CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [201]
2. Click the + icon to add counters.
3. For an object, select IPSec v4 IKE.
4. Choose each counter that appears in the list, and click the Explain button to learn what it is able to show you.
5. Add the following counters: Total Authentication Failures and Total Negotiation Failures.
6. Click Close.
You’re now monitoring the failures as they occur. On a properly functioning system, this graph should show no activity. Any activity that appears is indicative of problems since IPSec was last started and should be carefully examined.
Review Questions
1. What is the process of deriving an encrypted value from a mathematical process called?
a. Hashing
b. Asymmetric
c. Symmetric
d. Social engineering
2. During a training session, you want to impress upon users how serious security and, in particular, cryptography is. To accomplish this, you want to give them as much of an overview about the topic as possible. Which government agency should you mention is primarily responsible for establishing government standards involving cryptography for general-purpose government use?
a. NSA
b. NIST
c. IEEE
d. ITU
3. Assuming asymmetric encryption, if data is encoded with a value of 5, what would be used to decode it?
a. 5
b. 1
c. 1/5
d. 0
4. You’re a member of a consortium wanting to create a new standard that will effectively end all spam. After years of meeting, the group has finally come across a solution and now wants to propose it. The process of proposing a new standard or method on the Internet is referred to by which acronym?
a. WBS
b. X.509
c. RFC
d. IEEE
5. Mary claims that she didn’t make a phone call from her office to a competitor and tell them about developments her company is working on. Telephone logs, however, show that such a call was placed from her phone, and time clock records show she was the only person working at the time. What do these records provide?
a. Integrity
b. Confidentiality
c. Authentication
d. Nonrepudiation
6. Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols?
a. TLS
b. SSH
c. RSH
d. X.509
7. MAC is an acronym for what as it relates to cryptography?
a. Media access control
b. Mandatory access control
c. Message authentication code
d. Multiple advisory committees
8. You’ve been brought in as a security consultant for a small bicycle manufacturing firm. Immediately you notice that it’s using a centralized key-generating process, and you make a note to dissuade them from that without delay. What problem is created by using a centralized key-generating process?
a. Network security
b. Key transmission
c. Certificate revocation
d. Private key security
9. Which of the following terms refers to the prevention of unauthorized disclosure of keys?
a. Authentication
b. Integrity
c. Access control
d. Nonrepudiation
10. As the head of IT for MTS, you’re explaining some security concerns to a junior administrator who has just been hired. You’re trying to emphasize the need to know what is important and what isn’t. Which of the following is not a consideration in key storage?
a. Environmental controls
b. Physical security
c. Hardened servers
d. Administrative controls
11. What is the primary organization for maintaining certificates called?
a. CA
b. RA
c. LRA
d. CRL
12. Due to a breach, a certificate must be permanently revoked, and you don’t want it to ever be used again. What is often used to revoke a certificate?
a. CRA
b. CYA
c. CRL
d. PKI
13. Which organization can be used to identify an individual for certificate issue