Question 1
0.6 out of 0.6 points
Which of the following refers to a communication pathway, circuit, or frequency
dedicated or reserved for a specific transmission?
Selected
Answer:
Channel
Answers: Hardware VPN
Host-to-site VPN
Asymmetric cryptography
Channel
Question 2
0.6 out of 0.6 points
Which term describes a network, network link, or channel located between the
endpoints of a VPN?
Selected
Answer:
Intermediary
network
Answers: One-way function
Host-to-host network
Site-to-site network
Intermediary
network
Question 3
0.6 out of 0.6 points
Which of the following characteristics describes an edge router?
Selected
Answer:
The last device owned and controlled by an organization before an
ISP or telco connection
Answers:
The last device owned and controlled by an organization before an
ISP or telco connection
A form of VPN establishing a secure VPN over trusted VPN
connections
A form of cryptography in which each encryption key is used once
before being discarded
, A security service that ensures that a sender cannot deny sending a
message
Question 4
0.6 out of 0.6 points
Which of the following refers to a form of IDS/IPS detection based on a recording of
real-world traffic as a baseline for normal?
Selected
Answer:
Behavioral-based detection
Answers: Knowledge-based detection
Signature-based detection
Anomaly-based detection
Behavioral-based detection
Question 5
0.6 out of 0.6 points
Which name is given to a probability prediction based on statistics and historical
occurrences on the likelihood of how many times in the next year a threat is going to
cause harm?
Selected
Answer:
Annualized rate of occurrence (ARO)
Answers: Tunnel mode encryption
Physical address
Annualized rate of occurrence (ARO)
Rule
Question 6
0.6 out of 0.6 points
Which of the following is a technique for storing or copying log events to a
centralized logging server?
Selected
Answer:
Syslog
Answers:
Syslog
Write-once read-many (WORM) storage
Unified Threat Management (UTM)
Firewall logging
Question 7
, 0.6 out of 0.6 points
Which of the following refers to a type of software product that is pre-compiled and
whose source code is undisclosed?
Selected
Answer:
Closed source
Answers: Circuit
Closed source
Bots
Physical address
Question 8
0.6 out of 0.6 points
Which of the following refers to a network access control or admission control (NAC)
used on individual network access devices such as firewalls, VPN gateways, and
wireless routers to offload authentication to a dedicated authentication
server/service?
Selected
Answer:
Port-based network access (admission) control (PNAC)
Answers:
Port-based network access (admission) control (PNAC)
Database-based detection
Management interface
Access control list (ACL)
Question 9
0.6 out of 0.6 points
Which name is given to a hacking technique used against static packet filtering
firewalls to discover the rules or filters controlling inbound traffic?
Selected
Answer:
Firewalking
Answers: Filter
Signature-based detection
Firewalking
Database-based detection
Question 10
0.6 out of 0.6 points
Which term describes the cumulative value of an asset based on both tangible and
, intangible values?
Selected
Answer:
Asset value (AV)
Answers:
Asset value (AV)
Exposure factor (EF)
Single loss expectancy (SLE)
Packet
Question 11
0.6 out of 0.6 points
Which of the following describes an access control list (ACL)?
Selected
Answer:
A mechanism that defines traffic or an event to apply an authorization
control of allow or deny against
Answers:
A mechanism that defines traffic or an event to apply an authorization
control of allow or deny against
An intrusion detection system/intrusion prevention system (IDS/ IPS)
based on a defined normal, often defined using rules similar to firewall
rules
An event that does not trigger an alarm but should have, due to the
traffic or event actually being abnormal and/or malicious
A form of IDS/IPS detection based on a collection of samples, patterns,
signatures, and so on
Question 12
0.6 out of 0.6 points
Which of the following is a malicious software program distributed by a hacker to
take control of a victim’s computers?
