Practice Test 2 Flashcards
Which of the following cryptographic related browser settings allows an organization to communicate securely?
SSL 3.0/TLS 1.0
Peter, an employee, needs a certificate to encrypt data. Which of the following would issue Peter a certificate?
Certification authority
A server administrator notes that a legacy application often stops running due to a memory error. When reviewing the debugging logs, they notice code being run calling an internal process to exploit the machine. Which of the following attacks does this describe?
Buffer Overflow
Which of the following is a directional antenna that can be used in point-to-point or point-to-multipoint WiFi communication systems? (Select TWO).
A. Backfire
B. Dipole
C. Omni
D. PTZ
E. Dish
Backfire & Dish
An online store wants to protect user credentials and credit card information so that customers can store their credit card information and use their card for multiple separate transactions.
Which of the following database designs provides the BEST security for the online store?
Hash the credential fields and use encryption for the credit card field.
Based on information leaked to industry websites, business management is concerned that unauthorized employees are accessing critical project information for a major, well-known new product. To identify any such users, the security administrator could:
Set up a honeypot and place false project documentation on an unsecure share.
Which of the following is a security benefit of providing additional HVAC capacity or increased tonnage in a datacenter?
Longer Mean Time Between Failures of hardware due to lower operating temperatures. One year lifetime usually, thus cooler HVAC extends life.
Which of the following is the BEST reason to provide user awareness and training programs for organizational staff?
To reduce organizational IT risk
Which of the following is characterized by an attack against a mobile device?
Blue jacking
Which of the following components MUST be trusted by all parties in PKI?
Certificate Authority.
Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?
Containment Strategies
Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?
Vishing (Voice over IP Phishing)
Which of the following results in datacenters with failed humidity controls? (Select TWO).
A. Excessive EMI
B. Electrostatic charge
C. Improper ventilation
D. Condensation
E. Irregular temperature
Electrostatic Charge & Condensation
A retail store uses a wireless network for its employees to access inventory from anywhere in the store. Due to concerns regarding the aging wireless network, the store manager has brought in a consultant to harden the network. During the site survey, the consultant discovers that the network was using WEP encryption. Which of the following would be the BEST course of action for the consultant to recommend?
Change the encryption used so that the encryption protocol is CCMP-based (Counter Mode Cipher Block Chaining Message Authentication Code Protocol).
A small company has recently purchased cell phones for managers to use while working outside if the office.
The company does not currently have a budget for mobile device management and is primarily concerned with deterring leaks if sensitive information obtained by unauthorized access to unattended phones. Which of the following would provide the solution BEST meets the company’s requirements?
Screen Lock
A small company has a website that provides online customer support. The company requires an account recovery process so that customers who forget their passwords can regain access.
Which of the following is the BEST approach to implement this process?
Web-based form that identifies customer by another mechanism, sets a temporary password and forces a password change upon first login
The system administrator has been notified that many users are having difficulty connecting to the company’s wireless network. They take a new laptop and physically go to the access point and connect with no problems. Which of the following would be the MOST likely cause?
An unauthorized access point has been configured to operate on the same channel.
Which of the following is the term for a fix for a known software problem?
Patch
A company determines a need for additional protection from rogue devices plugging into physical ports around the building.
Which of the following provides the highest degree of protection from unauthorized wired network access?
IEEE 802.1x, (Port-based Network Access Control)
Which of the following describes the purpose of an MOU?
Define responsibilities of each party
Peter, the security administrator, has been notified by the IDS that the company website is under attack. Analysis of the web logs show the following string, indicating a user is trying to post a comment on the public bulletin board.
INSERT INTO message `
This is an example of which of the following?
XSS attack, Cross Site Scripting
While securing a network it is decided to allow active FTP(File Transfer Protocol) connections into the network. Which of the following ports MUST be configured to allow active FTP connections? (Select TWO).
A. 20
B. 21
C. 22
D. 68
E. 69
20, 21
A security administrator wants to implement a solution which will allow some applications to run under the user’s home directory and only have access to files stored within the same user’s folder, while other applications have access to shared folders. Which of the following BEST addresses these requirements if the environment is concurrently shared by multiple users?
Process Sandboxing
The finance department just procured a software application that needs to communicate back to the vendor server via SSL. Which of the following default ports on the firewall must the security engineer open to accomplish this task?
443