10.1 Final Assessment Flashcards

1
Q

Which of the following is a recognized way of restricting access to an application?

A

Blacklisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can be done to secure virtualized operating systems?

A

Patch the virtual machine OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a security architecture, what is the primary role of a firewall?

A

To filter and control network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have been receiving complaints about some employees accessing potentially dangerous websites. To prevent people from browsing websites that are not related to work, what type of solution could be used?

A

Content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization plans on implementing smart-card authentication. Which of the following allows for smart-card logon on a Windows domain?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nishtha is planning to terminate an employee this afternoon for fraud. She is coordinating the meeting with both Human Resources and the employee, aiming to protect the company against potential damage. Which one of the following steps is most important to coordinate in time with the termination meeting?

A

Revocation of electronic access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Endpoint detection and response have three major components that contribute to their ability to provide visibility into endpoints. Which of the following is not one of those three parts?

A

Malware analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following statements regarding TPM disk encryption are true? (Choose two)

A

Disk contents are protected while the system is running.

Disk contents are protected when the system is shut down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements is correct?

A

TLS supersedes SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What term describes a trusted third-party possessing decryption keys?

A

Key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements best describes a Trusted Platform Module?

A

A hardware module that performs cryptographic functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following hardening techniques is most effective at preventing attacks on open network ports?

A

Disable unused network services. Move servers to the DMZ of all firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Segmenting of the network, where not all attached hosts can communicate freely with one another, is a defensive implementation to secure networks. Which of the following is a means by which hosts in one segment are restricted in the way they communicate with hosts in other segments?

A

Network Segregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a form of enforcement where the organization aims to create a virtual boundary based on real-world geography?

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of port security, when implemented, will allow only a valid list of MAC addresses to connect to a specific port.

A

MAC Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly