CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [141]
b. ACLs aren’t used in modern systems.
c. The ACL process is dynamic in nature.
d. ACLs are used to authenticate users.
15. What product verifies that files being received by an SMTP server contain no suspicious code?
a. E-mail virus filter
b. Web virus filter
c. Packet filter firewall
d. IDS
16. Users are complaining about name resolution problems suddenly occurring that were never an issue before. You suspect that an intruder has compromised the integrity of the DNS server on your network. What is one of the primary ways in which an attacker uses DNS?
a. Network footprinting
b. Network sniffing
c. Database server lookup
d. Registration counterfeiting
17. LDAP is an example of which of the following?
a. Directory access protocol
b. IDS
c. Tiered model application development environment
d. File server
18. Your company is growing at a tremendous rate, and the need to hire specialists in various areas of IT is becoming apparent. You’re helping to write the newspaper ads that will be used to recruit new employees, and you want to make certain that applicants possess the skills you need. One knowledge area in which your organization is weak is database intelligence. What is the primary type of database used in applications today that you can mention in the ads?
a. Hierarchical
b. Relational
c. Network
d. Archival
19. The flexibility of relational databases in use today is a result of which of the following?
a. SQL
b. Hard-coded queries
c. Forward projection
d. Mixed model access
20. You’re redesigning your network in preparation for putting the company up for sale. The network, like all aspects of the company, needs to perform the best that it possibly can in order to be an asset to the sale. Which model is used to provide an intermediary server between the end user and the database?
a. One-tiered
b. Two-tiered
c. Three-tiered
d. Relational database
Answers to Review Questions
1. A. Baselining is the process of establishing a standard for security.
2. B. Hardening is the process of improving the security of an operating system or application. One of the primary methods of hardening an OS is to eliminate unneeded protocols.
3. C. Binding is the process of associating one protocol with another protocol or to a network card.
4. C. NetBIOS shouldn’t be bound to TCP/IP if at all possible. NetBIOS is a well-established target of attackers.
5. A. Bitlocker provides drive encryption and is available with Windows Vista.
6. C. The open-source movement makes system source code available to developers and programmers. Linux is the operating system at the forefront of the open-source movement.
7. C. FAT technology offers limited security options.
8. A. NSS is Novell’s newest filesystem. It’s a proprietary environment for servers.
9. D. Network File System (NFS) is the Unix standard for remote filesystems.
10. A. A service pack is one or more repairs to system problems bundled into a single process or function.
11. B. Never share the root directory of a disk if at all possible. Doing so opens the entire disk to potential exploitation.
12. C. A hotfix is done while a system is operating. This reduces the necessity of taking a system out of service to fix a problem.
13. C. A patch is a temporary workaround of a bug or problem in code that is applied manually. Complete programs usually replace patches at a later date.
14. A. Access control lists allow individual and highly controllable access to resources in a network. An ACL can also be used to exclude a particular system, IP address, or user.
15. A. SMTP is the primary protocol used in e-mail. An SMTP virus filter checks all incoming and outgoing e-mails for suspicious code. If a file is potentially infected, the scanner notifies the originator and quarantines the file.
16. A. DNS records in a DNS server provide insights into the nature and structure of a network. DNS records should be kept to a minimum