Deck F Flashcards

1
Q

After a company has standardized to a single operating system, not all servers are immune to a well-known OS vulnerability. Which of the following solutions would mitigate this issue?

A. Host based firewall

B. Initial baseline configurations

C. Discretionary access control

D. Patch management system

A

Patch management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When using PGP, which of the following should the end user protect from compromise? (Select TWO).

A. Private key

B. CRL details

C. Public key

D. Key password

E. Key escrow

F. Recovery agent

A

Private key

Key password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When considering a vendor-specific vulnerability in critical industrial control systems which of the following techniques supports availability?

A. Deploying identical application firewalls at the border

B. Incorporating diversity into redundant design

C. Enforcing application white lists on the support workstations

D. Ensuring the systems’ anti-virus definitions are up-to-date

A

Incorporating diversity into redundant design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?

A. RADIUS

B. TACACS+

C. Kerberos

D. LDAP

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following relies on the use of shared secrets to protect communication?

A. RADIUS

B. Kerberos

C. PKI

D. LDAP

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss to assist in an FM-200 deployment?

A. Water base sprinkler system

B. Electrical

C. HVAC

D. Video surveillance

A

HVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication and the files the user is sending using only a user ID and a key pair. Which of the following methods would achieve this goal?

A. AES

B. IPSec

C. PGP

D. SSH

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security team has identified that the wireless signal is broadcasting into the parking lot. To reduce the risk of an attack against the wireless network from the parking lot, which of the following controls should be used? (Select TWO).

A. Antenna placement

B. Interference

C. Use WEP

D. Single Sign on

E. Disable the SSID

F. Power levels

A

Antenna placement

Power levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?

A. Business continuity planning

B. Continuity of operations

C. Business impact analysis

D. Succession planning

A

Succession planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Company employees are required to have workstation client certificates to access a bank website. These certificates were backed up as a precautionary step before the new computer upgrade. After the upgrade and restoration, users state they can access the bank’s website, but not login. Which is the following is MOST likely the issue?

A. The IP addresses of the clients have change

B. The client certificate passwords have expired on the server

C. The certificates have not been installed on the workstations

D. The certificates have been installed on the CA

A

The certificates have not been installed on the workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In which of the following steps of incident response does a team analyze the incident and determine steps to prevent a future occurrence?

A. Mitigation

B. Identification

C. Preparation

D. Lessons learned

A

Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The network security engineer just deployed an IDS on the network, but the Chief Technical Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the following types of IDS has been deployed?

A. Signature Based IDS

B. Heuristic IDS

C. Behavior Based IDS

D. Anomaly Based IDS

A

Signature Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following types of application attacks would be used to identify malware causing security breaches that have NOT yet been identified by any trusted sources?

A. Zero-day

B. LDAP injection

C. XML injection

D. Directory traversal

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is true about an email that was signed by User A and sent to User B?

A. User A signed with User B’s private key and User B verified with their own public key.

B. User A signed with their own private key and User B verified with User A’s public key.

C. User A signed with User B’s public key and User B verified with their own private key.

D. User A signed with their own public key and User B verified with User A’s private key.

A

User A signed with their own private key and User B verified with User A’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

After working on his doctoral dissertation for two years, Peter, a user, is unable to open his dissertation file. The screen shows a warning that the dissertation file is corrupted because it is infected with a backdoor, and can only be recovered by upgrading the antivirus software from the free version to the commercial version. Which of the following types of malware is the laptop MOST likely infected with?

A. Ransomware

B. Trojan

C. Backdoor

D. Armored virus

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data execution prevention is a feature in most operating systems intended to protect against which type of attack?

A. Cross-site scripting

B. Buffer overflow

C. Header manipulation

D. SQL injection

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A security analyst has been tasked with securing a guest wireless network. They recommend the company use an authentication server but are told the funds are not available to set this up.
Which of the following BEST allows the analyst to restrict user access to approved devices?

