Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following errors most commonly occurs when responding to a security breach?

A.

Shutting down network access using the firewall, rather than the network router

B.

Adhering to the company policy rather than determining actions based on the IT manager's input

C.

Making snap judgments based on emotions, as opposed to company policy

D.

Taking too much time to document the attack

Which of the following can help you authoritatively trace a network flooding attack?

A.

Your ISP

B.

Firewall logs

C.

Router logs

D.

Ping

A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?

A.

Filtering traffic at the firewall

B.

Changing your ISP

C.

Installing Apache Server rather than Microsoft IIS

D.

Placing the database and the Web server on separate systems

What is the primary strength of symmetric-key encryption?

A.

It allows easy and secure exchange of the secret key.

B.

It creates a ash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.

C.

It can encrypt large amounts of data very quickly.

D.

It provides non-repudiation services more efficiently than asymmetric-key encryption.

Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?

A.

Enable stateful multi-layer inspection on the packet filter

B.

Implement caching on the network proxy server

C.

Enable authentication on the network proxy server

D.

Implement a screening router on the network DMZ

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

A.

Authentication databases, including directory servers

B.

Intrusion detection systems, especially those placed on sensitive networks

C.

Log files on firewall systems

D.

Firewall settings for desktop systems

You have implemented a version of the Kerberos protocol for your network. What service does Kerberos primarily offer?

A.

Authentication

B.

Encryption

C.

Non-repudiation

D.

Data integrity

You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network. Which form of encryption should you use?

A.

Asymmetric

B.

PGP

C.

Hash

D.

Symmetric

Which of the following is considered to be the most secure default firewall policy, yet usually causes the most work from an administrative perspective?

A.

Configuring the firewall to respond automatically to threats

B.

Blocking all access by default, then allowing only necessary connections

C.

Configuring the firewall to coordinate with the intrusion-detection system

D.

Allowing all access by default, then blocking only suspect network connections

Which choice lists typical firewall functions?

A.

Creating a VLAN and configuring the intrusion-detection system

B.

Issuing alerts and limiting host access

C.

Logging traffic and creating a choke point

D.

Implementing the security policy and scanning the internal network