failed questions Flashcards

1
Q

s the network admin of a large trucking company, network troubleshooting has become a main stay of your job responsibilities. During the process of troubleshooting a problem or condition on the network that needs to be identified and rectified your selection of the correct tool becomes very important to identify the problem. Which networking tool can identify problems with the DNS and query specific DNS servers to verify it’s functionality?

A

Nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following determines the correct response to PTI incident?

Privacy impact assessment
Privacy threshold assessment
RPO

A

Privacy impact assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following identifies system that process private information?
Privacy impact assessment
Privacy threshold assessment
RPO

A

Privacy threshold assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the amount of time that can elapse after a failure before system returns to normal?

Privacy impact assessment
Privacy threshold assessment
RPO

A

RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ted is a network tech in your company and has shared his testing results with you to highlight his results. Which network tool is shown in the exhibit?

A

Microsoft Network Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two are technologies that have intrinsic security weaknesses?

A

Operating systems

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When allowing BYOD in your office, you want to ensure mandatory manufacturer specific code signing on all mobile devices in the environment. Which mobile OS does NOT require this capability?

A

Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is true about voice encryption on mobile phones?

A

Encrypted transmissions work by adding cryptography to digitized conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The acronym HTTPS identifies which of the choices listed below?

A

Correct answer: Hypertext Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Active FTP is a considerable security risk because it allows which type of connections?

A

inbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are working with a networking manager at a client’s firm, and during a planning meeting with the client, the issue of virtual machine point-in-time snapshots comes up. You recommend careful use of snapshots because of the security ramifications. Your concern involves which of the following?

A

Invoked snapshots will have fewer patch updates than the currently running virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which class represents the recommended fire suppression method for an electrical fire?

A

Class C (argon)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following protocols does not send credentials over the network and requires that both parties have a shared secret to compute the hash?

A

MS-CHAPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The financial institution you work for is experiencing small continued losses that were identified by the auditors as internal. Which countermeasure would you first take to stop the loss without arousing suspicion?

A

least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Bonanza Mining Corporation (BMC) has 26,640 hard drive units. On average they were run for 873 hours each and they experienced 21 failures, what is the MTBF for BMC? Round up your result to the nearest hour.

A

1,107,463

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What provides secure access to corporate data in accordance with management policies?

A

technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Instant Messaging programs have very serious security issues. Name them (3)

A

The communications are not encrypted.
They can provide access to sensitive or confidential data.
It is possible to transmit files that contain viruses and Trojan horses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

n cryptography, when subtle input changes make a radical change in the output, this is referred to as which of the following?

A

diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which term most accurately describes smartcards?

A

low power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which is the protocol used by browsers to obtain the revocation status of a digital certificate attached to a website?

A

OCSP

21
Q

One of your users, Christine, reports that when she visits web sites, pop-up advertisements appear incessantly. After further investigation, you learn that one of the web sites she had visited had infected Flash code. Christine asks what the problem was. What do you tell her caused the problem?

A

Adware

22
Q

Employees with company laptops are given a cable lock and told to lock down their laptops when stepping away from the device while out of the office. To which class of security control does this apply?

A

Preventative

23
Q

four steps in a secure deployment environment into the correct order.

A

Dev, test, Staging, Prod

24
Q

A Birthday attack is an example of which type of attack

A

Brute force attack

25
Q

You have been tasked with gathering information on a company by sending what looks like normal Internet traffic. Your reconnaissance can involve browsing the DNS requests and records for publicly available content only. Which form of penetration testing are you being asked to conduct?

A

Semi-passive information gathering

26
Q

A piece of malware replaces a library of running code within the addresses space of a program, forcing it to load a library. Which of the following vulnerabilities describes this type of security issue?

A

DLL injection

27
Q

What is the maximum transmission rate supported by the 802.11a standard?

A

54 mbps

28
Q

Which of the following security measures would be in place on a mobile device that would cause a user to be locked out when a set number of failed attempts to logon were attempted?

A

Screen Lock

29
Q

Using the FTP PORT command in an attack is referred to as which of the attack types listed below?

A

Bounce Attack

30
Q

The majority of online transactions today use which authentication method?

A

Simple Passwords

31
Q

Which choice below best describes the networking technology that enables one network to send its data over another network’s connections?

A

Tunneling

32
Q

A client has hired you to implement some network security solutions that were recommended in the results of a network security audit. All clients connecting to the network must have a host-based firewall enabled and must have an up-to-date anti-virus solution installed. Which of the following will you implement to meet the concerns of the security audit and management?

A

NAC

33
Q

Your company has a mission critical server that data can be recovered from in the event of two hard disk failures. What RAID level should you implement on this server?

A

RAID 6

34
Q

Which door lock type is considered most secure?

A

Biometric lock

35
Q

Which network authentication protocol performs authentication of a user to a network entity?

A

CHAP

36
Q

Which LDAP operation will discontinue an operation that is in progress?

A

Abandon

37
Q

Where does the RADIUS client/server architecture store its security information?

A

In a single, central database.

38
Q

Which IEEE standard provides the highest degree of port security by using switch/port authentication, disabling the port completely if a device does not authenticate?

A

802.1x

39
Q

The specification for the behavior of ports providing remote access using SNMP is controlled by which IEEE specification?

A

802.1x

40
Q

ou have been requested to modify the Accounting Group policy to permit secure file transfers. You have made the changes and now want to be sure the policy gets updated. At the Command Prompt, what command would you type to execute this?

A

gpupdate

41
Q

Of the choices provided, which authentication method provides access based on transferring the username and password being exchanged and compared against an encrypted password file on the access server? If the password sent across the network is a match the associated UserID the connection is established. Since the password exchange can be intercepted the method is not considered to be secure.

A

pap

42
Q

RADIUS provides a system of distributed security for networks and network services. The primary use is to facilitate which type of connection shown below?

A

Remote

43
Q

As the network admin in charge of endpoint protection, you have noticed a spike in incidents involving removable media, specifically USB drives, and are concerned about future events that may occur. You are preparing a document to cover how occurrences can be prevented and how future responses can be improved. What type of document are you preparing?

A

After action report

44
Q

Which block cipher mode uses a pseudo-random-number generator for results in reasonable unpredictable values?

A

CTM

45
Q

Which wireless authentication protocol does not use PKI certificates and sends usernames in plain text?

A

LEAP

46
Q

In order to create your own PGP certificate, you must request and be issued specific documentation from a certification authority. Which choice below correctly identifies this documentation?

A

X.509 certificate

47
Q

While setting up your company’s e-commerce web server, you must protect multiple different domains, what type of certificate could you choose to use?

A

SAN certificate

48
Q

The day before a major downturn in stock prices, Ellen purchased 100 shares of Y. Z. company stock on behalf of Chester, based on an email she’d received from him. Chester now refutes the transaction, stating that he never ordered the shares. What could they have used to verify their identities to each other?

A

A certification authority

49
Q

Steganography is the process of hiding messages in digital media. What is the most common way these messages are encoded?

A

Least significant bit