CORRECT ANSWERS ALREADY
PASSED
A hash algorithm can be compromised with a collision, which occurs when two separate
and different messages or inputs pass through the hashing process and generate: -
Answer-the same value
Traceroute is one of the easiest ways to identify the path to a targeted Web site -
Answer-True
The Internet Assigned Numbers Authority (IANA) is responsible for the global
coordination of the Domain Name System (DNS) root, IP addressing, and other Internet
protocol resources - Answer-True
Which of the following refers to the structured and methodical means of investigating,
uncovering, attacking, and reporting on a target system's strengths and vulnerabilities? -
Answer-Penetration testing
Sniffers are useful and problematic at the same time because network traffic that might
include sensitive data can be viewed through the use of a sniffer. - Answer-True
During the planning phase of a penetration test, the aim should be to: - Answer-
determine why a penetration test and its associated tasks are necessary.
To verify the integrity of the message when creating a digital signature, the message or
information to be sent is passed through a hashing algorithm that creates a: - Answer-
hash
Which of the following is used to bring trust, integrity, and security to electronic
transactions - Answer-Public key infrastructure
Blocking everything and allowing only what is needed is known as: - Answer-the deny-
all principle.
The environment in which a new facility is constructed has little impact on the level and
type of security needed. - Answer-False
, Which of the following terms refers to the ability to verify that information has not been
altered and has remained in the form originally intended by the creator? - Answer-
Integrity
Robot-controlled workstations that are part of a collection of other robot-controlled
workstations are called - Answer-botnets
The Internet Assigned Numbers Authority (IANA) delegates Internet resources to the
Regional Internet Registries (RIRs) who then: - Answer-delegate resources as needed
to customers, who include Internet service providers (ISPs) and end-user organizations.
The terms algorithm and cipher describe the formula or process used to perform
encryption. - Answer-True
The Address Resolution Protocol (ARP) includes the ability to authenticate the systems
that use it. - Answer-False
A code is a mechanism that relies on the usage of complete words or phrases, whereas
ciphers utilize single letters to perform encryption - Answer-True
An attack in which a service is overwhelmed by traffic preventing or denying its
legitimate use is called a - Answer-denial of service attack
Which password attack method uses long lists of words that have been predefined and
can be quickly downloaded for use to break a password that is a word or a name -
Answer-Dictionary password attack
Public key infrastructure (PKI) addresses storing, managing, distributing, and
maintaining keys and digital certificates securely - Answer-True
What type of encryption uses the same key to encrypt and to decrypt information -
Answer-Symmetric encryption
Which of the following refers to a software program used to determine the path a data
packet traverses to get to a specific IP address - Answer-Traceroute
Which step(s) in the information-gathering process does footprinting cover? - Answer-
Gathering information and determining the network range
A hierarchical system of servers and services specifically designed to translate IP
addresses into domain names (forward lookups) as well as the reverse (reverse
lookups) is called: - Answer-Domain Name Service (DNS).
Repeaters, hubs, bridges, and switches are part of: - Answer-Physical or Network
Access Layer equipment