Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Test yourself better with 300 extra Security+ questions!
Get It Here!

Custom Search

Table Of Contents  CertiGuide to Security+
 9  Chapter 7:  Practice Exam Answers

Previous Topic/Section
Answers to Questions 26-30
Previous Page
Pages in Current Topic/Section
Next Page
Answers to Questions 36-40
Next Topic/Section

Answers to Questions 31-35

31. ActiveX controls can be digitally signed using a technology called:

A. Java Applet


C. Sandbox

D. Authenticode

Explanation: The ActiveX code is bundled into a single file called an ActiveX control. ActiveX controls can be digitally signed using Microsoft's Authenticode technology. Internet Explorer can be configured to disregard any ActiveX control that isn't signed, to run only ActiveX controls that have been signed by specific publishers, or to accept ActiveX controls signed by any registered software publisher. ActiveX controls do not run in a sandbox. The burden is on the user to determine which ActiveX controls s/he feels are "safe" to run.

Applets and CGI are alternate types of content, and a sandbox refers to a protected area of the system in which web content runs.

& Section ActiveX


32. Which of the following represents code that is dormant until triggered by a predetermined event?

A. Logic bomb

B. Virus

C. Worm

D. Snort

Explanation: A resident computer program that, when executed, checks for particular conditions or particular states of the system which, when satisfied, triggers the perpetration of an unauthorized act.

A virus is a self-replicating program; a worm is a program capable of replicating across the network. Snort is a commonly-used utility program.

& Section 1.5.3: Logic Bomb


33. With IPSEC, in each encrypted session we can find ____________ SA(s) for EACH direction.

A. One

B. Two

C. Four

D. Eight

Explanation: All implementations of IPSec must have a security association. The security association is a one-way connection that affords security services to the traffic carried by it. This means that in an encrypted session, there are two security associations - one for each direction. Security services are offered by either the Authentication Header (AH) or the Encapsulating Security Payload (ESP), but not both.

& Section 2.1.7: IPSec


34. Remote Access generally offers

A. The same rights and restrictions as are available on the LAN

B. Some of the rights and restrictions as are available as on the LAN

C. Different rights and restrictions as available on the LAN.

D. No choice is correct.

Explanation: Remote access frequently goes through a more stringent security procedure than local login. And if the account name used for remote is the same as what is used locally, it has the identical rights and restrictions unless you've added a firewall between your remote access server and your internal network.

& Section 2.1: Remote Access


35. A centralized database of remote users for a multi-site network typically uses





E. No choice is correct

Explanation: RADIUS (Remote Authentication Dial-In User Service) lowers administration costs and increases security by having a centralized database for authenticating remote users. PAP is the simplest of authentication protocols, which uses clear text.

& Section 2.1.3: RADIUS

Previous Topic/Section
Answers to Questions 26-30
Previous Page
Pages in Current Topic/Section
Next Page
Answers to Questions 36-40
Next Topic/Section

If you find useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $

Home - Table Of Contents - Contact Us

CertiGuide for Security+ ( on
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al. Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.