Exam F Flashcards

2
Q

QUESTION 1 Pete’s corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent? A. Collusion B. Impersonation C. Pharming D. Transitive Access

A

B. Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION 2 Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address? A. Interference B. Man-in-the-middle C. ARP poisoning D. Rogue access point

A

D. Rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION 3 Jane, the security administrator, is having issues with unauthorized users connecting to the wireless network. For administrative reasons, she cannot implement any wireless encryption methods. Which of the following can she implement to prevent unauthorized users from connecting to the network? A. NIPS B. Disable unused ports C. MAC filtering D. WEP

A

C. MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QUESTION 4 Matt, the security administrator, wants to secure the wireless network. Which of the following encryption methods offers the MOST security? A. WPA2 ENT AESB. WPA2 PSK AESC. WPA2 ENT TKIPD. WPA2 PSK TKIP

A

A. WPA2 ENT AES - Wireless Protected Access 2 Enteprise/ Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

QUESTION 5 Sara, the IT administrator, wants to control which devices can connect to the wireless network. Which of the following can she implement to accomplish this task? A. WPA2 Enterprise with AES encryption B. Decrease the WAP’s power levels C. Static IP addressing D. MAC address filtering

A

D. MAC address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QUESTION 6 When a new network drop was installed, the cable was run across several fluorescent lights. The users of the new network drop experience intermittent connectivity. Which of the following environmental controls was MOST likely overlooked during installation? A. Humidity sensors B. EMI shielding C. Channel interference D. Cable kinking

A

B. EMI shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QUESTION 7 Pete, the Chief Security Officer, wishes to institute annual security policy training for all users. The training’s purpose is to educate users about access to sensitive data. Which of the following should be included in the training? A. Revalidation of user account privileges. B. Review of guidelines for network stored data permissions. C. Implementation of new password procedures. D. Installation of disk-based encryption to protect data.

A

C. Implementation of new password procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

QUESTION 8 Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT A. Buffer overflow prevention B. Input validation C. CSRF prevention D. Cross-site scripting prevention

A

B. Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

QUESTION 9 Which of the following can BEST be implemented on a mobile phone to help prevent any sensitive data from being recovered if the phone is lost? A. Voice encryption B. Screen locks C. Device encryption D. GPS tracking

A

C. Device encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

QUESTION 10 Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss? A. Record time offset B. Clean desk policy C. Cloud computing D. Routine log review

A

B. Clean desk policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

QUESTION 11 If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing? A. Transitive trust B. Public key trust C. Certificate authority trust D. Domain level trust

A

A. Transitive trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

QUESTION 12 Which of the following is BEST associated with PKI? A. Private key B. Block ciphers C. Stream ciphers D. NTLMv2

A

A. Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

QUESTION 13 While traveling Matt, an employee, decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet, Matt agrees to share portions of his hard drive. This scenario describes one of the threats involved in which of the following technologies? A. Social networking B. ALE C. Cloud computing D. P2P

A

D. P2P - Peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

QUESTION 14 Which of the following is an attack where Pete spreads USB thumb drives throughout a bank’s parking lot in order to have malware installed on the banking systems? A. Tailgating B. Replay attack C. Virus D. Social engineering

A

D. Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION 15 Pete, the system administrator, has blocked users from accessing social media web sites. In addition to protecting company information from being accidentally leaked, which additional security benefit does this provide? A. No competition with the company’s official social presence B. Protection against malware introduced by banner ads C. Increased user productivity based upon fewer distractions D. Elimination of risks caused by unauthorized P2P file sharing

A

B. Protection against malware introduced by banner ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

QUESTION 16 Jane, the administrator of a small company, wishes to track people who access the secured server room, which is secured only by a simple hardware key lock. Jane does not have much of a budget or the approval to make significant construction changes. Given the limitations, which of the following can she do in the meantime? A. Implement an access log and a security guard B. Install a 24/7 closed-circuit camera system C. Install a separate hardware lock with limited keys D. Implement a cipher key lock

A

D. Implement a cipher key lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QUESTION 17 An administrator with a small company has begun to implement a backup strategy of the company’s critical financial data. Which of the following is the MOST secure place to store the back-ups? A. Near the data servers, for ease of restoration B. Next to where the physical records (e.g. paper) are stored C. At a remote off-site location D. With the financial department

A

C. At a remote off-site location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

QUESTION 18 In an enterprise environment, which of the following would be the BEST way to prevent users from accessing inappropriate websites when AUP requirements are constantly changing? A. Deploy a network proxy server. B. Configure Internet content filters on each workstation. C. Deploy a NIDS. D. Deploy a HIPS.

