Practice Test (2) Flashcards
One of your colleagues attempted to ping a computer name and received the response of fe80::3281:80ea:b72b:0b55. What type of address did the colleague view?
IPv6
IPv4
MAC address
IPv6
An IPv6 address is a 128-bit address that uses hexadecimal values (0–9 and A–F)
Which of the following defines the act of sending unsolicited messages to nearby Bluetooth devices?
Bluesnarfing
Brute force
Bluejacking
Bluejacking
Bluejacking is the act of sending unsolicited messages from one Bluetooth device to another Bluetooth device such as smartphones, tablets, and laptop computers
You are a system administrator and you are creating a public and private key pair. You have to specify the key strength. Which of the following would be your best choice?
RSA
DES
MD5
RSA
RSA is an asymmetric algorithm that uses private and public keys to encrypt and decrypt data
You are the security administrator for the sales department and the department needs to email high volumes of sensitive information to clients to help close sales. All emails go through a DLP scanner. Which of the following is the best solution to help the department protect the sensitive information?
Automatically encrypt outgoing emails.
Monitor all outgoing emails.
Automatically encrypt incoming emails.
Automatically encrypt outgoing emails.
Automatically encrypting outgoing emails will protect the company’s sensitive email that may contain personally identifiable information. Should the email be intercepted, the attacker wouldn’t be able to read the information contained in the email
You are the IT security officer of your company and have established a security policy that requires users to protect all sensitive documents to avoid their being stolen. What policy have you implemented?
Separation of duties
Clean desk
Job rotation
Clean desk
Clean desk policy ensures that all sensitive/confidential documents are removed from an end-user workstation and locked up when the documents are not in use
Which of the following options can a security administrator deploy on a mobile device that will deter undesirable people from seeing the data on the device if it is left unattended?
Screen lock
Push notification services
Remote wipe
Screen lock
The screen lock option can be enabled to prevent an unauthorized person from viewing the data on a device should the owner leave it unattended. This option can be configured to enable within seconds to minutes if device is unattended
You are a system administrator and are asked to prevent staff members from using each other’s credentials to access secured areas of the building. Which of the following will best address this request?
Install a biometric reader at the entrance of the secure area.
Install a proximity card reader at the entrance of the secure area.
Implement least privilege.
Install a biometric reader at the entrance of the secure area.
Biometrics are a person’s physical characteristics, such as a fingerprint, retina, hand geometry, and voice
A sales manager has asked for an option for sales reps who travel to have secure remote access to your company’s database server. Which of the following should you configure for the sales reps?
VPN
WLAN
NAT
VPN
A virtual private network (VPN) creates an encrypted connection between a remote client and a private network over an insecure network such as the Internet
An attacker tricks one of your employees into clicking on a malicious link that causes an unwanted action on the website the employee is currently authenticated to. What type of attack is this?
Replay
Cross-site request forgery
Cross-site scripting
Cross-site request forgery
A cross-site request forgery attack occurs when an attacker tricks a user into performing unwanted actions on a website the user is currently authenticated to
Which of the following is considered the strongest access control?
RBAC
DAC
MAC
MAC
The correct answer is mandatory access control (MAC). Access is controlled by comparing security labels with security clearances such as Confidential, Secret, and Top Secret
Your company wants to expand its data center, but has limited space to store additional hardware. The IT staff needs to continue their operations while expansion is underway. Which of the following would best accomplish this expansion idea?
IaaS
Virtualization
Public cloud
Virtualization
Virtualization allows the creation of virtual resources such as a server operating system. Multiple operating systems can run on one machine by sharing the resources such as RAM, hard drive, and CPU
Which of the following algorithms have known collisions? (Choose two.)
MD5
AES
SHA
SHA-256
RSA
MD5
SHA
MD5 and SHA have known cases of collisions
Which of the following must a security administrator implement to allow customers, vendors, suppliers, and other businesses to obtain information while preventing access to the company’s entire network?
Internet
Extranet
Honeynet
Extranet
An extranet will give customers, vendors, suppliers, and other business access to a controlled private network while preventing them from accessing the company’s entire network
The head of HR is conducting an exit interview with an IT network administrator named Matt. The interview questions include Matt’s view of his manager, why he is leaving his current position, and what he liked most about his job. Which of the following should also be addressed in this exit interview?
Job rotation
Background checks
Property return form
Property return form
A property return form properly records all equipment, keys, and badges that must be surrendered to the company when the employee leaves the company
Which of the following is considered the least secure authentication method?
CHAP
NTLM
PAP
PAP
Password Authentication Protocol (PAP) is an authentication protocol that sends the username and password as plain text to the authentication server
You are a security administrator for your company and have been asked to recommend a secure method for storing passwords due to recent brute-force attempts. Which of the following will provide the best protection? (Choose two.)
ROT13
BCRYPT
RIPEMD
PBKDF2
BCRYPT
PBKDF2
BCRYPT and PBKDF2 use key stretching to reduce brute-force attacks against vulnerabilities of encrypted keys. Both are considered password hashing functions
You installed a WAP for a local coffee shop and have discovered the signal is extending into the parking lot. Which of the following configurations will best correct this issue?
Change the antenna type.
Disable the SSID broadcast.
Reduce the signal strength for indoor coverage only.
Reduce the signal strength for indoor coverage only.
The correct answer is to reduce the signal strength for indoor coverage only. This action will prevent potential attackers from accessing the wireless access point and possibly compromising the users currently connected. Having the signal limited inside the business will help determine who is possibly connected
You are a network administrator for a bank. A branch manager discovers that the deskside employees have the ability to delete lending policies found in a folder within the file server. You review the permissions and notice the deskside employees have “modify” permissions to the folder. The employees should have read permissions only. Which of the following security principles has been violated?
Time-of-day restrictions
Separation of duties
Least privilege
Least privilege
Least privilege gives users the lowest level of rights so they can do their job to limit the potential chance of security breach
Which of the following concepts of cryptography ensures integrity of data by the use of digital signatures?
Steganography
Key exchange
Hashing
Hashing
Hashing transforms a string of characters into a key that represents the original string. When the string of characters is transformed and compared to the original hash, it will identify whether the string has been modified