A. Antenna placement

B. Power level adjustment

C. Disable SSID broadcasting

D. MAC filtering

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company is looking to reduce the likelihood of employees in the finance department being involved with money laundering. Which of the following controls would BEST mitigate this risk?

A. Implement privacy policies

B. Enforce mandatory vacations

C. Implement a security policy

D. Enforce time of day restrictions

A

Enforce mandatory vacations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following can Peter, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?

A. Security logs

B. Protocol analyzer

C. Audit logs

D. Honeypot

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

During an anonymous penetration test, Jane, a system administrator, was able to identify a shared print spool directory, and was able to download a document from the spool. Which statement BEST describes her privileges?

A. All users have write access to the directory.

B. Jane has read access to the file.

C. All users have read access to the file.

D. Jane has read access to the directory.

A

All users have read access to the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following can only be mitigated through the use of technical controls rather that user security training?

A. Shoulder surfing

B. Zero-day

C. Vishing

D. Trojans

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Users have been reporting that their wireless access point is not functioning. They state that it allows slow connections to the internet, but does not provide access to the internal network. The user provides the SSID and the technician logs into the company’s access point and finds no issues. Which of the following should the technician do?

A. Change the access point from WPA2 to WEP to determine if the encryption is too strong

B. Clear all access logs from the AP to provide an up-to-date access list of connected users

C. Check the MAC address of the AP to which the users are connecting to determine if it is an imposter

D. Reconfigure the access point so that it is blocking all inbound and outbound traffic as a troubleshooting gap

A

Check the MAC address of the AP to which the users are connecting to determine if it is an imposter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

LDAP and Kerberos are commonly used for which of the following?

A. To perform queries on a directory service

B. To store usernames and passwords for Federated Identity

C. To sign SSL wildcard certificates for subdomains

D. To utilize single sign-on capabilities

A

To utilize single sign-on capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

After reviewing the firewall logs of her organization’s wireless APs, Ann discovers an unusually high amount of failed authentication attempts in a particular segment of the building. She remembers that a new business moved into the office space across the street. Which of the following would be the BEST option to begin addressing the issue?

A. Reduce the power level of the AP on the network segment

B. Implement MAC filtering on the AP of the affected segment

C. Perform a site survey to see what has changed on the segment

D. Change the WPA2 encryption key of the AP in the affected segment

A

Reduce the power level of the AP on the network segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate laptops where the file structures are unknown?

A. Folder encryption

B. File encryption

C. Whole disk encryption

D. Steganography

A

Whole disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A database administrator would like to start encrypting database exports stored on the SAN, but the storage administrator warns that this may drastically increase the amount of disk space used by the exports. Which of the following explains the reason for the increase in disk space usage?

A. Deduplication is not compatible with encryption

B. The exports are being stored on smaller SAS drives

C. Encrypted files are much larger than unencrypted files

D. The SAN already uses encryption at rest

A

Encrypted files are much larger than unencrypted files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which statement is TRUE about the operation of a packet sniffer?

A. It can only have one interface on a management network.

B. They are required for firewall operation and stateful inspection.

C. The Ethernet card must be placed in promiscuous mode.

D. It must be placed on a single virtual LAN interface.

A

The Ethernet card must be placed in promiscuous mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A small business needs to incorporate fault tolerance into their infrastructure to increase data availability. Which of the following options would be the BEST solution at a minimal cost?

A. Clustering

B. Mirrored server

C. RAID

D. Tape backup

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following must be kept secret for a public key infrastructure to remain secure?

A. Certificate Authority

B. Certificate revocation list

C. Public key ring

D. Private key

A

Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Ann, the security administrator, received a report from the security technician, that an unauthorized new user account was added to the server over two weeks ago. Which of the following could have mitigated this event?

