Chapter 1-6 Practice Questions Flashcards
You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is your BEST solution?
A. Use hashes
B. Encrypt it before sending
C. Protect it with digital signature
D. Use RAID
B. Encrypt it before sending
Using hashes is for when checking if a data has been modified.
Protecting it with a digital signature ensures that it came from you.
RAID does not do anything to protect confidentiality
Book:
B. You can maintain confidentiality of any data, including Personally Identifiable Information (PII) with encryption. Hashes provide integrity, not confidentiality. A digital signature provides authentication, nonrepudiation, and integrity. A redundant array of inexpensive disks (RAID)
provides higher availability for a disk subsystem.
Apu manages network devices in his store and maintains copies of the configuration files for all the managed routers and switches. On a weekly basis, he creates hashes for these files and compares them with hashes he created on the same files the previous week. Which of the following use case is the most likely being used?
A. Supporting confidentiality
B. Supporting integrity
C. Supporting encryption
D. Supporting availability
B. Supporting integrity
Using hash does not support confidentiality the files can still be viewed. Encryption is not hashing or is it a method of. Hashing does not promote availability too. Hashing supports integrity because it will identify whether or not a file has been modified.
Book:
B. He is most likely using a use case of supporting integrity. By verifying that the hashes are the same on the configuration files, he is verifying that the files have not changed. Confidentiality is enforced with encryption, access controls, and steganography. Encryption is a method of enforcing confidentiality and it doesn’t use hashes. Availability ensures systems are up and operational when needed.
Louie hid several plaintext documents within an image file. He then sent the image file to Tony. Which of the following BEST describes the purpose of his actions?
A. to support steganography
B. to support integrity
C. to support availability
D. to support obfuscation
Book:
D. Hiding data within data is one way to support a use case of
supporting obfuscation. In this scenario, Louie is using steganography to hide the files within the image, but that is the method, not the purpose. Hashing methods and digital signatures support integrity. Redundancy and fault-tolerance methods increase availability.
Management has mandated the use of digital signatures by all personnel within your organization. Which of the following use case does this primarily support?
A. Supporting confidentiality
B. Supporting availability
C. Supporting obfuscation
D. Supporting non-repudiation
D. Supporting non-repudiation
non-repudiation is the assurance that one cannot deny something and is achieved by using digital signatures just like using a signature
Book:
D. Digital signatures will support a use case of supporting nonrepudiation.
Digital signatures don’t encrypt data, so they do not support a use case of supporting confidentiality. Redundancy and fault-tolerance solutions will increase availability. Steganography is one way of supporting obfuscation.
As the CTO, Marge is implementing a security program. She has included security controls to address confidentiality and availability. Of the following choices, what else should she include?
A. Ensure critical systems provide uninterruptible service.
B. Protect data-in-transit from unauthorized disclosure.
C. Ensure data systems are not susceptible to unauthorized changes.
D. Secure data to prevent unauthorized disclosure.
C. ensure data systems are not susceptible to unauthorized changes
this answer supports integrity. she already has measures for confidentiality and availability
Book:
C. The chief technology officer (CTO) should ensure systems are not susceptible to unauthorized changes, which is an element of integrity. A security program should address the three core security principles of
confidentiality, integrity, and availability (CIA). The system in the example is already addressing confidentiality and availability. Ensuring critical systems provide uninterrupted service addresses availability.
Protecting data and securing
Your organization wants to reduce the amount of money it is losing due to thefts. Which of the following is the BEST example of an equipment theft deterrent?
A. Snapshots
B. Cable locks
C. Strong passwords
D. Persistent VDI
B. cable locks
this is a physical means of security to prevent theft
Book:
B. Cable locks are effective equipment theft deterrents for laptops and other systems. Snapshots refer to digital snapshots that capture the state of a virtual machine at a moment in time. Passwords prevent
unauthorized access to systems, but don’t provide physical security. A virtual desktop infrastructure (VDI) allows users to access a desktop on a remote server. A persistent VDI saves
Your organization is considering virtualization solutions. Management wants to ensure that any solution provides the best ROI. Which of the following situations indicates that virtualization would provide the best ROI?
