Certmaster practice questions Flashcards
5
A multinational company has partnered with several smaller, younger companies. To protect their supply chain and improve their own risk posture, the company offers to provide network security services for their new partners. Conclude what type of risk the company is addressing.
External
Legacy systems
Multiparty
Internal
Multiparty
Multiparty risk occurs when an adverse event impacts multiple organizations. If a breach occurs for one party, all parties share the risk.
1
A vulnerability database loaded on a scanning tool such as Tenable Nessus will commonly show which of the following properties?
Select all that apply.
Score
Dictionary
Security data inputs
Packet data
Score
Dictionary
Score-Common Vulnerability Scoring System (CVSS) is maintained by the Forum of Incident Response and Security Teams (first.org/cvss). Scores range from 0 (low) to 9+ (critical).
Dictionary-Common Vulnerabilities and Exposures (CVE) is a dictionary of vulnerabilities in published operating systems and applications software provided by cve.mitre.org. It includes CVE ID, brief descriptions, a URL reference list, and data of entry.
3
A company provides smartphones to their employees. IT administrators have the ability to deploy, secure, and remove specific applications and data from the employees’ smartphones. Analyze the selections and determine how IT can perform this type of control.
Push notifications
Content management
Baseband update
Storage segmentation
Storage segmentation
Storage segmentation is personal data segmented from organizational data on a mobile device. It gives IT administrators control over corporate assets on employees’ mobile devices.
1
Experts at a scientific facility suspect that operatives from another government entity have planted malware and are spying on one of their top-secret systems. Based on the attacker’s location and likely goals, which attacker type is likely responsible?
Hacktivists
Script kiddies
State actors
Criminal syndicates
State actors
State actors have been implicated in many attacks, particularly on energy and health network systems. They typically work at arm’s length from the national government that sponsors and protects them, maintaining “plausible deniability.” A criminal syndicate can operate across the internet from different jurisdictions than its victim, increasing the complexity of prosecution. Syndicates will seek any opportunity for criminal profit, but typical activities are financial fraud. A script kiddie is someone who uses hacker tools without necessarily understanding how they work or having the ability to craft new attacks. Hacktivists might attempt to obtain and release confidential information to the public domain, perform denial of service (DoS) attacks, or deface websites.
1
What would be the highest concern for an e-commerce company whose top priority is to ensure customers can shop online 24/7?
Increase of data breaches
Loss of reputation
Loss of availability
Increase of fines
Loss of availability
Availability loss in this case is losing redundancy in applications and servers that host and run the e-commerce website. Service availability is important to an e-commerce company that advertises 24/7 services.
1
Today’s hackers are keen on knowing that security teams are actively hunting for threats on the network. Hackers may use resources to trigger a diversion to keep threat hunters busy, while another attack is initiated to carry out the primary objective of the planned penetration attack. How can a security team best circumvent this strategic hacking technique?
Monitor threat feeds from ISACs.
Review security advisories.
Apply intelligence fusion techniques.
Use a defensive maneuver.
Use a defensive maneuver.
A defense maneuver uses passive discovery techniques so that threat actors do not know they have been discovered. This gives the security team a chance to investigate the source of the attack and plan a resolution before the threat moves on to the next objective.
5
A severe tropical storm devastates an island where a small company stores data. Which disaster types have impacted the company?
Select all that apply
External
Internal
Environmental
Person-made
External
Environmental
An environmental or natural disaster is one that could not be prevented through human agency. Environmental disasters include floods, earthquakes, storms, or disease.
External disaster events are caused by threat actors who have no privileged access and includes disasters that have an impact on the organization through wider environmental or social impacts.
2
A cardiovascular patient is sent home with a monitoring device that records and sends data to a healthcare provider when triggered by abnormal cardiac activity. Response time to the data is critical to patient health. Which embedded platform is the medical device using?
Real-time
Standalone
Distributed
Networked
Real-time
A real-time operating system (RTOS) is in an embedded system intended to serve real-time applications that process data as it comes in. It provides a quicker reaction to external events than a typical operating system.
3
A network administrator can conduct a site survey to find potential placement locations of wireless access points (WAP) using which of the following?
Select all that apply
Wi-Fi Protected Setup (WPS)
Wi-Fi analyzer
Wireless controller
Heat map
Wi-Fi analyzer
Heat map
A Wi-Fi analyzer is software on a laptop or mobile device with a wireless network adapter. Information about the signal is obtained at regularly spaced points as the surveyor moves around.
