Information Assurance

Information Assurance

Interview Questions

1.All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:

A. SSL.
B. SSH.
C. L2TP.
D. IPSeC.

Answer:
C
2.Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

A. Steganography
B. Worm
C. Trojan horse
D. Virus

Answer:
A
3.Which of the following network filtering devices will rely on signature updates to be effective?

A. Proxy server
B. Firewall
C. NIDS
D. Honeynet

Answer:
C
4.Which of the following is a single server that is setup in the DMZ or outer perimeter in order to distract attackers?

A. Honeynet
B. DMZ
C. Honeypot
D. VLAN

Answer:
C

5.Which of the following increases the collision resistance of a hash?

A. Salt
B. Increase the input length
C. Rainbow Table
D. Larger key space

Answer:
A
6.Which of the following access control methods gives the owner control over providing permissions?

A. Role-Based Access Control (RBAC)
B. Rule-Based Access control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)

Answer:
D
7.Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?

A. TACACS
B. RAS
C. RADIUS
D. Kerberos

Answer:
D
8.Which of the following is the LEAST intrusive way of checking the environment for known software flaws?

A. Protocol analyzer
B. Vulnerability scanner
C. Port scanner
D. Penetration test

Answer:
B
9.If a certificate has been compromised, which of the following should be done?

A. Run the recovery agent.
B. Put the certificate on the CRL.
C. Put the certificate in key escrow.
D. Suspend the certificate for further investigation.

Answer:
B
10.Which of the following can be used as a means for dual-factor authentication?

A. RAS and username/password
B. RADIUS and L2TP
C. LDAP and WPA
D. Iris scan and proximity card

Answer:
D

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.