CORRECT 100%
Which of the following is not a primary objective of information security? - ANSWER-
Privacy
Security ________ are goals an organization strives to achieve through its security
efforts. - ANSWER-Objectives
Which of the following is not a distinguishing characteristic of a WAN compared to a
LAN? - ANSWER-Has a limited geographic area
From the perspective of computers and networks, _________ is confidence that
other users will act in accordance with your organizations - ANSWER-Trust
Which of the following has the ultimate and final responsibility for network security in
an organization? - ANSWER-Senior management
What does a client/server environment have that a peer-to-peer networking
environment typically does not? - ANSWER-Server
Which of the following do you not get with network address translation (NAT)? -
ANSWER-A static public IP address for each internal client
Which layer of the OSI reference model handles logical addressing (IP addresses)
and routing traffic? - ANSWER-Network
Which of the following a problem for static filtering? - ANSWER-Large, unordered
rule sets
What is a network component that filters traffic between nodes? - ANSWER-Firewall
You are analyzing a risk and have determined that the SLE is $1,000 and the ARO is
5. What is the ALE? - ANSWER-$5,000
When performing a risk assessment, what is the amount of potential loss that can be
experienced due to any compromise of an asset for a specific threat within a year? -
ANSWER-Annualized loss expectancy (ALE)
Which of the following enables you to check a client computer for compliance with
security policies and either grant or deny its access to the internal network? -
ANSWER-Network access control
Which IT domain includes demilitarized zones (DMZs) and intrusion detection
systems (IDS)? - ANSWER-LAN-to-WAN Domain
, Which IT domain in a typical IT infrastructure typically includes routers, circuits,
switches, firewalls, and equivalent gear at remote locations? - ANSWER-WAN
Domain
The lack of ____________ is both a strength and weakness of workgroups. -
ANSWER-Central authority
You are filtering MAC addresses on a switch by blocking only specific IP addresses.
What do you use to perform this type of filtering? - ANSWER-Black list
You can filter which type of traffic on a typical firewall? - ANSWER-Both ingress and
egress
Which private address range is 172.16.0.0-172.31.255.255 /12? - ANSWER-Class B
A _________ is a boundary network that hosts resource servers for the public
Internet. - ANSWER-DMZ
A ___________ is either a hardware device or a software product you deploy to
enforce the access control policy on network communications. - ANSWER-Firewall
_______ resolves FQDNs into the associated IP address. [hint 3 letters abbreviation]
- ANSWER-DNS
_______________ is the process of securing or locking down a host against threats
and attacks. - ANSWER-Hardening
_____ ________ __________are new and previously unknown attacks for which no
current specific defenses exist. [hint 3 words] - ANSWER-Zero day exploits
______ __________ ____________ allows an attacker to eavesdrop on electronic
devices from a distance. The technique is to perfect or simple to perform, but has
been demonstrated on LCD and CRT monitors as well as keyboard cables. With
minor shielding, you can eliminate most of the risk from such an attack. - ANSWER-
Van Eck phreaking
When performing a risk assessment, what is the amount of potential harm from a
threat, expressed as a percentage? - ANSWER-Exposure factor (EF)
What is a primary benefit of a multi-homed firewall? - ANSWER-Isolation of subnets
_______ translates internal addresses into external addresses. - ANSWER-Network
address translation (NAT)
What can a firewall provide that is a form of static reversal of network translation? -
ANSWER-Port forwarding
When performing a risk assessment, how do you calculate a potential cost/benefit? -
ANSWER-(Original ALE - New ALE) - cost of the countermeasure per year