CIS 552 CIS552 WEEK 5 MIDTERM EXAM (SPRING 2017)

    1. All but which one of the following is security vulnerability found in RIP?a. Broadcasts all datab. No authenticationc. Travels only 56 hopsd. Subject to route poisoning2. Which of the following is the main purpose of ICMP?a. Packet deliveryb. Error detection and correctionc. Logical errors and diagnosticsd. IP packet delivery3. OSPF operates at which of the following layers of the OSI model?a. Sessionb. Applicationc. Transportd. Network4. Which of the following statements is true in regard to protocols?a. IP is a routing protocol whereas RIP is a routable protocol.b. OSPF is a routing protocol whereas IP is a routable protocol.c. BGP is used as a routable protocol whereas RIP is a routing protocol.d. Routable protocols are used to dene the best path from point A to point B while routing protocols are used to transport the data5. Which of the following is a common application layer attack?a. Port scanningb. Malwarec. Session hijackd. SYN attack6. When choosing between guards and dogs for physical which of the following factors must be considered?a. Liabilityb. Discernmentc. Dual roled. Multifunction7. Which of the following biometric authentication methods is most frequently found on laptops?a. Retinab. Fingerprintc. Irisd. Voice recognition8. Which of the following lock grades should be selected in order to appropriately protect critical business assets?a. Grade 4b. Grade 2c. Grade 1d. Grade 39. CCTV can be used as which of the following type of tools?a. Detective onlyb. Preventive onlyc. Detective and reactived. Reactive and preventative10. Focal length defines which of the following camera qualities?a. Degree of granularityb. Ability to zoomc. Scope of colord. Horizontal and vertical view11. Which of the following describes penetration testing as a four-step process?a. HIPAAb. NIST 800-42c. FISMAd. NIST 800-3712. Which of the following is a corporate governance law that affects public corporations financial reporting?a. SOXb. HIPAAc. FISMAd. NIST 800-5313. Which of the following statements is most accurate in regard to successful security professionals?a. Once certified they are current for as long as they practiceb. They must have at minimum a masters level college degreec. They commit to lifelong learningd. They only need to know general terms of technology14. Which of the following terms best describes hackers that occupy the lowest level of the hacker hierarchy?a. Script kiddiesb. White-hathackersc. Gray-hathackersd. Black-hathackers15. Which of the following controls take the form of software or hardware such as firewalls proxies and intrusion detection systems?a. Administrativeb. Technicalc. Physicald. Logical16. In order to locate domain information on a Canadian organization which of the following Regional Internet Registries would be checked first?a. LACNICb. APNICc. RIPEd. ARIN17. Which of the following databases would be valuable for obtaining information about a companys financial history?a. Internet Assigned Numbers Authority (IANA)b. Wayback Machinec. EDGARd. Whois18. Which of the following is most likely to provide a wealth of publicly posted information about an organizations employees?a. E-mailb. Social networking sitesc. The organization’s intranetd. User group forums19. In order to locate domain information on a European organization which of the following Regional Internet Registries would be checked first?a. LACNICb. APNICc. RIPEd. ARIN20. Which of the following best describes the purpose of the in title command?a. Instructs Google to search for a term within the title of a documentb. Instructs Google to ignore words in the title of a specific documentc. Instructs Google to look in the URL of a specific sited. Instructs Google to search a specific URL21. Which of the following is a tool used for network mapping?a. Superscanb. Cheopsc. THC-Scand. Kismet22. Which of the following ports does SSH operate on?a. 20b. 22c. 80d. 11023. Which of the following is a tool used for wardriving?a. Superscanb. Cheopsc. THC-Scand. Kismet24. Which of the following best describes the SYN flag?a. Synchronize sequence number **a 144b. Acknowledgement of sequence numberc. Final data flag used during the four-step shutdownd. Reset bit used to close an abnormal connection25. Modems can be located by conducting what type of attack?a. Wardialingb. Wardrivingc. Pingingd. Port scans26. Which of the following is a commonly used hashing algorithm?a.DESb.MD5c.AESd. Twofish27. Which of the following is a cipher commonly known as a key shift cipher?a. Vernamb. Caesarc. Concealmentd. Vigenere28. Key management includes all but which one of the following processes?a. Generationb. Storagec. Destructiond. Layering29. Which of following methods is best suited in a situation where bulk encryption is required?a.RSAb.ECCc.DESd.MD530. Which of the following terms best describes the main principle behind PKI?a. Hashingb. Established trustc. Nonreputationd. Availability

                                                                                                                                      Order Now