Information Assurance

Information Assurance

Interview Questions

1.All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:

A. SSL.
B. SSH.
C. L2TP.
D. IPSeC.

Answer:
C
2.Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

A. Steganography
B. Worm
C. Trojan horse
D. Virus

Answer:
A
3.Which of the following network filtering devices will rely on signature updates to be effective?

A. Proxy server
B. Firewall
C. NIDS
D. Honeynet

Answer:
C
4.Which of the following is a single server that is setup in the DMZ or outer perimeter in order to distract attackers?

A. Honeynet
B. DMZ
C. Honeypot
D. VLAN

Answer:
C

5.Which of the following increases the collision resistance of a hash?

A. Salt
B. Increase the input length
C. Rainbow Table
D. Larger key space

Answer:
A
6.Which of the following access control methods gives the owner control over providing permissions?

A. Role-Based Access Control (RBAC)
B. Rule-Based Access control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)

Answer:
D
7.Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?

A. TACACS
B. RAS
C. RADIUS
D. Kerberos

Answer:
D
8.Which of the following is the LEAST intrusive way of checking the environment for known software flaws?

A. Protocol analyzer
B. Vulnerability scanner
C. Port scanner
D. Penetration test

Answer:
B
9.If a certificate has been compromised, which of the following should be done?

A. Run the recovery agent.
B. Put the certificate on the CRL.
C. Put the certificate in key escrow.
D. Suspend the certificate for further investigation.

Answer:
B
10.Which of the following can be used as a means for dual-factor authentication?

A. RAS and username/password
B. RADIUS and L2TP
C. LDAP and WPA
D. Iris scan and proximity card

Answer:
D