02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Assessment Test xxxi<br />

C. PPP<br />

D. SLIP<br />

7. Which design concept limits access to systems from outside users while protecting users and<br />

systems inside the LAN?<br />

A. DMZ<br />

B. VLAN<br />

C. I&A<br />

D. Router<br />

8. In the key recovery process, which key must be recoverable?<br />

A. Rollover key<br />

B. Secret key<br />

C. Previous key<br />

D. Escrow key<br />

9. Which kind of attack is designed to overload a system or resource, taking it temporarily or<br />

permanently offline?<br />

A. Spoofing<br />

B. Trojan<br />

C. Man in the middle<br />

D. Syn flood<br />

10. Which component of an NIDS collects data?<br />

A. Data source<br />

B. Sensor<br />

C. Event<br />

D. Analyzer<br />

11. What is the process of making an operating system secure from attack called?<br />

A. Hardening<br />

B. Tuning<br />

C. Sealing<br />

D. Locking down<br />

12. The integrity objective addresses which characteristic of the CIA triad?<br />

A. Verification that information is accurate<br />

B. Verification that ethics are properly maintained<br />

C. Establishment of clear access control of data<br />

D. Verification that data is kept private and secure

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!