CIS 552 WEEK 5 MIDTERM
CIS 552 Week 5 Midterm
1.
Which of the
following is most likely to be broken using a birthday attack?
2.
Which of
following methods is best suited in a situation where bulk encryption is
required?
3.
The main
purposes for using cryptography include all but which one of the following?
4.
Which of the
following best describes the purpose of the key zeroization process?
5.
Digital
signatures are used for all but which one of the following purposes?
6.
All but which
one of the following is security vulnerability found in RIP?
7.
Which of the following
statements is true in regard to TCP?
8.
Which of the
following is a factor that makes scanning UDP more difficult?
9.
Which of the
following is a common application layer attack?
10.
Which of the
following activities is the responsibility of the OSI reference model transport
layer?
11.
Focal length
defines which of the following camera qualities?
12.
A false
acceptance rate is also known as which of the following errors?
13.
If an active fax
machine is discovered during an assessment, which of the following is of the least
concern?
14.
Which of the
following lock grades should be selected in order to appropriately protect
critical business assets?
15.
Which of the
following biometric authentication methods is most frequently found on laptops?
16.
Which of the
following is a tool used for network mapping?
17.
A ___________
scan detects packets in which all flags are active.
18.
Modems can be
located by conducting what type of attack?
19.
What does OS
fingerprinting allow?
20.
Which of the
following is a tool used for wardriving?
21.
Which of the following
is a penetration testing framework?
22.
Which of the
following types of penetration testing is designed to attack an organization's
physical security?
23.
Which of the
following terms best describes hackers that occupy the lowest level of the
hacker hierarchy?
24.
Which of the
following statements is most accurate in regard to successful security
professionals?
25.
In which of the
following phases does an attacker passively acquire information about the
intended victim's systems?
26.
Which of the
following tools is used to determine the path to a specific IP address?
27.
Which of the
following databases would be valuable for obtaining information about a
company's financial history?
28.
In order to
locate domain information on a Canadian organization, which of the following Regional
Internet Registries would be checked first?
29.
Which of the
following best describes the first two steps of the footprinting process?
30.
In order to
locate domain information on a European organization, which of the following
Regional Internet Registries would be checked first?
No comments:
Post a Comment