401-450 Flashcards

1
Q

Which of the following is an example of establishing a published chart of roles, responsibilities, and chain of command to be used during a disaster?

A

Succession planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator recently updated various network devices to ensure redundancy throughout the network. If an interface on any of the Layer 3 devices were to go down, traffic will still pass through another interface and the production environment would be unaffected.

Which of the following concepts represents this type of configuration?

A

High availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network administrator has purchased two devices that will act as failovers for each other.

Which of the following concepts does this BEST illustrate?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The main corporate website has a service level agreement that requires availability 100% of the time, even in the case of a disaster.

Which of the following would be required to meet this demand?

A

Geographically disparate site redundant datacenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company replaces a number of devices with a mobile appliance, combining several functions.

Which of the following descriptions fits this new implementation? (Choose two.)

A

All-in-one device

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A small business needs to incorporate fault tolerance into their infrastructure to increase data availability.

Which of the following options would be the BEST solution at a minimal cost?

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following may significantly reduce data loss if multiple drives fail at the same time?

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following provides data the best fault tolerance at the LOWEST cost?

A

RAID 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following provides the LEAST availability?

A

RAID 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application.

Which of the following does this represent?

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following concepts allows an organization to group large numbers of servers together in order to deliver a common service?

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Jane has implemented an array of four servers to accomplish one specific task. This is BEST known as which of the following?

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following technologies uses multiple devices to share work?

A

Load Balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following provides the BEST application availability and is easily expanded as demand grows?

A

Load Balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to restore those services?

A

Mobile site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A security administrator has just finished creating a hot site for the company.

Which of the following concepts relates this implementation to?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following disaster recovery strategies has the highest cost and shortest recovery time?

A

Hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A company wants to ensure that its hot site is prepared and functioning.

Which of the following would be the BEST process to verify the backup datacenter is prepared for such a scenario?

A

Disaster recovery exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Chief Information Officer (CIO) wants to implement a redundant server location to which the production server images can be moved within 48 hours and services can be quickly restored, in case of a catastrophic failure of the primary datacenter’s HVAC.

Which of the following can be implemented?

A

Warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is the BEST concept to maintain required but non-critical server availability?

A

Warm site

22
Q

After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the document is no longer encrypted.

Which of the following can a security technician implement to ensure that documents stored on Joe’s desktop remain encrypted when moved to external media or other network based storage?

A

File level encryption

23
Q

Customers’ credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor.

Which of the following methods should the company consider securing this data in the future?

A

Encrypted TCP wrappers

24
Q

Which of the following controls can be used to prevent the disclosure of sensitive information stored on a mobile device’s removable media in the event that the device is lost or stolen?

A

Encryption

25
Q

An online store wants to protect user credentials and credit card information so that customers can store their credit card information and use their card for multiple separate transactions.

Which of the following database designs provides the BEST security for the online store?

A

Hash the credential fields and use encryption for the credit card field

26
Q

A system administrator has been instructed by the head of security to protect their data at-rest.

Which of the following would provide the strongest protection?

A

Incorporating a full-disk encryption system

27
Q

Several departments within a company have a business need to send high volumes of confidential information to customers via email.

Which of the following is the BEST solution to mitigate unintentional exposure of confidential information?

A

Employ encryption on all outbound emails containing confidential information.

28
Q

After recovering from a data breach in which customer data was lost, the legal team meets with the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data.

Which of the following controls support this goal?

A

Encryption and stronger access control

29
Q

A security audit identifies a number of large email messages being sent by a specific user from their company email account to another address external to the company. These messages were sent prior to a company data breach, which prompted the security audit. The user was one of a few people who had access to the leaked data. Review of the suspect’s emails show they consist mostly of pictures of the user at various locations during a recent vacation. No suspicious activities from other users who have access to the data were discovered.

Which of the following is occurring?

A

The user is using steganography.

30
Q

A security analyst has been notified that trade secrets are being leaked from one of the executives in the corporation. When reviewing this executive’s laptop, they notice several pictures of the employee’s pets are on the hard drive and on a cloud storage network. When the analyst hashes the images on the hard drive against the hashes on the cloud network, they do not match.

Which of the following describes how the employee is leaking these secrets?

A

steganography

31
Q

Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

A

Hashing

32
Q

A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to each password before the password is hashed. This technique is known as:

A

Salting

33
Q

Which of the following concepts describes the use of a one-way transformation in order to validate the integrity of a program?

A

Hashing

34
Q

The security administrator is implementing a malware storage system to archive all malware seen by the company into a central database. The malware must be categorized and stored based on similarities in the code.
Which of the following should the security administrator use to identify similar malware?

A

Fuzzy hashes

35
Q

An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-to- peer network that cannot connect to the Internet. The ISSO can update the antivirus definitions manually, but which of the following steps is MOST important?

A

The signatures must have a hash value equal to what is displayed on the vendor site.

36
Q

Which of the following would a security administrator use to verify the integrity of a file?

A

Hash

37
Q

Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days’ hashes.

Which of the following security concepts is Sara using?

A

Integrity

38
Q

Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message is 160-bits long.

Which of the following hashing methods would Matt have to use to obtain this digital fingerprint?

A

SHA1

39
Q

Company A submitted a bid on a contract to do work for Company B via email. Company B was insistent that the bid did not come from Company A.

Which of the following would have assured that the bid was submitted by Company A?

A

Digital Signatures

40
Q

An email client says a digital signature is invalid and the sender cannot be verified.

Which of the following concepts is the recipient concerned with?

A

Integrity

41
Q

A software firm posts patches and updates to a publicly accessible FTP site. The software firm also posts digitally signed checksums of all patches and updates. The firm does this to address:

A

Integrity of downloaded software.

42
Q

It is important to staff who use email messaging to provide PII to others on a regular basis to have confidence that their messages are not intercepted or altered during transmission.

Which of the following types of security control are they concerned about?

A

integrity

43
Q

Matt, a security administrator, wants to ensure that the message he is sending does not get intercepted or modified in transit.

Which of the following concepts relates this concern to?

A

Integrity

44
Q

Which of the following is used by the recipient of a digitally signed email to verify the identity of the sender?

A

Sender’s public key

45
Q

Digital signatures are used for ensuring which of the following items? (Choose two.)

A

Integrity

Non-Repudiation

46
Q

Joe, a user, wants to send an encrypted email to Ann.

Which of the following will Ann need to use to verify that the email came from Joe and decrypt it? (Choose two.)

A

Ann’s private key

Joe’s public key

47
Q

Joe, a user, wants to send an encrypted email to Ann.

Which of the following will Ann need to use to verify the validity’s of Joe’s certificate? (Choose two.)

A

The CA’s public key

Joe’s public key

48
Q

A user was reissued a smart card after the previous smart card had expired. The user is able to log into the domain but is now unable to send digitally signed or encrypted email.

Which of the following would the user need to perform?

A

Publish the new certificates to the global address list.

49
Q

Which of the following could cause a browser to display the message below?

“The security certificate presented by this website was issued for a different website’s address.”

A

HTTPS://127.0.01 was used instead of HTTPS://localhost.

50
Q

Certificates are used for: (Choose two.)

A

Client authentication.

Code signing.