Exam D Flashcards
QUESTION 1 Which of the following sets numerous flag fields in a TCP packet? A. XMAS B. DNS poisoning C. SYN flood D. ARP poisoning
A. XMAS
QUESTION 2 Which of the following devices is MOST commonly used to create a VLAN? A. Hub B. Router C. Firewall D. Switch
D. Switch
QUESTION 3 Which of the following network design elements provides for a one-to-one relationship between an internal network address and an external network address? A. NAT B. NAC C. VLAN D. PAT
A. NAT - Network Address Translation
QUESTION 4 Using proximity card readers instead of the traditional key punch doors would help to mitigate: A. impersonation B. tailgating C. dumpster diving D. shoulder surfing
D. shoulder surfing
QUESTION 5 In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him understand what traffic patterns are normal on his network. Which of the following tools would help Pete determine traffic patterns? A. Syslog B. Protocol analyzer C. Proxy server D. Firewall
B. Protocol analyzer
QUESTION 6 Jane, a security administrator, has asked her technicians to determine if a certificate is valid. Which of the following should be checked to determine whether or not a certificate has been invalidated? A. CA B. CRL C. PKI D. CRC
B. CRL - Certificate Revocation List
QUESTION 7 TKIP uses which of the following encryption ciphers? A. RC5 B. AES C. RC4 D. 3DES
C. RC4 -
QUESTION 8 The process of exchanging public keys is BEST explained as which cryptography concept? A. Symmetric encryption B. Asymmetric encryption C. Key escrow D. Transport encryption
B. Asymmetric encryption
QUESTION 9 Which of the following network segments would be BEST suited for installing a honeypot? A. Management network B. Internal network C. External network D. DMZ network
C. External network
QUESTION 10 Jane, a security architect, has noticed significant performance loss with the increase in user-base of her PKI infrastructure. Which of the following could she deploy in order to increase response times? A. Smart card B. CAC C. HSM D. VPN
C. HSM - Hardware Security Module
QUESTION 11 Pete, a security administrator, has configured and implemented an additional public intermediate CA. Which of the following must Pete submit to the major web browser vendors in order for the certificates, signed by this intermediate, to be trusted? A. Die root CA’s private key B. The root CA’s public key C. The intermediate CA’s public key D. The intermediate CA’s private key
C. The intermediate CA’s public key
QUESTION 12 Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business? A. Deterrence B. Separation of duties C. Transference D. Mitigation
D. Mitigation
QUESTION 13 A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss? A. Enforced privacy policy, encryption of VPN connections, and monitoring of communications entering the organization. B. Enforced acceptable usage policy, encryption of confidential emails, and monitoring of communications leaving the organization. C. Enforced privacy policy, encryption of VPN connections, and monitoring of communications leaving the organization. D. Enforced acceptable usage policy, encryption of confidential emails, and monitoring of communications entering the organization.
B. Enforced acceptable usage policy, encryption of confidential emails, and monitoring of communications leaving the organization.
QUESTION 14 In a wireless network, which of the following components could cause too much coverage, too little coverage, and interference? A. MAC filter B. AP power levels C. Phones or microwaves D. SSID broadcasts
B. AP power levels
QUESTION 15 Which of the following has a default port of 22? A. SSH B. FTP C. TELNET D. SCAP
A. SSH - Secure Shell 22
QUESTION 16 The public key is used to perform which of the following? (Select THREE). A. Validate the CRL B. Validate the identity of an email sender C. Encrypt messages D. Perform key recovery E. Decrypt messages F. Perform key escrow
C. Encrypt messages E. Decrypt messages F. Perform key escrow
QUESTION 17 Pete, a network administrator, implements the spanning tree protocol on network switches. Which of the following issues does this address? A. Flood guard protection B. ARP poisoning protection C. Loop protection D. Trunking protection
C. Loop protection
QUESTION 18 Matt, a security administrator, has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files, Matt should: A. Require all visitors to the public web home page to create a username and password to view the pages in the website B. Configure the web application firewall to send a reset packet to the incoming IP from where an attack or scan signature has been detected. C. Create file hashes for website and critical system files, and compare the current file hashes to the baseline at regular time intervals. D. Reboot the web server and database server nightly after the backup has been completed.
C. Create file hashes for website and critical system files, and compare the current file hashes to the baseline at regular time intervals.
QUESTION 19 Matt, the administrator, has been told to confirm what account an email was sent from. Which of the following is this an example of? A. Surveillance B. E-discovery C. Chain of custody D. Integrity
B. E-discovery
QUESTION 20 Which of the following is a feature of Kerberos? A. One-way encryption B. Vendor patch management C. Only available for Linux systems D. Single sign-on
D. Single sign-on
QUESTION 21 Which of the following is a secure alternate to Telnet? A. TFTP B. HTTPS C. SSH D. SCP
C. SSH - Secure Shell 22 (Telnet 23)
QUESTION 22 Temporary employees are not allowed to work overtime. The information security department must implement a control to enforce this measure. Which of the following measures would BEST enforce this policy? A. Separation of duties B. Personal identification card C. Single sign-on D. Time of day restrictions
D. Time of day restrictions
QUESTION 23 Sara from IT Governance wants to provide a mathematical probability of an earthquake using facts and figures. Which of the following concepts would achieve this? A. Qualitative Analysis B. Impact Analysis C. Quantitative Analysis D. SLE divided by the ARO
C. Quantitative Analysis
QUESTION 24 During an anonymous penetration test, Jane, a system administrator, was able to identify a shared print spool directory, and was able to download a document from the spool. Which statement BEST describes her privileges? A. All users have write access to the directory. B. Jane has read access to the file. C. All users have read access to the file. D. Jane has read access to the directory.
C. All users have read access to the file.