ACTUAL CORRECT QUESTIONS AND
VERIFIED DETAILED ANSWERS
|FREQUENTLY TESTED QUESTIONS AND
SOLUTIONS |ALREADY GRADED
A+|NEWEST|BRAND NEW VERSION
!!!|GUARANTEED PASS
Mateo is testing a new biometric security control. In his testing, 10 authorized users attempted
to access the facility; 9 of them were granted access while 1 was denied access. Ten
unauthorized users also attempted to access the facility but all were turned away. What is the
false rejection rate (FRR) of this control?
10%
Which of the following statements is NOT true regarding social engineering?
Social engineering has different goals and objectives than other types of hacking.
Blocking all ports by default and allowing only those ports that are needed is known as
________.
the deny-all principle
What is a mechanism used to encrypt communication between two parties?
Transport Layer Security (TLS)
Brynn discovered that her company's accounts receivable department is discarding customer
payment checks without shredding them. What is the primary social engineering risk associated
with this activity?
Dumpster diving
Yolanda discovered that a botnet infected several systems on her network. Which of the
following activities is not a likely use of the botnet?
1|Page
,Social engineering
The Windows operating system feature used to give access to certain types of information
across the network is _________.
the NULL session
Tricking or coercing people into revealing information or violating normal security practices is
referred to as ________.
social engineering
Which protocol resolves an Internet Protocol v4 (IPv4) address to an unknown Media Access
Control (MAC) address?
Address Resolution Protocol (ARP)
Which of the following is a disadvantage of alarms?
False alarms tied to the police may result in fines.
Which two protocols are associated with the Host-to-Host Layer of the TCP/IP model?
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
Vic is analyzing the LinkedIn profiles of his company's employees. He discovers that one of them
is labeled with the keyword LION. What risk does this pose?
Collecting too many connections
Carrie is examining a piece of malware and determines that it was gathering information about
the user of a system. Which of the following terms can she use to describe this malware?
Spyware
A measurement of the percentage of individuals who should have been granted to a system via
biometrics but were not allowed access is called the ________.
false rejection rate (FRR)
Lin is analyzing a system. She wishes to list all established NetBIOS sessions between that
system and other networked systems. What command can she use to achieve this goal?
nbtstat -S
In what type of attack does the attacker take over an established session between two parties
and then interacts with the remaining party as if the attacker were the party that has been
disconnected?
2|Page
, Active session hijacking
An attacker who sets up a realistic persona from which the victim seeks assistance is
participating in ________.
reverse social engineering
Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which
port would provide her with the most information about user web activity?
80
Repeaters, hubs, bridges, and switches are typically part of which layer of the TCP/IP model?
Physical or Network Access Layer
A point where all traffic must enter or exit a facility is called a ________.
gate
Which of the following is NOT true of routers?
They direct traffic using physical addresses as opposed to logical addresses.
Which of the following is a distributed denial of service (DDoS) attack in which the attacker
sends a large number of ping packets with the intent of overwhelming a victim?
Ping flood
What type of sniffing takes place on networks that have connectivity hardware that is "smarter"
or more advanced, such as those with a switch?
Active sniffing
Greg is designing the lighting scheme for a building. He would like the lights to be randomly
turned on to create an impression of activity. Which lighting scheme should he use?
Standby
Diego is concerned about attackers targeting his Windows servers using the NetBIOS protocol
and wants to block use of that protocol at the firewall. Which of the following ports does Diego
NOT need to block to prevent NetBIOS access?
140/tcp
Which Facebook protection practice enables you to "friend" work associates with whom you
feel uncomfortable sharing personal information?
3|Page