1. This technology is used to measure and analyze human body characteristics for
authentication purposes.
Correct : B. Biometrics
2. __________ is an electronic or paper log used to track computer activity.
Correct : D. Audit trail
3. This is a series of messages sent by someone attempting to break into a computer to learn which computer network services the computer provides.
Correct : D. Port scan
4. This is the name for a group of programmers who are hired to expose errors or security
holes in new software or to find out why a computer network's security is being broken.
Correct : C. Tiger team
5. This is a mechanism for ensuring that only authorized users can copy or use specific software applications.
Correct : D. Dongle
6. At which two traffic layers do most commercial IDSes generate signatures?
Correct : B. Network layer
7. This is a Peripheral Component Interconnect (PCI) card that offloads SSL processing to
speed up secure transactions on e-commerce Web sites.
Correct : C. Server accelerator card
8. ___________is a form of eavesdropping used to pick up telecommunication signals by
monitoring the electromagnetic fields produced by the signals.
Correct : C. Van Eck phreaking
9. This enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.
Correct : B. Public key infrastructure (PKI)
10. This is an assault on the integrity of a security system in which the attacker substitutes
a section of cipher text (encrypted text) with a different section that looks like (but is not the same as) the one removed.
Correct : D. Cut and paste attack
11. Which of the following is an advantage of anomaly detection?
Correct : C. The engine can scale as the rule set grows.
12. A false positive can be defined as…
Correct : D. Both a. and b.
13. This is an encryption/decryption key known only to the party or parties that exchange
secret messages.
Correct : C. Private key
14. What is the purpose of a shadow honeypot?
Correct : C. To randomly check suspicious traffic identified by an anomaly detection system.
15. This is is the hiding of a secret message within an ordinary message and the extraction
of it at its destination.
Correct : D. Steganography
16. An IDS follows a two-step process consisting of a passive component and an active
component. Which of the following is part of the active component?
Correct : B. Mechanisms put in place to reenact known methods of attack and record system responses
17. When discussing IDS/IPS, what is a signature?
Correct : B. Attack-definition file
18. "Semantics-aware" signatures automatically generated by Nemean are based on traffic
at which two layers?
Correct : D. Both a and c
19. In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?
Correct : D. Path traversal attacks
20. Which of the following is true of improper error handling?
Correct : D. All of the above.
21. Which of the following is NOT recommended for securing Web applications against authenticated users?
Correct : A. Client-side data validation
22. In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source?
Correct : A. Cross-site scripting
23. In which of the following exploits does an attacker add SQL code to a Web form input
box to gain access to resources or make changes to data?
Correct : C. SQL injection
24. Which of the following is characteristic of spyware?
Correct : B. Aggregating surfing habits across multiple users for advertising
25. One of the most obvious places to put an IDS sensor is near the firewall. Where exactly
in relation to the firewall is the most productive placement?
Correct : A. Inside the firewall
26. This was commonly used in cryptography during World War II.
Correct : D. One-time pad
27. Today, many Internet businesses and users take advantage of cryptography based on
this approach.
Correct : A. Public key infrastructure
28. This is the name for the issuer of a PKI certificate.
Correct : B. Certificate authority
29. Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring
program by individuals and is also used by many corporations.
Correct : D. Pretty Good Privacy
30. This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm.
Correct : A. Rijndael
31. This is the inclusion of a secret message in otherwise unencrypted text or images.
Correct : B. Steganography
32. In password protection, this is a random string of data used to modify a password hash.
Correct : B. Salt
33. This is a mode of operation for a block cipher, with the characteristic that each possible
block of plaintext has a defined corresponding cipher text value and vice versa.
Correct : D. Electronic Code Book
34. This is a trial and error method used to decode encrypted data through exhaustive
effort rather than employing intellectual strategies.
Correct : D. Brute force cracking
35. An intruder might install this on a networked computer to collect user ids and
passwords from other machines on the network.
Correct : B. Root kit
36. This type of intrusion relies on the intruder's ability to trick people into breaking
normal security procedures.
Correct : D. Social engineering
37. The developers of an operating system or vendor application might issue this to prevent
intruders from taking advantage of a weakness in their programming.
Correct : D. Patch
38. This is an attack on a computer system that takes advantage of a particular
vulnerability that the system offers to intruders.
Correct : C. Exploit
39. This is a program in which harmful code is contained inside apparently harmless
programming or data.
Correct : D. Trojan horse
40. This is the modification of personal information on a Web user's computer to gain
unauthorized information with which to obtain access to the user's existing accounts.
Correct : B. Cookie poisoning
41. This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions - for example, changing data or disclosing confidential information.
Correct : A. Buffer overflow
42. This is the forging of an e-mail header so that the message appears to have originated
from someone or somewhere other than the actual source.
Correct : C. E-mail spoofing
43. This is a type of network security attack in which the intruder takes control of a
communication between two entities and masquerades as one of them.
Correct : A. Hijacking
44. This is a compromised Web site that is being used as an attack launch point in a denialof-service attack.
Correct : D. Zombie
45. This electronic "credit card" establishes a user's credentials when doing business or
other transactions on the Web and is issued by a certification authority.
Correct : B. Digital certificate
46. What "layer" of an e-mail message should you consider when evaluating e-mail
security?