 12 Which of the following security threats would MOST likely use IRC? A. Botnets B. Adware C. Logic bombs

D. Spam QUESTION NO: 13 A user contacts technical support stating they received notification in a web browser that their computer is infected with a virus. Which of the following would help prevent this in the future? A. Anti-Spyware B. Spam blocker C. Antivirus D. Pop-up blocker QUESTION NO: 14 An administrator wants to make sure that network machines stay up-to-date with current solutions, which of the following should be done on a regular basis to help facilitate this need? A. Group policy updates B. Patch management C. Driver updates D. Configuration baselines QUESTION NO: 15 Which of the following is the main disadvantage of implementing a certificate revocation list? A. Revocation is not instantaneous. B. It is a single point of failure and expensive to maintain. C. Only a certain number of certificates can be revoked. D. The CRL database cannot be duplicated. QUESTION NO: 16 On which of the following algorithms is PGP based? A. RSA B. MD5 C. WPA D. DES QUESTION NO: 17

Employee A sends employee B an encrypted message along with a digital signature. Employee B wants to make sure that the message is truly from employee A. Which of the following will employee B do to verify the source of the message? A. Use employee B s private key to unencrypted the message. B. Use employee A s private key to verify the digital signature. C. Use employee B s public key to unencrypted the message. D. Use employee A s public key to verify the digital signature. QUESTION NO: 18 Employee A wants to send employee B an encrypted message that will identify employee A as the source of the message. Which of the following will employee A do to accomplish this? (Select TWO). A. Use employee A s private key to sign the message. B. Use the message application to mark the message as urgent. C. Use only symmetric encryption to send the message. D. Use employee B s private key to encrypt the message. E. Use employee B s public key to encrypt the message. F. Use employee A s public key to sign the message., E QUESTION NO: 19 Which of the following groups should be able to view the results of the risk assessment for an organization? (Select TWO). A. HR employees B. Information security employees C. All employees D. Executive management E. Vendors, D QUESTION NO: 20 Which of the following describes the role of a proxy server? A. Analyzes packets B. Serves as a honeypot C. Blocks access to the network D. Forwards requests for services from a client

QUESTION NO: 21 A recent risk assessment has identified vulnerabilities on a production server. The technician realizes it was recently re-imaged after a component failed on it. Which of the following is the FIRST item to assess when attempting to mitigate the risk? A. If all current service packs and hotfixes were re-applied B. If the spam filters have been properly applied C. If all device drivers were updated D. If the firewall ruleset does not allow incoming traffic to the vulnerable port QUESTION NO: 22 NIDS can be used to help secure a network from threats MOST effectively by watching network traffic in order to: A. verify adequate bandwidth is being provided for existing traffic. B. inspect and analyze data being passed through SSH tunnels. C. ensure proper password strength. D. observe if any systems are communicating using unauthorized protocols. QUESTION NO: 23 Which of the following is the BEST solution for an administrator to implement in order to learn more about the zeroday exploit attacks on the internal network? A. A Honeypot B. A stateful firewall C. A HIDS D. An IDS QUESTION NO: 24 An administrator is having difficulty getting staff to adhere to group policy directives regarding streaming audio. Bandwidth utilization increases around the time that a popular radio show is broadcast. Which of the following is the BEST solution to implement? A. Enforce group policy B. Change the password policy C. Deploy content filters D. Implement time of day restrictions

QUESTION NO: 25 Which of the following is the BEST way for an attacker to conceal their identity? A. Shoulder surfing B. Deleting the cookies C. Increase the max size of the log D. Disable logging QUESTION NO: 26 Which of the following logs would show that someone has been querying information about a Company s networks? A. System logs for patch and reboot events B. DNS logs for zone transfers C. Application logs for service start and stop events D. Security logs for failed logon attempts QUESTION NO: 27 Which of the following determines if traffic is blocked or allowed? A. Access Control List (ACL) B. Network-based Intrusion Detection System (NIDS) C. Username and passwords D. Logical keys QUESTION NO: 28 Which of the following is the primary location where global policies are implemented in an organization? A. Physical memory B. Domain C. User documentation D. Security group QUESTION NO: 29 Which of the following provides a security buffer, after passing through a firewall, by separating a network and still allowing access to that network?

A. VLAN B. DMZ C. NAC D. NAT QUESTION NO: 30 In the event of a fire, the MOST appropriate setting for electronic cipher locks would be to: A. allow personnel to exit the building only after security confirms the threat and electronically releases all locks. B. allow personnel to exit the building without any forms of authentication. C. allow personnel to exit the building using only a photo ID badge. D. allow personnel to exit the building only after using a valid swipe card and key. QUESTION NO: 31 Which of the following protocols uses a three-way handshake during communication with multiple hosts? A. SMTP B. UDP C. TCP D. RDP QUESTION NO: 32 A number of users on the company network have been contracting viruses from required social networking sites. Which of the following would be MOST effective to prevent this from happening? A. NIDS B. Firewall C. Proxy server D. Honeypot QUESTION NO: 33 A user logs onto a laptop with an encrypted hard drive. There is one password for unlocking the encryption and one password for logging onto the network. Both passwords are synchronized and used to login to the machine. Which of the following authentication types is this?

A. Biometric B. Single sign-on C. Three factor D. Two factor QUESTION NO: 34 A call center uses 50 remote representatives to handle calls for clients. The representatives run software based IP phones on their laptops, and connect back to the call center over the Internet. However, one of the representatives reports that they can no longer connect to the call center PBX. Which of the following is the reason that only this call center representative is unable to connect to the PBX? A. The representative has a disk defragmentation program installed. B. The call center has placed the firewall on the edge of the network. C. The representative has a mis-configured software firewall. D. The call center has recently installed HIDS. QUESTION NO: 35 A network administrator is alerted to an incident on a file server. The alerting application is a file integrity checker. Which of the following is a possible source of this HIDS alert? A. ARP poisoning B. DDOS C. Teardrop attack D. Rootkit QUESTION NO: 36 A NIPS is primarily used for which of the following purposes? A. To monitor network traffic in promiscuous mode B. To alert the administrator to known anomalies C. To log any known anomalies D. To take action against known threats QUESTION NO: 37 Which of the following should be done FIRST after creating a formal disaster recovery plan? A. Test the plan.