Practice Test (2) Flashcards
One of your colleagues attempted to ping a computer name and received the response of fe80::3281:80ea:b72b:0b55. What type of address did the colleague view?
IPv6
IPv4
MAC address
IPv6
An IPv6 address is a 128-bit address that uses hexadecimal values (0–9 and A–F)
Which of the following defines the act of sending unsolicited messages to nearby Bluetooth devices?
Bluesnarfing
Brute force
Bluejacking
Bluejacking
Bluejacking is the act of sending unsolicited messages from one Bluetooth device to another Bluetooth device such as smartphones, tablets, and laptop computers
You are a system administrator and you are creating a public and private key pair. You have to specify the key strength. Which of the following would be your best choice?
RSA
DES
MD5
RSA
RSA is an asymmetric algorithm that uses private and public keys to encrypt and decrypt data
You are the security administrator for the sales department and the department needs to email high volumes of sensitive information to clients to help close sales. All emails go through a DLP scanner. Which of the following is the best solution to help the department protect the sensitive information?
Automatically encrypt outgoing emails.
Monitor all outgoing emails.
Automatically encrypt incoming emails.
Automatically encrypt outgoing emails.
Automatically encrypting outgoing emails will protect the company’s sensitive email that may contain personally identifiable information. Should the email be intercepted, the attacker wouldn’t be able to read the information contained in the email
You are the IT security officer of your company and have established a security policy that requires users to protect all sensitive documents to avoid their being stolen. What policy have you implemented?
Separation of duties
Clean desk
Job rotation
Clean desk
Clean desk policy ensures that all sensitive/confidential documents are removed from an end-user workstation and locked up when the documents are not in use
Which of the following options can a security administrator deploy on a mobile device that will deter undesirable people from seeing the data on the device if it is left unattended?
Screen lock
Push notification services
Remote wipe
Screen lock
The screen lock option can be enabled to prevent an unauthorized person from viewing the data on a device should the owner leave it unattended. This option can be configured to enable within seconds to minutes if device is unattended
You are a system administrator and are asked to prevent staff members from using each other’s credentials to access secured areas of the building. Which of the following will best address this request?
Install a biometric reader at the entrance of the secure area.
Install a proximity card reader at the entrance of the secure area.
Implement least privilege.
Install a biometric reader at the entrance of the secure area.
Biometrics are a person’s physical characteristics, such as a fingerprint, retina, hand geometry, and voice
A sales manager has asked for an option for sales reps who travel to have secure remote access to your company’s database server. Which of the following should you configure for the sales reps?
VPN
WLAN
NAT
VPN
A virtual private network (VPN) creates an encrypted connection between a remote client and a private network over an insecure network such as the Internet
An attacker tricks one of your employees into clicking on a malicious link that causes an unwanted action on the website the employee is currently authenticated to. What type of attack is this?
Replay
Cross-site request forgery
Cross-site scripting
Cross-site request forgery
A cross-site request forgery attack occurs when an attacker tricks a user into performing unwanted actions on a website the user is currently authenticated to
Which of the following is considered the strongest access control?
RBAC
DAC
MAC
MAC
The correct answer is mandatory access control (MAC). Access is controlled by comparing security labels with security clearances such as Confidential, Secret, and Top Secret
Your company wants to expand its data center, but has limited space to store additional hardware. The IT staff needs to continue their operations while expansion is underway. Which of the following would best accomplish this expansion idea?
IaaS
Virtualization
Public cloud
Virtualization
Virtualization allows the creation of virtual resources such as a server operating system. Multiple operating systems can run on one machine by sharing the resources such as RAM, hard drive, and CPU
Which of the following algorithms have known collisions? (Choose two.)
MD5
AES
SHA
SHA-256
RSA
MD5
SHA
MD5 and SHA have known cases of collisions
Which of the following must a security administrator implement to allow customers, vendors, suppliers, and other businesses to obtain information while preventing access to the company’s entire network?