A heat map is a visual of the information gathered from a Wi-Fi analyzer. It can show where a signal is strong (red) or weak (green/blue), and which channel is being used.
5
An employee at a financial firm is responsible for ensuring that data is stored in accordance with applicable laws and regulations. What role does the employee have in terms of data governance?
Data steward
Data processor
Data owner
Data custodian
Data steward
The data steward is primarily responsible for data quality. This involves tasks such as ensuring data is labeled and identified with appropriate metadata, as well as ensuring the data is collected and stored in a format containing values that comply with applicable laws and regulations.
3
A small company has set up the domain environment to prevent the installation of a list of prohibited software. Employees received this same list via email. What type of method prevents the installation of specific software on workstations?
Whitelisting
Blacklisting
Anti-malware
Application hardening
Blacklisting
Execution control, to prevent the use of unauthorized software, can be implemented as a blacklist. This control means that anything not on the prohibited blacklist can run.
3
Which certificate attribute describes the computer or machine it belongs to?
Select all that apply
Certificate authority name
Common name
Company name
Subject alternate name
Common name
Subject alternate name
The common name (CN) attribute identifies the computer or machine by name, usually a fully qualified domain name (FQDN), such as www.comptia.org.
The subject alternative name (SAN) extension field is structured to represent different types of identifiers, including domain names. This is more commonly used as the CN attribute has been deprecated.
3
Evaluate and select the differences between WPA and WPA2.
Select all that apply
WPA2 supports an encryption algorithm based on the Advanced Encryption Standard (AES) rather than the version of RC4 “patched” with the Temporal Key Integrity Protocol (TKIP).
WPA2 is a security protocol developed by the Wi-Fi Alliance for use in securing wireless networks.
WPA2 is much more secure than WEP, where WPA is not.
WPA2 requires entering a longer password than WPA.
WPA2 supports an encryption algorithm based on the Advanced Encryption Standard (AES) rather than the version of RC4 “patched” with the Temporal Key Integrity Protocol (TKIP).
WPA2 requires entering a longer password than WPA.
WPA2 supports an encryption algorithm based on the Advanced Encryption Standard (AES) rather than the version of RC4 “patched” with the Temporal Key Integrity Protocol (TKIP).
WPA and WPA2 are both much more secure than WEP (wired equivalent privacy).
3
IT management wants to make it easier for users to request certificates for their devices and web services. The company has multiple intermediate certificate authorities spread out to support multiple geographic locations. In a full chain of trust, which entity would be able to handle processing certificate requests and verifying requester identity?
OCSP
RA
CA
CSR
RA
A Registration Authority (RA) is a function of certificate enrollment and its services would be combined with a Certificate Authority (CA) in a single CA hierarchy. An RA is responsible for validating and submitting a request on behalf of end users.
1
IT discovers a flaw in a web application where it allows queries without encryption. As a result, requests are being spoofed and directories containing private files are viewable. What is happening?
Structured Query Language (SQL) injection
Dynamic Link Library (DLL) injection
Lightweight Directory Access Protocol (LDAP) injection
Extensible Markup Language (XML) injection
Extensible Markup Language (XML) injection
Extensible Markup Language (XML) can be used for data exchange. Without encryption, it is vulnerable to spoofing, request forgery, and injection of arbitrary code. For example, an XML External Entity (XXE) attack embeds a request for a local resource.
2
A test team performs an in-depth review of completed code and analyzes its compatibility with the environment it will be deployed to. Which of the following environments is the test occurring in?
Development
Test
Staging
Production
Staging
A staging environment mimics that of a production environment. It is used for dynamic analysis of an application in a complete but separate production-like environment.
2
A consumer uses a Samsung SmartThings coordinator to turn on lights in the home and start the dishwasher. Which communications protocol is the hub using?
Baseband
Bluetooth
Narrowband
Zigbee
Zigbee
Zigbee is a two-way wireless radio frequency communication between a sensor and a control system. It is an Institute of Electrical and Electronics Engineers (IEEE) 802.15.4-based specification for communication protocols and is used for home automation.
3
A company stages its computing power in a centralized environment. All workstations run off of one desktop hosted in the data center. When the admin makes changes at individual workstations, the changes only get saved locally, until a user signs off, and the system then reverts back to the previous state. What technology does this represent?
