CIS 2337 QUESTIONS AND ANSWERS
Public keys are components of digital certificates.
-True
-False - Answers - True
If the root CA's private key were compromised, what would happen?
-Entities within the hierarchical trust model and end users would be unaffected.
-Entities within the hierarchical trust model would also be compromised, but users would
be unaffected.
-All entities within the hierarchical trust model would be drastically affected.
-Only the root CA would be affected. - Answers - All entities within the hierarchical trust
model would be drastically affected.
PKI can be used to establish a level of trust with individuals we do not know, allowing
sensitive communication to take place.
-True
-False - Answers - True
Private keys are listed in the digital certificates.
-True
-False - Answers - False
The X.509 standard outlines the necessary fields of a certificate and the possible values
that can be inserted into the fields.
-True
-False - Answers - True
SSID (service set identifier )is:
-Name of the wireless network
-Wireless signal strength
-Which spectrum its operating
-Why I am using the network - Answers - Name of the wireless network.
WEP stands for Wired Equivalent Privacy
-True
, -False - Answers - True
What is Point-to-point (P2P) connection?
-Communications with one endpoint on each end
-Communications that have multiple receivers for a transmitted signal
-Series of satellites that provide nearly global coverage
-RFID tags - Answers - Communications with one endpoint on each end
WiFi series refers to:
-802.11 standard
-142.23 standard
-Zigbee standard
-BLE standard - Answers - 802.11 standard
WiFi uses which frequency spectrum?
-10 Mhz
-2.4 Mhz
-2.4 Ghz and 5 Ghz
-10 Ghz - Answers - 2.4 Ghz and 5Ghz
What does a host-based IDS monitor?
-activity a specific host
-activity on the network itself
-a honeynet
-a digital sandbox - Answers - activity on a specific host
Which component of an HIDS pulls in the information that the other components, such
as the analysis engine, need to examine?
-traffic collector
-signature database
-expert knowledge database
-user interface and reporting - Answers - traffic collector
Which component of an HIDS must decide what activity is "okay" and what activity is
"bad"?
-traffic collector
-analysis engine
-signature database
-examination collector - Answers - analysis engine
Public keys are components of digital certificates.
-True
-False - Answers - True
If the root CA's private key were compromised, what would happen?
-Entities within the hierarchical trust model and end users would be unaffected.
-Entities within the hierarchical trust model would also be compromised, but users would
be unaffected.
-All entities within the hierarchical trust model would be drastically affected.
-Only the root CA would be affected. - Answers - All entities within the hierarchical trust
model would be drastically affected.
PKI can be used to establish a level of trust with individuals we do not know, allowing
sensitive communication to take place.
-True
-False - Answers - True
Private keys are listed in the digital certificates.
-True
-False - Answers - False
The X.509 standard outlines the necessary fields of a certificate and the possible values
that can be inserted into the fields.
-True
-False - Answers - True
SSID (service set identifier )is:
-Name of the wireless network
-Wireless signal strength
-Which spectrum its operating
-Why I am using the network - Answers - Name of the wireless network.
WEP stands for Wired Equivalent Privacy
-True
, -False - Answers - True
What is Point-to-point (P2P) connection?
-Communications with one endpoint on each end
-Communications that have multiple receivers for a transmitted signal
-Series of satellites that provide nearly global coverage
-RFID tags - Answers - Communications with one endpoint on each end
WiFi series refers to:
-802.11 standard
-142.23 standard
-Zigbee standard
-BLE standard - Answers - 802.11 standard
WiFi uses which frequency spectrum?
-10 Mhz
-2.4 Mhz
-2.4 Ghz and 5 Ghz
-10 Ghz - Answers - 2.4 Ghz and 5Ghz
What does a host-based IDS monitor?
-activity a specific host
-activity on the network itself
-a honeynet
-a digital sandbox - Answers - activity on a specific host
Which component of an HIDS pulls in the information that the other components, such
as the analysis engine, need to examine?
-traffic collector
-signature database
-expert knowledge database
-user interface and reporting - Answers - traffic collector
Which component of an HIDS must decide what activity is "okay" and what activity is
"bad"?
-traffic collector
-analysis engine
-signature database
-examination collector - Answers - analysis engine