ANSWERS TESTED AND APPROVED NEW
MODIFIED EXAM
A structure that replaces a normal single door with a phone booth-
sized space with a door on each side is called a ________. --
CORRECT ANSWER--mantrap
Greg is educating users about social media concerns in the corporate
setting. Which of the following risks is most likely associated with an
employee who has recently been terminated? --CORRECT
ANSWER--Tweet rage
Barry is investigating the unauthorized access to his chief executive
officer's (CEO's) email account. Barry discovers the tools Ettercap
and Hunt on a nearby workstation. Which of the following attacks is
the most likely cause of the breach? --CORRECT ANSWER--Session
hijacking
Which type of token does NOT require that the card be inserted or
slid through a reader? --CORRECT ANSWER--Contactless
Page 1 of 20
,The act of a third party covertly monitoring Internet and telephone
conversations is called ________. --CORRECT ANSWER--
wiretapping
Consumption of bandwidth, consumption of resources, and
exploitation of programming defects are the three broad categories of
________. --CORRECT ANSWER--denial of service (DoS) attacks
From a security standpoint, which of the following is NOT desirable
in a door? --CORRECT ANSWER--Hollow core
Lin is designing the locks for a sensitive data center facility. She
would like to choose the strongest possible lock that is appropriate for
use in a commercial facility. What type of lock should she choose? --
CORRECT ANSWER--Grade 1
A device used to break a network into multiple logical network
segments known as collision domains is called a ________. --
CORRECT ANSWER--switch
Page 2 of 20
, Active@ and Trinity Rescue Kit are examples of ________. --
CORRECT ANSWER--tools used to change passwords
Attackers' attempts to stop their attacks from being detected are
referred to as ________. --CORRECT ANSWER--covering tracks
________ is designed to convert fully qualified domain names
(FQDNs) into numeric Internet Protocol (IP) addresses or IP
addresses into FQDNs. --CORRECT ANSWER--Domain Name
System (DNS)
Which of the following is NOT a step in the common lock picking
method of scraping? --CORRECT ANSWER--A pry bar is used to
pry the lock away from the door.
Which of the following statements is NOT true regarding Address
Resolution Protocol (ARP) poisoning? --CORRECT ANSWER--It
cannot be used to tap Voice over IP (VoIP) phone calls.
A mechanical or electronic device designed to secure, hold, or close
items operated by a key, combination, or keycard is a ________. --
CORRECT ANSWER--lock
Page 3 of 20