PROBLEM 1 – Network Access Control (20 points)
(5 pts each)
A) Policies, authentication and access control
B) Authentication, access control and remediation
C) Authentication, access control and audit
D) Policies, remediation and audit
A) Individuals rotate security-related duties so that no one person is permanently responsible for a sensitive function.
B) Includes two-man and dual operator controls.
C) Operators maintain an arms-length relationship with security controls.
D) Continuous retraining of personnel.
E) Ensures that no one person can compromise the whole system.
A) It retrieves security credentials directly from the endpoints.
B) It evaluates security credentials and makes an admission control policy decision.
C) It enforces admission control policy decision.
D) All of the above
A) Risk Assignment
B) Risk Containment
C) Risk Acceptance
D) Risk Reduction
PROBLEM 2 – IPSec and VPN (20 points)
(5 pts each)
A) Transport and Session Header
B) Encapsulating and Authenticating Header
C) Authentication Header and Encapsulating Security Payload
D) TCP and UDP
A) First encapsulated in another datagram and then encrypted.
B) First encrypted and then encapsulated in another datagram.
C) First authenticated and then encrypted.
D) First encrypted and then authenticated.
A) Some extranets are VPNs; some VPNs are extranets.
B) Some extranets are VPNs; all VPNs are extranets.
C) VPNs and extranets are the same type of network.
D) VPNs are unrelated to extranets.
A) VPN-specific gateway device.
B) Router-based.
C) Firewall-based.
D) Software only.
E) All of the above.
PROBLEM 3 – Firewalls (20 points)
(5 pts each)
A) High security.
B) Application independence.
C) Performance strength.
D) Excellent scalability.
A) The management console is easily installed.
B) The device contains proprietary operating systems.
C) The connection to the device is monitored by security personnel.
D) A thorough packet inspection capability.
E) The hackers know most router-based firewall code.
A) Stateful Firewall.
B) Non-Passive Firewall.
C) Active State Firewall.
D) Stateless Firewall.
E) None of the above
A) Network Address Translator.
B) Web Proxy.
C) Web Firewall.
D) Host based firewall.
PROBLEM 4 – Wireless Network Security (20 points)
(5 pts each)
A) Wireless Encryption Protocol (WEP)
B) Wireless Application Protocol (WAP)
C) Wired Equivalent Privacy (WEP)
D) Wireless Session Protocol (WSP)
A) Forged deauthenticate frames
B) RF jamming
C) TCP SYN floods
D) Data sniffing
A) WEP