Chapter 9 ■ Practice Test 1 207
- Frank is the security administrator for a web server that provides news and information to
people located around the world. His server received an unusually high volume of traffic
that it could not handle and was forced to reject requests. Frank traced the source of the
traffic back to a botnet. What type of attack took place?
A. Denial of service
B. Reconaissance
C. Compromise
D. Malicious insider - In the database table shown here, which column would be the best candidate for a
primary key?
1
2
3
234 Main Street
1024 Sample Street
913 Sorin Street
MD
FL
IN
21040
33131
46556
(301) 555-1212
(305) 555-1995
(574) 555-5863
14
14
26
Columbia
Miami
South Bend
Acme Widgets
Abrams Consulting
Dome Widgets
Company ID Company Name Address City State ZIP Code Telephone Sales Rep
A. Company ID
B. Company Name
C. ZIP Code
D. Sales Rep
- Information about an individual like their name, Social Security number, date and place of
birth, or their mother’s maiden name is an example of what type of protected information?
A. PHI
B. Proprietary data
C. PII
D. EDI - Bob is configuring egress filtering on his network, examining traffic destined for the Inter-
net. His organization uses the public address range 12.8.195.0/24. Packets with which one
of the following destination addresses should Bob permit to leave the network?
A. 12.8.195.15
B. 10.8.15.9
C. 192.168.109.55
D. 129.53.44.124 - How many possible keys exist in a cryptographic algorithm that uses 6-bit encryption keys?
A. 12
B. 16
C. 32
D. 64