51. A stateful packet filtering firewall protects a web server. Which of the following is true:
Correct answer: (D)
The firewall will not block application level attacks
52. A station on a network is sending hundreds of SYN packets to a destination computer. What is the sending computer doing?
Correct answer: (C)
Attacking the destination computer with a SYN flood
53. A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext?
Correct answer: (A)
XORing it with the encryption key
54. A suspect has been forging credit cards with the purpose of stealing money from their owners through ATM withdrawals. Under which U.S. law is this suspect most likely to be prosecuted?
Correct answer: (B)
Access Device Fraud
55. A system administrator needs to harden a server. The most effective approach is:
Correct answer: (C)
Remove unneeded services, disable unused ports, and remove unneeded accounts
56. A systems engineer has discovered that a web server supports only 56- bit SSL connections. What can the systems engineer deduce from this?
Correct answer: (C)
Web communications with this server are not secure
57. A systems engineer is designing a system that consists of a central computer and attached peripherals. For fastest throughput, which of the following technologies should be used for communication with peripheral devices:
Correct answer: (A)
USB 2.0
58. A user, Bill, has posted a link on a web site that causes unsuspecting users to transfer money to Bill if they click the link. The link will only work for users who happen to be authenticated to the bank that is the target of the link. This is known as:
Correct answer: (A)
Cross site request forgery
59. A workstation that can remotely access the organization's network through a VPN and access the local LAN, all through the same physical network connection, is using:
Correct answer: (A)
Split tunneling
60. After completing a risk assessment, an organization was able to reduce the risk through the addition of detective and preventive controls. However, these controls did not remove all risk. What options does the organization have for treating the remaining risk?
Correct answer: (A)
Accept, avoid, reduce, or transfer