Every PrepLogic Practice Exam question includes a “Feedback Link” that allows you to provide feedback or alert us to items you believe may be in error. From time to time we like to address some of your remarks here in our blog. Let’s take a look at some of our recent Practice Exam Feedback.
Our first comment is in regards to a question in our Certified Ethical Hacker (CEH) (312-50) Practice Exam. The question is:
You are a security consultant hired to perform a wireless penetration test. Which of the following would be considered part of the test? Select the best answers.
A.) Application Testing and Code Review
B.) Cordless Communications Testing
C.) Privacy Review
D.) Infrared Systems Testing
E.) PBX Testing
F.) Intrusion Detection System Testing
The correct answers are B, C and D.
Vincent writes in to say that “IDS testing should be a part of any Pen Testing for WAN or LAN.” This is an excellent point for discussion. It’s true that IDS, in theory, can be used in the testing of wireless network vulnerabilities, but it isn’t a standard practice according to the CEH exam. IDS testing is essentially meant for wired communications. This journal article notes the need for improvements to IDS systems in order to account for the inherent vulnerabilities in wireless networks, but at this time, IDS systems are not used in this way. In the wireless penetration test example given, Cordless Communications Testing, Privacy Review and Infrared Systems Testing would be considered part of the test.
Our next comment comes from the feedback for our CISSP® Practice Exam. The question is:
Which of the following is NOT a preventative physical access control? Select the best answer.
C.) Call back systems
D.) CCTV (Closed-Circuit TV)
The correct answer is C, Call back systems, which is a preventative technical access control.
Our commenter asks “Isn’t biometrics considered more of a technical control than a physical control?” While it is true that Biometrics is a technical control, it is also a physical control. Consider that a technical access control mechanism is one that prevents access to systems with the intention of protecting information. Laptops with built-in fingerprint scanners would be an example of biometrics used as a technical access control mechanism. Physical access control mechanisms are distinguished from technical access control mechanisms, in that they restrict you from physically entering a space you don’t belong. A finger print scanner at a secure entryway would be a biometric physical access control mechanism. Of the choices listed, Call back systems are not a preventative physical access control.
The final comment we will address today is from PrepLogic’s A+ Practical Application (220-702) Practice Exam. The question is:
You upgrade a system that contains a layered service provider from a previous version of Windows Vista. The system loses network connectivity when configured for dynamic address assignment. How would you verify that this upgrade is the probable issue? Select the best answer.
A.) Open a command prompt with administrator rights, issue netsh winsock reset and check the listings.
B.) Open a command prompt, issue ipconfig and check for a “169.254.x.x” IPv4 address.
C.) Unplug and reinsert the network card, check for a loose cable and try to ping a nearby host.
D.) Call the Internet Service Provider and contact a network administrator.
The correct answer is B. The 169.254.x.x is an APIPA address, signifying that the computer has no current network visibility.
An A+ candidate writes that “an APIPA does not verify an upgrade issue. There are many possible reasons for an APIPA. The only thing it verifies is that there is no network connectivity.” One of the biggest problems with Layered Service Providers is corruption of the TCP/IP stack, usually as a result of improper or incomplete removal of the service. This is a widely known issue. If the TCP/IP stack does become corrupted, the computer no longer can access the network and, thus, the computer pulls an APIPA address rather than one assigned by DHCP. We can verify that the upgrade is the problem on the simple notion of causality. Before the upgrade, my computer had access to the network. After the upgrade, my computer pulls an APIPA address, leaving me to believe the TCP/IP stack is corrupted, since the question includes no additional information regarding improper DHCP configuration is included in the stem.
Remember, if you have any comments or questions about a practice question, simply submit your comment and our editorial team will review it. If we made a mistake (we’re only human!) we’ll correct it in a practice exam update. Thanks for your feedback, and good luck on your exams.