A. Routine log audits

B. Job rotation

C. Risk likelihood assessment

D. Separation of duties

A

Routine log audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Peter, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Peter insisted that he was not aware of any company policy that prohibits the use of such web sites. Which of the following is the BEST method to deter employees from the improper use of the company’s information systems?

A. Acceptable Use Policy

B. Privacy Policy

C. Security Policy

D. Human Resource Policy

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A company hired Peter, an accountant. The IT administrator will need to create a new account for
Peter. The company uses groups for ease of management and administration of user accounts.
Peter will need network access to all directories, folders and files within the accounting department.
Which of the following configurations will meet the requirements?

A. Create a user account and assign the user account to the accounting group.

B. Create an account with role-based access control for accounting.

C. Create a user account with password reset and notify Peter of the account creation.

D. Create two accounts: a user account and an account with full network administration rights.

A

Create an account with role-based access control for accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

One month after a software developer was terminated the helpdesk started receiving calls that several employees’ computers were being infected with malware. Upon further research, it was determined that these employees had downloaded a shopping toolbar. It was this toolbar that downloaded and installed the errant code. Which of the following attacks has taken place?

A. Logic bomb

B. Cross-site scripting

C. SQL injection

D. Malicious add-on

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?

A. Recovery agent

B. Certificate authority

C. Trust model

D. Key escrow

A

Recovery agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A system administrator has noticed network performance issues and wants to gather performance data from the gateway router. Which of the following can be used to perform this action?

A. SMTP

B. iSCSI

C. SNMP

D. IPSec

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following practices reduces the management burden of access management?

A. Password complexity policies

B. User account audit

C. Log analysis and review

D. Group based privileges

A

Group based privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following could a security administrator implement to mitigate the risk of tailgating for a large organization?

A. Train employees on correct data disposal techniques and enforce policies.

B. Only allow employees to enter or leave through one door at specified times of the day.

C. Only allow employees to go on break one at a time and post security guards 24/7 at each entrance.

D. Train employees on risks associated with social engineering attacks and enforce policies.

A

Train employees on risks associated with social engineering attacks and enforce policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following attacks targets high level executives to gain company information?

A. Phishing

B. Whaling

C. Vishing

D. Spoofing

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The loss prevention department has purchased a new application that allows the employees to monitor the alarm systems at remote locations. However, the application fails to connect to the vendor’s server and the users are unable to log in. Which of the following are the MOST likely causes of this issue? (Select TWO).

A. URL filtering

B. Role-based access controls

C. MAC filtering

D. Port Security

E. Firewall rules

A

URL filtering

Firewall rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A security administrator would like to ensure that system administrators are not using the same password for both their privileged and non-privileged accounts. Which of the following security controls BEST accomplishes this goal?

A. Require different account passwords through a policy

B. Require shorter password expiration for non-privileged accounts

C. Require shorter password expiration for privileged accounts

D. Require a greater password length for privileged accounts

A

Require different account passwords through a policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is BEST carried out immediately after a security breach is discovered?

A. Risk transference

B. Access control revalidation

C. Change management

D. Incident management

A

Incident management

42
Q

A company’s Chief Information Officer realizes the company cannot continue to operate after a disaster. Which of the following describes the disaster?

A. Risk

B. Asset

C. Threat

D. Vulnerability

A

Threat

43
Q

Which of the following is built into the hardware of most laptops but is not setup for centralized management by default?

A. Whole disk encryption

B. TPM encryption

C. USB encryption

D. Individual file encryption

A

TPM encryption

44
Q

A security administrator wants to deploy security controls to mitigate the threat of company employees’ personal information being captured online. Which of the following would BEST serve this purpose?

A. Anti-spyware

B. Antivirus

C. Host-based firewall

D. Web content filter

A

Anti-spyware

45
Q

A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?

A. IPsec

B. SFTP

C. BGP

D. PPTP

A

IPsec

46
Q

Which of the following presents the STRONGEST access control?

