SCS: Laboratory Final Exam
Started onTuesday, 8 January 2013, 2:03 PM
StateFinished
Completed onTuesday, 8 January 2013, 2:47 PM
Time taken44 mins 25 secs
Grade29.93 out of a maximum of 40.00 (75%)
Feedback

The test is passed

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Explain what the NSLOOKUP tool enables?
Select one or more:
Correct
Correct

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Resolve the abbreviation DoS.
Select one:
Correct

Feedback

Question 3

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The following SID value:

S-1-5-21-1757982066-362288127-1801674531-501

is probably associated with:
Select one:
Incorrect

Feedback

Question 4

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

A payload protocol is also called:
Select one:
Incorrect

Feedback

Question 5

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Explain the purpose of penetration tests
Select one:
Incorrect

Feedback

Question 6

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Select proper types of firewall.
(Two answers are correct)
Select one or more:
Correct

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The authentication approach that assumes of presentation of two different kinds of evidence to prove one's identity is called:
Select one:
Correct

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Explain the purpose of penetration tests
Select one:
Correct

Feedback

Question 9

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Indicate the false sentence:
(Two answers are correct)
Select one or more:
Incorrect
Correct
Incorrect

Feedback

Question 10

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The process of confirming access rights to specific resources is called:
Select one:
Correct

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

During a DoS attack one is gathering information about:
Select one:
Correct

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Your personal firewall has the following active rule defined:

direction: outgoing,
protocol: tcp,
remote_address: www.army.net,
action: block.

You can normally ping www.army.net. Is that true? 

Select one:
Correct

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To assure confidentially of the message contents one should:
Select one:
Correct

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the name of the second phase of a penetration test?
Select one:
Correct

Feedback

Question 15

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What functions does a typical firewall have?
(Three answers are correct)
Select one or more:
Correct
Incorrect

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

This framework of open standards is used for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. Its name is:
Select one:
Correct

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

 Which of the following mechanisms could be used for authentication?
Select one or more:
Correct
Correct
Correct
Correct
Correct

Feedback

Question 18

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The purpose of message encrypting is to assure confidentially of the message sender, isn't it?
Select one:
Incorrect

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the TRACERT tool used for?
Select one or more:
Correct
Correct

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Resolve the abbreviation VPN.
Select one:
Correct

Feedback

Question 21

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the other name of a secret key?
Select one:
Correct

Feedback

Question 22

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the other name of a private key?
Select one:
Correct

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

 

Is the following sentences true or false?

The AH (Authentication Header) protocol is a member of IPSec suite. Its purpose is to guarantee payload's (message) integrity and data origin authentication of IP packets.

It provides protection for the entire packet (IP header and payload), it does not provide confidentiality (lack of encryption) of the data. The data is readable, but protected from modification.

 

Select one:
Correct

Feedback

Question 24

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Choose the proper answer.

L2TP lies in the ... OSI layer.
Select one:
Incorrect

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the name of the following port scanning method?

A scanner initiates TCP handshaking (SYN) and hangs up (RST). Closed ports reply with the appropriate RST packet, whereas open ports reply with the SYN-ACK packet.
Select one:
Correct

Feedback

Question 26

Partially correct
Mark 0.33 out of 1.00
Flag question

Question text

What functions does a typical firewall have?
(Three answers are correct)
Select one or more:
Incorrect
Correct
Correct

Feedback

Question 27

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Using pwdump you can simply known user's password.

Select one:
Incorrect

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What does filtered or dropped port mean in scanning reports?
Select one:
Correct

Feedback

Question 29

Correct
Mark 1.00 out of 1.00
Flag question

Question text

 

The following sentences are true or false?
Private key is stored on the sender's computer. The sender uses the key to digitally sign messages as well as decrypting (unlocking) messages from the recipients. This key should be password protected and should stay in secret.

Public key is given to the recipient. The recipient uses the key to verify the signature of the sender and to validate the integrity of the message as well as to encrypt (lock) messages sent to the sender. This key doesn't need to be password protected, neither needs to stay in secret.

 

Select one:
Correct

Feedback

Question 30

Correct
Mark 1.00 out of 1.00
Flag question

Question text

 What is the WHOIS tool used for?
Select one:
Correct

Feedback

Question 31

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What are the modes of operation of IPSec?
Select one or more:
Correct
Correct

Feedback

Question 32

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

What is under attack in the fourth phase of penetration tests?
Select one or more:
Correct
Correct
Incorrect

Feedback

Question 33

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To use remote resources in a safety way, you would suggest using:
Select one:
Correct

Feedback

Question 34

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To verify the sender by the recipient one is using:
Select one:
Correct

Feedback

Question 35

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following are asymmetric cryptographic algorithms:
(Three answers are correct)
Select one or more:
Correct
Correct
Correct

Feedback

Question 36

Partially correct
Mark 0.60 out of 1.00
Flag question

Question text

How to resist DoS attacks?
Select one or more:
Correct
Correct
Correct

Feedback

Question 37

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following are valid TCP flags?
(Three answers are correct)
Select one or more:
Correct
Correct
Correct

Feedback

Question 38

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The positive feature of IPSec is that its deployment is transparent to the user.

Select one:
Correct

Feedback

Question 39

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a very bad habbit of administrators that they change their passwords frequently.

Select one:
Correct

Feedback

Question 40

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following are symmetric cryptographic algorithms:
(Three answers are correct)
Select one or more:
Correct
Correct
Correct

Feedback