Type 1 hypervisor
Persistent VDE
Snapshot
Non-persistent VDE
Non-persistent VDE
Non-persistent Virtual Desktop Environments (VDE) utilizes a central desktop through a remote server. When a user accesses logs on to the desktop, changes and work completed are not saved locally long term. As soon as the user logs off, the desktop reverts back to the image on the central location.
2
A logistics facility provides transportation services globally for many clients. Clients require their planning information to be kept in a secure environment not connected to a network until the needs have been fulfilled. Which of the following solutions would be the most ideal method of meeting this requirement for the company?
Air gap
Faraday cage
Container
Mantrap
Air gap
An air gap is a host that is not physically connected to any network. Air gaps are secure areas that protect resources against unauthorized users and spillage of information.
2
A systems administrator plans to protect a data center with various security controls and safety mechanisms. Which solution does the administrator plan based on a “triangle” principle?
Noise detection
Industrial camouflage
Motion detection
Fire suppression
Fire suppression
The fire triangle works on the principle that fire requires heat, oxygen, and fuel to ignite and burn. Removing any one of those elements provides fire suppression.
4
List methods of containment based on the concept of segmentation.
Select all that apply
Honeynet
Sandboxing
Blackhole
Sinkhole
Honeynet
Sinkhole
Sinkhole routing means suspicious traffic that is flooding a specific IP address, routes to another network for analysis. Sinkhole routing is a form of segmentation because it maintains the connection to other networks.
A honeynet is a segmented network composed entirely of honeypots. A honeypot is a decoy node intended to draw the attention of threat actors, to trick them into revealing their presence and potentially more information.
4
A Security Information Event System (SIEM) parses network traffic and log data from multiple sensors, appliances, and hosts to implement correlation rules on metrics derived from data sources. SIEM assists the systems admin to detect events that may be potential incidents. Define the term for notifications passed upon detection of a potential incident.
Correlation
Sensitivity
Alerts
Trends
Alerts
SIEM dashboards are one of the main sources of automated alerts. The event is listed on a dashboard or incident handling system for an agent to assess. Then, the SIEM dashboard will automatically notify the staff in charge of security.
2
In which environment can multiple developers check out software code and include change management processes?
Production
Test
Development
Staging
Development
A development environment is where developers create a product. Developers check out code for editing or updating. Version control and change management occur in the development environment to track development.
4
Identify types of metadata that would be associated with CDR (call detail records) of mobile devices
Select all that apply
List of towers connected to
Call durations
SMS text timestamps
GPS location data
Call durations
SMS text timestamps
GPS location data
Call detail records (CDR) routinely contain times and durations of incoming, outgoing, and attempted calls, as well as the phone numbers of said calls.
By examining the** list of towers **a device has connected to in the call detail records (CDR), it is possible to ascertain the general vicinity of locations in which the device has been present.
SMS text time, duration, and phone number of origin are recorded in the call detail records (CDR) metadata associated with mobile devices.
5
An organization that is planning a move to the cloud checks to see that the chosen CSP uses a standard method for creating and following security competencies. Which method does the CSP likely implement?
Cloud controls matrix
Reference architecture
Service Organization Control (SOC2)
National, territory, or state laws
Cloud controls matrix
Cloud controls consists of specific controls and assessment guidelines that should be implemented by CSPs. A matrix acts as a starting point for agreements as it provides a baseline level of security competency that the CSP should meet.
1
Which of the following are deployed similarly to a credit card skimmer?
Card cloner
Malicious USB plug
Keyloggers
Malicious flash drive
Malicious USB plug
A malicious Universal Serial Bus (USB) charging cable and plug are deployed similar to card skimmers. The device may be placed over a public charging port at airports and other transit locations. The device can then access a smartphone when connected.
5
Which resource can help for a cloud consumer to evaluate a cloud service provider as services relate to integrating on-premise controls?
Reference architecture
Security guidance
Cloud control matrix
Service Organization Control
Security guidance
Security guidance offers a best practice summary analyzing the unique challenges of cloud environments and how on-premises controls can be adapted to them.
4
Investigators perform analysis on a breached system. When looking at data timestamps, what should be noted about any time offset?
Select all that apply
Daylight savings time
Valid time source
Clock synchronization
UTC time
Daylight savings time
UTC time
Local time is the time within a particular time zone, which is offset from UTC by several hours. NTFS uses UTC “internally.” It is vital to establish how a timestamp is calculated and note the offset.
