In: Computer Science
Question 22
What is the most common patch remediation frequency for most organizations?
1 point
As soon as they are released.
Weekly
Monthly
Annually
23.
Question 23
In Windows kernel mode, what stops a misbehaving driver from impacting other processes?
1 point
The Windows Virtual Address Manager.
Each process runs in its own dedicated virtual address space.
The Windows Process Director.
Nothing.
24.
Question 24
In Linux, Bash, tcsh and sh are what?
1 point
Shells
Commands
Directories
Distros
25.
Question 25
Symmetric key encryption ensures which of the following?
1 point
Confidentiality only.
Confidentiality and Availability.
Confidentiality, Integrity and Availability.
Confidentiality and Integrity.
26.
Question 26
Which statement is True of Hash functions?
1 point
Hashing is a reliable way to assure the integrity of a message.
Using hashing is a good way to assure the confidentiality of the messages you send.
Hashes are becoming easier to reverse engineer since computers are becoming more powerful.
The length of the hash string is proportional to the length of the input so the approximate message length can be derived from a hash.
27.
Question 27
Which of the following statements about hashing is True?
1 point
The original message can be retrieved from the hash if you have the encryption key.
A weakness of hashing is that the hash is proportional in length to the original message.
Hashing uses algorithms that are known as “one-way” functions.
If you have two hashes that differ only by a single character, you can infer that the original messages also differed very little.
28.
Question 28
Which statement about encryption is True about data in use.
1 point
It is vulnerable to theft and should be decrypted only for the briefest possible time while it is being operated on.
Short of orchestrating a memory dump from a system crash, there is no practical way for malware to get at the data being processed, so dump logs are your only real concern.
Data in active memory registers are not at risk of being stolen.
Data should always be kept encrypted since modern CPUs are fully capable of operating directly on encrypted data.
29.
Question 29
For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done?
1 point
Install a single firewall that is capable of conducting both stateless and stateful inspections.
You must install the stateful and stateless firewalls in parallel with an intelligent switch in front of them to direct the packets to one or the other as appropriate.
You must install 2 firewalls in series, so all packets pass through the stateless firewall first and then the stateless firewall.
Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in addition to state related factors.
30.
Question 30
Which statement best describes configuring a NAT router to use dynamic mapping?
1 point
The organization will need as many registered IP addresses as it has computers that need Internet access.
The NAT router uses each computer's IP address for both internal and external communication.
Unregistered IP addresses are mapped to registered IP addresses as they are needed.
Many unregistered IP addresses are mapped to a single registered IP address using different port numbers.
31.
Question 31
If a computer needs to send a message to a system that is not part of the local network, where does it send the message?
1 point
The computer's IP address.
The computer's domain name.
The computer's MAC address.
The network's default gateway address.
The network's DNS server address.
The network's DHCP server address.
Q 22) Answer is as soon as they are released.
It depends upon the criticality of the system and impact of the patches.
For example,
Windows security patches should be installed immediately.
Antivirus patches should be installed weekly.
Database patches should be installed quarterly.
Q 23) Answer is Nothing
In kernel mode, all code runs in a shared single virtual address space. If a kernel-mode driver crashes, the entire operating system crashes. Nothing can stop.
In user mode, each process runs in its own dedicated virtual address space.
Q 24) Answer is Shells.
BASH, TCSH and SH are shells in linux where,
SH is referred to as shell.
BASH is referred to as "Bourne again shell"
TCSH is sometimes called as "C Shell" or "TC shell"(pronounced as tee-cee shell)
Q 25) Answer is Confidentiality only
Symmetric key encryption uses only a single key for encryption and decryption. It is a private key which is shared by sender and receiver only. Confidentiality can be achieved this way.
Q 26) Answer is Hashing is a reliable way to assure the integrity of a message
A hash function is used to transform large random size data to small fixed size data. It does not need any key and works in one way manner.
One of the main purpose of hash function is providing integrity services via MAC (Message Authentication Code).
Q 27) Answer is Hashing uses algorithms that are known as “one-way” functions
A one-way hash function is a mathematical function that takes variable-length input string and converts it into fixed length binary sequence.
It is hard to reverse the process.
A good hash function makes it hard to find two strings that would produce the same hash value. A slight change in the input string would change the hash value drastically.