Practice Questions 1-12 Flashcards

1
Q
Homer needs to send an email to his supervisor with an attachment that includes proprietary data. He wants to maintain the confidentiality of this data. Which of the following choices is BEST choice to meet his needs?
A. Digital signature
B. Encryption 
C. Steganography 
D. Hashing
A

Encryption because it is the most effective for confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
You are the security administrator in your organization. You want to ensure that a file maintains integrity. Which is the BEST solution to meet your goal?
A. Steganography
B. Encryption 
C. Hash
D. AES
A

Hash because it provides integrity for files, emails, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What of the following accurately identifies primary security controls?
A. Roel based and discretionary 
B Technical and administrative 
C. Confidentiality and availability 
D. Encryption and hashing
A

Technical (implemented by technical means) and administrative (implemented via administrative or management methods) are classified as security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
You recently started a new job in information technology security. Your primary responsibilities are to monitor security logs, analyze trend reports, and install CCTV systems. Which is the BEST TWO choices that identifies  your responsibilities?
A. Hardening systems
B. Detecting security incidents 
C. Preventing incidents 
D. Implementing monitoring controls
A

Detecting security incidents is the goal for detective controls.
Implementing monitoring controls. Ex. installing CCTV systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security expert is identifying and implementing several different physical deterrent controls to protect an organization’s server room. Which us the Best choice to meet the objective?
A. Using hardware locks
B. Utilizing data encryption
C. Performing a vulnerability assessment
D. Training users

A

Using hardware locks is physical security control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
An organization is implementing a feature that allows multiple servers to operate on a single physical server. Which feature is being implemented?
A. Virtualization 
B. IaaS
C. Cloud computing 
D. DLP
A

Virtualization allows multiple servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lisa is using a Linux computer to monitor network traffic. She connected the computer to the mirror port of a switch and started the logging software. However, she found that the only traffic being collected is traffic to or from the Linux computer. She wants to collect all the traffic going through the switch. Which action should she take?
A. Run the command ipconfig etho promise.
B . Run the command ifconfig etho promise.
C. Reconfigure the switch
D. Connect the computer to a router.

A

Run the command ifconfig etho promise to enable the promiscuous mode in NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Management has updated the security policy and it has changed the requirements for the password policy. The password policy needs to ensure that users change their passwords regularly and they cannot resuse their passwords. Which three following settings needs to be configured?
A. Maximum password age
B. Password length 
C. Password history
D. Password complexity 
E. Minimum password age
A

Maximum password age ensures that users change their password regularly .

Password history records at least 24 previously used passwords and prevents users from using the same password

Minimum password age prevents users from changing their password repeatedly to go back to their original password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Your organization has implemented a system that stores users credentials in a central database. Users log on once with their credentials. They can then access other systems in the organization without logging on again. Which best describes this?
A. Federation
B. SAML
C. Single sign on
D. Biometrics
A

A single sign on is a solution to where the users only has to sign on once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
You are modifying a configuration file used to authenticate Linux accounts against an external server. The file includes phrases such as DC+ Server1 and DC= Com. Which authentication service is the external server MOST likely using?
A. Authentication
B. RADIUS 
C. LDAP
SAML
A

LDAP uses X. 500 based on phrases to identify components such as the domain component =DC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A network includes q ticket granting ticket server. Which is the primary purpose of this server? 
A. Authentication
B. Identification 
C. Authorization
D. Access control
A

Kerberos uses a ticket granting ticket server for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your organization has a strict policy requiring administrators to disable users accounts during the exit interview. This provides several security benefits. Which choice BEST identifies a security benefit of this practice?
A. Ensures that user security keys are retained
B. Ensures that user files are retained
C. Ensure that the account can be enabled again if the employee returns.
D. Ensures that users cannot log on remotely.

A

Ensures that users security keys (cryptographic keys) are retained can encrypt and decrypt files and if the keys are deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly