Lions
Tigers
Bears
100

An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?

A - Load balancing

See Ch. 6: Network Security Devices, Design, and Technology, Section - Standard Network Devices

100

What type of attack is being performed when multiple computers overwhelm a system with fake requests?

A - DDoS

See Ch. 5: Networking and Server Attacks, Section - Server Attacks

100

What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?

A - Hactivists

See Ch. 1: Introduction to Security, Section - Hactivists

200

What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?

A - Extranet

See Ch. 6: Network Security Devices, Design, and Technology, Section - Security Zones

200

What specific type of phishing attack uses the telephone to target a victim?

A - Vishing

See Ch. 2: Malware and Social Engineering Attacks, Section - Psychological Approaches

200

What is the most commonly used asymmetric cryptography algorithm?

A - RSA

See Ch. 3: Basic Cryptography, Section - Asymmetric Cryptographic Algorithms

300

What is the secure alternative to the telnet protocol?

A - SSH

See Ch. 4: Advanced Cryptography and PKI, Section - Secure Shell (SSH)

300

If Bob receives an encrypted reply message from Alice, whose private key is used to decrypt the received message?

A - Bob's private key

See Ch. 3: Basic Cryptography, Section - Asymmetric Cryptographic Algorithms

300

Of the 3 states of data, what term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?

A - Data-in-use

See Ch. 3: Basic Cryptography, Section - Cryptography and Security

400

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

A - Gramm-Leach-Bliley

See Ch. 1: Introduction to Security, Section - Understanding the Importance of Information Security

400

In the process of a clients web browser initiating a session with a web server, what is used to create session keys?

A - Master secret

See Ch. 4: Advanced Cryptography and PKI, Section - Types of Digital Certificates

400

What length SSL and TLS keys are generally considered to be strong?

A - 4096

See Ch. 4: Advanced Cryptography and PKI, Section - Transport Layer Security (TLS)

500

Brokers and competitors could be considered among the many different types of what?

A - Threat actors

See Ch. 1: Introduction to Security, Section - Other Threat Actors

500

What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?

A - Intranet

See Ch. 6: Network Security Devices, Design, and Technology, Section - Security Zones

500

The name of the scrambled and unreadable output of encryption is:

A - Ciphertext (sometimes called Digest)

See Ch. 3: Basic Cryptography, Section - What Is Cryptography?

M
e
n
u