1. Which of the following is an example of a false negative?

A. The IDS does not identify a buffer overflow
B. Anti-virus identifies a benign application as malware
C. Anti-virus protection interferes with the normal operation of an application
D. A user account is locked out after the user mistypes the password too many times

2. Which of the following encrypts the body of a packet, rather than just the password, while sending information?

A. LDAP
B. TACACS+
C. ACLs
D. RADIUS

3. Which of the following is similar to a smurf attack, but uses UDP instead of ICMP?

A. X-MAS attack
B. Fraggle attack
C. Vishing
D. Man-in-the-middle attack

4. Which of the following accurately describes the strongest multifactor authentication?

A. Something you are, something you have
B. Something you have, something you know
C. Something you are near to, something you have
D. Something you have, someone you know

5. Which of the following is a valid server-role in a Kerberos authentication system?

A. Token issuing system
B. Security assertion server
C. Authentication agent
D. Ticket granting server

Back to Top
Site Code:
DIRECT