A. MAC

B. TACACS

C. DAC

D. RBAC

A

MAC

47
Q

A security administrator is reviewing the company’s continuity plan. The plan specifies an RTO of six hours and RPO of two days. Which of the following is the plan describing?

A. Systems should be restored within six hours and no later than two days after the incident.

B. Systems should be restored within two days and should remain operational for at least six hours.

C. Systems should be restored within six hours with a minimum of two days worth of data.

D. Systems should be restored within two days with a minimum of six hours worth of data.

A

Systems should be restored within six hours with a minimum of two days worth of data.

48
Q

One of the senior managers at a company called the help desk to report to report a problem. The manager could no longer access data on a laptop equipped with FDE. The manager requested that the FDE be removed and the laptop restored from a backup. The help desk informed the manager that the recommended solution was to decrypt the hard drive prior to reinstallation and recovery. The senior manager did not have a copy of the private key associated with the FDE on the laptop. Which of the following tools or techniques did the help desk use to avoid losing the data on the laptop?

A. Public key

B. Recovery agent

C. Registration details

D. Trust Model

A

Recovery agent

49
Q

Peter, a security administrator, is informed that people from the HR department should not have access to the accounting department’s server, and the accounting department should not have access to the HR department’s server. The network is separated by switches. Which of the following is designed to keep the HR department users from accessing the accounting department’s server and vice-versa?

A. ACLs

B. VLANs

C. DMZs

D. NATS

A

VLANs

50
Q

Input validation is an important security defense because it:

A. rejects bad or malformed data.

B. enables verbose error reporting.

C. protects mis-configured web servers.

D. prevents denial of service attacks.

A

rejects bad or malformed data.

51
Q

Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Ann ensure is open?

A. 22

B. 139

C. 443

D. 3389

A

3389

52
Q

How must user accounts for exiting employees be handled?

A. Disabled, regardless of the circumstances

B. Disabled if the employee has been terminated

C. Deleted, regardless of the circumstances

D. Deleted if the employee has been terminated

A

Disabled, regardless of the circumstances

53
Q

Which of the following is a hardware based encryption device?

A. EFS

B. TrueCrypt

C. TPM

D. SLE

A

TPM

54
Q

An organization is recovering data following a datacenter outage and determines that backup copies of files containing personal information were stored in an unsecure location, because the sensitivity was unknown. Which of the following activities should occur to prevent this in the future?

A. Business continuity planning

B. Quantitative assessment

C. Data classification

D. Qualitative assessment

A

Data classification

55
Q

Which of the following would prevent a user from installing a program on a company-owned mobile device?

A. White-listing

B. Access control lists

C. Geotagging

D. Remote wipe

A

White-listing

56
Q

Which of the following provides a static record of all certificates that are no longer valid?

A. Private key

B. Recovery agent

C. CRLs

D. CA

A

CRLs

57
Q

A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen?

A. Application control

B. Remote wiping

C. GPS

D. Screen-locks

A

Remote wiping

58
Q

Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?

A. Vulnerability assessment

B. Black box testing

C. White box testing

D. Penetration testing

A

Vulnerability assessment

59
Q

A system administrator is responding to a legal order to turn over all logs from all company servers. The system administrator records the system time of all servers to ensure that:

A. HDD hashes are accurate.

B. the NTP server works properly.

C. chain of custody is preserved.

D. time offset can be calculated.

A

time offset can be calculated.

60
Q

Verifying the integrity of data submitted to a computer program at or during run-time, with the intent of preventing the malicious exploitation of unintentional effects in the structure of the code, is BEST described as which of the following?

A. Output sanitization

B. Input validation

C. Application hardening

D. Fuzzing

A

Input validation

61
Q

A security administrator is investigating a recent server breach. The breach occurred as a result of a zero-day attack against a user program running on the server. Which of the following logs should the administrator search for information regarding the breach?