A. Most physical servers within the organization are currently utilized at close to 100 percent.
B. The organization has many servers that do not require failover services.
C. Most desktop PCs require fast processors and a high amount of memory.
D. Most physical servers within the organization are currently underutilized.
D. most physical servers within an organization are currently underutilized
since they are underutilized, utilize them more to increase efficiency with lesser cost, thus better ROI
Book:
D. If most physical servers within the organization are currently underutilized, virtualization will provide a high return on investment (ROI). If the servers are currently utilized close to 100 percent, new servers will need to be purchased to virtualize them. It is possible to
implement failover services on virtualized servers so there is little cost difference between physical and virtualized servers. The amount of processing power or memory requirements isn’t relevant unless you
know how much systems are currently utilizing.
You are preparing to deploy a new application on a virtual server. The virtual server hosts another server application that employees routinely access. Which of the following is the BEST method to use when deploying the new application?
A. Take a snapshot of the VM before deploying the new application.
B. Take a snapshot of the VM after deploying the new application.
C. Ensure the server is configured for non-persistence.
D. Back up the server after installing the new application.
A. take a snapshot of the VM before deploying the new application
this method is a backup method in case the new application messes with the operation of the server
Book:
A. Taking a snapshot of the virtual machine (VM) before deploying it ensures that the VM can be reverted to the original configuration if the
new application causes problems. Taking a snapshot after the installation doesn’t allow you to revert the image. Non-persistence is used in a virtual desktop infrastructure (VDI), where user changes to the
desktop are not changed. It isn’t appropriate to use non-persistence on a virtual server. Backing up the server might be
Ned is not able to access any network resources from his Linux-based computer. Which of the following commands would he use to view the network configuration of his system?
A. ifconfig
B. ipconfig
C. netstat
D. tracert
A. ifconfig
Book:
A. The ifconfig command displays network settings on a Linux computer. This includes the IP address, subnet mask, and default gateway assigned to the network interface card (NIC). The ipconfig command
performs similar checks on Windows computers, but not on Linux systems. Netstat shows network statistics and active connections but not the network settings. The tracert command traces the route of data and
can help determine which network devices are failing.
Administrators frequently create VMs for testing. They sometimes leave these running without them again after they complete their tests. Which of the following does this describe?
A. VM escape
B. VDI snapshot
C. VM sprawl
D. Type II hypervisor
C. VM sprawl
this is a phenomenon where the number of VMs have reached a point where admins can no longer manage them effectively - because many test VMs are kept running
Book:
C. VM sprawl occurs when an organization has many VMs that aren’t managed properly. Unmonitored VMs typically won’t get updated and can be vulnerable to attacks. VM escape is an attack that allows an
attacker to access the host system from within the virtual system. A virtual desktop infrastructure (VDI) provides users with virtual desktops hosted on a server. A VDI snapshot is commonly used to provide users with the same non-persistent desktop that doesn’t save changes. The VMs might be Type II hypervisors (running as software within a host
operating system), but that isn’t relevant to leaving them running and unmonitored.
Users within your organization access virtual desktops hosted on remote servers. This describes which of the following?
A. VDE
B. Snapshots for non-persistence
C. Type I hypervisors
D. VM sprawl
A. VDE
by process of elimination
not B, C or D
What is VDE?
Book:
A. In a virtual desktop environment (VDE), users access virtual desktops hosted on remote servers. VDE desktops can use snapshots for non-persistence, but it is also possible to allow users to have persistent
unique desktops in a VDE. Type I hypervisors (bare-metal hypervisors) run directly on the system without an operating system and are not used for a VDE. VM sprawl describes a problem of many unmanaged VMs,
but the scenario doesn’t mention that the virtual desktops are not managed.
Your organization has implemented a VDI for most users. When a user logs off, the desktop reverts to its original state without saving any changes made by the user. Which of the following BEST describes this behavior?
A. Container virtualization
B. VM escape
C. Non-persistence
D. Elasticity
C. Non-persistence
nothing is saved. it reverts back to its original state after log off
Book:
C. Non-persistence in a virtual desktop infrastructure (VDI) indicates that the desktop is the same for most (or all) users and when the user logs off, the desktop reverts to a known state or rolls back to a known configuration. With container virtualization, application cells run isolated services or applications within the host, using the host’s kernel. Virtual machine (VM) escape is an attack where the attacker accesses
the host system from within the VM. Elasticity refers to the ability to resize a VM in response to increased or decreased load.
