Exam G Flashcards
QUESTION 1 Separation of duties is often implemented between developers and administrators in order to separate which of the following? A. More experienced employees from less experienced employees B. Changes to program code and the ability to deploy to production C. Upper level management users from standard development employees D. The network access layer from the application access layer
B. Changes to program code and the ability to deploy to production
QUESTION 2 Which of the following will require exceptions when considering the use of 802.1x port security? A. Switches B. Printers C. Laptops D. Desktops
B. Printers
QUESTION 3 Which of the following may cause Jane, the security administrator, to seek an ACL work around? A. Zero day exploit B. Dumpster diving C. Virus outbreak D. Tailgating
A. Zero day exploit
QUESTION 4 Which of the following is MOST likely to lead to a breach of security in which Matt, an unauthorized employee, accidently views sensitive data? A. Lack of business continuity plan B. Lack of logging and auditing access to files C. Lack of chain of custody procedure D. Lack of data labeling, handling, and disposal policies
D. Lack of data labeling, handling, and disposal policies
QUESTION 5 A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed? A. The request needs to be sent to the incident management team. B. The request needs to be approved through the incident management process. C. The request needs to be approved through the change management process. D. The request needs to be sent to the change management team.
C. The request needs to be approved through the change management process.
QUESTION 6 Jane, an individual, has recently been calling various financial offices to be another person to gain financial information. Which of the following attacks is being described? A. Phishing B. Tailgating C. Pharming D. Vishing
D. Vishing
QUESTION 7 The security administrator wants each user to individually decrypt a message but allow anybody to encrypt it. Which of the following MUST be implemented to allow this type of authorization? A. Use of CA certificate B. Use of public keys only C. Use of private keys only D. Use of public and private keys
D. Use of public and private keys
QUESTION 8 Jane, a user in the company, is in charge of various financial roles but needs to prepare for an upcoming audit. She uses the same account to access each financial system. Which of the following security controls will MOST likely be implemented within the company? A. Account lockout policy B. Account password enforcement C. Password complexity enabled D. Separation of duties
D. Separation of duties
QUESTION 9 Pete, an employee, is granted access to only areas of a network folder needed to perform his job. Which of the following describes this form of access control? A. Separation of duties B. Time of day restrictions C. Implicit deny D. Least privilege
D. Least privilege
QUESTION 10 A security administrator notices unusual activity from a default account when reviewing system logs and finds the account has been compromised. After investigating the incident, the administrator determines the account can be disabled to prevent any further incidents because the account was not necessary for any job functions. Which of the following could have prevented this incident? A. Enhanced password complexity B. Disabling unnecessary accounts C. Reviewing centralized logs D. Disabling unnecessary services
B. Disabling unnecessary accounts
QUESTION 11 A CRL is comprised of: A. malicious IP addresses B. trusted CA’s. C. untrusted private keys. D. public keys
D. public keys
QUESTION 12 Which of the following can be implemented to prevent Matt, a user, from connecting a hub or switch to a single switch port to access network resources with multiple devices? (Select TWO). A. Subnetting B. NAC C. VLAN D. DMZ E. Port security
B. NAC - Network Access ControlE. Port security
QUESTION 13 Which of the following devices utilizes behavior heuristics to detect or prevent intrusion into network resources? A. NIPS B. VPN concentrators C. NAT router D. Flood guard
A. NIPS - Network-Based Intrusion Prevention System
QUESTION 14 Which of the following may significantly reduce data loss if multiple drives fail at the same time? A. Virtualization B. RAID C. Load balancing D. Server clustering
B. RAID
QUESTION 15 Which of the following would MOST likely belong in the DMZ? (Select TWO). A. Finance servers B. Backup servers C. Web servers D. SMTP gateways E. Laptops
C. Web servers D. SMTP gateways
QUESTION 16 Which of the following protocols would MOST likely be implemented if Pete, a user, wants to transfer files reliably from one location to another? A. SNMP B. SSH C. ICMP D. SFTP
D. SFTP - Secure File Transfer Protocol 115 (SSH)
QUESTION 17 A server containing critical data will cost the company $200/hour if it were to be unavailable due to DoS attacks. The security administrator expects the server to become unavailable for a total of two days next year. Which of the following is true about the ALE? A. The ALE is $48. B. The ALE is $400. C. The ALE is $4,800. D. The ALE is $9,600.
D. The ALE is $9,600.
QUESTION 18 Jane, a user, installs software downloaded from a trusted website. The installed software causes unwanted pop-ups for pharmaceuticals. Which of the following BEST describes the type of threat? A. Trojan B. Backdoor C. Spyware D. Adware
D. Adware
QUESTION 19 Sara, a security administrator, notices a number of ports being scanned on the perimeter firewall. At first the scanning appears random, but after monitoring the logs for 30 minutes, she determines that the whole port range is being scanned and all TCP flags are being turned on. Which of the following BEST describes this type of threat? A. Smurf attack B. X-Mas attack C. Spoofing D. Malicious insider threat
B. X-Mas attack
QUESTION 20 The Chief Information Officer (CIO) receives a call from an individual who states they are from the IT department. The caller wants to know the CIOs ID and password to validate their account as part of a yearly account revalidation process. Which of the following BEST describes this scenario? A. Spam B. Hoax C. Spoofing D. Vishing
D. Vishing
QUESTION 21 To reduce an organization’s risk exposure by verifying compliance with company policy, which of the following should be performed periodically? A. Qualitative analysis B. Quantitative analysis C. Routine audits D. Incident management
C. Routine audits
QUESTION 22 A buffer overflow can result in which of the following attack types? A. DNS poisoning B. Zero-day C. Privilege escalation D. ARP poisoning
C. Privilege escalation
QUESTION 23 Which of the following is an authentication service that uses UDP as a transport medium? A. TACACS+ B. LDAP C. Kerberos D. RADIUS
D. RADIUS - Remote Authentication Dial-In User Service
QUESTION 24 Which of the following is true concerning WEP security? A. WEP keys are transmitted in plain text. B. The WEP key initialization process is flawed. C. The pre-shared WEP keys can be cracked with rainbow tables. D. WEP uses the weak RC4 cipher.
B. The WEP key initialization process is flawed. (Wired Equivalent Privacy)