Exam F Flashcards
QUESTION 1 Pete’s corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent? A. Collusion B. Impersonation C. Pharming D. Transitive Access
B. Impersonation
QUESTION 2 Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address? A. Interference B. Man-in-the-middle C. ARP poisoning D. Rogue access point
D. Rogue access point
QUESTION 3 Jane, the security administrator, is having issues with unauthorized users connecting to the wireless network. For administrative reasons, she cannot implement any wireless encryption methods. Which of the following can she implement to prevent unauthorized users from connecting to the network? A. NIPS B. Disable unused ports C. MAC filtering D. WEP
C. MAC filtering
QUESTION 4 Matt, the security administrator, wants to secure the wireless network. Which of the following encryption methods offers the MOST security? A. WPA2 ENT AESB. WPA2 PSK AESC. WPA2 ENT TKIPD. WPA2 PSK TKIP
A. WPA2 ENT AES - Wireless Protected Access 2 Enteprise/ Advanced Encryption Standard
QUESTION 5 Sara, the IT administrator, wants to control which devices can connect to the wireless network. Which of the following can she implement to accomplish this task? A. WPA2 Enterprise with AES encryption B. Decrease the WAP’s power levels C. Static IP addressing D. MAC address filtering
D. MAC address filtering
QUESTION 6 When a new network drop was installed, the cable was run across several fluorescent lights. The users of the new network drop experience intermittent connectivity. Which of the following environmental controls was MOST likely overlooked during installation? A. Humidity sensors B. EMI shielding C. Channel interference D. Cable kinking
B. EMI shielding
QUESTION 7 Pete, the Chief Security Officer, wishes to institute annual security policy training for all users. The training’s purpose is to educate users about access to sensitive data. Which of the following should be included in the training? A. Revalidation of user account privileges. B. Review of guidelines for network stored data permissions. C. Implementation of new password procedures. D. Installation of disk-based encryption to protect data.
C. Implementation of new password procedures.
QUESTION 8 Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT A. Buffer overflow prevention B. Input validation C. CSRF prevention D. Cross-site scripting prevention
B. Input validation
QUESTION 9 Which of the following can BEST be implemented on a mobile phone to help prevent any sensitive data from being recovered if the phone is lost? A. Voice encryption B. Screen locks C. Device encryption D. GPS tracking
C. Device encryption
QUESTION 10 Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss? A. Record time offset B. Clean desk policy C. Cloud computing D. Routine log review
B. Clean desk policy
QUESTION 11 If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing? A. Transitive trust B. Public key trust C. Certificate authority trust D. Domain level trust
A. Transitive trust
QUESTION 12 Which of the following is BEST associated with PKI? A. Private key B. Block ciphers C. Stream ciphers D. NTLMv2
A. Private key
QUESTION 13 While traveling Matt, an employee, decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet, Matt agrees to share portions of his hard drive. This scenario describes one of the threats involved in which of the following technologies? A. Social networking B. ALE C. Cloud computing D. P2P
D. P2P - Peer-to-peer
QUESTION 14 Which of the following is an attack where Pete spreads USB thumb drives throughout a bank’s parking lot in order to have malware installed on the banking systems? A. Tailgating B. Replay attack C. Virus D. Social engineering
D. Social engineering
QUESTION 15 Pete, the system administrator, has blocked users from accessing social media web sites. In addition to protecting company information from being accidentally leaked, which additional security benefit does this provide? A. No competition with the company’s official social presence B. Protection against malware introduced by banner ads C. Increased user productivity based upon fewer distractions D. Elimination of risks caused by unauthorized P2P file sharing
B. Protection against malware introduced by banner ads
QUESTION 16 Jane, the administrator of a small company, wishes to track people who access the secured server room, which is secured only by a simple hardware key lock. Jane does not have much of a budget or the approval to make significant construction changes. Given the limitations, which of the following can she do in the meantime? A. Implement an access log and a security guard B. Install a 24/7 closed-circuit camera system C. Install a separate hardware lock with limited keys D. Implement a cipher key lock
D. Implement a cipher key lock
QUESTION 17 An administrator with a small company has begun to implement a backup strategy of the company’s critical financial data. Which of the following is the MOST secure place to store the back-ups? A. Near the data servers, for ease of restoration B. Next to where the physical records (e.g. paper) are stored C. At a remote off-site location D. With the financial department
C. At a remote off-site location
QUESTION 18 In an enterprise environment, which of the following would be the BEST way to prevent users from accessing inappropriate websites when AUP requirements are constantly changing? A. Deploy a network proxy server. B. Configure Internet content filters on each workstation. C. Deploy a NIDS. D. Deploy a HIPS.
A. Deploy a network proxy server.
QUESTION 19 Broadcast traffic is having a negative impact on network performance. Which of the following might help minimize this issue? A. Use NAT to hide the IPs of each of the workstations. B. Separate the network onto a number of different switches. C. Separate the network into a number of different VLANs. D. Route all the unicast traffic through the proxy server.
C. Separate the network into a number of different VLANs.
QUESTION 20 A new wireless router has been compromised, blocking all of the company computers from using the router. Which of the following is the MOST likely cause for this issue? A. There was a backdoor account on the router. B. The default password on the router was not changed. C. The attacker discovered the WEP key of the router. D. The attacker had gone dumpster diving to find the router’s credentials.
B. The default password on the router was not changed.
QUESTION 21 A company wants to maintain a backup site, and is more concerned about site maintenance cost rather than high availability following a disaster. Which of the following is the BEST solution? A. Cold site B. Remote site C. Hot site D. Warm site
A. Cold site
QUESTION 22 Which of the following would be the MOST likely reason to use a cluster of host servers to support load balancing? A. Confidentiality by distributing traffic across multiple host servers B. Enhance security by obscuring the physical host of the guest server C. Availability by distributing connections across multiple servers D. Integrity by separating traffic across multiple guest servers
C. Availability by distributing connections across multiple servers
QUESTION 23 Which of the following controls is considered to be the MOST effective type of physical security? A. Access lists B. Cipher lock C. Chain link fence D. Mantrap
D. Mantrap
QUESTION 24 An administrator notices that former temporary employees’ accounts are still active on a domain. Which of the following can be implemented to increase security and prevent this from happening? A. Implement a password expiration policy. B. Implement an account expiration date for permanent employees. C. Implement time of day restrictions for all temporary employees. D. Run a last logon script to look for inactive accounts.
D. Run a last logon script to look for inactive accounts.