As per the guidelines in the ISO Security Policy standard, what is the purpose of the section on Physical and Environmental Security?
You are discussing the design and infrastructure of the Internet with several colleagues when a disagreement begins over the actual function of the Tier System in the Internets design. What is the function of the Tier System in the physical structure of the Internet?
Recently at your organization you have been requested to lead the team in performing a new Risk Analysis of the organization. During the first team meeting you identify to your team the three areas of Risk Analysis. What are those three areas?
In your organization, the majority of employees use Microsoft Outlook Express as their email client. You are configuring these systems so that applications on the employee systems cannot send email, posing as the user of the system. Under the Security tab, which option will you select to achieve this goal?
You are running Nessus in your organization to perform vulnerability assessments. If you wish to write your own plugin, to scan for a custom vulnerability, what will you use to write the plugin?
To increase the security of your corporate website, you are running some basic checks on leaked information. You view the source code for a web page and see the following:
<title>Security Certifications for the IT Pro
From this code, which of the following would an attacker most likely assume is the operating system that was used to create this web site?
Recently you found out that there has been a flood of bogus network traffic hitting your Email server.
Because of this flood, authorized users have not been able to consistently send or receive email. What is happening to your Email server?
To maintain the security of your network you routinely run several checks of the network and computers.
Often you use the built-in tools, such as netstat. If you run the following command, netstat –s which of the following will be the result?
You are examining a packet from an unknown host that was trying to ping one of your protected servers and notice that the packets it sent had an IPLen of 20 byes and DgmLen set to 60 bytes. What type of operating system should you believe this packet came from?
Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?
In order for your newly written security policy to have any weight, it must be implemented. Which of the following are the three components of a successful Security Policy Implementation in an organization?
Which of the following best describes the Repair Model?
Which two of the following are factors that must be considered in determining the likelihood of occurrence during a risk analysis review?
From the following list, chose the primary reason for splitting a Security Policy into multiple smaller policies?
Most companies that do business via the Web offer a shopping cart so you can specify all the items you want before placing the order. Poor shopping cart design, however, can allow a different kind of hack. Take a look at the HTML code sample presented here and determine the line that presents the vulnerability:
In your network, you have built a single domain of only Windows computers. There are 55 XP machines and 10 Windows Server 2003 machines. You are concerned about the security of your SAM files on the Servers. Windows Server 2003 is the only Operating System on the computers, and the hard drives are all formatted with NTFS. Which of the following are issues you must be sure to address when securing the
SAM file?
If an attacker uses a program that sends thousands of email messages to every user of the network, some of them with over 50MB attachments. What are the possible consequences to the email server in the network?
On your Windows 2003 system, you want to control inbound access to various ports. What feature of Windows 2003 will allow you to do this?
What type of cipher is used by an algorithm that encrypts data in chunks of data, 64 bits at a time?
After installing a new application on your SuSe Linux server, you need to read through the log files.
When you open the files, you notice they are very long, and you only wish to check the newest entries to the file. What command do you use to perform this action?
Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use
Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?
What type of encryption converts data from a variable-length to a fixed length piece of data?
While configuring TCP Wrappers on your Linux system, you desire to create a line that will effect every local computer's access to the ftp service. Which of the following lines will achieve this desired result?
In Windows Server 2003, there are four methods of implementing IPSec. They are:
1 - Require Security
2 - Request Security
3 - Respond Only
4 - No IPSec Policy
Your network hosts many servers, and different security policies are in place in different locations in the network. The Clients and Servers in your network are configured as follows:
-You have servers numbered 1-9, which have a policy stating they require no network traffic security.
-You have servers numbered 10-19, which have a policy stating they are not required to be secure, but will encrypt network traffic if the client is able to receive it.
-You have servers numbered 20-29, which have a policy stating they are required to be secure and all network traffic they deliver must be secured.
-You have clients numbered 60-79 that are required to access secure servers 20-29.
-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are required to access servers 1-9 and 10-19.
Based on the Client and Server configuration provided above, which of the following computers will implement IPSec method 4?
You are configuring the security of a service using Xinetd. You wish to add a line to the configuration of the service that grants access during the hours of 6AM to 7PM. Which of the following lines will you need to add to the configuration to achieve this result?
There are several clients of your network that require the ability to connect remotely. You are using Internet Authentication Services (IAS) in Windows Server 2003 for security. What is IAS the Windows implementation of?
After you have configured your new Linux file server, a colleague wishes to check the permission settings on some files. You run the command to view the permissions, and the onscreen result is:
-rwx-rw-rw- 1 ps_admin root 2345 10:23 file1
Which of the following are true based on this output?
Public Key Cryptography systems use which two of the following keys?
You are examining the Event IDs in your Windows 2003 network. There have been a large number of failed attempts at logon in the network. What is the Event ID for a failed attempt at Logon due to an account being disabled?
You are setting the permissions on a new file in Linux. What will be the level of permission given to the user if you assign an Octal value of 7?
What classic cipher is shown in this image?
What classic cipher is shown in this image?
You are making changes to your Windows Server 2003 file server, to increase security. You are aware from your auditing that attackers have been trying to map your network and perform reconnaissance. You wish to stop attackers from enumerating share names. What can you do to stop this?
What encryption algorithm was selected to replace DES?