SCS: Laboratory Final Exam
Started onTuesday, 8 January 2013, 2:02 PM
StateFinished
Completed onTuesday, 8 January 2013, 2:42 PM
Time taken40 mins
Grade31.50 out of a maximum of 40.00 (79%)
Feedback

The test is passed

Question 1

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Is the following sentence true or false?

The ESP (Encapsulation Security Payload) protocol is a member of IPSec suite. Its purpose is to guarantee payload's (message) integrity, data origin authentication of IP packets and confidentially of the payload.

It does provide protection for the entire packet, not only to the payload.
Select one:
Incorrect

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The goal of DoS attacks is to make resources or services of a computer system available to legitimate users, isn't it?
Select one:
Correct

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A network sniffer can:
Select one or more:
Correct
Correct
Correct

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Indicate the true sentence:
Select one:
Correct

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The following SID value:

S-1-5-21-1757982066-362288127-1801674531-501

is probably associated with:
Select one:
Correct

Feedback

Question 6

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The purpose of message signing is to:
Select one or more:
Incorrect
Incorrect
Correct

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

During this attack the victim is bombarded with datagrams that are directed to random ports. Victim's machine checks the state of the port, and reply with ICMP Destination Unreachable packet if the port is closed. This action can consume enough resources to make the system unresponsive to legitimate users and services.

This kind of attack is particularly dangerous in combination with the malformed datagram where the source IP address is spoofed and point, for example, to the network broadcast address – this could lead to network bandwidth exhaustion.
Select one:
Correct

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a very bad habbit of administrators that they change their passwords frequently.

Select one:
Correct

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the name of the second phase of a penetration test?
Select one:
Correct

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Indicate the true senteces.
Select one or more:
Correct
Correct

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What type of encryption is considered more secure: symmetric or asymmetric?
Select one:
Correct

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Your personal firewall has the following active rule defined:

direction: outgoing,
protocol: tcp,
remote_address: www.army.net,
action: block.

You can normally ping www.army.net. Is that true? 

Select one:
Correct

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Resolve the abbreviation VPN.
Select one:
Correct

Feedback

Question 14

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

How does Stealth FIN scanning method work?
Select one:
Incorrect

Feedback

Question 15

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

During this attack the victim is bombarded with SYN requests which consume enough resources to make the system unresponsive to legitimate users and services. This attack is called:
Select one:
Incorrect

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following are symmetric cryptographic algorithms:
(Three answers are correct)
Select one or more:
Correct
Correct
Correct

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Match the true sentence regarding IDS and IPS.
Select one or more:
Incorrect
Correct
Incorrect

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To use remote resources in a safety way, you would suggest using:
Select one:
Correct

Feedback

Question 19

Partially correct
Mark 0.33 out of 1.00
Flag question

Question text

 What does IPSec provide?
Select one or more:
Correct
Correct
Incorrect

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The purpose of IPSec tunnel mode is to assure safe communication over network, isn't it?
Select one:
Correct

Feedback

Question 21

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

How can you check the routing table contents in MS Windows systems?
(Two answers are correct)
Select one or more:
Correct

Feedback

Question 22

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Select proper types of firewall.
(Two answers are correct)
Select one or more:
Correct
Correct

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Is the following sentence true or false?
Symmetric cryptographic algorithms use one key for coding and decoding, while asymmetric algorithms use a pair of keys - one for coding and second for decoding.
 
Select one:
Correct

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Flag question

Question text

This list holds information about revoked certificates (certificates that were called off). 
The list is called:
Select one:
Correct

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A public key can be simply generated from a private key.

Select one:
Correct

Feedback

Question 26

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

During a DoS attack one is gathering information about:
Select one:
Incorrect

Feedback

Question 27

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Explain the purpose of penetration tests
Select one:
Incorrect

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What tool is used for measuring transit delays of packets across Internet?
Select one:
Correct

Feedback

Question 29

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What will be the answer from a closed port (on most operating systems) while scanning using UDP scan method?
Select one:
Correct

Feedback

Question 30

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Virtualization in Virtual Private Networks means that you obtain access to remote resources by virtual network interface.

Select one:
Correct

Feedback

Question 31

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the name of the second phase of a penetration test?
Select one:
Correct

Feedback

Question 32

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The purpose of message encrypting is to assure confidentially of the message sender, isn't it?
Select one:
Incorrect

Feedback

Question 33

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Resolve the abbreviation GPG.
Select one:
Correct

Feedback

Question 34

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Usually a public key should be PIN-protected.

Select one:
Correct

Feedback

Question 35

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Tunnels implemented using IPSec are unidirectional.

Select one:
Correct

Feedback

Question 36

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Can Wireshark intercept and record network traffic?
Select one:
Correct

Feedback

Question 37

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which phase of penetration tests engage the following methods of penetration?

Gathering general information from WWW, press, blogs, mailing lists, the usage of Web search engines, querying WHOIS databases, querying DNS, host reachability.
Select one:
Correct

Feedback

Question 38

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In which layer of TCP/IP suite you can find the Domain Name System?
Select one:
Correct

Feedback

Question 39

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

Which of the following are asymmetric cryptographic algorithms:
(Three answers are correct)
Select one or more:
Correct
Correct

Feedback

Question 40

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Select proper types of firewall.
(Two answers are correct)
Select one or more:
Correct
Correct

Feedback