QUESTION 20: Which of the following is the MOST secure form of authentication? A. Kerberos B. Biometrics C. Smart Cards D.

Username/password QUESTION 21: Which of the following is the LEAST secure form of authentication? A. Kerberos B. Biometrics C. Smart Cards D. Username/password QUESTION 32: One of the below options are correct regarding the DoS (Denial of Service) attack? A. Prevention access to resources by users authorized to use those resources. B. Use of multiple computers to attack a single organization. C. Placing a computer system between the sender and receiver to capture information D. Listening or overhearing parts of a conversation. QUESTION 34: Which of the following attacks would involve bringing down an e-commerce website to prevent or deny usage by legitimate customers? A. DoS B. Inception C. DDoS D. Eavesdropping QUESTION 40: Which of the following options is the correct sequence for the TCP Three-Way Handshake? A. Host A, SYN, SYN/ACK, ACK, Host B B. Host A, ACK, SYN/ACK, Host B, SYN C. Host A, SYN/ACK, ACK, SYN, Host B D. Host A, ACK, SYN/ACK, SYN, Host B QUESTION 43: Which of the following protocols is used to transmit e-mail between an e-mail client and an e-mail server?

E-mail. CD-Rom D. IMAP4 QUESTION 84: Which of the following are used to make connections between private networks across a public network? A. FTP C. Simple Mail Transfer Protocol (SMTP) D. Floppy C. version 3 (POP3) C. HTTP C. SNMP QUESTION 106: By which means do most network bound viruses spread? A. Hypertext Transfer Protocol (HTTP) B.A. Access control lists. Internet Control Message Protocol (ICMP) QUESTION 44: Which of the following protocols is used to transmit data between a web browser and a web server? A. SFTP D. SLIP (Serial Line Internet Protocol) B. SMTP B. B. . SSH B. B. Mass storage devices QUESTION 116: Which of the following are NOT features of a firewall? (Choose all that apply) A. Post Office Protocol. RADIUS (Remote Authentication Dial-In User Service) QUESTION 102: Which of the following protocols make use of port 25? A. PPP (Point-to-Point Protocol) C. Dynamic packet filtering. Telnet D. VPN D.

Switches and bridges D. where traffic sent to one port is sent to all other ports? A. QUESTION 126: Choose the type of encryption used by SSL (Secure Sockets Layer). From the Internet B. VPN (Virtual Private Network) QUESTION 129: From the list of protocols. Which is it? A. SMTP (Simple Mail Transfer Protocol) QUESTION 137: Which of the following network devices is considered the simplest in a networking environment and most vulnerable to attacks. Symmetric key exchange. HTTP (Hypertext Transfer Protocol) C. which is used to secure web transactions? A. S/MIME (Secure Multipurpose Internet Mail Extensions) B. SSL (Secure Sockets Layer) D. QUESTION 137: . From the inside network C. Public keys. Authentication. From universities D. B. Routers C. Virus protection. because they serve as central connectivity devices between hosts. D. Asymmetric key exchange. XML (Extensible Makeup Language) C. SSL (Secure Sockets Layer) D. A. IPSec (Internet Protocol Security) B. From intruders who gain physical access to the computer resources E. QUESTION 127: One of these protocols is used to encrypt traffic passed between a web browser and web server. C. D. Hubs B. Secret encryption.C. All of the above QUESTION 137: Where do most attacks on an organization’s computer resources originate? A.

Confidentiality B. Vulnerability . Integrity D. Availability QUESTION 137: Which of the following is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or data on the system? A. Mitigation D. Redundancy C.What are the three primary goals of network security? (Choose three.) A. Exploit C. Risk B.