
Certification Exam 100
.doc
|
82. |
|
Computers that use a dial-up connection to the Internet are typically assigned a _____ IP address. |
|
|
|
|
Correct answer is |
(a) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See Section 5.5.4, subsection "Internet Service Providers," in the course notes.
|
|
|
83. |
|
What system is used to translate domain names to IP addresses? |
|
|
|
|
Correct answer is |
(b) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See Section 5.5.2, subsection "Domain Name Service," in the course notes.
|
|
|
84. |
|
An intruder pretending to be an employee of a company asking the company's network administrator for sensitive information is an example of a _____ attack. |
|
|
|
|
Correct answer is |
(d) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.1.2, subsection "Social Engineering/Fraud," in the course notes.
|
|
|
85. |
|
The dictionary attack against a computer system involves |
|
|
|
|
Correct answer is |
(c) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.1.2, subsection "Password Cracking," in the course notes.
|
|
|
86. |
|
Which of the following is (are) true regarding boot sector viruses?
|
|
|
|
|
Correct answer is |
(d) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See Chapter 4, page 186, in the course textbook.
|
|
|
87. |
|
Which of the following is (are) true regarding computer viruses?
|
|
|
|
|
Correct answer is |
(b) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See Chapter 4, page 185, in the course textbook.
|
|
|
88. |
|
Which of the following means of providing password information to Internet Service Providers is (are) considered safe?
|
|
|
|
|
Correct answer is |
(a) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.1.2, subsection "Spoofing," in the course notes.
|
|
|
89. |
|
Capabilities of computer viruses include which of the following?
|
|
|
|
|
Correct answer is |
(c) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See Chapter 4, page 185, in the course textbook.
|
|
|
90. |
|
The set of standards and services that govern the use of public-key cryptography and the system of certificates is called |
|
|
|
|
Correct answer is |
(c) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.2.3, subsection "Digital Certificates and Certificate Authorities," in the course notes.
|
|
|
91. |
|
The set of all possible keys for an encryption algorithm is known as its |
|
|
|
|
Correct answer is |
(a) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.2.1, subsection "Substitution Cipher," in the course notes.
|
|
|
92. |
|
Features used for identification in biometrics include which of the following?
|
|
|
|
|
Correct answer is |
(d) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.2.3, subsection "Biometrics," in the course notes.
|
|
|
93. |
|
Which of the following is (are) true regarding digital signatures?
|
|
|
|
|
Correct answer is |
(d) |
|
Your score on this question is: |
0.00 |
|
Feedback: |
See section 6.2.3, subsection "Digital Signatures," in the course notes.
|
|
|
94. |
|
The identification of individuals based on their physiological or behavioral characteristics is known as _____ identification. |
|
|
|
|
Correct answer is |
(b) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.2.3, subsection "Biometrics," in the course notes.
|
|
|
95. |
|
A backup that makes a fresh copy of every file that exists in the folder specified for backup is known as a(n) |
|
|
|
|
Correct answer is |
(b) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See Chapter 4, page 196, in the course textbook.
|
|
|
96. |
|
Which of the following precautions can users take to avoid executing malicious code?
|
|
|
|
|
Correct answer is |
(d) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.3.4 in the course notes.
|
|
|
97. |
|
Which of the following is (are) true regarding computer security?
|
|
|
|
|
Correct answer is |
(d) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.3.4 in the course notes.
|
|
|
98. |
|
Which of the following is (are) true regarding the use of backup software?
|
|
|
|
|
Correct answer is |
(c) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See Chapter 4, pages 200–201, in the course textbook.
|
|
|
99. |
|
Assume that a full backup is taken on Saturdays and an incremental backup is taken on all other days of the week. If a disk crash occurs on Thursday, which of the following backup disks would be needed for restoration?
|
|
|
|
|
Correct answer is |
(b) |
|
Your score on this question is: |
0.00 |
|
Feedback: |
See Chapter 4, page 196, in the course textbook.
|
|
|
100. |
|
Functions of network monitoring systems include which of the following?
|
|
|
|
|
Correct answer is |
(a) |
|
Your score on this question is: |
1.00 |
|
Feedback: |
See section 6.3.2, subsection "Network Monitoring Tools," in the course notes.
|