Practice Questions 85-96 Flashcards

1
Q
When you log on to your online bank account, you were are also able to access a partner's credit card site, check-ordering services , and mortgage site without entering your credentials again. Which does this describe?
A. SSO 
B. Same sign-on
C. SAML
D. Kerberos
A

Single sign on capabilities because you can log on once and access all the respires without entering your credentials again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Your network uses an authentication service based on the X.SOO specification. When encrypted, it uses TLS. Which authentication service is your network using?
A. SAML
B. Diameter
C. Kerberos
D. LDAP
A

Lightweight Directory Access Protocol (LDAP) uses X.500- based phrases to identify components and Secure LDAP can be encrypted with Transport Layer Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You’re asked to identify who is accessing a spreadsheet containing employee salary data. Detailed logging is configured correctly on this file. However, you are unable to identify a specific person who is accessing the file. Which is the MOST likely reason?
A. shared accounts are not prohibited
B. Guest accounts are disabled
C. Permissions for the file were assigned to a group
D. Account lockout has been enabled

A

Shared accounts are not prohibited, allowing multiple users to access the same file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Interns from a local college frequently work at your company. Some interns work with the database developers, some interns work with the web applicator developers and some inters work with both developers . Interns working with the database require different privileges. Which is the simplest method to meet these requirements ?
A. Use generic accounts
B. Create user based privileges
C. Use group based privileges
D. Grant the interns access to the Guest accounts.

A

Using group based privileges because you cab create a DB_ Group and a Web_Group and assign appropriate privileges to the groups and add intern accounts to the group based not their assignments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are configuring a file server used to share files and folders among employees within your organization. However, employees should not be able to access all folders on this server. Which choice is the BEST method to manage security for these folders?
A. Assign permissions to each user needed
B. Wait to users to request permission and then assign the appropriate permissions
C. Delegate authority to assign these permissions
D. Use security groups with appropriate permissions

A

You can create security groups place users into these groups and grant access to the folders by assigning appropriate permissions to the security groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Retirement Castle uses groups for ease of administration and management. They recently hired Jasper as their accountant. Jasper needs access to all the files and folders used by the Accounting department. Which should the administrator do to give Jasper appropriate access?
A. Create an account for Jasper and add the account to the Accounting group
B. Give Jasper the password for the Guest account
C. Create an account for Jasper and use rule-based for accounting.
D. Create an account for Jasper and add the account to the Administrators group

A

Create an account for Jasper and add it to the Accounting group because the organization uses group it makes sense that they have an Accounting group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
You need to send several large files containing proprietary data to a business partner. What is the BEST choice for this task?
A. FTP
B. SNMPv3
C. SFTP
D. SRTP
A

SFTP is the best choice because FTP is the best choice to send large files if they don’t contain sensitive data. The files contain proprietary data so they should be encrypted and SFT{ encrypts the using SSH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Your organization is planning to establish a secure link between one of your mail servers and a business partner's mail server. The connection will use the Internet. Which protocol is the BEST choice?
A. TLS 
B. SMTP
C. HTTP
D. SSH
A

Transport Layer Security (TLS) is a good choice to create a secure connection between two systems over the Internet. SMTP by itself will not create a secure link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bart is adding a DMZ into his organization’s network. Which is the BEST description of why he would do so?
A. To increase security for servers accessed from public networks
B To provide a secure physical location for networking equipment
C. To lure attackers to a fake server or foe network
D. To cache data retrieved from a web server

A

Demilitarized zone (DMZ) us a logical buffer zone for servers accessed by public networks such as the Internet and it provides a layer of security for servers in the DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Your organization wants to prevent employees from accessing file sharing web sites. Which choice will meet this need?
A. Content inspection
B. Malware inspection 
C. URL filter 
D. Web application firewall
A

A URL filter blocks access to specific web sites based on the URLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Your organization hosts serval web servers in a web farm. they have recently been attacked, resulting in unacceptable downtime. Management wants to implement a solution that will provide protection for the web farm and include load balancing to improve the overall performance of the web farm. Which will BEST meet this need?
A. Stateless firewall
B. Stateful firewall
C. Web application firewall
D. Cos-Based firewall
A

A web application firewall (WAF) is the best choice, because you can it in the DMZ and the web farm servers in the internal network, WAF also provides load balancing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Management suspects that employees have been sending proprietary data out of the network via email. They want t implement a solution that will detect and block similar incidents in the future. Which is the BEST choice to meet this need?
A. Mail gateway
B. UTM appliance 
C. Forward proxy 
D. Reverse proxy
A

A mail gateway is placed between an email server and the Internet and mail gateways typically include data loss prevention (DLP) capabilities. They can inspect the contents outgoing traffic looking for key works and block any traffic containing proprietary data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly