Practice Questions 1-12 Flashcards
Homer needs to send an email to his supervisor with an attachment that includes proprietary data. He wants to maintain the confidentiality of this data. Which of the following choices is BEST choice to meet his needs? A. Digital signature B. Encryption C. Steganography D. Hashing
Encryption because it is the most effective for confidentiality.
You are the security administrator in your organization. You want to ensure that a file maintains integrity. Which is the BEST solution to meet your goal? A. Steganography B. Encryption C. Hash D. AES
Hash because it provides integrity for files, emails, etc
What of the following accurately identifies primary security controls? A. Roel based and discretionary B Technical and administrative C. Confidentiality and availability D. Encryption and hashing
Technical (implemented by technical means) and administrative (implemented via administrative or management methods) are classified as security controls.
You recently started a new job in information technology security. Your primary responsibilities are to monitor security logs, analyze trend reports, and install CCTV systems. Which is the BEST TWO choices that identifies your responsibilities? A. Hardening systems B. Detecting security incidents C. Preventing incidents D. Implementing monitoring controls
Detecting security incidents is the goal for detective controls.
Implementing monitoring controls. Ex. installing CCTV systems
A security expert is identifying and implementing several different physical deterrent controls to protect an organization’s server room. Which us the Best choice to meet the objective?
A. Using hardware locks
B. Utilizing data encryption
C. Performing a vulnerability assessment
D. Training users
Using hardware locks is physical security control.
An organization is implementing a feature that allows multiple servers to operate on a single physical server. Which feature is being implemented? A. Virtualization B. IaaS C. Cloud computing D. DLP
Virtualization allows multiple servers.
Lisa is using a Linux computer to monitor network traffic. She connected the computer to the mirror port of a switch and started the logging software. However, she found that the only traffic being collected is traffic to or from the Linux computer. She wants to collect all the traffic going through the switch. Which action should she take?
A. Run the command ipconfig etho promise.
B . Run the command ifconfig etho promise.
C. Reconfigure the switch
D. Connect the computer to a router.
Run the command ifconfig etho promise to enable the promiscuous mode in NIC
Management has updated the security policy and it has changed the requirements for the password policy. The password policy needs to ensure that users change their passwords regularly and they cannot resuse their passwords. Which three following settings needs to be configured? A. Maximum password age B. Password length C. Password history D. Password complexity E. Minimum password age
Maximum password age ensures that users change their password regularly .
Password history records at least 24 previously used passwords and prevents users from using the same password
Minimum password age prevents users from changing their password repeatedly to go back to their original password.
Your organization has implemented a system that stores users credentials in a central database. Users log on once with their credentials. They can then access other systems in the organization without logging on again. Which best describes this? A. Federation B. SAML C. Single sign on D. Biometrics
A single sign on is a solution to where the users only has to sign on once.
You are modifying a configuration file used to authenticate Linux accounts against an external server. The file includes phrases such as DC+ Server1 and DC= Com. Which authentication service is the external server MOST likely using? A. Authentication B. RADIUS C. LDAP SAML
LDAP uses X. 500 based on phrases to identify components such as the domain component =DC
A network includes q ticket granting ticket server. Which is the primary purpose of this server? A. Authentication B. Identification C. Authorization D. Access control
Kerberos uses a ticket granting ticket server for authentication.
Your organization has a strict policy requiring administrators to disable users accounts during the exit interview. This provides several security benefits. Which choice BEST identifies a security benefit of this practice?
A. Ensures that user security keys are retained
B. Ensures that user files are retained
C. Ensure that the account can be enabled again if the employee returns.
D. Ensures that users cannot log on remotely.
Ensures that users security keys (cryptographic keys) are retained can encrypt and decrypt files and if the keys are deleted.