A

A. Deploy a network proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

QUESTION 19 Broadcast traffic is having a negative impact on network performance. Which of the following might help minimize this issue? A. Use NAT to hide the IPs of each of the workstations. B. Separate the network onto a number of different switches. C. Separate the network into a number of different VLANs. D. Route all the unicast traffic through the proxy server.

A

C. Separate the network into a number of different VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

QUESTION 20 A new wireless router has been compromised, blocking all of the company computers from using the router. Which of the following is the MOST likely cause for this issue? A. There was a backdoor account on the router. B. The default password on the router was not changed. C. The attacker discovered the WEP key of the router. D. The attacker had gone dumpster diving to find the router’s credentials.

A

B. The default password on the router was not changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

QUESTION 21 A company wants to maintain a backup site, and is more concerned about site maintenance cost rather than high availability following a disaster. Which of the following is the BEST solution? A. Cold site B. Remote site C. Hot site D. Warm site

A

A. Cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

QUESTION 22 Which of the following would be the MOST likely reason to use a cluster of host servers to support load balancing? A. Confidentiality by distributing traffic across multiple host servers B. Enhance security by obscuring the physical host of the guest server C. Availability by distributing connections across multiple servers D. Integrity by separating traffic across multiple guest servers

A

C. Availability by distributing connections across multiple servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

QUESTION 23 Which of the following controls is considered to be the MOST effective type of physical security? A. Access lists B. Cipher lock C. Chain link fence D. Mantrap

A

D. Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

QUESTION 24 An administrator notices that former temporary employees’ accounts are still active on a domain. Which of the following can be implemented to increase security and prevent this from happening? A. Implement a password expiration policy. B. Implement an account expiration date for permanent employees. C. Implement time of day restrictions for all temporary employees. D. Run a last logon script to look for inactive accounts.

A

D. Run a last logon script to look for inactive accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

QUESTION 25 Which of the following devices is used to capture and analyze data packets when Jane, an unauthorized user, is trying to gain access to a network? A. Sniffer B. VPN concentrator C. Packet filtering firewall D. Router

A

A. Sniffer

27
Q

QUESTION 26 Which of the following is the BEST filtering device capable of stateful packet inspection? A. Switch B. Protocol analyzer C. Firewall D. Router

A

C. Firewall

28
Q

QUESTION 27 An employee’s workstation is connected to the corporate LAN. Due to content filtering restrictions, the employee attaches a 3G Internet dongle to get to websites that are blocked by the corporate gateway. Which of the following BEST describes a security implication of this practice? A. A corporate LAN connection and a 3G Internet connection are acceptable if a host firewall is installed. B. The security policy should be updated to state that corporate computer equipment should be dual-homed. C. Content filtering should be disabled because it may prevent access to legitimate sites. D. Network bridging must be avoided, otherwise it may join two networks of different classifications.

A

D. Network bridging must be avoided, otherwise it may join two networks of different classifications.

29
Q

QUESTION 28 In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO). A. Subnetting B. NAT C. Firewall D. NAC E. VPN

A

C. Firewall E. VPN

30
Q

QUESTION 29 If a security issue is resolved, which of the following risk management strategies was used? A. Deterrence B. Acceptance C. Mitigation D. Avoidance

A

C. Mitigation

31
Q

QUESTION 30 Which of the following is the BEST approach to perform risk mitigation of user access control rights? A. Conduct surveys and rank the results. B. Perform routine user permission reviews. C. Implement periodic vulnerability scanning. D. Disable user accounts that have not been used within the last two weeks.