Internet
Extranet
Honeynet
Extranet
An extranet will give customers, vendors, suppliers, and other business access to a controlled private network while preventing them from accessing the company’s entire network
The head of HR is conducting an exit interview with an IT network administrator named Matt. The interview questions include Matt’s view of his manager, why he is leaving his current position, and what he liked most about his job. Which of the following should also be addressed in this exit interview?
Job rotation
Background checks
Property return form
Property return form
A property return form properly records all equipment, keys, and badges that must be surrendered to the company when the employee leaves the company
Which of the following is considered the least secure authentication method?
CHAP
NTLM
PAP
PAP
Password Authentication Protocol (PAP) is an authentication protocol that sends the username and password as plain text to the authentication server
You are a security administrator for your company and have been asked to recommend a secure method for storing passwords due to recent brute-force attempts. Which of the following will provide the best protection? (Choose two.)
ROT13
BCRYPT
RIPEMD
PBKDF2
BCRYPT
PBKDF2
BCRYPT and PBKDF2 use key stretching to reduce brute-force attacks against vulnerabilities of encrypted keys. Both are considered password hashing functions
You installed a WAP for a local coffee shop and have discovered the signal is extending into the parking lot. Which of the following configurations will best correct this issue?
Change the antenna type.
Disable the SSID broadcast.
Reduce the signal strength for indoor coverage only.
Reduce the signal strength for indoor coverage only.
The correct answer is to reduce the signal strength for indoor coverage only. This action will prevent potential attackers from accessing the wireless access point and possibly compromising the users currently connected. Having the signal limited inside the business will help determine who is possibly connected
You are a network administrator for a bank. A branch manager discovers that the deskside employees have the ability to delete lending policies found in a folder within the file server. You review the permissions and notice the deskside employees have “modify” permissions to the folder. The employees should have read permissions only. Which of the following security principles has been violated?
Time-of-day restrictions
Separation of duties
Least privilege
Least privilege
Least privilege gives users the lowest level of rights so they can do their job to limit the potential chance of security breach
Which of the following concepts of cryptography ensures integrity of data by the use of digital signatures?
Steganography
Key exchange
Hashing
Hashing
Hashing transforms a string of characters into a key that represents the original string. When the string of characters is transformed and compared to the original hash, it will identify whether the string has been modified
Your manager has asked you to recommend a public key infrastructure component to store certificates that are no longer valid. Which of the following is the best choice?
Intermediate CA
CSR
CRL
CRL
A certificate revocation list (CRL) is a list of certificates that were revoked by a CA before their expiration date. The certificates listed in the CRL should not be considered trusted
You are a backup operator and receive a call from a user asking you to send sensitive documents immediately because their manager is going to a meeting with the company’s executives. The user states the manager’s files are corrupted and he is attending the meeting in the next 5 minutes. Which of the following forms of social engineering best describes this situation?
Scarcity
Consensus
Intimidation
Intimidation
The user is using an intimidation tactic to get the employee to take action quickly. Sometimes intimidation tactics can be combined with other principles such as urgency
Which of the following controls can you implement together to prevent data loss if a mobile device is lost or stolen? (Choose two.)
Geofencing
Full-device encryption
Screen locks
Push notification services
Full-device encryption
Screen locks
The correct answers are full-device encryption and screen locks. Full-device encryption encodes all the user’s data on a mobile device by using an encrypted key, and enabling screen lock prevents an unauthorized person from viewing the data on a device should the owner leave it unattended
A chief security officer (CSO) notices that a large number of contractors work for the company. When a contractor leaves the company, the provisioning team is not notified. The CSO wants to ensure the contractors cannot access the network when they leave. Which of the following polices best supports the CSO’s plan?
Account lockout policy
Enforce password history
Account expiration policy
Account expiration policy
Account expiration policy will prevent the contracts from attempting to access the network after they leave. The provisioning team can set a date when the contract is set to leave, and the user will not be able to have access to systems within the company’s network
The CISO wants to strengthen the password policy by adding special characters to users’ passwords. Which of the following control best achieves this goal?
Password complexity
Password length
Password history
Password complexity
Password complexity is a rule that demands inclusion of three of the four following character sets: lowercase letters, uppercase letters, numerals, and special characters