A. Application log

B. Setup log

C. Authentication log

D. System log

A

Application log

62
Q

After a user performed a war driving attack, the network administrator noticed several similar markings where WiFi was available throughout the enterprise. Which of the following is the term used to describe these markings?

A. IV attack

B. War dialing

C. Rogue access points

D. War chalking

A

War chalking

63
Q

The server administrator has noted that most servers have a lot of free disk space and low memory utilization. Which of the following statements will be correct if the server administrator migrates to a virtual server environment?

A. The administrator will need to deploy load balancing and clustering.

B. The administrator may spend more on licensing but less on hardware and equipment.

C. The administrator will not be able to add a test virtual environment in the data center.

D. Servers will encounter latency and lowered throughput issues.

A

The administrator may spend more on licensing but less on hardware and equipment.

64
Q

Which of the following encompasses application patch management?

A. Configuration management

B. Policy management

C. Cross-site request forgery

D. Fuzzing

A

Configuration management

65
Q

A datacenter requires that staff be able to identify whether or not items have been removed from the facility. Which of the following controls will allow the organization to provide automated notification of item removal?

A. CCTV

B. Environmental monitoring

C. RFID

D. EMI shielding

A

RFID

66
Q

A process in which the functionality of an application is tested without any knowledge of the internal mechanisms of the application is known as:

A. Black box testing

B. White box testing

C. Black hat testing

D. Gray box testing

A

Black box testing

67
Q

Which of the following is the default port for TFTP?

A. 20

B. 69

C. 21

D. 68

A

69

68
Q

A new client application developer wants to ensure that the encrypted passwords that are stored in their database are secure from cracking attempts. To implement this, the developer implements a function on the client application that hashes passwords thousands of times prior to being sent to the database. Which of the following did the developer MOST likely implement?

A. RIPEMD

B. PBKDF2

C. HMAC

D. ECDHE

A

PBKDF2

69
Q

Which of the following is a security concern regarding users bringing personally-owned devices that they connect to the corporate network?

A. Cross-platform compatibility issues between personal devices and server-based applications

B. Lack of controls in place to ensure that the devices have the latest system patches and signature files

C. Non-corporate devices are more difficult to locate when a user is terminated

D. Non-purchased or leased equipment may cause failure during the audits of company-owned assets

A

Lack of controls in place to ensure that the devices have the latest system patches and signature files

70
Q

A technician is unable to manage a remote server. Which of the following ports should be opened on the firewall for remote server management? (Select TWO).

A. 22

B. 135

C. 137

D. 143

E. 443

F. 3389

A

22

3389

71
Q

A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has experienced several laptop thefts from the cafe during peak shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate laptop theft. Which of the following would provide the IT department with the BEST solution?

A. Attach cable locks to each laptop

B. Require each customer to sign an AUP

C. Install a GPS tracking device onto each laptop

D. Install security cameras within the perimeter of the café

A

Attach cable locks to each laptop

72
Q

Matt, the network engineer, has been tasked with separating network traffic between virtual machines on a single hypervisor. Which of the following would he implement to BEST address this requirement? (Select TWO).

A. Virtual switch

B. NAT

C. System partitioning

D. Access-list

E. Disable spanning tree

F. VLAN

A

Virtual switch

VLAN

73
Q

Which of the following would be used when a higher level of security is desired for encryption key storage?

A. TACACS+

B. L2TP

C. LDAP

D. TPM

A

TPM

74
Q

A company uses PGP to ensure that sensitive email is protected. Which of the following types of cryptography is being used here for the key exchange?

A. Symmetric

B. Session-based

C. Hashing

D. Asymmetric

A

Symmetric

75
Q

A recent spike in virus detections has been attributed to end-users visiting www.compnay.com. The business has an established relationship with an organization using the URL of www.company.com but not with the site that has been causing the infections. Which of the following would BEST describe this type of attack?

A. Typo squatting

B. Session hijacking

C. Cross-site scripting

D. Spear phishing

A

Typo squatting

76
Q

The datacenter manager is reviewing a problem with a humidity factor that is too low. Which of the following environmental problems may occur?