A

B. Perform routine user permission reviews.

32
Q

QUESTION 31 Used in conjunction, which of the following are PII? (Select TWO). A. Marital status B. Favorite movie C. Pet’s name D. Birthday E. Full name

A

D. Birthday E. Full name (PII- Personally Identifiable Information)

33
Q

QUESTION 32 In a disaster recovery situation, operations are to be moved to an alternate site. Computers and network connectivity are already present; however, production backups are several days out-of- date. Which of the following site types is being described? A. Cold site B. High availability site C. Warm site D. Hot site

A

C. Warm site

34
Q

QUESTION 33 Which of the following malware types is an antivirus scanner MOST unlikely to discover? (Select TWO). A. Trojan B. Pharming C. Worms D. Virus E. Logic bomb

A

B. Pharming E. Logic bomb

35
Q

QUESTION 34 Which of the following threats corresponds with an attacker targeting specific employees of a company? A. Spear phishing B. Phishing C. Pharming D. Man-in-the-middle

A

A. Spear phishing

36
Q

QUESTION 35 Which of the following attacks would password masking help mitigate? A. Shoulder surfing B. Brute force C. Tailgating D. Impersonation

A

A. Shoulder surfing

37
Q

QUESTION 36 If cookies with non-random sequence numbers are issued upon authentication, which of the following attack types can occur? A. Directory traversal B. Session hijacking C. Cross-site scripting D. SQL injection

A

B. Session hijacking

38
Q

QUESTION 37 Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system? A. CompTIA SY0-301 Exam B. System A and System B both fail closed. C. System A and System B both fail open. D. System A fails closed. System B fails open.

A

A. CompTIA SY0-301 Exam

39
Q

QUESTION 38 An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application’s security posture? A. Baseline reporting B. Protocol analysis C. Threat modeling D. Functional testing

A

A. Baseline reporting

40
Q

QUESTION 39 Which of the following is a strong cryptographic system used by Windows based systems for authentication? A. SSO B. DES C. NTLMv2 D. LANMAN

A

C. NTLMv2 - NT LAN Manager Authentication

41
Q

QUESTION 40 Which of the following algorithms has well documented collisions? (Select TWO). A. AES B. MD5 C. SHA D. SHA-256 E. RSA

A

B. MD5 - Message-Digest Algorithm C. SHA - Secure Hash Algorithm

42
Q

QUESTION 41 Which of the following describes common concerns when implementing IPS? A. Legitimate traffic will be incorrectly blocked B. False negatives will disrupt network throughput C. Incompatibilities with existing routers will result in a DoS D. Security alerts will be minimal until adequate traffic is collected

A

A. Legitimate traffic will be incorrectly blocked

43
Q

QUESTION 42 Which of the following describes an issue encountered when reconstructing a security incident through the examination of security logs collected from multiple servers? A. Proprietary log formats prevent review of security alerts B. Some operating systems do not natively export security logs C. Security logs are often encrypted D. Inconsistent time settings interfere with sequential event analysis

A

D. Inconsistent time settings interfere with sequential event analysis

44
Q

QUESTION 43 When verifying file integrity on a remote system that is bandwidth limited, which of the following tool combinations provides the STRONGEST confidence? A. MD5 and 3DES B. MD5 and SHA-1 C. SHA-256 and RSA D. SHA-256 and AES

A

B. MD5 and SHA-1

45
Q

QUESTION 44 Jane, the security administrator, needs to be able to test malicious code in an environment where it will not harm the rest of the network. Which of the following would allow Jane to perform this kind of testing? A. Local isolated environment B. Networked development environment C. Infrastructure as a Service D. Software as a Service

A

A. Local isolated environment

46
Q

QUESTION 45 A company is sending out a message to all users informing them that all internal messages need to be digitally signed. This is a form of which of the following concepts? A. Availability B. Non-repudiation C. Authorization D. Cryptography