The local time offset on a system may vary if daylight savings time is in place. Investigators must note the offset between the local system time and UTC.
2
An unmanned aerial vehicle is equipped with a component to ensure position and movement sensors are aligned and relays information to a ground control. Which of the following computing devices does this best describe?
Embedded system
SoC
Microprocessor
Microcontroller
Embedded system
An embedded system is a combination of hardware and software that contains a dedicated function and uses a computer component to complete the function.
5
A global corporation assesses risk appetite and how risks in various regions could influence mission-critical operations. They are assessing compliance with local laws and licensing requirements to prevent financial risk or resolve security risks, and changing the risk posture and implementing risk controls to compensate. Conclude what type of assessment the team is performing.
Penetration testing
Vulnerability assessment
Risk control assessment
Site risk assessment
Risk control assessment
Risk and control self-assessment (RCSA) is the method by which companies evaluate and analyze the operational risks and the efficacy of the controls used to manage them.
4
A systems administrator learns Linux commands to view log files. Which command should be used if line numbers are required to view an entire file?
grep
tail
cat
head
cat
The Linux command cat allows for viewing the entire contents of one or more files. For example, to view the contents of two log files, use cat -n access.log access2.log. The -n switch adds line numbers.
1
Which attack is a brute-force type that mixes common passwords with usernames?
Dictionary
Skimming
Rainbow
Spraying
Spraying
Password spraying is a horizontal brute-force online attack. The attacker chooses one or more common passwords (for example, password) and tries them in conjunction with multiple usernames.
4
Flow analysis tools, such as IPFIX or Netflow, collect metadata about network traffic without capturing each frame. Evaluate the type of analysis that uses these tools.
Vulnerability analysis
Trend analysis
Log analysis
Packet analysis
Trend analysis
Since flow analyzers gather metadata and statistics about network traffic, they are commonly used to visualize traffic statistics in order to assist in identifying trends.
3
The RADIUS server is down, and employees need immediate access to Wi-Fi routers in the office building. The WAPs (Wireless Access Points) service smartphones and tablets. After disabling Enterprise mode, how will users connect to the WAPs?
Use company credentials
Use 5 GHz band
Use a pre-shared key
Set devices to 802.11n
Use a pre-shared key
PSK (Pre-shared Key) is the password needed to gain access to a WAP (Wireless Authentication Protocol) that is WPA2 enabled, for example.
2
A network administrator needs a service to easily manage Virtual Private Cloud (VPC) and edge connections. The service must have a central console for ease of monitoring all components. Which of the following is the best solution for the administrator to use in a cloud computing environment?
Transit gateway
NAT gateway
Cloud storage gateway
gateway endpoint
Transit gateway
A transit gateway is a cloud network hub that allows users to interconnect virtual private clouds (VPC) and on-premises networks through a central console.
4
A large business works with a consulting group to develop a business continuity plan. The goal of the plan is to provide a potentially uninterrupted workflow in the event of an incident. Examine the descriptions and determine which one matches this goal.
Retention of data for a specified period
Ensuring processing redundancy supports the workflow
Performing mission critical functions without IT support
Recovery of primary business functions when disrupted
Ensuring processing redundancy supports the workflow
Business continuity planning identifies how business processes should deal with both minor and disaster-level disruption. It ensures that there is processing redundancy supporting the workflow through failover.
5
After reading an article online, a business stakeholder is concerned about a risk associated with Denial of Service (DoS) attacks. The stakeholder requests information about what countermeasures would be taken during an attack. Where would the security analyst look to find this information?
Risk regulations
Risk heat map
Risk register
Risk and Control Assessmen
Risk register
The risk register shows the results of risk assessments in a comprehensible document format. Information in the register includes impact, likelihood ratings, date of identification, description, countermeasures, owner/route for escalation, and status.
4
The NIST Computer Security Incident Handling Guide describes six stages of the incident response lifecycle. Indicate in which stage of the incident response lifecycle the incident response team would review and analyze their response and possibly integrate changes into the team’s Incident Response Plan.
Preparation
Recovery
Lessons learned
Identification
Lessons learned
The “lessons learned” phase occurs when the team’s response is evaluated. It is for this reason that it is important to document the entire response process.
1
Security content automation protocol (SCAP) allows compatible scanners to compare computers with which of the following?
