CYBR 3200 Final UPDATED Actual Exam Questions and CORRECT Answers
5 views 0 purchase
Course
CYBR 3200
Institution
CYBR 3200
CYBR 3200 Final UPDATED Actual Exam
Questions and CORRECT Answers
What is a VPN typically used for?
-secure remote access
-detection of security threats
-block open ports
-filter harmful scripts - CORRECT ANSWER- secure remote access
CYBR 3200 Final UPDATED Actual Exam
Questions and CORRECT Answers
What is a VPN typically used for?
-secure remote access
-detection of security threats
-block open ports
Why might you want your security system to provide nonrepudiation?
-to prevent a user from capturing packets and viewing sensitive information
-to prevent an unauthorized user from logging into the system
-to trace the origin of a worm spread through email
-so a user can't deny sending or receiving a communication - CORRECT ANSWER✔✔- so a
user can't deny sending or receiving a communication
What tool do you use to secure remote access by users who utilize the Internet?
-VPN
-IDS
-DMZ
-DiD - CORRECT ANSWER✔✔- VPN
Physical security protects a system from theft, fire, or environmental disaster.
True
False - CORRECT ANSWER✔✔- True
Reviewing log files is a time-consuming task and therefore should only be done when an
attack on the network has occurred.
True
False - CORRECT ANSWER✔✔- False
,A hactivist can best be described as which of the following?
-an unskilled programmer that spreads malicious scripts
-consider themselves seekers of knowledge
-use DoS attacks on Web sites with which they disagree
-deface Web sites by leaving messages for their friends to read - CORRECT ANSWER✔✔-
use DoS attacks on Web sites with which they disagree
A worm creates files that copy themselves repeatedly and consume disk space.
True
False - CORRECT ANSWER✔✔- True
Which of the following is NOT one of the three primary goals of information security?
confidentiality
integrity
impartiality
availability - CORRECT ANSWER✔✔- impartiality
Which type of attack works by an attacker operating between two computers in a network
and impersonating one computer to intercept communications?
malicious port scanning
man-in-the-middle
denial of service
With discretionary access control, network users can share information with other users,
making it more risky than MAC.
True
False - CORRECT ANSWER✔✔- True
In which form of authentication does the authenticating device generate a random code and
send it to the user who wants to be authenticated?
,basic
challenge/response
biometrics
signature - CORRECT ANSWER✔✔- challenge/response
What is a program that appears to do something useful but is actually malware?
virus
logic bomb
Trojan
back door - CORRECT ANSWER✔✔- Trojan
Defense in depth can best be described as which of the following?
a firewall that protects the network and the servers
a layered approach to security
antivirus software and firewalls
authentication and encryption - CORRECT ANSWER✔✔- a layered approach to security
Which of the following is the broadcast address for subnet 192.168.10.32 with subnet mask
255.255.255.240
192.168.10.63
192.168.10.47
192.168.10.23
192.168.10.95 - CORRECT ANSWER✔✔- 192.168.10.47
The TCP protocol uses a three-way handshake to create a connection.
True
False - CORRECT ANSWER✔✔- True
The IP address 172.20.1.5 is a private IP address.
True
, False - CORRECT ANSWER✔✔- True
Which of the following is a valid IPv6 address?
5BA4:2391:0:0:4C3E
1080::8:800:200C:417A
24::5B1A::346C
The Transport layer of the OSI model includes the RIP protocol.
True
False - CORRECT ANSWER✔✔- False
Which of the following addresses is a Class B IP address?
126.14.1.7
224.14.9.11
189.77.101.6
211.55.119.7 - CORRECT ANSWER✔✔- 189.77.101.6
What should you do when configuring DNS servers that are connected to the Internet in order
to improve security?
disable zone transfers
delete the DNS cache
disable DNS buffers
setup DNS proxy - CORRECT ANSWER✔✔- disable zone transfers
Which of the following is the first packet sent in the TCP three-way handshake?
RST
SYN
ACK
PSH - CORRECT ANSWER✔✔- SYN
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.