A

B. Non-repudiation

47
Q

QUESTION 46 While performing basic forensic analysis of a hard drive in Sara’s, the security administrator, possession, which of the following should be verified during the analysis? A. Witness statements B. Image hashes C. Chain of custody D. Order of volatility

A

B. Image hashes

48
Q

QUESTION 47 Which of the following are used to implement VPNs? (Select TWO). A. SFTP B. IPSec C. HTTPS D. SNMP E. SSL

A

B. IPSec - Internet Protocol SecurityE. SSL - Secure Sockets Layer

49
Q

QUESTION 48 A company is concerned about physical laptop theft. Which of the following is the LEAST expensive way to prevent this threat? A. Bollards B. Full disk encryption C. Cable locks D. Safes

A

C. Cable locks

50
Q

QUESTION 49 Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? A. Man-in-the-middle B. Bluejacking C. Bluesnarfing D. Packet sniffing

A

B. Bluejacking

51
Q

QUESTION 50 Matt, a security administrator, is receiving reports about several SQL injections and buffer overflows through his company’s website. Which of the following would reduce the amount of these attack types? A. Antivirus B. Anti-spam C. Input validation D. Host based firewalls

A

C. Input validation

52
Q

QUESTION 51 A new server image is being created and Sara, the security administrator, would like a baseline created for the servers. Which of the following needs to be taken into account for the baseline? A. Disabling all unnecessary services B. Enabling all default accounts C. Disabling all accounts D. Enabling all default services

A

A. Disabling all unnecessary services

53
Q

QUESTION 52 Pete, a person who appears to be from a delivery company, is holding a stack of boxes. He requests that the door be held open as he enters the office. Which of following attacks has MOST likely taken place? (Select TWO). A. Impersonation B. Vishing C. Shoulder surfing D. Tailgating E. Whaling

A

A. Impersonation D. Tailgating

54
Q

QUESTION 53 The Chief Information Officer (CIO) is concerned that passwords may be written down and posted in plain sight. Which of the following would BEST mitigate this risk? A. Password expiration policy B. Clean desk policy C. Enforce greater password complexity D. Acceptable use policy

A

B. Clean desk policy

55
Q

QUESTION 54 Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task? (Select TWO). A. Private hash B. Recovery agent C. Public key D. Key escrow E. CRL

A

B. Recovery agent D. Key escrow

56
Q

QUESTION 55 A company is concerned about proprietary information leaving the network via email. Which of the following is the BEST solution to remediate the risk? A. Block port 25 on the network B. Deploy a firewall on the e-mail server C. Filter incoming traffic D. Filter outgoing traffic

A

D. Filter outgoing traffic

57
Q

QUESTION 56 Several departments within a company have a business need to send high volumes of confidential information to customers via email. Which of the following is the BEST solution to mitigate unintentional exposure of confidential information? A. Employ encryption on all outbound emails containing confidential information. B. Employ exact data matching and prevent inbound emails with Data Loss Prevention. C. Employ hashing on all outbound emails containing confidential information. D. Employ exact data matching and encrypt inbound e-mails with Data Loss Prevention.

A

A. Employ encryption on all outbound emails containing confidential information.

58
Q

QUESTION 57 A certificate authority takes which of the following actions in PKI? A. Signs and verifies all infrastructure messages B. Issues and signs all private keys C. Publishes key escrow lists to CRLs D. Issues and signs all root certificates

A

D. Issues and signs all root certificates

59
Q

QUESTION 58 To ensure the security of a PKI, security technicians should regularly update which of the following, by checking with the CA for newer versions? A. CRLs B. Expiration lists C. Preshared keys D. Public keys

A

A. CRLs - Certificate Revocation List

60
Q

QUESTION 59 Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks? A. Malicious code on the local system B. Shoulder surfing C. Brute force certificate cracking D. Distributed dictionary attacks

A

A. Malicious code on the local system

61
Q

QUESTION 60 An administrator is provided two accounts: one with administrative access but not network services, and the other account with other network services but no administrative access. Which of the following describes this scenario? A. Least privilege B. Mandatory access control C. Multifactor authentication D. Separation of duties

A

A. Least privilege