Log collector
Common Vulnerability Scoring System
Configuration baseline
Security bulletin
Configuration baseline
Security content automation protocol (SCAP) allows compatible scanners to determine whether a computer meets a configuration baseline. The Extensible Configuration Checklist Description Format (XCCDF) audits for best-practice configuration checklists and rules.
1
A user notices several new icons for unknown applications after downloading and installing a free piece of software. IT support determines that the applications are not malicious but are classified as which type of software?
PUPs
Fileless viruses
Worms
Trojans
PUPs
Potentially unwanted programs (PUP) are software installed alongside a package selected by the user, or perhaps bundled with a new computer system.
5
Which value is the result of a quantitative or qualitative risk analysis?
Annualized loss expentancy
Single loss expentency
Inherent risk
Risk factors
Inherent risk
The result of quantitative or qualitative analysis is a measure of inherent risk. Inherent risk is the level of risk before any type of mitigation has been attempted.
5
Conclude what type of data has high trade values in black markets, is often anonymized or deidentified for use in scientific research, and when compromised, can lead to its use in blackmail or insurance fraud, as well as cause reputational damage to the responsible organization.
Government Data
Customer Data
Financial Information
Personal health information (PHI)
Personal health information (PHI)
Personal health information (PHI), such as medical and insurance records, laboratory test results, etc., has a high value in black markets because of its potential use for blackmail and insurance fraud. It is often anonymized and used for research.
4
An enterprise has recently experienced a severe malware attack. Admin has identified and removed the cause, and they are now checking the systems and bringing them back online. How would one categorize the cause with respect to incident response procedures?
Recovery
Eradication
Containment
Preparation
Eradication
Eradication is an incident response lifecycle phase requiring the identification of the root cause of an incident. For instance, a user clicking on a suspicious attachment in an email is a root cause of a potentially larger problem.
2
An application requires continuity of operations within a 24 hour period due to the command and control capabilities it maintains. The failover site must be physically separated from the program office and be available within the required timeframe with live data. Which of the following redundancy solutions best meets the failover requirement?
Recovery time objective
Geographical dispersal
Failover clusters
Meantime between failure
Geographical dispersal
Geographical dispersal is a failover consideration that replicates data in hot and warm sites physically distanced from one another in the event of a catastrophe.
1
Which of the following are examples of weak patch management for operating systems and device firmware in a classified network?
Select all that apply
non-centralized deployment
undocumented process
A non-centralized deployment process makes patch management difficult. For example, Microsoft Endpoint Configuration Manager can schedule, monitor, and auto-deploy patches to Windows systems and applications.
An undocumented process makes it difficult to maintain a consistent workflow for patch management in a closed or classified network. Personnel should know how to download patches from the Internet and upload them to the closed network.
1
An attacker launches a vishing social engineering attack by impersonating a police officer. The attacker calls the victims and tries to exploit this behavior by demanding the victims give the attacker their name and address immediately. This type of attack does NOT demonstrate what type of social engineering principle?
Urgency
Authority
Intimidation
Familiarity/liking
Familiarity/liking
One of the basic tools of a social engineer is simply to be affable, likable, and persuasive, and to present the requests they make as completely reasonable and unobjectionable.
5
Information security and cybersecurity tasks can be classified into five functions. Which regulatory concept or entity relates to these functions?
Center for Internet Security (CIS)
Payment Card Industry Data Security Standard (PCI DSS)
General Data Protection Regulation (GDPR)
National Institute of Standards and Technology (NIST)
National Institute of Standards and Technology (NIST)
Information security and cybersecurity tasks can be classified as five functions (Identify, Protect, Detect, Respond, Recover), following the framework developed by the National Institute of Standards and Technology.
5
How might responsibilities be divided among individuals to prevent abuse of power in an organization?
Separation of duties
Least privilege
Job rotation
Clean desk space
Separation of duties
Separation of duties is a means of establishing checks and balances against the possibility that critical systems or procedures can be compromised by insider threats. Divided duties among individuals prevent ethical conflicts or abuses of power.
1
Which of the following is TRUE about false negatives in relation to vulnerability scanning tools?
Select all that apply
Is identified
Is not high risk
Is a high risk
Is not identified
Is a high risk
Is not identified
False negatives are the potential vulnerabilities that are not identified by the scanning tool. It is possible the vulnerability has not been discovered, or a hacker may have spoofed the vulnerability as if nothing is wrong.
A false negative is a high security risk because a possible threat could go unnoticed for long periods. This can be mitigated by running repeat scans and by using scanning tools from other vendors.