Which type of virtualization allows a computer’s operating system kernel to run multiple isolated instances of a guest virtual machine, with each guest sharing the same kernel?
A. Container virtualization
B. Type I hypervisor virtualization
C. Type II hypervisor virtualization
D. VDE
Book:
A. Container-based virtualization (also called application cell virtualization) uses the same operating system kernel of the host computer. It is often used to run isolated applications or services within a
virtual environment. Type I hypervisor virtualization runs directly on the system hardware. Type II hypervisor virtualization runs VMs that all include their own operating system, including their own kernel. A virtual desktop
You are considering rebooting a database server and want to identify if it has any active network connections. Which of the following commands will list activate network connections?
A. arp
B. ipconfig
C. ping
D. netstat
D. netstat
Book:
D. The netstat command displays active connections on a system. Arp displays information related to media access control (MAC) addresses. Ipconfig displays TCP/IP configuration information for wired and wireless network
You have configured a firewall in your network to block ICMP traffic. You want to verify that it is blocking this traffic. Which of the following commands would you use?
A. arp
B. ipconfig
C. netstat
D. ping
D. ping
Book:
D. The ping command sends Internet Control Message Protocol (ICMP) echo requests and checks for ICMP echo replies. Arp resolves IP addresses to media access control (MAC) addresses and does not use echo commands. Ipconfig checks the configuration of a NIC. Netstat shows active connections and network statistics.
Developers in your organization have created an application designed for the sales team. Salespeople can log on to the application using a simple password of 1234. However, this password does not meet the organization’s password policy. Which of the following is the BEST response by the security administrator after learning about this?
A. Nothing. Strong passwords aren’t required in applications
B. Modify the security policy to accept this password.
C. Document this as an exception in the application’s documentation.
D. Direct the application team manager to ensure the application adheres to the organization’s password policy.
D. must adhere to password policy
Book:
D. The application should be recoded to adhere to the company’s password policy, so the best response is to direct the application team manager to do so. Application passwords should be strong and should
adhere to an organization’s security policy. It is not appropriate to weaken a security policy to match a weakness in an application. Nor is it appropriate to simply document that the application uses a weak
password.
Ned is reviewing password security for employees of The Leftorium. The password policy has the following settings:
- the password maximum age is 30 days
- the password minimum length is 14 characters
- passwords cannot be reused until five other passwords have been used
- passwords must include at least one of each of the following four character types: uppercase letters, lowercase letters, numbers, and special characters.
Ned discovers that despite having this password policy in place, users are still using the same password that they were using more than a month ago. Which of the following actions will resolve this issue?
A. Create a rule in the password policy for the password minimum age to be 7 days.
B. Change the password history to 10
C. Require the use of complex passwords.
D. Change the maximum age setting to 60 days.
A. minimum age for password must be set, otherwise they can change the password five times over and they will be able to reuse their old password at the 6th change
Book:
A. The best solution is to create a rule in the password policy for the password minimum age. Currently, users can change their passwords five more times in just a couple of minutes, changing it back to their original password on the sixth change. None of the other settings prevents the users from doing this. A password history of 10 forces the users to take a couple more minutes to get back to the original password. The password policy currently requires complex passwords.
Maximum age of 60 days increases how long a user can keep the same password.
Your organization is planning to implement remote access capabilities. Management wants strong authentication and wants to ensure that passwords expire after a predefined time interval. Which of the following choices BEST meets this requirement?
A. HOTP
B. TOTP
C. CAC
D. Kerberos
B. time-based one-time password
coz its temporary
Book:
B. A Time-based One-Time Password (TOTP) meets this requirement. Passwords created with TOTP expire after 30 seconds. An HMAC-based One-Time Password (HOTP) creates passwords that do
not expire. A Common Access Card (CAC) is a type of smart card, but it does not create passwords. Kerberos uses tickets instead of passwords.
Your organization has decided to implement a biometric solution for authentication. One of the goals is to ensure that the biometric system is highly accurate. Which of the following provides the BEST indication of accuracy with the biometric system?
A. The lowest possible FRR
B. The highest possible FAR
C. The lowest possible CER
D. The highest possible CER
C. lowest CER?
FRR - false rejection rate
FAR - false acceptance rate
CER - crossover error rate
ideal to be below CER - can tune to smaller FRR and FAR
Book:
C. A lower crossover error rate (CER) indicates a more accurate biometric system. The false acceptance rate (FAR) and the false rejection rate (FRR) vary based on the sensitivity of the biometric system and don’t indicate accuracy by themselves. A higher CER indicates a less accurate biometric system.
Your organization recently updated an online application that employees use to log on when working from home. Employees enter their username and password into the application from their smartphone and the application logs their location using GPS. Which type of authentication is being used?
A. One-factor
B. Dual-factor
C. Something you are
D. Somewhere you are
A. one-factor
Something you know - uname and password
logs location using GPS - so?
Book:
A. This is using one-factor authentication—something you know. The application uses the username for identification and the password for authentication. Note that even though the application is logging the
location using Global Positioning System (GPS), there isn’t any indication that it is using this information for authentication. Dual-factor authentication requires another factor of authentication. If the application verified you were logging on from a specific GPS location as part of the authentication, it would be dual-factor authentication (something you know and somewhere you are). Something-you-are refers
to biometric authentication methods. The somewhere you are authentication method verifies you are somewhere, such as in a specific GPS location, but this isn’t being used for authentication in this scenario.
A network includes a ticket-granting ticket server used for authentication. Which authentication service does this network use?
A. Shibboleth
B. SAML
C. LDAP
D. Kerberos
D. Kerberos
ticket granting ticket server
D. Kerberos uses a ticket-granting ticket (TGT) server, which creates tickets for authentication. Shibboleth is a federated identity solution used in some single sign-on (SSO) solutions. Security Assertion Markup Language (SAML) is an Extensible Markup Language (XML) used for some SSO solutions. Lightweight Directory Access Protocol (LDAP) is an X.500- based authentication service used to identify objects.
Lisa is a training instructor and she maintains a training lab with 18 computers. She has enough rights and permissions on these machines so that she can configure them as needed for classes. However, she does not have the rights to add them to the organization’s domain. Which of the following BEST describes this example?
A. Least privilege
B. Need to know
C. Group-based privileges
D. Location-based privileges
A. Least privilege
she has enough rights to perform her function -
Book:
A. When following the principle of least privilege, individuals have only enough rights and permissions to perform their job, and this is exactly what is described in this scenario. Need to know typically refers to data and information rather than the privileges required to perform an action, such as adding computers to a domain. Group-based privileges refer to giving permissions to groups and then adding the users to the groups to give them appropriate privileges. A location-based policy
allows or blocks access based on location, but the scenario doesn’t indicate the location is being checked.
Marge is reviewing an organization’s account management processes. She wants to ensure that security log entries accurately report the identity of personnel taking specific actions. Which of the following steps would BEST meet this requirement?
A. Update ACLs for all files and folders
B. Implement role-based privileges
C. Use an SSO solution.
D. Remove all shared accounts
D. remove all shared accounts
so she can identify who accesses what
Book:
D. Removing all shared accounts is the best answer to the available choices. If two employees are using the same account, and one employee maliciously deletes data in a database, it isn’t possible to identify which employee deleted the data. File and folder access control lists (ACLs) identify permissions for users, but don’t control the user identity. Role-based (or group-based) privileges assign the same permissions to all members of a group, which simplifies administration.
A single sign-on (SSO) solution allows a user to log on once and access multiple resources.
A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately one week every quarter. Which of the following is the BEST response to this situation?
A. Remove the account expiration from the accounts.
B. Delete the accounts.
C. Reset the accounts.
D. Disable the accounts.
D. disable the accounts
Book:
D. The best response is to disable the accounts and then enable them when needed by the contractors. Ideally, the accounts would include an expiration date so that they would automatically expire when no longer needed, but the scenario doesn’t indicate the accounts have an expiration date. Because the contractors need to access the accounts periodically, it’s better to disable them rather than delete them. Reset the accounts implies you are changing the password, but this isn’t needed.
Members of a project team chose to meet at a local library to complete some work on a key project. All of them are authorized to work from home using a VPN connection and have connected from home successfully. However, they found that they were unable to connect to the network using the VPN from the library and they could not access any of the project data. Which of the following choices is the MOST likely reason why they can’t access this data?
A. Role-based access control
B. Time-of-day access control
C. Location-based policy
D. Discretionary access control
c. location-based
Book:
C. A location-based policy restricts access based on location, such as with an IP address, and this is the best possible answer to those given. The scenario indicates they could use the virtual private network (VPN) connection from home, but it was blocked when they tried to access it from the library. Time-of-day access control restricts access based on the time of day, but the scenario doesn’t indicate the time. Neither a discretionary access control model nor a role-based access control model restricts access based on location.
You need to create an account for a contractor who will be working at your company for 60 days. Which of the following is the BEST security step to take when creating this account?
A. Configure history on the account.
B. Configure a password expiration date on the account.
C. Configure and expiration date on the account
D. Configure complexity
c. expiration date for the account
Book:
C. When creating temporary accounts, it’s best to configure expiration dates so that the system will automatically disable the accounts on the specified date. History, password expiration, and complexity all refer to password policy settings. However, it’s rare to
configure a specific password policy on a single account.
A company recently hired you as a security administrator. You notice that some former accounts used by temporary employees are currently enabled. Which of the following choices is the BEST response?
A. Disable all the temporary accounts.
B. Disable the temporary accounts you’ve noticed are enabled.
C. Craft a script to identify inactive accounts based on the last time they logged on.
D. Set account expiration dates for all accounts when creating them.
c. craft a script to identify inactive accounts
identify the former accounts to disable
Book:
C. Running a last logon script allows you to identify inactive accounts, such as accounts that haven’t been logged on to in the last 30 days. It’s appropriate to disable unused accounts, but it isn’t necessarily
appropriate to disable all temporary accounts, because some might still be in use. If you disable the accounts you notice, you might disable accounts that some employees are still using, and you might miss some accounts that should be disabled. Setting expiration dates for newly created accounts is a good step, but it doesn’t address previously created
accounts.
Developers are planning to develop an application using role-based access control. Which of the following would they MOST likely include in their planning?
A. A listing of labels reflecting classification levels
B. A requirements list identifying need to know
C. A listing of owners
D. A matrix functions matched with their required privileges
d. matrix with required privileges
Book:
D. A matrix of functions, roles, or job titles matched with the required access privileges for each of the functions, roles, or job titles is a common planning document for role-based access control (role-
BAC) model. The mandatory access control (MAC) model uses sensitivity labels and classification levels. MAC is effective at restricting access based on a need to know. The discretionary access control (DAC) model specifies that every object has an owner and it might identify owners in a list.
Security administrators need to implement an access control system that will protect data based on the following matrix.
Document Type | Security Level | Security Label
Employment | Private | Employee
documents | |
Salary &Compensation | Private | Payroll
documents
(Note that this matrix only represents a subset of the overall requirements.) Which of the following models is the administrator implementing?
A. DAC
B. MAC
C. Role-BAC
D. ABAC
B. MAC
“levels”
Book:
B. This is a mandatory access control (MAC) model. You can tell because it is using security labels. None of the other model’s listed use labels. A discretionary access control (DAC) model has an owner, and the owner establishes access for the objects. A role-based access control (role-BAC) model uses roles or groups to assign rights and permissions. An attribute-based access control (ABAC) model uses attributes assigned to subjects and objects within a policy to grant access.
Your organization is implementing an SDN. Management wants to use an access control model that controls access based on attributes. Which of the following is the BEST solution?
A. DAC
B. MAC
C. Role-BAC
D. ABAC
D. ABAC
attributes based
D. A software-defined network (SDN) typically uses an attribute-based access control (ABAC) model, which is based on attributes that identify subjects and objects within a policy. A discretionary access control (DAC) model has an owner, and the owner establishes access for the objects. A mandatory access control (MAC) model uses labels assigned to subjects and objects. A role-based access control (role-BAC) model uses roles or groups to assign rights and permissions.
Your organization’s security policy requires that PII data-in-transit must be encrypted. Which of the following protocols would BEST meet this requirement?
