Chapter 9 ■ Practice Test 1 207
- Frank is the security administrator for a web server that provides news and information to
people located around the world. His server received an unusually high volume of traffic
that it could not handle and was forced to reject requests. Frank traced the source of the
traffic back to a botnet. What type of attack took place?
A. Denial of service
B. Reconaissance
C. Compromise
D. Malicious insider - In the database table shown here, which column would be the best candidate for a
primary key?
1
2
3234 Main Street
1024 Sample Street
913 Sorin StreetMD
FL
IN21040
33131
46556(301) 555-1212
(305) 555-1995
(574) 555-586314
14
26Columbia
Miami
South BendAcme Widgets
Abrams Consulting
Dome WidgetsCompany ID Company Name Address City State ZIP Code Telephone Sales RepA. Company ID
B. Company Name
C. ZIP Code
D. Sales Rep- Information about an individual like their name, Social Security number, date and place of
birth, or their mother’s maiden name is an example of what type of protected information?
A. PHI
B. Proprietary data
C. PII
D. EDI - Bob is configuring egress filtering on his network, examining traffic destined for the Inter-
net. His organization uses the public address range 12.8.195.0/24. Packets with which one
of the following destination addresses should Bob permit to leave the network?
A. 12.8.195.15
B. 10.8.15.9
C. 192.168.109.55
D. 129.53.44.124 - How many possible keys exist in a cryptographic algorithm that uses 6-bit encryption keys?
A. 12
B. 16
C. 32
D. 64