Free IC3-3 Exam Braindumps (page: 13)

Page 13 of 36

Which of the following elements of security means that data should only be available to authorized users?

  1. Integrity
  2. Confidentiality
  3. Availability
  4. Authentication

Answer(s): C

Explanation:

There are four elements of security, which are as follows:

Confidentiality:
It means that data should only be accessible by authorized users. This access includes printing, displaying, and other forms of disclosure, including simply revealing the existence of an object.

Integrity:
It means that the only authorized users are able to modify data. Modification admits writing, changing, changing status, deleting, and creating.
Availability:
It means that data should only be available to authorized users.
Authenticity:
It means that a host or service should be able to verify the identity of a user.



Maria works as a Security administrator for DataSoft Inc. She implements a policy for passwords.
Which of the following things should she keep in mind while creating a strong password? Each correct answer represents a part of the solution. Choose all that apply.

  1. It should contain numbers and special characters.
  2. It should be a word that appears in the dictionary.
  3. It should be generated randomly.
  4. It should contain uppercase and lowercase letters. E. It should be the users' name followed by their date of births. F:It should be a username followed by 123. G: It should be a user's father name spelled backwards.

Answer(s): A,D

Explanation:

Following are the important guidelines for choosing a strong password:
A password should be a combination of uppercase and lowercase letters, numbers, and special characters.
A password should not be blank or the same as the username.
A password should not be one's own name followed by the date of birth, for example stephen1711.
A password should not be repeated.
A password must be changed regularly. The same password should not be used at multiple places. Randomly generated passwords should not be used, as they are difficult to remember.
A password should not be a word that appears in the dictionary because such a password can be cracked through a dictionary attack.



Which of the following connecting devices is used to form a hybrid network in a Star topology?

  1. Gateway
  2. Repeater
  3. Brouter
  4. MAU

Answer(s): D

Explanation:

MAU stands for Media Access Unit. It is also known as an Ethernet transceiver or MSAU (MultiStation Access Unit). It is a type of adapter, connector, or stand-alone device. It enables a network device to be connected to a token ring network. This device is used to attach multiple network stations in a star topology.
A MAU can be available as either active or passive to prevent issues if a network device or computer goes down.
Answer option B is incorrect.
A repeater is an electronic device that receives a signal and retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
A repeater is a device that receives a digital signal on an electromagnetic or optical transmission medium and regenerates the signal along the next leg of the medium. In electromagnetic media, repeaters overcome the attenuation caused by free-space electromagnetic-field divergence or cable loss.
A series of repeaters make possible the extension of a signal over a distance. Repeaters remove the unwanted noise in an incoming signal. Unlike an analog signal, the original digital signal, even if weak or distorted, can be clearly perceived and restored. With analog transmission, signals are restrengthened with amplifiers which unfortunately also amplify noise as well as information. An example of a wireless repeater is shown in the figure below: Answer option C is incorrect.
A brouter is a network bridge and a router combined in a single product.
A bridge is a device that connects one local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or Token Ring). If a data unit on one LAN is intended for a destination on an interconnected LAN, the bridge forwards the data unit to that LAN; otherwise, it passes it along on the same LAN.
A bridge usually offers only one path to a given interconnected LAN.
A router connects a network to one or more other networks that are usually part of a wide area network (WAN) and may offer a number of paths out to destinations on those networks.
A router therefore needs to have more information than a bridge about the interconnected networks. It consults a routing table for this information. Since a given outgoing data unit or packet from a computer may be intended for an address on the local network, on an interconnected LAN, or the wide area network, it makes sense to have a single unit that examines all data units and forwards them appropriately.
Answer option A is incorrect.
A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end- point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within a company's network or at a local Internet service provider (ISP) are gateway nodes. In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server.
A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.



John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e-mail:
The e-mail that John has received is an example of __________.

  1. Spambots
  2. Chain letters
  3. Virus hoaxes
  4. Social engineering attacks

Answer(s): B

Explanation:

This email is an example of a chain letter. Chain letters are emails that urge the recipient to forward these emails to other people. Forwarding chain letters wastes the network bandwidth and user's time. Amy Bruce, Angels Exist, Applebees Gift Certificate, ATM Theft, Bill Gates, and Bill Gates Fortune are some good examples of chain letters.
Answer option C is incorrect. This email is not a virus hoax. Virus hoaxes are false reports about non-existent viruses. In these reports, the writer of virus hoaxes often claims to do impossible things. Due to these false reports, the network administrator shuts down his network, which in turn affects the work of the company. These virus hoaxes falsely claim to describe an extremely dangerous virus, and declare that the report is issued by a reputed company.
Answer option D is incorrect. This email is not an example of a social engineering attack because there is no information about stealing being done in the whole process. Social engineering is the art of convincing people and making them disclose useful information such as account names and passwords. This information is further exploited by hackers to gain access to a user's computer or network. This method involves mental ability of people to trick someone rather than their technical skills.
A user should always distrust people who ask him for his account name, password, computer name, IP address, employee ID, or other information that can be misused.
Answer option A is incorrect. This is not an example of a spambot. Spambot is a software program that collects email addresses of users and creates a mailing list. Spam will be sent to the email addresses stored in the mailing list.



Page 13 of 36



Post your Comments and Discuss Certiport IC3-3 exam with other Community members:

A commented on September 30, 2024
Good questiond
Anonymous
upvote

MM commented on September 30, 2024
is there anyone who wrote and pass using this dump?
SOUTH AFRICA
upvote

Chris commented on September 30, 2024
This is a very good resource. Reliable and cheap.
UNITED STATES
upvote

DeMalio commented on September 30, 2024
Very helpful and very accurate. Could not have passed this exam without this exam dump. Very grateful.
UNITED STATES
upvote

Pragati commented on September 30, 2024
Useful Resources
Anonymous
upvote

Dan commented on September 30, 2024
hi Thanks could you provide scenario based questions ?
FRANCE
upvote

Ashitosh commented on September 30, 2024
I m Ashitosh
JAPAN
upvote

Chipo Musenge commented on September 30, 2024
These revision are so insightful.
Anonymous
upvote

Han commented on September 30, 2024
I found the questions very helpful. I saw most users are saying that this exam is very hard. So I am trying every option to prepare and pass.
Anonymous
upvote

Lucas commented on September 30, 2024
Thank you! Great material
ISRAEL
upvote

Alejandro commented on September 30, 2024
My exam is coming up this week. I have prepared using this exam dumps. Let's see how it goes and I will share my result here.
UNITED STATES
upvote

Mary commented on September 29, 2024
This is a great material to study
COLOMBIA
upvote

Lorry commented on September 29, 2024
Hello users of this website, This exam is easy to pass with this study guide. All practice questions are the same as the real exam. I passed and got 93%.
Anonymous
upvote

Rizwan commented on September 29, 2024
It's very useful information in the reveal solutions.
Anonymous
upvote

Rizwan commented on September 29, 2024
I am trying to learn question and answer to attempt Exam tomorrow morning.
Anonymous
upvote

Elon commented on September 29, 2024
Hi! Has anyone attempted this exam recently? If so, please let me know if these questions are still relevant and appearing in the exam in the same format.
Anonymous
upvote

B commented on September 28, 2024
first time user, is this reliable
Anonymous
upvote

Parm commented on September 28, 2024
Good questions so far
UNITED STATES
upvote

Parm commented on September 28, 2024
Very good questions so far
UNITED STATES
upvote

Parminder commented on September 28, 2024
Good questions
UNITED STATES
upvote

Suresh G commented on September 28, 2024
Good content.
UNITED STATES
upvote

EG commented on September 28, 2024
Correct and explained answers. Thank you.
Anonymous
upvote

Haleem commented on September 28, 2024
This exam dump came to my rescue. Questions were very close to actual exam and I passed with 84%.
UNITED KINGDOM
upvote

krithika commented on September 28, 2024
Helpful ,Thank for the resources
Anonymous
upvote

Venkat commented on September 27, 2024
Preparing for certification
Anonymous
upvote

Nigel commented on September 27, 2024
Managed to pass my exam bu using the full version of this exam. This free version has less questions compared to PDF.
Spain
upvote

Kangaroo Jack commented on September 27, 2024
The best way to study and pass your exam. Quick and painless. The full PDF version is well worth the money.
AUSTRALIA
upvote

Ouahid commented on September 27, 2024
Thank you, it is very useful
AUSTRIA
upvote

Karlik commented on September 27, 2024
I passed the exam with help from this questions :)
Anonymous
upvote

Nate commented on September 27, 2024
Has anyone recently taken the exam? Can anyone confirm these questions are similar or word for word?
Anonymous
upvote

Birkha commented on September 27, 2024
NO comments
BHUTAN
upvote

raba commented on September 26, 2024
@khorshal can i use this alone to pass the exams
Anonymous
upvote

raba commented on September 26, 2024
some of the questions are straight forward
Anonymous
upvote

Judwa commented on September 26, 2024
This exam is super hard. I was overwhelmed. After using this exam dump, I went into the exam feeling a bit better. I passed my test. :-)
INDIA
upvote