求学资讯 思科认证 提问
思科认证 > 模拟试题

思科认证考试综合考试题(全英)(一)

来源:用户上传 上传用户:zfy 发布时间:2017-06-27

导读:
求学资讯网更新了“思科认证考试综合考试题(全英)(一)”,供考生参考,更多资讯请继续关注求学资讯网。

单项选择题

1. Which of the following is a means of restricting access to objects based on the identity of the subject to 
which they belong?
A. Mandatory access control 
B. Group access control 
C. Discretionary access control 
D. User access control

2.  What is the purpose of certification path validation?
A. Checks the legitimacy of the certificates in the certification path. 
B. Checks that all certificates in the certification path refer to same certification practice statement. 
C. Checks that no revoked certificates exist outside the certification path. 
D. Checks that the names in the certification path are the same.

3.  Which one of the following instigates a SYN flood attack?
A. Generating excessive broadcast packets. 
B. Creating a high number of half-open connections. 
C. Inserting repetitive Internet Relay Chat (IRC) messages. 
D. A large number of Internet Control Message Protocol (ICMP) traces.

4.  To mitigate the impact of a software vendor going out of business, a company that uses vendor 
software should require which one of the following?
A. Detailed credit investigation prior to acquisition. 
B. Source code held in escrow. 
C. Standby contracts with other vendors. 
D. Substantial penalties for breech of contract.

5.  Which security program exists if a user accessing low-level data is able to draw conclusions about ___
A. Interference 
B. Inference
C. Polyinstatiation 
D. Under-classification

6.  Security measures that protect message traffic independently on each communication path are called __
A. Link oriented 
B. Procedure oriented 
C. Pass-through oriented 
D. End-to-end oriented

7.  Which one of the following conditions is NOT necessary for a long dictionary attack to succeed?
A. The attacker must have access to the target system. 
B. The attacker must have read access to the password file. 
C. The attacker must have write access to the password file. 
D. The attacker must know the password encryption mechanism and key variable.

8.  In a Secure Electronic Transaction (SET), how many certificates are required for a payment gateway 
to support multiple acquires?
A. Two certificates for the gateway only. 
B. Two certificates for the gateway and two for the acquirers. 
C. Two certificates for each acquirer. 
D. Two certificates for the gateway and two for each acquirer.

9. Which one of the following is a KEY responsibility for the "Custodian of Data"?
A. Data content and backup 
B. Integrity and security of data 
C. Authentication of user access 
D. Classification of data elements

10.  When conducting a risk assessment, which one of the following is NOT an acceptable social 
engineering practice?
A. Shoulder surfing 
B. Misrepresentation 
C. Subversion 
D. Dumpster diving

11.  Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) 
addresses/names with the intent of diverting traffic?
A. Network aliasing 
B. Domain Name Server (DNS) poisoning 
C. Reverse Address Resolution Protocol (ARP) 
D. Port scanning

12.  Which one of the following is an example of electronic piggybacking?
A. Attaching to a communications line and substituting data. 
B. Abruptly terminating a dial-up or direct-connect session. 
C. Following an authorized user into the computer room. 
D. Recording and playing back computer transactions.

13.  Which one of the following operations of a secure communication session cannot be protected?
A. Session initialization
B. Session support 
C. Session termination 
D. Session control

14.  What is the PRIMARY advantage of using a separate authentication server (e.g., Remote Access Dial- 
In User System, Terminal Access Controller Access Control System) to authenticate dial-in users?
A. Single user logons are easier to manage and audit. 
B. Each session has a unique (one-time) password assigned to it. 
C. Audit and access information are not kept on the access server. 
D. Call-back is very difficult to defeat.

15.  In which way does a Secure Socket Layer (SSL) server prevent a "man-in-the-middle" attack?
A. It uses signed certificates to authenticate the server's public key. 
B. A 128 bit value is used during the handshake protocol that is unique to the connection. 
C. It uses only 40 bits of secret key within a 128 bit key length. 
D. Every message sent by the SSL includes a sequence number within the message contents.

 

16.  The intent of least privilege is to enforce the most restrictive user rights required __
A. To execute system processes. 
B. By their job description. 
C. To execute authorized tasks. 
D. By their security role.

17.  Which one of the following is a characteristic of a penetration testing project?
A. The project is open-ended until all known vulnerabilities are identified. 
B. The project schedule is plotted to produce a critical path. 
C. The project tasks are to break into a targeted system. 
D. The project plan is reviewed with the target audience.

18.  The MAIN reason for developing closed-circuit television (CCTV) as part of your physical security 
program is to ____
A. Provide hard evidence for criminal prosecution. 
B. Apprehend criminals. 
C. Deter criminal activity. 
D. Increase guard visibility.

19.  Which one of the following tests determines whether the content of data within an application 
program falls within predetermined limits?
A. Parity check 
B. Reasonableness check 
C. Mathematical accuracy check 
D. Check digit verification

20.  In addition to providing an audit trail required by auditors, logging can be used to __-
A. provide backout and recovery information 
B. prevent security violations 
C. provide system performance statistics 
D. identify fields changed on master files.

21.  In which one of the following documents is the assignment of individual roles and responsibilities 
MOST appropriately defined?
A. Security policy 
B. Enforcement guidelines 
C. Acceptable use policy 
D. Program manual

22.  What is the basis for the Rivest-Shamir-Adelman (RSA) algorithm scheme?
A. Permutations 
B. Work factor 
C. Factorability 
D. Reversivibility

23.  Who is the individual permitted to add users or install trusted programs?
A. Database Administrator 
B. Computer Manager 
C. Security Administrator 
D. Operations Manager

24.  Which of the following are objectives of an information systems security program?
A. Threats, vulnerabilities, and risks 
B. Security, information value, and threats 
C. Integrity, confidentiality, and availability. 
D. Authenticity, vulnerabilities, and costs.

25.  After law enforcement is informed of a computer crime, the organization's investigators constraints 
are ____
A. removed. 
B. reduced. 
C. increased. 
D. unchanged.


声明:本站为免费网络服务提供商,网站所有信息均为用户自行发布并由用户承担相应法律责任,本站不对其真实性及合法性负责,如涉及侵权或者信息违法,请你及时与本站联系删除。

阅读 1301 举报

相关推荐
评论0

当前没有评论内容

发表评论 0条评论
89
微博
QQ
QQ空间
微信
取消