CERTIFIED PRACTITIONER COURSE
WITH CORRECT SOLUTIONS
The most common security weaknesses and exploits are in which standardized list? -
ANSWER-D. CVE - Common Vulnerabilities and Exposures
Choose the password configuration rules enforced by the Passfilt.dll Windows add-on. -
ANSWER-C. Password must have a combination of upper case, lower case, numbers,
and special characters; including a 6 character minimum password length
A computer forensics specialist should be attempting to attain which ultimate goal? -
ANSWER-B. Preserve electronic evidence and protect it from any alteration
What term is used to describe how data is transmitted between nodes on a network or
between networks, with the three common types being Broadcast, Multicast, and
Unicast? - ANSWER-A. Casting
While conducting Quantitative risk analysis, which formula would be utilized? -
ANSWER-D. SLE - Single Loss Expectancy
Which protocol listed below resolves a physical MAC address for a given logical IP
address? - ANSWER-A. ARP
Providing optimal protection, what comprehensive array of layered security solutions
resembles the layers of an onion? - ANSWER-B. Defense in Depth
Swiping a badge against a magnet reader at an entrance that unlocks the door for entry,
would be which of the following? - ANSWER-B. Single-factor authentication
Encryption is attained at what layer of the OSI model? - ANSWER-C. Presentation
Layer - Layer 6
What type of encrypted string is the output of a one way hash function on a string of
random length? - ANSWER-A. fixed length
What is the main difference between a phreak and a hacker? - ANSWER-A. Phreaks
specifically target telephone networks
Through what method of deduction is two-factor authentication achieved using your
ATM card? - ANSWER-C. It combines something you have with something you know