A. FTP
B. SSH
C. SMTP
D. HTTP
B. SSH
not file transfer, not mail
Book:
B. You can use Secure Shell (SSH) to encrypt Personally Identifiable Information (PII) data when transmitting it over the network (data-intransit). Secure File Transfer Protocol (SFTP) uses SSH to encrypt File Transfer Protocol (FTP) traffic. FTP, Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP) transmit data in cleartext unless they are combined with an encryption protocol.
Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to protect the confidentiality of credentials used to connect to these devices. Which of the following protocols would BEST meet this need?
A. SSH
B. FTPs
C. SNMPv3
4. TLS
Book:
C. Simple Network Management Protocol version 3 (SNMPv3) is a secure protocol that can monitor and collect information from network devices. It includes strong authentication mechanisms to protect the
confidentiality of credentials. None of the other protocols listed are used to monitor network devices. Secure Shell (SSH) provides a secure method of connecting to devices but does not monitor them. File
Transfer Protocol Secure (FTPS) is useful for encrypting large files in transit, using Transport Layer Security (TLS). TLS is commonly used to secure transmissions but doesn’t include methods to monitor devices.
Lisa is enabling NTP on some servers within the DMZ. Which of the following use case is she MOST likely supporting this action?
A. Support voice and video transmissions
B. Provide time synchronization
C. Enable email usage
D. Encrypt data-in-transit
B. time synch
NTP - network time protocol
Book:
B. The Network Time Protocol (NTP) provides time synchronization services, so enabling NTP on servers would meet this use case. The Real-time Transport Protocol (RTP) delivers audio and video over IP networks and Secure RTP (SRTP) provides encryption, message authentication, and integrity for RTP. Protocols such as Simple Mail Transfer Protocol (SMTP), Post Office Protocol v3 (POP3), and Internet
Message Access Protocol version 4 (IMAP4) is used for email. Encrypting data isn’t relevant to time synchronization services provided by NTP.
Your organization wants to increase security for VoIP and video teleconferencing applications used within the network. Which of the following protocols will BEST support this goal?
A. SMTP
B. TLS
C. SFTP
D. SRTP
Book:
D. The Secure Real-time Transport Protocol (SRTP) provides encryption, message authentication, and integrity for Voice over Internet Protocol(VoIP), video teleconferencing, and other streaming
media applications. None of the other answers are directly related to VoIP or video teleconferencing. Simple Mail Transfer Protocol (SMTP) transfers email. The Transport Layer Security (TLS) protocol is used to encrypt data-in-transit but isn’t the best choice for streaming media. Secure File Transfer Protocol (SFTP) is a secure implementation of FTP to transfer files.
Your organization wants to ensure that switches are not susceptible to switching loop problems. Which of the following protocols is the BEST choice to meet this need?
A. Flood guard
B. SNMPv3
C. SRTP
D. RSTP
D. RSTP
Rapid Spanning Tree Protocol ensures a loop-free topology for Ethernet networks
Flood guard - tools to prevent DoS attacks
SNMPv3 - security model
SRTP - Secure Real-time Transport protocol
Book:
D. Rapid STP (RSTP) prevents switching loop problems and should be enabled on the switches to meet this need. A flood guard on a switch helps prevent a media access control (MAC) flood attack. Simple Network Management Protocol version 3 (SNMPv3) is used to manage and monitor network devices. The Secure Real-time Transport Protocol (SRTP) provides encryption, message authentication, and integrity for
video and voice data.
A network technician incorrectly wired the switch connections in your organization’s network. It effectively disabled the switch as though it was a victim of a denial-of-service attack. Which of the following should be done to prevent this situation in the future?
A. Install an IDS
B. Only use Layer 2 switches
C. Install SNMPv3 on the switches
D. Implement STP or RSTP
Book:
D. Spanning Tree Protocol (STP) and Rapid STP (RSTP) both prevent switching loop problems. It’s rare for a wiring error to take down a switch. However, if two ports on a switch are connected to each
other, it creates a switching loop and effectively disables the switch. An intrusion detection system (IDS) will not prevent a switching loop. Layer 2 switches are susceptible to this problem. Administrators use
Simple Network Management Protocol version 3 (SNMPv3) to manage and monitor devices, but it doesn’t prevent switching loops.