4
A piece of data that may or may not be relevant to the investigation or incident response such as registry keys, files, time stamps, and event logs are known as what?
Artifacts
Cache
Checksums
Tags
Artifacts
An artifact is a piece of data, such as registration keys, files, timestamps, and event logs that may or may not be important to the investigative analysis or incident response.
5
A small department at a company manages a server, separate from IT, for data access and backup purposes. What role does the department fulfill?
Data owner
Data processor
Data controller
Data custodian
data custodian
The data custodian role handles managing the system on which the data assets are stored. This includes responsibility for enforcing access control, encryption, and backup/recovery measures.
2
Devices deployed in a network and that send data to the local area network (LAN) level and process it with an Internet of things (IoT) sensor are which of the following?
Fog computing
On-premise computing
Cloud computing
Edge computing
Fog computing
Fog computing provides decentralized local access by deploying fog nodes throughout the network. Fog computing analyzes data on the network edge to avoid the need to transfer unnecessary data back to the LAN.
5
A new company implements a datacenter that will hold proprietary data that is output from a daily workflow. As the company has not received any funding, no risk controls are in place. How does the company approach risk during operations?
Mitigation
Avoidance
Transference
Acceptance
Acceptance
Risk acceptance means that no countermeasures are put in place either because the level of risk does not justify the cost or because there will be an unavoidable delay before the countermeasures are deployed.
1
Choose the components a threat actor may use to set up a distributed denial of service attack (DDoS) on a local network.
Select all that apply
Remote access trojan
Botnet
Command and control
Spyware
Remote access trojan
Botnet
Command and control
A botnet is a group of bots that are all under the control of the same malware instance. A bot is an automated script or tool that performs some malicious activity.
A command and control (C2 or C&C) host or network controls the bots or botnet to carry out remote tasks on the local network.
A remote access trojan (RAT) is backdoor malware that mimics the functionality of legitimate remote control programs but is designed specifically to operate covertly.
4
Identify security control options that can be categorized as “corrective.”
Select all that apply
Firewall rules
Quarantine of infected hosts
Digital Loss Prevention (DLP) software configurations
Containment of the threat
Quarantine of infected hosts
Containment of the threat
Corrective controls act to eliminate or reduce the impact of an intrusion event. During an attack, for instance, a corrective control can eliminate the threat.
Quarantining infected or compromised machines is a corrective control.
1
Where should a systems administrator search for more information on how to fix a CPU vulnerability on a Dell rack server?
Best Buy Geek Squad
Facebook
Vendor support page
Black Hat conference
Vendor support page
Vendors will provide guides, templates, and tools for configuring and securing operating systems, applications, and physical devices like a rack server. CPU vulnerabilities may require firmware updates that may only be available from the vendor. Conferences are hosted and sponsored by various institutions and provide an opportunity for presentations on the latest threats and technologies. The Black Hat conferences showcase the latest threats and hacker techniques in the industry. Social media platforms, such as Facebook, can showcase “How to” videos and posts, but they are limited. Support files are only available on vendor support pages. A local industry group or company like Best Buy’s Geek Squad helps with smaller commercial and consumer products and is not ideal for rack server related items.
4
Identify which tools would be used to identify suspicious network activity.
Select all that apply
tcpdump
tcpreplay
Wireshark
Metasploit
tcpdump
tcpreplay
Wireshark
tcpdump is a command-line packet capture utility for Linux. The utility will display captured packets until halted manually, and it can save frames to a .pcap file. This tool commonly uses filter expressions to reduce the number of frames captured, such as Type, Direction, or Protocol.
Wireshark is a graphical application that can capture all types of traffic by sniffing the network, and save that data to a .pcap file.
tcpreplay is a command-line utility for Linux that can replay data from a .pcap file, for example, to analyze traffic patterns and data.
4
An IT technician at a London-based company is setting up a new VoIP system in the CEO’s office. The CEO has asked the technician to set up encryption for calls and informs the CEO that session-to-session encryption is implemented at the endpoints. The CEO wants not only the session encrypted but also the call data itself. Recommend a protocol that will encrypt VoIP call data.
SIPS
SRTP
SFTP
HTTPS
SRTP
SRTP, which stands for Secure Real-time Transport Protocol, provides encryption and authentication for RTP (Real-Time Protocol) data in unicast and multicast data flows. SRTP will encrypt all data sent and received by each SIP endpoint for the entire journey.