Exam C Flashcards
QUESTION 1The annual loss expectancy can be calculated by:A. dividing the annualized rate of return by single loss expectancyB. multiplying the annualized rate of return and the single loss expectancyC. subtracting the single loss expectancy from the annualized rate of returnD. adding the single loss expectancy and the annualized rate of return
B. multiplying the annualized rate of return and the single loss expectancy
QUESTION 2 Which of the following datacenter environmental controls must be properly configured to prevent equipment failure from water? A. Lighting B. Temperature C. Humidity D. Halon fire suppression
C. Humidity
QUESTION 3 Which of the following should the security administrator do when taking a forensic image of a hard drive? A. Image the original hard drive, hash the image, and analyze the original hard drive. B. Copy all the files from the original into a separate hard drive, and hash all the files. C. Hash the original hard drive, image the original hard drive, and hash the image. D. Image the original hard drive, hash the original hard drive, and analyze the hash.
C. Hash the original hard drive, image the original hard drive, and hash the image.
QUESTION 4 In order to prevent and detect fraud, which of the following should be implemented? A. Job rotation B. Risk analysis C. Incident management D. Employee evaluations
A. Job rotation
QUESTION 5 A vulnerability scan detects an unpatched application that does not exist on the server. Which of the following is the BEST explanation? A. File corruption B. False positive C. Wrong system was scanned D. Signature needs to be updated on the tool
B. False positive
QUESTION 6 Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task? A. HIDS B. Firewall C. NIPS D. Spam filter
C. NIPS - Network Intrusion Protection System
QUESTION 7 An administrator notices an unusual spike in network traffic from many sources. The administrator suspects that: A. it is being caused by the presence of a rogue access point. B. it is the beginning of a DDoS attack. C. the IDS has been compromised. D. the internal DNS tables have been poisoned.
B. it is the beginning of a DDoS attack.
QUESTION 8 Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate? A. War dialing B. War chalking C. War driving D. Bluesnarfing
A. War dialing
QUESTION 9 Mike, a system administrator, anticipating corporate downsizing this coming November writes a malicious program to execute three weeks later if his account is removed. Which of the following attacks is this? A. Rootkit B. Virus C. Logic Bomb D. Worm
C. Logic Bomb
QUESTION 10 The Compliance Department implements a policy stating the Security Analyst must only review security changes and the Security Administrator will implement the changes. This is example of which of the following? A. Job rotation B. Discretionary access control C. Trust models D. Separation of duties
D. Separation of duties
QUESTION 11 An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender? A. CRL B. Non-repudiation C. Trust models D. Recovery agents
B. Non-repudiation
QUESTION 12 Which of the following protocols would be used to verify connectivity between two remote devices at the LOWEST level of the OSI model? A. DNS B. SCP C. SSH D. ICMP
D. ICMP - Internet Control Message Protocol
QUESTION 13 Sara, a user, needs to copy a file from a Linux workstation to a Linux server using the MOST secure file transfer method available. Which of the following protocols would she use? A. SCP B. FTP C. SNMP D. TFTP
A. SCP - Secure Copy Protocol
QUESTION 14 Users require access to a certain server depending on their job function. Which of the following would be the MOST appropriate strategy for securing the server? A. Common access card B. Role based access control C. Discretionary access control D. Mandatory access control
B. Role based access control
QUESTION 15 Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server? A. HIPS B. NIDS C. HIDS D. NIPS
A. HIPS - Host-Based Intrusion Prevention System
QUESTION 16 Matt, the security administrator, notices a large number of alerts on the NIDS. Upon further inspection, it is determined that no attack has really taken place. This is an example of a: A. false negative. B. true negative. C. false positive. D. true positive.
C. false positive.
QUESTION 17 Sara, a visitor, plugs her Ethernet cable into an open jack in a wall outlet and is unable to connect to the network. This is MOST likely an example of: A. port security. B. implicit deny. C. flood guards. D. loop protection.
A. port security.
QUESTION 18 Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished? A. Create a VLAN without a default gateway. B. Remove the network from the routing table. C. Create a virtual switch. D. Commission a stand-alone switch.
C. Create a virtual switch.
QUESTION 19 The security principle that is targeted when implementing ACLs is: A. integrity. B. availability. C. confidentiality. D. responsibility.
A. integrity.
QUESTION 20 Which of the following is true about two security administrators who are using asymmetric encryption to send encrypted messages to each other? A. When one encrypts the message with the private key, the other can decrypt it with the private key. B. When one encrypts the message with the private key, the other can decrypt it with the public key. C. When one encrypts the message with the public key, the other can use either the public or the private to decrypt it. D. When one encrypts the message with the public key, the other can decrypt it with the public key.
B. When one encrypts the message with the private key, the other can decrypt it with the public key.
QUESTION 21 A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default? A. 20 B. 21 C. 22 D. 23
B. 21 FTP File Transfer Protocol
QUESTION 22 Which of the following top to bottom sequential firewall rules will allow SSH communication? A. DENY ANY ANY PERMIT ANY ANY TCP 22 PERMIT ANY ANY UDP 22 B. PERMIT ANY ANY UDP 22 PERMIT ANY ANY TCP 21 DENY ANY ANY C. PERMIT ANY ANY TCP 23 PERMIT ANY ANY TCP 22 DENY ANY ANY D. PERMIT ANY ANY TCP 23 DENY ANY ANY PERMIT ANY ANY TCP 22
C. PERMIT ANY ANY TCP 23 PERMIT ANY ANY TCP 22 DENY ANY ANY
QUESTION 23 A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following? A. Availability B. Integrity C. Confidentiality D. Fire suppression
A. Availability
QUESTION 24 Which of the following Data Loss Prevention strategies is used to ensure that unauthorized users cannot access information stored in specified fields? A. Whole disk encryption B. Trust models C. Database encryption D. Individual file encryption
C. Database encryption