ANSWERS GRADED A
An organization that uses a client-server model permits remote user machines to access its
network and distributed resources. With this setup, the organization recognizes that remotely
used client machines can become threats.
Which requirement should this company subject its remote clients to in order to secure data and
communications in the system?
Create a fortress mentality for secure data communications
Run processes in user and supervisory modes at the same time
Allow users only minimal but not necessary access to sensitive resources
Install restricted user-interface mechanisms and database management systems Correct Answer:
Install restricted user-interface mechanisms and database management systems
A technology-based firm wants to implement secure data communication between secure
desktops to a remote server while keeping reliability as the most important requirement in its
scope.
Which kind of secure data communication should be used within a WAN environment?
Transmission control protocol (TCP)
User datagram protocol (UDP)
Point-to-point protocol (PPP)
Hypertext transfer protocol (HTTP) Correct Answer: Transmission control protocol (TCP)
A systems developer needs to reduce or eliminate the vulnerability of impersonation.
Which security solution should this system developer adopt?
Restrict access
Digital signatures
Blacklist services
Blocking attachments Correct Answer: Digital signatures
A systems developer needs to create a subscription system for a list of known email abuse
sources.
Which solution should be used to create this item?
Blacklist services
Whitelist services
Subscription services
Domain name services Correct Answer: Blacklist services
,A software developer needs to secure emails for a bank using a public-private key system. The
system should include a variety of algorithms that encrypt files and email messages.
Which email security solution should this developer use?
Pretty good privacy
DomainKeys identified mail
Post office protocol 3 (POP3)
Simple mail transfer protocol (SMTP) Correct Answer: Pretty good privacy
Which service manages the monitoring of devices within the application layer?
File transfer protocol (FTP)
Point-to-point protocol (PPP)
Hypertext transfer protocol secure (HTTPS)
Simple network management protocol (SNMP) Correct Answer: Simple network management
protocol (SNMP)
Which service is managed at the transport layer of the TCP/IP stack?
Network file services (NFS)
User datagram protocol (UDP)
Hypertext transfer protocol (HTTP)
Simple mail transfer protocol (SMTP) Correct Answer: User datagram protocol (UDP)
Which layer of TCP/IP composes the simplex connectionless protocol user datagram protocol
(UDP)?
Network
Transport
Application
Presentation Correct Answer: Transport
Which layer of the OSI model is affected if a data center experienced a power outage with no
backup power supply?
Session
Network
Physical
Transport Correct Answer: Physical
Which layer is affected if an organization has weak authentication communication protocols?
Session
Transport
Application
, Presentation Correct Answer: Session
A consultant explains that there is no mechanism within internet control message protocol
(ICMP) for the retransmission of lost or damaged packets.
Why are ICMP error messages sent to the host?
Transmission control protocol (TCP) connection-related protocols can detect errors.
They help the sending process or its human user to diagnose problems.
Connection- or session-related protocols detect errors in the local area network (LAN).
ICMP automatically retransmits every other packet to support WAN connectivity. Correct
Answer: They help the sending process or its human user to diagnose problems.
According to error logs associated with the local area network (LAN), one of the layers of the
OSI model needs to be used to provide error correction.
Which layer should be used?
Session
Data link
Transport
Application Correct Answer: Transport
A software developer needs to disconnect a transmission control protocol (TCP) session when a
communication session is complete.
What is the first packet that ensures this process?
FIN flagged packet
SYN flagged packet
ACK flagged packet
RST flagged packet Correct Answer: FIN flagged packet
A software developer establishes a communication between a web server and a web browser
over a network connection.
Which protocol is encapsulated in the transmission control protocol (TCP) to ensure this action?
User datagram protocol (UDP)
File transfer protocol (FTP)
Simple mail transfer protocol (SMTP)
Hypertext transfer protocol (HTTP) Correct Answer: Hypertext transfer protocol (HTTP)
How would hackers sniff network traffic during an address resolution protocol (ARP) poisoning
attack?
By locating corresponding media access control (MAC) addresses using reverse ARP