1.All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:
2.Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
C. Trojan horse
3.Which of the following network filtering devices will rely on signature updates to be effective?
A. Proxy server
4.Which of the following is a single server that is setup in the DMZ or outer perimeter in order to distract attackers?
5.Which of the following increases the collision resistance of a hash?
B. Increase the input length
C. Rainbow Table
D. Larger key space
6.Which of the following access control methods gives the owner control over providing permissions?
A. Role-Based Access Control (RBAC)
B. Rule-Based Access control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
7.Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?
8.Which of the following is the LEAST intrusive way of checking the environment for known software flaws?
A. Protocol analyzer
B. Vulnerability scanner
C. Port scanner
D. Penetration test
9.If a certificate has been compromised, which of the following should be done?
A. Run the recovery agent.
B. Put the certificate on the CRL.
C. Put the certificate in key escrow.
D. Suspend the certificate for further investigation.
10.Which of the following can be used as a means for dual-factor authentication?
A. RAS and username/password
B. RADIUS and L2TP
C. LDAP and WPA
D. Iris scan and proximity card