Exam I Flashcards
QUESTION 1Which of the following pseudo codes can be used to handle program exceptions?A. If program detects another instance of itself, then kill program instance.B. If user enters invalid input, then restart program.C. If program module crashes, then restart program module.D. If user’s input exceeds buffer length, then truncate the input.
C. If program module crashes, then restart program module.
QUESTION 2Jane, an administrator, hears reports of circles being drawn in the parking lot. Because the symbols fall within range of the company’s wireless AP, the MOST likely concern is:A. that someone has used war chalking to help others access the company’s network.B. that the symbols indicate the presence of an evil twin of a legitimate APC. that someone is planning to install an AP where the symbols are, to cause interferenceD. that a rogue access point has been installed within range of the symbols.
A. that someone has used war chalking to help others access the company’s network.
QUESTION 3Enforcing data encryption of removable media ensures that the:A. lost media cannot easily be compromised.B. media can be identified.C. location of the media is known at all times.D. identification of the user is non-repudiated.
A. lost media cannot easily be compromised.
QUESTION 4When employees that use certificates leave the company they should be added to which of the following?A. PKIB. CAC. CRLD. TKIP
C. CRL - Certificate Revocation List
QUESTION 5Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?A. Incident managementB. Server clusteringC. Change managementD. Forensic analysis
C. Change management
QUESTION 6Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?A. RAIDB. ClusteringC. RedundancyD. Virtualization
B. Clustering
QUESTION 7Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?A. Identify user habitsB. Disconnect system from networkC. Capture system imageD. Interview witnesses
C. Capture system image
QUESTION 8Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?A. Implement WPAB. Disable SSIDC. Adjust antenna placementD. Implement WEP
A. Implement WPA Wireless Protected Access
QUESTION 10Which of the following application attacks is used to gain access to SEH?A. Cookie stealingB. Buffer overflowC. Directory traversalD. XML injection
B. Buffer overflow
SEH - structured exception handler
QUESTION 9Which of the following incident response procedures BEST allows Sara, the security technician, to identify who had possession of a hard drive prior to forensics analysis?A. Chain of custodyB. Tracking man hoursC. WitnessesD. Capturing system images
A. Chain of custody
QUESTION 11Jane, a security technician, has been tasked with preventing contractor staff from logging into the company network after business hours. Which of the following BEST allows her to accomplish this?A. Time of day restrictionsB. Access control listC. Personal identity verificationD. Mandatory vacations
A. Time of day restrictions
QUESTION 12Which of the following can be implemented on a lost mobile device to help recover it?A. Remote sanitizationB. GPS trackingC. Voice encryptionD. Patch management
B. GPS tracking
QUESTION 13Jane, a security analyst, wants to ensure that data is being stored encrypted, in the event that a corporate laptop is stolen. Which of the following encryption types will accomplish her goal?A. IPSecB. Secure socket layerC. Whole diskD. Transport layer security
C. Whole disk
QUESTION 14Sara, the Chief Executive Officer (CEO) of a corporation, wishes to receive her corporate email and file attachments on her corporate mobile computing device. If the device is lost or stolen, the BEST security measure to ensure that sensitive information is not comprised would beA. to immediately file a police report and insurance reportB. the ability to remotely wipe the device to remove the dataC. to immediately issue a replacement device and restore data from the last backupD. to turn on remote GPS tracking to find the device and track its movements
B. the ability to remotely wipe the device to remove the data
QUESTION 15Which of the following protocols allows for secure transfer of files? (Select TWO).A. ICMPB. SNMPC. SFTPD. SCPE. TFTP
C. SFTP - Secure File Transfer Protocol - 115D. SCP - Secure Copy Protocol 22
QUESTION 16Users at a corporation are unable to login using the directory access server at certain times of the day. Which of the following concepts BEST describes this lack of access?A. Mandatory access controlB. Least privilegeC. Time of day restrictionsD. Discretionary access control
C. Time of day restrictions
QUESTION 17During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).A. 21B. 22C. 23D. 69E. 3389F. SSHG. Terminal servicesH. RloginI. RsyncJ. Telnet
B. 22 - SSHC. 23 - TELNETF. SSHJ. Telnet
QUESTION 18Matt, an IT security technician, needs to create a way to recover lost or stolen company devices. Which of the following BEST meets this need?A. Locking cabinetsB. GPS trackingC. SafeD. Firewalls
B. GPS tracking
QUESTION 19Which of the following is the MOST specific plan for various problems that can arise within a system?A. Business Continuity PlanB. Continuity of Operation PlanC. Disaster Recovery PlanD. IT Contingency Plan
D. IT Contingency Plan
QUESTION 20Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?A. Sign in and sign out logsB. MantrapC. Video surveillanceD. HVAC
B. Mantrap
QUESTION 21Which of the following fire suppression systems is MOST likely used in a datacenter?A. FM-200B. Dry-pipeC. Wet-pipeD. Vacuum
A. FM-200 Fire Suppression Agent
QUESTION 22A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?A. LDAPB. RADIUSC. KerberosD. XTACACS
C. Kerberos (88)