A. EMI emanations

B. Static electricity

C. Condensation

D. Dry-pipe fire suppression

A

Static electricity

77
Q

A security analyst performs the following activities: monitors security logs, installs surveillance cameras and analyzes trend reports. Which of the following job responsibilities is the analyst performing? (Select TWO).

A. Detect security incidents

B. Reduce attack surface of systems

C. Implement monitoring controls

D. Hardening network devices

E. Prevent unauthorized access

A

Detect security incidents

Implement monitoring controls

78
Q

The security department has implemented a new laptop encryption product in the environment. The product requires one user name and password at the time of boot up and also another password after the operating system has finished loading. This setup is using which of the following authentication types?

A. Two-factor authentication

B. Single sign-on

C. Multifactor authentication

D. Single factor authentication

A

Single factor authentication

79
Q

An internal audit has detected that a number of archived tapes are missing from secured storage. There was no recent need for restoration of data from the missing tapes. The location is monitored by access control and CCTV systems. Review of the CCTV system indicates that it has not been recording for three months. The access control system shows numerous valid entries into the storage location during that time. The last audit was six months ago and the tapes were accounted for at that time. Which of the following could have aided the investigation?

A. Testing controls

B. Risk assessment

C. Signed AUP

D. Routine audits

A

Testing controls

80
Q

Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for multicast packets from the switches on the network. After investigation, she discovers that this is normal activity for her network. Which of the following BEST describes these results?

A. True negatives

B. True positives

C. False positives

D. False negatives

A

False positives

81
Q

A company wants to ensure that all credentials for various systems are saved within a central database so that users only have to login once for access to all systems. Which of the following would accomplish this?

A. Multi-factor authentication

B. Smart card access

C. Same Sign-On

D. Single Sign-On

A

Single Sign-On

82
Q

A software development company wants to implement a digital rights management solution to protect its intellectual property. Which of the following should the company implement to enforce software digital rights?

A. Transport encryption

B. IPsec

C. Non-repudiation

D. Public key infrastructure

A

Public key infrastructure

83
Q

The security consultant is assigned to test a client’s new software for security, after logs show targeted attacks from the Internet. To determine the weaknesses, the consultant has no access to the application program interfaces, code, or data structures. This is an example of which of the following types of testing?

A. Black box

B. Penetration

C. Gray box

D. White box

A

Black box

84
Q

A computer security officer has investigated a possible data breach and has found it credible. The officer notifies the data center manager and the Chief Information Security Officer (CISO). This is an example of:

A. escalation and notification.

B. first responder.

C. incident identification.

D. incident mitigation.

A

escalation and notification

85
Q

Which of the following helps to apply the proper security controls to information?

A. Data classification

B. Deduplication

C. Clean desk policy

D. Encryption

A

Data classification

86
Q

Which of the following is a control that allows a mobile application to access and manipulate information which should only be available by another application on the same mobile device (e.g. a music application posting the name of the current song playing on the device on a social media site)?

A. Co-hosted application

B. Transitive trust

C. Mutually exclusive access

D. Dual authentication

A

Transitive trust

87
Q

Which of the following BEST describes a SQL Injection attack?

A. The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.

B. The attacker attempts to have the receiving server run a payload using programming commonly found on web servers.

C. The attacker overwhelms a system or application, causing it to crash and bring the server down to cause an outage.

D. The attacker overwhelms a system or application, causing it to crash, and then redirects the memory address to read from a location holding the payload.

A

The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.

88
Q

An administrator is instructed to disable IP-directed broadcasts on all routers in an organization. Which of the following attacks does this prevent?

A. Pharming

B. Smurf

C. Replay

D. Xmas

A

Smurf

89
Q

Human Resources suspect an employee is accessing the employee salary database. The administrator is asked to find out who it is. In order to complete this task, which of the following is a security control that should be in place?

