Professional Documents
Culture Documents
i. Confidentiality
ii. Integrity
iii. Authentication
iv. Availability
a. i,ii,iii
b. i,iii,iv
c. i,ii,iv
d. ii,iii,iv
a. Data communication
b. Administrative
c. Logon
d. Identification
9. Which of the security method best describe the statement ”The most
common form of security identification that is, verification of who a user
is and that the user is permitted to use the network”
a. Data communication
b. Administrative
c. Logon
d. Identification
a. File sharing
b. File transfer
i. Data modification
ii. Hacking
iii. Cracking
iv. Spoofing
b. i,iii, and iv
a. Spoofing
b. Cracking
c. Sniffing
d. Hacking
a. Sniffing
b. Interruption
c. Interception
d. Fabrication
14. Which of the following is the example of attack in the security enviroment?
i. Reconnaissance attack
a. i, ii, iii
b. i, iii, iv
c. i, ii, iv
d. ii, iii, iv
15. The following is the identify of the threat in the security environment
EXCEPT...
a. Extensible threat
b. Unstructured threats
c. Structured threats
d. External threats
16. Statement “Someone who just like to know exactly how things work. They
don’t cause harm, but rather explore, experiment and gain knowledge”
best describe
a. Cracker
b. Attacker
c. Jumper
d. Hacker
a. Reconnaissance attacks
b. Access attacks
18. Malicious code attack mostly hides in the following application EXCEPT
a. Email
b. File transfer
c. Web content
d. Legitimate sites
19. The statement “It also passing the infection from one infected system to
another” best describe
a. Worm
b. Trojan
c. Horses
d. Virus
20. The statement” Flood of packet are sent to a server requesting client
connection. The packet contain invalid IP address” best describe
a. Ping of death
b. SYN Flooding
c. Data modification
d. Data disclosure
a. Firewall
b. Worm
c. Antivirus
c. Monitoring system
d. Dial up modem
a. Dial-up Architecture
b. Artificial Architecture
c. Single Router Architecture
iii. Proxy
a. i,ii, iv
b. i, iii, iv
c. ii, iii, iv
d. i, ii, iii
25. Which of the firewall are NOT examines each packet based on the
following criteria in the Static Packet Filtering
a. Source IP address
c. Destination IP address
a. Backup disk
b. Internet
c. networked computers
d. removable disks
b. Floppy disk
c. Paper documentation
i. Source IP Address
ii. Destination IP Address
a. i, ii
b. ii, iii
c. iii, iv
d. i, iv
c. An intruder who gains access to a server in the ISP network may gain
access to other servers on the site
30. Which of the following is the system policy that an administrator should
NOT follow in the Windows Security Approach?
a. Password
b. Account
c. Audit
d. Monitor
a. Application
b. Patches
c. Software
d. Virus
e. Games
32. Which of the following is NOT the basic level of security in the computer
environment?
a. Sharing password
33. What is the function of the Internet Protocol Security (IPSec) Filtering?
35. Which of the following is NOT the main features of Microsoft Security
Server ?
a. Network connectivity
b. Proxy connectivity
c. Server connectivity
d. Proxy security
39. Which of the following is NOT the attack that can be launch if
authentication is not be implemented?
a. Eavesdropper attacks
b. Replay attacks
d. Phishing attacks
a. Decryption
b. Encryption
c. Cipher Text
d. Cryptanalysis
i. Symmetric
ii. Asymmetric
iii. Encryption
iv. Decryption
a. i,ii
b. i,iii
c. iii,iv
d. ii, iv
42. The following is the example of the symmetric( secret key) except
a. DES
b. IDEA
c. TWOFISH
d. ELGAMAL
43. Statement “Exchange of tokens that hide the implementation detail from
the higher level application and wrapping include confidentiality (secrecy)
and integrity (authenticity)” refer to
a. DNSSEC
b. GSSAPI
c. SSL
d. SHTTP
a. i,ii, iii
b. i, iii, iv
c. i, ii, iv
d. ii, iii, iv
45. Which of the types of backup that copy all the data in the hard disk
a. Full backup
b. Differential backup
c. Incremental backup
d. Imaging backup
46. Which of the types of backup that copy all the data that been choose by user to a
certain folder
a. Full backup
b. Differential backup
c. Incremental backup
d. Imaging backup
47. Which of the types of backup that copy all the folder in the storage that been choose
e. Full backup
f. Differential backup
g. Incremental backup
h. Imaging backup
48. Which of the following is not the hardware use for handling server disaster
a. UPS
b. RAID
d. REDUNDANT Server
49. Which of the following is the advantage of using RAID in handling server
disaster
c. A file may be damaged or deleted by user error and not noticed for
days or weeks
b. Load-balancing clusters
c. Grid computing
d. Backup cluster
SECTION B
(15
Marks)
i. data modification :
ii. Hacking :
iii. Cracking :
iv. Spoofing :
v. Sniffing :
ATTACKERS HACKERS
I. reconnaissance attack :
(12
Marks)
i. personal firewall
(12
Marks)
(9 Marks)
I. SYN Flooding
(4 Marks)
4. a. Explain the attacks that can be launched if authentication is not
implemented
(15
Marks)
I. DNSSEC
II. GSSAPI
(6
Marks)
c. Brief the different between modem pool replacement and dedicated WAN Link
Replacement
(4 Marks)