Am I awake
Sometimes they come back
Terminator X
Yo!
Paintball
100
Which of the following is not a valid access control mechanism? A. DAC B. SAC C. MAC D. RBAC
What is B. SAC
100
Which of the following password generators is based on challenge-response mechanisms? a. asynchronous b. synchronous c. cryptographic keys d. smart cards
What is b. synchronous (has an authentication server that generates a challenge string)
100
What does CHAP stand for? a. Challenge Handy Application b. Challenge Handshake Application Protocol c. Challenge Handshake Access Protocol d. Challenge Handshake Authentication Protocol
What is d. Challenge Handshake Authentication Protocol
100
What port number is DNS? a. 2 b. 56 c. 53 d. 55
What is C. 53
100
What is a program that can infect other programs by modifying them to include a version of it called? a. replicator b. virus c. Trojan horse d. logic bomb
What is B. Virus
200
Which of the following best describes an access control mechanism in which access control decisions are based on the responsibilities that an individual user or process has in an organization? A. MAC B. RBAC C. DAC D. None
What is B. RBAC
200
Which of the following password management systems is designed to provide for a large number of users? a. self service password resets b. locally saved passwords c. multiple access methods d. synchronized passwords
What is a. self service password resets
200
Why are biometrics used? a. accountability b. certification c. authorization d. authentication
What is D. Authentication
200
****Please wake up Max**** What type of attack occurs when the session initiation between TCP and a server is compromised? a. Buffer Overflow b. SYN Attack c. Smurf D. Birthday Attack
What is B. SYN Attack
200
What type of virus can hide itself by intercepting disk access requests? a. multipartite b. stealth c. interceptor d. polymorphic
What is B. Stealth
300
Which of the following best describes and access control mechanism that allows the data owner to create and administer access control? A. MAC B.RBAC C. LBAC D. DAC
What is D. What is DAC
300
Which of the following best describes a challenge-response session? a. a workstation or system that generates random challenge string b. a workstation or system that generates a random login ID c. a special hardware device that is used to generate random text in cryptography system d. the authentication mechanism in the workstation or system does not determine if the owner should be authenticated
What is a. a workstation or system that generates a random challenge string
300
Which of the following is the most costly method of authentication? a. passwords b. tokens c. biometrics d. shared secrets
What is C. Biometrics
300
What is TCP IP (Define the acronym)
What is Transmission Control Protocol Internet Protocol
300
What is a program that appears to be useful but contains hidden code that allows unauthorized individuals to exploit or destroy data is commonly known? a. virus b. Trojan horse c. worm d. back door
What is B. Trojan
400
Which of the following is a flaw of DAC? a. relies only on the identity of the user b. relies on certificates c. anyone can use the account d. has no flaws
What is a. relies only on the identity of the user
400
Which of the following must be deployed for Kerberos to function properly? a. Dynamic IP b. Separate network segments c. Token authentication devices d. Time synchronization services
What is D. Time synchronization
400
Which of the following provides the strongest form of authentication? a. token b. username and password c. biometrics d. one time password
What is C. Biometrics
400
What should the minimum length of a password be to deter dictionary password cracks? a. 6 characters b. 8 characters c. 10 characters d. 12 characters
What is B. 8 characters
400
What do intruders use most often to gain unauthorized-access to a system? a. brute force attack b. key logging c. Trojan horse d. social engineering
What is D. Social engineering
500
Which of the following access control methods provides the most protection? a. capabilities b. access control list c. permission bits d. profiles
What is b. access control list
500
Why are clocks used in Kerberos authentication system? a. To ensure proper connections b. To ensure tickets expire correctly c. To generate the seed value of encryption keys d. To benchmark and set the optimal encryption algorithm
What is B. To ensure tickets expire correctly
500
How many ports in TCP/IP are vulnerable to being scanned, exploited, or attached? a. 32 b. 1024 c. 65,534 d. 16,777,216
What is C. 65,534
500
In which of the following does someone use an application to capture and manipulate packets as they are passing through your network? a. DDOS b. Back Door c. Spoofing d. Man in the middle
What is D. Man in the middle
500
Which of the following is an example of the theft of network passwords without the use of software tools? a. Trojan programs b. social engineering c. sniffing d. hacking
What is B. Social Engineering