451-500 Flashcards
company’s website. The administrator ensures that the certificate is not expired and that customers have trusted the original issuer of the certificate.
Which of the following could be causing the problem?
The intermediate CA certificates were not installed on the server.
Which of the following can be used to ensure digital certificates? (Choose two.)
Confidentiality
Non-repudiation
A certificate used on an e-commerce web server is about to expire.
Which of the following will occur if the certificate is allowed to expire?
Clients will be notified that the certificate is invalid.
An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com.
Which of the following files should be copied from srv4 to accomplish this?
certificate, private key, and intermediate certificate chain
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message.
Which of the following aspects of PKI BEST ensures the identity of the sender?
Non-repudiation
Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group.
Which of the following would prevent her from denying accountability?
C.
Non Repudiation
A company recently experienced data loss when a server crashed due to a midday power outage.
Which of the following should be used to prevent this from occurring again?
D.
Redundancy
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task.
Which of the following can Matt implement to ensure servers will withstand hardware failure?
RAID
After a company has standardized to a single operating system, not all servers are immune to a well-known OS vulnerability.
Which of the following solutions would mitigate this issue?
D.
Patch management system
A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security controls?
D.
Safety
A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has experienced several laptop thefts from the cafe during peak shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate laptop theft.
Which of the following would provide the IT department with the BEST solution?
A.
Attach cable locks to each laptop
A business has set up a Customer Service kiosk within a shopping mall. The location will be staffed by an employee using a laptop during the mall business hours, but there are still concerns regarding the physical safety of the equipment while it is not in use.
Which of the following controls would BEST address this security concern?
C.
Locking cabinets
Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent penetration test reveals vulnerabilities on the network.
Which of the following has been reported by the vulnerability scan?
D.
False negative
Which of the following documents outlines the technical and security requirements of an agreement between organizations?
C.
ISA
A large bank has moved back office operations offshore to another country with lower wage costs in an attempt to improve profit and productivity.
Which of the following would be a customer concern if the offshore staff had direct access to their data?
C.
Privacy considerations
Which of the following are examples of detective controls?
C.
Motion sensors, intruder alarm and audit.
An organization processes credit card transactions and is concerned that an employee may intentionally email credit card numbers to external email addresses.
Which of the following technologies should this company consider?
C.
DLP
Which of the following, if properly implemented, would prevent users from accessing files that are unrelated to their job duties? (Choose two.)
A.
Separation of duties
E.
Least privilege
Which of the following helps to establish an accurate timeline for a network intrusion?
C.
Analyzing network traffic and device logs
A recent audit has revealed weaknesses in the process of deploying new servers and network devices.
Which of the following practices could be used to increase the security posture during deployment? (Choose two.)
B.
Disable unnecessary services
C.
Change default passwords