click below
click below
Normal Size Small Size show me how
ITN 260 Final Exam
| Question | Answer |
|---|---|
| Which option below is responsible for the issuing of EAP request packets? | authenticator |
| Which direction do access point antennas radiate their signals and where should they be located? | all directions and centrally located |
| Which of the following is the most secure form of IEEE 802.1x authentication? | certificate-based authentication |
| Where does the supplicant send identity information? | authenticator |
| The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length? | 64 bits |
| Piconets in which connections exist between different piconets are known as which of the following terms? | scatternet |
| Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? | PEAP |
| What encryption protocol is used for WPA2? | CCMP |
| Slave devices that are connected to a piconet and are sending transmissions are known as what? | active slave |
| When using AES-CCMP, the AES-256 bit key requires how many rounds? | 13 |
| What technology uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security? | captive portal AP |
| What is the maximum transmission power for IEEE WLANs? | 200 milliwatts (mW) |
| Authentication for WPA Personal is accomplished by using what type of key? | PSK |
| Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches? | heuristic monitoring |
| A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology? | Anti-climb |
| Which of the following are application development stages? (Choose all that apply.) | staging, testing |
| Which OS hardening technique removes all unnecessary features that may compromise an operating system? | kernel pruning |
| Anti-virus products typically utilize what type of virus scanning analysis? | Static analysis |
| How can an area be made secure from a non-secured area via two interlocking doors to a small room? | Using a mantrap |
| What type of OS in firmware is designed to manage a specific device like a video game console? | appliance OS |
| What publicly released software security update is intended to repair a vulnerability? | patch |
| Which of the following is a popular type of removable data storage used on mobile devices? | SD |
| What type of storage is used on mobile devices? | flash memory |
| What type of tools are involved in effective patch management? (Choose all that apply.) | patch distribution, patch reception |
| What software methodology includes security automation? | Secure DevOps |
| What specific process in application development removes a resource that is no longer needed? | deprovisioning |
| What is the maximum range of most Bluetooth 5 devices? | 800 ft |
| What specific feature on an AP controls how much of the spectrum is available to transfer data? | channel width |
| What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? | access Point |
| What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? | evil twin |
| Which encryption protocol below is used in the WPA2 standard? | AES-CCMP |
| What type of survey can help a network administrator make decisions about bands, channels, and widths when installing new access points? | site |
| Select the device that is designed to exclusively monitor the RF frequency for network transmissions? | WAP |
| An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? | rogue |
| Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a: | cable lock |
| A Wi-Fi enabled microSD card is an example of what type of device? | SDIO |
| What security standard was introduced in conjunction with UEFI? | Secure Boot |
| What type of OS manages hardware and software on a client computer? | workstation OS |
| Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply.) | Employing least functionality, Disabling default accounts/passwords |
| In Microsoft Windows, what type of templates are a collection of security configuration settings? | security |
| Which of the following self-contained APs are autonomous, or independent, because they are separate from other network devices and even other autonomous APs? | fat APs |
| What is the maximum number of characters that can exist within a SSID name? | 32 |
| What monitors emails for spam and other unwanted content to prevent these messages from being delivered? | mail gateway |
| An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology? | roller barrier |
| What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile? | Bayesian filtering |
| What U.S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings? | TEMPEST |
| What type of update does not allow a user to refuse or delay security updates? | forced |
| A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms? | Bluesnarfing |
| Select the EAP protocol that uses digital certificates for authentication? | EAP-TLS |
| Which of the following choices is not one of the four types of packets used by EAP? | Error |
| Which application development life-cycle model uses a sequential design process? | waterfall |
| What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus? | antivirus |
| What PIN is considered to be the most commonly used PIN? | 1234 |
| A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer? | subnotebook |
| A QR code can't contain which of the following items directly? | A video. |
| Which of the following is NOT an Android Smart Lock configuration option? | User device detection |
| Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel? | Security 2 (S2) framework |
| What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password? | Enable a lock screen |
| What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access? | OTG |
| What type of technology can add geographical identification data to media such as digital photos taken on a mobile device? | GPS tagging |
| Which enterprise deployment model allows users to use their personal mobile devices for business purposes? | BYOD |
| Select the proprietary wireless network technology that is used primarily by sensors for communicating data. | ANT |
| Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise? | increased internal service |
| What process gives a user access to a file system on a mobile device with full permissions, essentially allowing the user to do anything on the device? | jailbreaking |
| What option below represents an example of behavioral biometrics? | keystroke dynamics |
| A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a: | password |
| What specific type of authentication can be based on where the user is located? | geolocation |
| What federated identity management (FIM) relies on token credentials? | OAuth |
| The use of one authentication credential to access multiple accounts or applications is referred to as which of the following? | single Sign On |
| Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server? | service account |
| What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face? | standard biometrics |
| Which of the following is a is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest? | transitive trust |
| Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply.) | Password Policy Settings, Account Lockout Policy |
| Which of the following is NOT a valid biometric disadvantage? | false error rate |
| Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs? | account lockout threshold |
| If a user has more than one type of authentication credential, what type of authentication is being used? | multifactor authentication |
| Which type of biometrics is based on the perception, thought process, and understanding of the user? | cognitive biometrics |
| Which of the following can replace using radio frequency (RF) for the communication media? | infrared |
| Select the item that is not considered to be a basic characteristic of mobile devices. | A removable media storage. |
| What type of management system below can help distribute and manage public and corporate apps? | Mobile Device Management |
| Which of the following selections is not one of the features provided by a typical MDM? | Track stolen devices |
| What type of software is specifically designed for a SoC in an embedded system? | RTOS |
| Which term below describes the time it takes for a key to be pressed and then released? | dwell time |
| What type of authentication is based on what the user has? | Security token |
| A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called: | Common Access Card (CAC) |
| What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file? | Brute force |
| The use of a single authentication credential that is shared across multiple networks is called: | identity management |
| A list of the available nonkeyboard characters can be seen in Windows by opening what utility? | charmap.exe |