Practice Questions 25-36 Flashcards

1
Q

Lenny noticed a significant number of logon failures for administrators accounts on the organization’s public web site. After investigating it further, he noticed that most of these attempts are IP addresses assigned to foreign countries. He wants to implement a solution that will detect and prevent similar attacks. Which is the BEST choice?
A. Add a flood guard to the network
B. Block all traffic from foreign countries.
C. Implement IPS
D. Disable the administrator accounts.

A

IPS can detect, react and prevent attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
You are assisting a small business owner in setting up a public wireless hot spot for her customers. Which actions is MOST appropriate for his hot spot
A. Using Open mode
B. Enabling MAC filtering 
C. Disabling SSID broadcast 
D. Installing directional antennas
A

Open mode is the best choice because it is used with WEP and doesn’t require users to enter a pre-shared key or passphrase and doesn’t require the owner to give out information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Jasper is setting up an 802.11ac network at the Retirement Castle. He wants to provide the highest level of security. Which is the BEST to meet his needs?
A. WPA2 with AES
B. WPA2 with TKIP
C. WPS with SSL
D. WPA2 with MDS
A

WPA2 with AES ( Advanced Encryption Standard) is the best choice to secure 802.11 wireless network because it uses CCMP, Counter Mode with Cipher Block required by the WIFI alliance to meet WiFI certified logo.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
You are planning a wireless network for a business. A core requirement is to ensure that solution encrypts users credentials when users enter their usernames and passwords. Which BEST meets this requirement?
A. WPA2-PSK
B. WPA2 using CCMP
C. WPS with EAP-FAST
D. WPA2 with EAP-TTLS
A

WPA2 with EAP-TTLS encrypts users credentials when users enter their usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
An attacker can access email contact list on your smartphone. What type of attack is this?
A. Bluesnarfing
B. Bluejacking
C. Captive Portal 
D. WPS
A

Bluesnarfing is an attack that allows attackers to access data like email contact list on a smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
An organization is hosting a VPN. Management wants to ensure that all VPN clients are using up to date operating systems and antivirus software. Which would be BEST to meet this need?
A. NAT
B.NAC
C. VLAN 
D. DMZ
A

NAC technologies can inspect VPN clients for health status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator needs to update the operating system on switches used within the network. Assuming the organization is following standard best practices, what should the admin do first?
A. Submit a request using the baseline configuration process
B. Submit a request using the incident management process.
C. Submit a request using the change management process.
D. Submit a request using the application patch management process.

A

The network administrator should submit a request using the change of management process which is the same process that is typically used for changes to any devices or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What functions does HSM include?
A. Reduces the risk of the employees emailing confidential information outside the organization
B.Provides webmail to clients
C. Provides full drive encryption
D. Generates and stores keys used with servers

A

HSM is a removable device that can generate and store RSA keys used with servers for data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The Shelbyville Nuclear Power Plant stores some data in the cloud using its own resources. The Springfield school system also has a cloud using its own resources. Later, the two organizations decide to share some of the educational data in both clouds. Which BEST describes the cloud created by the organization?
A. Community
B. Private
C. Public
D. PaaS
A

They created a community cloud because they have a common goal of sharing educational materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Ziffcorp is planning to eliminate it current BYOD policy and instead implement a COPE deployment model. You're asked to provide input for the new policy. Which concepts are appropriate for this policy?
A. Encryption on employee-owned devices
B. HSM
C. ISA
D. Remote wipe
A

Remote wipe sends a remote signal to the device to wipe or erase all the data and is appropriate for a corporate-owned personally enabled (COPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Your organization is planning  to implement a CYOD policy. Which of the following controls will help protect data by isolating it?
A.  Encrypt sensitive data 
B. Storage segmentation 
C. Full device encryption
D. Rooting
A

Storage segmentation protects company data on mobile devices owned by users and allowed under a choose your own device (CYOD) policy. It isolates data in secure area of a users device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Bart recently launched an attack in a company webs site using scripts he found on the Internet. Which is the BEST describes Bart as a threat actor?
A. Insider
B. Hacktivist
C. Script kiddie
D. Nation-state
A

Bart is acting as a script kiddie because he is using existing scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly