Practice Exam 2 Flashcards
Which of the following statements about highly structured threats is not true?
Which of the following statements is false regarding BYOD?
Your organization utilizes two different people to perform tasks that are both necessary for the entry into your building. Person 1 checks IDs, enters data in a log, and can issue a visitor badge. Visitor 2 controls the door access, so a failure by either person does not expose your organization. Which of the following is this an example of?
Two-person integrity/control
Which of the following mitigation techniques are the most effective in preventing and minimizing the impact of ransomware data encryption incidents?
Select two.
-Do periodic updates of user training and awareness materials
-Identify network hosts that are not compliant with security baselines
-Do a periodic review of layer 4 network perimeter firewall rules
-Store frequent backups offline
-
What is the term used to describe the characteristic of a software system to process higher workloads on its current resources or on additional resources without interuption?
Continuous monitoring is the term used to describe which of the following?
A recent security audit had a finding of your VPN allowing split tunneling. The auditors preferred to require full tunneling on the VPN. What security risk are the auditors attempting to mitigate?
All of the following are supporting elements of authorization except:
-rights, permissions, and privileges
-principle of least privilege
-separation of duties
-credential validation
Which of the following is guidance for configuring and operating computer systems at a secure level that is documented and understood?
All of the following are characteristics of the RADIUS authentication protocol except:
-RADIUS uses TCP port 1812
-RADIUS uses UDP port 1812
-RADIUS accepts earlier forms of authentication protocols, such as PAP
-RADIUS encrypts user passwords during the authentication process
Data that if disclosed to an unauthorized party would potentially cause harm or disruption to the organization should be labeled as which of the following?
Which of the following terms indicates the amount of time it takes for a hardware component to recover from failure?
What is a script kiddie?
Your office does not deal in classified or even sensitive data. You are concerned, however, with the loss of equipment, as you have had a few external drive and tablets stolen in the last 12 months. Which of the following would be most appropriate for your environment, keeping in mind that you want a low-cost solution?
What network attack method involves the attacker sending messages to corrupt the ARP table and cause packets to be misrouted?
Which tool would you use to discover hosts and services on a network?
You are browsing a social media platform and notice question-game posts asking which car you drove to pass a driver’s test. Which term best describes these types of posts?
Which tool would you use to manipulate network interfaces on a workstation?
After recent phishing attacks through email, you decide to implement a solution internally where employees can be assured of the authenticity of messages from other employees. Which email feature should you implement?
Which of the following is the best description of impact?
In discussions of threat hunting, what does the acronym IOA mean?
Which of the following protocols would you use to encrypt VPN traffic?
Which of the following is not an element of mobile device management?
What is the primary difference between authorized and semi-authorized hackers?