A. Shared accounts should be prohibited.

B. Account lockout should be enabled

C. Privileges should be assigned to groups rather than individuals

D. Time of day restrictions should be in use

A

Shared accounts should be prohibited.

90
Q

Which the following flags are used to establish a TCP connection? (Select TWO).

A. PSH

B. ACK

C. SYN

D. URG

E. FIN

A

ACK

SYN

91
Q

Which of the following would BEST deter an attacker trying to brute force 4-digit PIN numbers to access an account at a bank teller machine?

A. Account expiration settings

B. Complexity of PIN

C. Account lockout settings

D. PIN history requirements

A

Account lockout settings

92
Q

The incident response team has received the following email message.
From: monitor@ext-company.com To: security@company.com Subject: Copyright infringement
A copyright infringement alert was triggered by IP address 13.10.66.5 at 09: 50: 01 GMT.
After reviewing the following web logs for IP 13.10.66.5, the team is unable to correlate and identify the incident.
09:
45: 33 13.10.66.5 http: //remote.site.com/login.asp?user=john
09:
50: 22 13.10.66.5 http: //remote.site.com/logout.asp?user=anne
10: 50: 01 13.10.66.5 http: //remote.site.com/access.asp?file=movie.mov
11: 02: 45 13.10.65.5 http: //remote.site.com/download.asp?movie.mov=ok
Which of the following is the MOST likely reason why the incident response team is unable to identify and correlate the incident?

A. The logs are corrupt and no longer forensically sound.

B. Traffic logs for the incident are unavailable.

C. Chain of custody was not properly maintained.

D. Incident time offsets were not accounted for.

A

Incident time offsets were not accounted for.

93
Q

The security administrator is implementing a malware storage system to archive all malware seen by the company into a central database. The malware must be categorized and stored based on similarities in the code. Which of the following should the security administrator use to identify similar malware?

A. TwoFish

B. SHA-512

C. Fuzzy hashes

D. HMAC

A

Fuzzy hashes

94
Q

A bank has a fleet of aging payment terminals used by merchants for transactional processing. The terminals currently support single DES but require an upgrade in order to be compliant with security standards. Which of the following is likely to be the simplest upgrade to the aging terminals which will improve in-transit protection of transactional data?

A. AES

B. 3DES

C. RC4

D. WPA2

A

3DES

95
Q

End-user awareness training for handling sensitive personally identifiable information would include secure storage and transmission of customer:

A. Date of birth.

B. First and last name.

C. Phone number.

D. Employer name.

A

Date of birth

96
Q

A network administrator noticed various chain messages have been received by the company.
Which of the following security controls would need to be implemented to mitigate this issue?

A. Anti-spam

B. Antivirus

C. Host-based firewalls

D. Anti-spyware

A

Anti-spam

97
Q

A security administrator has concerns regarding employees saving data on company provided mobile devices. Which of the following would BEST address the administrator’s concerns?

A. Install a mobile application that tracks read and write functions on the device.

B. Create a company policy prohibiting the use of mobile devices for personal use.

C. Enable GPS functionality to track the location of the mobile devices.

D. Configure the devices so that removable media use is disabled.

A

Configure the devices so that removable media use is disabled.

98
Q

Physical documents must be incinerated after a set retention period is reached. Which of the following attacks does this action remediate?

A. Shoulder Surfing

B. Dumpster Diving

C. Phishing

D. Impersonation

A

Dumpster Diving

99
Q

Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to restore those services?

A. Hot site

B. Warm site

C. Cold site

D. Mobile site

A

Mobile site

100
Q

Peter, a technician, is tasked with finding a way to test operating system patches for a wide variety of servers before deployment to the production environment while utilizing a limited amount of hardware resources. Which of the following would provide the BEST environment for performing this testing?

A. OS hardening

B. Application control

C. Virtualization

D. Sandboxing

A

Sandboxing