1. A malicious attacker has intercepted HTTP traffic and inserted an ASCII line that sets the referrer URL. Which of the following is the attacker most likely utilizing?
A) Cookie hijacking
B) Xml injection
C) Header manipulation
D) Cross-site scripting
2. A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
A) Compensating
B) Preventive
C) Detective
D) Deterrent
3. A Chief Information Officer (CIO) recently saw on the news that a significant security flaws exists with a specific version of a technology the company uses to support many critical application. The CIO wants to know if this reported vulnerability exists in the organization and,if so,to what extent the company could be harmed. Which of the following would BEST provide the needed information?
A) Penetration test
B) Patching assessment report
C) Active reconnaissance
D) Vulnerability scan
4. A company wants to provide centralized authentication for its wireless system. The wireless authentication system must integrate with the directory back end. Which of the following is a AAA solution that will provide the required wireless authentication?
A) LDAP
B) TACACS+
C) MSCHAPv2
D) RADIUS
5. A company is deploying a new VoIP phone system. They require 99.999% uptime for their phone service and are concerned about their existing data network interfering with the VoIP phone system. The core switches in the existing data network are almost fully saturated. Which of the following options will pro-vide the best performance and availability for both the VoIP traffic,as well as the traffic on the existing data network?
A) Put the VoIP network into a different VLAN than the existing data network.
B) Physically separate the VoIP phones from the data network
C) Upgrade the edge switches from 10/100/1000 to improve network speed
D) Implement flood guards on the data network
Write a public review