• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
QUESTION NO: 1 Who is responsible for establishing access permissions to network resources in the DAC access control model?
A. The system administrator.
B. The owner of the resource.
C. The system administrator and the owner of the resource.
D. The user requiring access to the resource.
Answer: B
QUESTION NO: 2 Why do security researchers often use virtual machines?
A. To offer an environment where new network applications can be tested
B. To offer a secure virtual environment to conduct online deployments
C. To offer a virtual collaboration environment to discuss security research
D. To offer an environment where malware can be executed with minimal risk to equipment and
software
Answer: D
QUESTION NO: 3 Which access control system allows the system administrator to establish access permissions to network resources?
A. MAC
B. DAC
C. RBAC
D. None of the above.
Answer: A
QUESTION NO: 4 You work as a network administrator for your company. Taking personal safety into consideration, what fire suppression substances types can effectively prevent damage to electronic equipment?
A. Halon
B. CO
C. Water
D. Foam
Answer: B
QUESTION NO: 5 Which of the following access control models uses roles to determine access permissions?
A. MAC
B. DAC
C. RBAC
D. None of the above.
Answer: C
QUESTION NO: 6 Given: John is a network administrator. He advises the server administrator of his company to implement whitelisting, blacklisting, closing-open relays and strong authentication techniques. Question: Which threat is being addressed?
A. Viruses
B. Adware
C. Spam
D. Spyware
Answer: C
QUESTION NO: 7 Most current encryption schemes are based on A. digital rights management
B. time stamps
C. randomizing
D. algorithms
Answer: D
QUESTION NO: 8 Study the following items carefully, which one will permit a user to float a domain registration for a maximum of five days?
A. Spoofing
B. DNS poisoning
C. Domain hijacking
D. Kiting
Answer: D
QUESTION NO: 9 Which of the following types of cryptography is typically used to provide an integrity check? A. Public key
B. Asymmetric
C. Symmetric
D. Hash
Answer: D
QUESTION NO: 10 The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and
procedures needed to create, manage, store, distribute, and revoke digital certificates. The public
key infrastructure is based on which encryption schemes?

A. Symmetric
B. Quantum
C. Asymmetric
D. Elliptical curve
Answer: C
QUESTION NO: 11 How is access control permissions established in the RBAC access control model?
A. The system administrator.
B. The owner of the resource.
C. The role or responsibilities users have in the organization.
D. None of the above.
Answer: C
QUESTION NO: 12 Which threat is increased by the availability of portable external storage such as USB hard drives to networks? A. Increased loss business data
B. Introduction of material on to the network
C. Removal of sensitive and PII data
D. Introduction of rogue wireless access points
Answer: C
QUESTION NO: 13 What does the DAC access control model use to identify the users who have permissions to a resource? A. Predefined access privileges.
B. The role or responsibilities users have in the organization
C. Access Control Lists
D. None of the above.
Answer: C