
CEH Study Guide - 03 Security Foundations
Authored by Alejandro Hidalgo
Computers
Professional Development
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To remove malware from the network before it gets to the endpoint, you would use which of the following?
Packet filter
Application layer gateway
Unified threat management appliance
Stateful firewall
Answer explanation
Packet filters are used to make block/allow decisions based on header data like source and destination address and port.
Stateful firewalls add in the ability to factor in the state of the connection—new, related, established.
An Application layer gateway knows about Application layer protocols.
A unified threat management appliance adds additional capabilities on top of firewall functions, including antivirus.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If you were on a client engagement and discovered that you left an external hard drive with essential data on it at home, which security principle would you be violating?
Confidentiality
Integrity
Non-repudiation
Availability
Answer explanation
Confidentiality is about making sure secrets are kept secret.
Integrity makes sure that data isn’t altered accidentally or by an unauthorized agent.
Non-repudiation makes sure someone can’t say a message didn’t originate with them if it came from their identity.
Availability means making sure data is where it needs to be when it should be there. This includes services as well.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How would you calculate risk?
Probability * loss value
Probability * mitigation factor
(Loss value + mitigation factor) * (loss value/probability)
Probability * mitigation factor
Answer explanation
Risk is the probability of the occurrence of an event multiplied by the dollar value of loss.
There is no mitigation factor that is quantified, so it could be put into a risk calculation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is one factor of a defense in depth approach to network design?
Switches
Using Linux on the desktop
Optical cable connections
Access control lists on routers
Answer explanation
Switches and optical cable connections can certainly be part of a network design, but in and of themselves they don’t add any security features.
You may use Linux on the desktop, but without more of a strategy for patch and vulnerability management, Linux is no better than other operating systems.
Access control lists on routers can add an additional layer of security, especially when combined with other elements like firewalls and intrusion detection systems.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How would you ensure that confidentiality is implemented in an organization?
Watchdog processes
Encryption
Cryptographic hashes
Web servers
Answer explanation
Confidentiality is keeping secret information secret, which means unauthorized users can’t access it.
Encryption is a good way to keep unauthorized users from data because in order to get to the data, they need to have the key.
Watchdog processes are used to ensure that programs remain running.
Cryptographic hashes are used to verify the integrity of data.
Web servers are used to serve up information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An intrusion detection system can perform which of the following functions?
Block traffic
Filter traffic based on headers
Generate alerts on traffic
Log system messages
Answer explanation
Firewalls are used to block traffic into a network, though an intrusion prevention system will also block traffic.
A packet filtering firewall uses header information, such as source and destination address and port, to determine whether to allow traffic into the network.
Syslog and the Windows event subsystem can be used to log system messages.
Intrusion detection systems can be used to generate alerts on traffic.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these would be an example of a loss of integrity?
User making changes to a file and saving it
Bad blocks flagged on disk
Credit cards passed in cleartext
Memory failures causing disk drivers to run incorrectly
Answer explanation
If a user makes a change to a file and saves it, that’s an intentional act and the data is what the user expects and wants.
If the disk drive has flagged bad blocks on the disk, the drive won’t write any data out to those blocks, so there will be no loss of integrity.
Credit cards passed in cleartext would be a violation of confidentiality.
Memory failures, though, could cause a loss of data integrity, even in the case of writing data to the drive. The corrupted data in memory could be written to disk. Also, memory failures may cause issues with the disk driver, which may also cause data corruption.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
18 questions
Ict Quiz
Quiz
•
KG - Professional Dev...
21 questions
Historia de la informática 1SMX SOM Actividad 1.2
Quiz
•
Professional Development
20 questions
VIDEOJUEGOS-CMSB
Quiz
•
1st Grade - Professio...
20 questions
Introduction to Machine Learning
Quiz
•
University - Professi...
20 questions
Microsoft Excel
Quiz
•
KG - Professional Dev...
20 questions
MTA - Microsoft Operating Systems Review 1
Quiz
•
10th Grade - Professi...
20 questions
Salesforce Developer
Quiz
•
Professional Development
15 questions
Kodlama ve Bilişim
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development