10.1 Final Assessment Flashcards
Which of the following is a recognized way of restricting access to an application?
Blacklisting
What can be done to secure virtualized operating systems?
Patch the virtual machine OS.
In a security architecture, what is the primary role of a firewall?
To filter and control network traffic
You have been receiving complaints about some employees accessing potentially dangerous websites. To prevent people from browsing websites that are not related to work, what type of solution could be used?
Content filter
An organization plans on implementing smart-card authentication. Which of the following allows for smart-card logon on a Windows domain?
Kerberos
Nishtha is planning to terminate an employee this afternoon for fraud. She is coordinating the meeting with both Human Resources and the employee, aiming to protect the company against potential damage. Which one of the following steps is most important to coordinate in time with the termination meeting?
Revocation of electronic access rights
Endpoint detection and response have three major components that contribute to their ability to provide visibility into endpoints. Which of the following is not one of those three parts?
Malware analysis
Which of the following statements regarding TPM disk encryption are true? (Choose two)
Disk contents are protected while the system is running.
Disk contents are protected when the system is shut down.
Which of the following statements is correct?
TLS supersedes SSL.
What term describes a trusted third-party possessing decryption keys?
Key escrow
Which of the following statements best describes a Trusted Platform Module?
A hardware module that performs cryptographic functions
Which of the following hardening techniques is most effective at preventing attacks on open network ports?
Disable unused network services. Move servers to the DMZ of all firewalls.
Segmenting of the network, where not all attached hosts can communicate freely with one another, is a defensive implementation to secure networks. Which of the following is a means by which hosts in one segment are restricted in the way they communicate with hosts in other segments?
Network Segregation
What is a form of enforcement where the organization aims to create a virtual boundary based on real-world geography?
Geofencing
This type of port security, when implemented, will allow only a valid list of MAC addresses to connect to a specific port.
MAC Filtering