Architecture and Design (5) Flashcards
Emily manages the IDS/IPS for her network. She has an NIPS installed and properly configured. It is not detecting obvious attacks on one specific network segment. She has verified that the NIPS is properly configured and working properly. What would be the most efficient way for her to address this?
Implement port mirroring for that segment.
Install an NIPS on that segment.
Upgrade to a more effective NIPS.
Implement port mirroring for that segment.
The NIPS is not seeing the traffic on that network segment. By implementing port mirroring, the traffic from that segment can be copied to the segment where the NIPS is installed
You have been instructed to find a VPN solution for your company. Your company uses TACACS+ for remote access. Which of the following would be the best VPN solution for your company?
PPTP
RADIUS
L2TP
L2TP
Layer 2 Tunneling Protocol is a VPN technology that supports a wide range of remote access methods, including TACACS+. L2TP also supports a range of protocols, including ATM and X.25
Jacob is the CIO for a mid-sized company. His company has very good security policies and procedures. The company has outsourced its web application development to a well-known web programming company. Which of the following should be the most important security issue for Jacob to address?
The web application vendor’s hiring practices
The financial stability of the web application vendor
Security practices of the web application vendor
Security practices of the web application vendor
Whenever any part of your business process is outsourced, you need to ensure that the vendor meets or exceeds all of your security policies and procedures. Supply chain assessment security is a critical issue
Gerard is responsible for physical security at his company. He is considering using cameras that would detect a burglar entering the building at night. Which of the following would be most useful in accomplishing this goal?
Motion-sensing camera
Infrared-sensing camera
Sound-activated camera
Infrared-sensing camera
Infrared can still detect at night. A burglar is likely to be in the building at dark, so detecting via infrared is important
Tim is implementing a Faraday cage around his server room. What is the primary purpose of a Faraday cage?
Regulate current
Block intrusions
Block EMI
Block EMI
A Faraday cage is a metal wire mesh designed to block electromagnetic interference. Options A, B, and C are all incorrect. These are not functions of a Faraday cage
You are working for a large company. You are trying to find a solution that will provide controlled physical access to the building and record every employee who enters the building. Which of the following would be the best for you to implement?
A security guard with a sign-in sheet
Smart card access
A camera by the entrance
Smart card access
Smartcards can be used to allow entrance into a building. The smartcard can also store information about the user, and thus the system can log who enters the building
David is responsible for cryptographic keys in his company. What is the best way to deauthorize a public key?
Send out a network alert.
Delete the digital certificate.
Publish that certificate in the CRL.
Publish that certificate in the CRL.
Certificate revocation lists are designed specifically for revoking certificates. Since public keys are distributed via certificates, this is the most effective way to deauthorize a public key
Thomas is trying to select the right fire extinguisher for his company’s server room. Which of the following would be his best choice?
Type A
Type B
Type C
Type C
Type C fire extinguishers are used for electrical fires, including computer equipment fires
Carole is concerned about security for her server room. She wants the most secure lock she can find for the server room door. Which of the following would be the best choice for her?
Combination lock
Key-in-knob
Deadbolt
Deadbolt
Of the locks listed here, deadbolts are the most secure. The locking bolt goes into the door frame, making it more secure
What is the ideal humidity range for a server room?
70% to 80%
40% to 60%
Below 30%
40% to 60%
Forty percent to 60 percent is considered ideal humidity. High humidity can cause corrosion, and low humidity can cause electrostatic discharge
Molly is implementing biometrics in her company. Which of the following should be her biggest concern?
FAR
FRR
CER
FAR
False acceptance rate is the rate at which the system incorrectly allows in someone it should not. This is clearly a significant concern
Daniel is responsible for physical security in his company. All external doors have electronic smart card access. In an emergency such as a power failure, how should the doors fail?
Fail secure
Fail closed
Fail open
Fail open
Physical locks must always fail open, which is also called fail safe. The safety of employees must take precedence over the safety of property. If the lock does not fail open, then employees could be trapped in the building
Donald is responsible for networking for a defense contractor. He is concerned that emanations from UTP cable could reveal classified information. Which of the following would be his most effective way to address this?
Migrate to CAT 7 cable.
Implement protected cabling.
Place all cable in a Faraday cage.
Implement protected cabling.
Protected cabling will secure the cable and prevent anyone from eavesdropping. These systems, also called protected distribution systems, use a variety of safeguards so that classified information can be sent unencrypted
Fred is responsible for physical security in his company. He wants to find a good way to protect the USB thumb drives that have BitLocker keys stored on them. Which of the following would be the best solution for this situation?
Store the drives in a secure cabinet.
Encrypt the thumb drives.
Don’t store BitLocker keys on these drives.
Store the drives in a secure cabinet.
A secure cabinet is tamper proof and provides a good place to store anything you are trying to physically protect
Juanita is responsible for servers in her company. She is looking for a fault-tolerant solution that can handle two drives failing. Which of the following should she select?
RAID 3
RAID 5
RAID 6
RAID 6
RAID 6, disk striping with dual parity, uses a minimum of four disks with distributed parity bits. RAID 6 can handle up to two disks failing