CEH

(Jeff_L) #1

Assessment Test xxxi


C. PPP


D. SLIP



  1. Which design concept limits access to systems from outside users while protecting users and
    systems inside the LAN?
    A. DMZ
    B. VLAN
    C. I&A
    D. Router

  2. In the key recovery process, which key must be recoverable?
    A. Rollover key
    B. Secret key
    C. Previous key
    D. Escrow key

  3. Which kind of attack is designed to overload a system or resource, taking it temporarily or
    permanently offline?
    A. Spoofing
    B. Trojan
    C. Man in the middle
    D. Syn flood

  4. Which component of an NIDS collects data?
    A. Data source
    B. Sensor
    C. Event
    D. Analyzer

  5. What is the process of making an operating system secure from attack called?
    A. Hardening
    B. Tu n i n g
    C. Sealing
    D. Locking down

  6. The integrity objective addresses which characteristic of the CIA triad?
    A. Verification that information is accurate
    B. Verification that ethics are properly maintained
    C. Establishment of clear access control of data
    D. Verification that data is kept private and secure


flast.indd 31 22-07-2014 11:36:26

Free download pdf