Practice Test 10 Flashcards
Which of the following authentication protocols transmits passwords over the network in an unencrypted form and is therefore considered unsecure?
RADIUS
PAP
TACACS+
CHAP
PAP
FTP, HTTP, IMAP4, LDAP, POP3, SNMPv1, SNMPv2, and Telnet are all examples of network protocols that send data in clear text.
True
False
True
A security solution designed to detect anomalies in the log and event data collected from multiple network devices is known as:
HIDS
PCAP
HIPS
SIEM
SIEM
security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.
Which of the following security measures would be of help in troubleshooting user permission issues? (Select 2 answers)
Password complexity Principle of least privilege Password history Permissions auditing and review Multifactor authentication
Principle of least privilege
Permissions auditing and review
“The term ““Segmentation fault”” refers to: (Select 2 answers)”
Error handling technique Access violation Zero-day vulnerability Memory management Input validation technique
Access violation
Memory management
Which of the tools listed below can be used troubleshooting certificate issues? (Select 2 answers)
CIRT CRC OCSP CRL OSPF
OCSP
CRL
The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate. It is described in RFC 6960 and is on the Internet standards track.
A Certificate Revocation List (CRL) is a list of certificate serial numbers which have been revoked, are no longer valid, and should not be relied upon by any system user.
A software or hardware-based security solution designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network (data exfiltration) is known as:
DEP
RADIUS
DLP
PGP
DLP
Data loss prevention(DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.
The importance of changing default user names and passwords can be illustrated on the example of certain network devices (such as for example routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.
True
False
True
Which of the following answers list(s) example(s) of weak security configuration(s)? (Select all that apply)
DES WPA2 SHA-1 WEP SHA-512 WPS
DES
SHA-1
WEP
WPS
A set of rules enforced in a network that restricts the use to which the network may be put is known as:
SLA
AUP
MOU
SOW
AUP
Anacceptable use policy(AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign anacceptable use policybefore being granted a network ID.
Which of the security measures listed below would be effective against the malicious insider threat? (Select 3 answers)
DLP system Principle of least privilege Time-of-day restrictions Strong authentication Usage auditing and review
DLP system
Principle of least privilege
Usage auditing and review
What is the best countermeasure against social engineering?
Strong authentication
Permission auditing and review
User awareness training
Password complexity requirement
User awareness training
What are the drawbacks of running an unauthorized software in a corporate environment?
Potential malware propagation problem
Inadequate support from the in-house IT department
Violation of software licensing agreements
All of the above
All of the above
Usage auditing and application whitelisting are the countermeasures against:
Unauthorized software
Social engineering
Weak security configurations
Misconfigured software
Unauthorized software
One of the best practices for malware removal involves the process of isolation of files and applications suspected of containing malware to prevent further execution and potential harm to the user’s system. This process is referred to as:
Quarantine
Content filtering
Protected mode
Blacklisting
Quarantine