Exam E Flashcards
QUESTION 1Which of the following BEST describes a demilitarized zone?A. A buffer zone between protected and unprotected networks.B. A network where all servers exist and are monitored.C. A sterile, isolated network segment with access lists.D. A private network that is protected by a firewall and a VLAN.
A. A buffer zone between protected and unprotected networks.
QUESTION 2Which of the following statements BEST describes the basic functionality of a network firewall?A. Improves communication between trusted and non-trusted networksB. Redirects accepted traffic to the proper VLANC. Provides stateful packet inspection of TCP trafficD. Accepts and rejects data based on content
C. Provides stateful packet inspection of TCP traffic
QUESTION 3Which of the following BEST describes the function of a protocol analyzer?A. It allows a security technician to decrypt packets as they traverse the network.B. It allows a security technician to encrypt packets as they traverse the network.C. It allows a security technician to perform deep state packet inspection.D. It allows a security technician to perform hardware device troubleshooting.
C. It allows a security technician to perform deep state packet inspection.
QUESTION 4Which of the following network solutions would BEST allow Jane, a security technician, to host an extranet application for her company?A. Platform as a ServiceB. Infrastructure as a ServiceC. Storage as a ServiceD. Software as a Service
D. Software as a Service
QUESTION 5Which of the following network design elements BEST provides a testing environment to perform malware analysis?A. Platform as a Service (PaaS)B. DMZC. VirtualizationD. Proxies
C. Virtualization
QUESTION 6Matt, a security technician, is attempting to explain why some of the company policies should be changed for high risk IT positions. Which of the following concepts BEST explains his support for fraud detection?A. Time of day restrictions is more likely to discover fraud than the other fraud detection methods.B. Least privilege principles allow internal audit teams to discover fraud while a staff member is out of the office.C. Separation of duties is a better fraud detection method than mandatory vacations; therefore, it should be used.D. Mandatory vacations support the company discovering fraud while staff members are out of the office.
D. Mandatory vacations support the company discovering fraud while staff members are out of the office.
QUESTION 7Jane, a security technician, is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration management processes. One of the network technicians asks Jane to explain the access control type found in a firewall. With which of the following should Jane respond?A. Rule based access controlB. Role based access controlC. Discretionary access controlD. Mandatory access control
A. Rule based access control
QUESTION 8Sara, a security administrator, has been tasked with explaining smart cards to the company’s management team. Which of the following are smart cards? (Select TWO).A. DACB. TokensC. CACD. ACLE. PIV
C. CAC - Common Access Card E. PIV - Personal Identity Verification Card
QUESTION 9Jane, a security architect, is implementing security controls throughout her organization. Which of the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x Impact?A. Vulnerability is related to the risk that an event will take place.B. Vulnerability is related to value of potential loss.C. Vulnerability is related to the probability that a control will fail.D. Vulnerability is related to the probability of the event.
C. Vulnerability is related to the probability that a control will fail.
QUESTION 10Jane, a security analyst, has recently implemented a password complexity requirement within the company systems. Which of the following BEST explains this requirement?A. Accounts shall be required to adhere to no less than 15 characters for all personnel accounts.B. Accounts shall have two uppercase, two lowercase, and one number or special character.C. Accounts shall be changed no less than every ninety (90) days for service accounts.D. Accounts shall be disabled after a period of thirty (30) days if the account has not logged on within thattime period.
B. Accounts shall have two uppercase, two lowercase, and one number or special character.
QUESTION 11Pete, an email administrator, notices that Sara and Matt are exchanging image files back and forth. Pete opens an image and sees the image is from the company’s intranet. Pete checks the MD5 hash of the file on the Internet page versus the file Sara and Matt are sending and the hash values do not match. Which of the following is this MOST likely an example of?A. Key escrowB. SteganographyC. Digital signatureD. Non-repudiation
B. Steganography
QUESTION 12The HR department has been rotating positions in their own department and hiring new employees to fill positions. It is the end of the year and Pete, the CEO, is concerned about performance reviews and salaries being leaked from the corporate file server. Which of the following should Pete request be done to ensure only the required employees have access to the performance reviews?A. Perform an audit for access.B. Encrypt the data.C. Check the logs for access.D. Move the data to a USB drive.
A. Perform an audit for access.
QUESTION 13Jane is building a new web server. Jane only wants to run a web server on a workstation so she disables the default web site, turns off FTP, adds a certificate, and enables port 443 on the web server. Jane is performing which of the following?A. Application patch managementB. Exception handlingC. Application hardeningD. Application baselining
C. Application hardening
QUESTION 14Pete’s boss is concerned with the amount of down time the shipping and receiving server is having. He asks Pete to provide him with numbers on the mean time between failures. Which of the following equations could Pete perform to provide this information to his boss?A. Calculate the Annual Loss Expectancy for the year.B. Track the man hours and expenses of the system being down for a month.C. The operational time of the server divided by the number of times the system went down.D. Calculate the Annual Rate of Occurrence for the year.
C. The operational time of the server divided by the number of times the system went down.
QUESTION 15The information security department regularly walks the campus and around the buildings looking forunauthorized open wireless networks. This is an example of which of the following?A. A site surveyB. Antenna placementC. War dialingD. War driving
D. War driving
QUESTION 16Sara, an attacker, launches a man-in-the-middle attack against Pete. While sniffing Pete’s network traffic, Sara is able to acquire the current cookies Pete is using. Which of the following can Sara use these cookies for?A. Buffer overflowB. Header manipulationC. ARP poisoningD. Session hijacking
D. Session hijacking
QUESTION 17Users are reporting having trouble connecting to a certain web server. Pete, the security engineer,discovers the server appears to be running optimally at the OS level. Upon deeper investigation, Pete determines that the server is suspiciously flooding users with RST packets when they attempt to connect. Which of the following tools did Pete MOST likely use to discover this?A. HoneynetB. Network snifferC. Vulnerability scannerD. Port scanner
B. Network sniffer
QUESTION 18The lobby of the hotel allows users to plug in their laptops to access the Internet. This network is also used for the IP based phones in the hotel lobby. Mike, the security engineer, wants to secure the phones so that guests cannot electronically eavesdrop on other guests. Which of the following would Mike MOST likely implement?A. VLANB. Port securityC. MPLSD. Separate voice gateway
A. VLAN
QUESTION 19Jane, the security engineer, is tasked with hardening routers. She would like to ensure that network access to the corporate router is allowed only to the IT group and from authorized machines. Which of the following would MOST likely be implemented to meet this security goal? (Select TWO).A. SNMPB. HTTPSC. ACLD. Disable consoleE. SSHF. TACACS+
C. ACL - Access Control List F. TACACS+ - Terminal Access Controller Access-Control System Plus - 49
QUESTION 20Jane, the network administrator, would like wireless users to authenticate to the network’s RADIUS server via EAP prior to connecting to the WLAN. Which of the following would MOST likely be implemented to facilitate this authentication?A. 802.1xB. WPA2-PSKC. WEPD. TACACS+
A. 802.1x
QUESTION 21After a new firewall has been installed, devices cannot obtain a new IP address. Which of the following ports should Matt, the security administrator, open on the firewall?A. 25B. 68C. 80D. 443
B. 68 (DHCP)
QUESTION 22Which of the following could Sara, an administrator, use in a workplace to remove sensitive data at rest from the premises?A. Network snifferB. Personally owned devicesC. Vulnerability scannerD. Hardware locks
B. Personally owned devices
QUESTION 23Pete, the system administrator, has concerns regarding users losing their company provided smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his concerns?A. Enforce device passwords.B. Use remote sanitation.C. Enable GPS trackingD. Encrypt stored data.
C. Enable GPS tracking
QUESTION 24Pete, the system administrator, wishes to monitor and limit users’ access to external websites. Which of the following would BEST address this?A. Block all traffic on port 80.B. Implement NIDS.C. Use server load balancers.D. Install a proxy server.
D. Install a proxy server.