Selected
Answer:
Agent
Answers: Sacrificial host
Client
Server
Agent
Question 13
0.6 out of 0.6 points
0.6 out of 0.6 points
Which of the following refers to a communication pathway, circuit, or frequency
dedicated or reserved for a specific transmission?
Selected
Answer:
Channel
Answers: Hardware VPN
Host-to-site VPN
Asymmetric cryptography
Channel
Question 2
0.6 out of 0.6 points
Which term describes a network, network link, or channel located between the
endpoints of a VPN?
Selected
Answer:
Intermediary
network
Answers: One-way function
Host-to-host network
Site-to-site network
Intermediary
network
Question 3
0.6 out of 0.6 points
Which of the following characteristics describes an edge router?
Selected
Answer:
The last device owned and controlled by an organization before an
ISP or telco connection
Answers:
The last device owned and controlled by an organization before an
ISP or telco connection
A form of VPN establishing a secure VPN over trusted VPN
connections
A form of cryptography in which each encryption key is used once
before being discarded
, A security service that ensures that a sender cannot deny sending a
message
Question 4
0.6 out of 0.6 points
Which of the following refers to a form of IDS/IPS detection based on a recording of
real-world traffic as a baseline for normal?
Selected
Answer:
Behavioral-based detection
Answers: Knowledge-based detection
Signature-based detection
Anomaly-based detection
Behavioral-based detection
Question 5
0.6 out of 0.6 points
Which name is given to a probability prediction based on statistics and historical
occurrences on the likelihood of how many times in the next year a threat is going to
cause harm?
Selected
Answer:
Annualized rate of occurrence (ARO)
Answers: Tunnel mode encryption
Physical address
Annualized rate of occurrence (ARO)
Rule
Question 6
0.6 out of 0.6 points
Which of the following is a technique for storing or copying log events to a
centralized logging server?
Selected
Answer:
Syslog
Answers:
Syslog
Write-once read-many (WORM) storage
Unified Threat Management (UTM)
Firewall logging
Question 7
, 0.6 out of 0.6 points
Which of the following refers to a type of software product that is pre-compiled and
whose source code is undisclosed?
Selected
Answer:
Closed source
Answers: Circuit
Closed source
Bots
Physical address
Question 8
0.6 out of 0.6 points
Which of the following refers to a network access control or admission control (NAC)
used on individual network access devices such as firewalls, VPN gateways, and
wireless routers to offload authentication to a dedicated authentication
server/service?
Selected
Answer:
Port-based network access (admission) control (PNAC)
Answers:
Port-based network access (admission) control (PNAC)
Database-based detection
Management interface
Access control list (ACL)
Question 9
0.6 out of 0.6 points
Which name is given to a hacking technique used against static packet filtering
firewalls to discover the rules or filters controlling inbound traffic?
Selected
Answer:
Firewalking
Answers: Filter
Signature-based detection
Firewalking
Database-based detection
Question 10
0.6 out of 0.6 points
Which term describes the cumulative value of an asset based on both tangible and
, intangible values?
Selected
Answer:
Asset value (AV)
Answers:
Asset value (AV)
Exposure factor (EF)
Single loss expectancy (SLE)
Packet
Question 11
0.6 out of 0.6 points
Which of the following describes an access control list (ACL)?
Selected
Answer:
A mechanism that defines traffic or an event to apply an authorization
control of allow or deny against
Answers:
A mechanism that defines traffic or an event to apply an authorization
control of allow or deny against
An intrusion detection system/intrusion prevention system (IDS/ IPS)
based on a defined normal, often defined using rules similar to firewall
rules
An event that does not trigger an alarm but should have, due to the
traffic or event actually being abnormal and/or malicious
A form of IDS/IPS detection based on a collection of samples, patterns,
signatures, and so on
Question 12
0.6 out of 0.6 points
Which of the following is a malicious software program distributed by a hacker to
take control of a victim’s computers?
Selected
Answer:
Agent
Answers: Sacrificial host
Client
Server
Agent
Question 13
0.6 out of 0.6 points