Practice Test 2 Flashcards
An administrator is receiving an error in browser stating a website’s certificate is invalid. Which of the following is the browser referring to?
A) Recovery agent
B) CRL
C) Private key
D) Public key
Public key
A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?
A) Restricted interface
B) Session output pipe to /dev/null
C) Command shell restriction
D) Warning banners
Warning banners
A software development company wants to implement a digital rights management solution to protect its intellectual property. Which of the following should the company implement to enforce software digital rights?
A) Transport encryption
B) Non-repudiation
C) Public Key infrastructure
D) IPsec
Public Key infrastructure
Rachael, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Rachael configure?
A) NACL
B) NAT
C) PACL
D) DNS
NAT
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
A) Shoulder surfing
B) Impersonation
C) Tailgating
D) Dumpster diving
Shoulder surfing
Which of the following is BEST used as a secure replacement for TELNET?
A) HTTPS
B) GPG
C) SSH
D) HMAC
SSH
Which of the following network architecture concepts is used to securely isolate network devices at the boundary between networks?
A) NAT
B) DMZ
C) VLAN
D) Subnetting
DMZ
An administrator in the Network Security Department notices that an employee in the Networking Department made unauthorized changes to a firewall over the weekend. Which of the following would be used to mitigate this issue so that only security administrators can make changes to the firewall?
A) Job rotation
B) Time of day restriction
C) Least privilege
D) Mandatory vacations
Least privilege
Which statement is TRUE about the operation of a packet sniffer?
A) They are required for firewall operation and stateful inspection.
B) It can only have one interface on a management network.
C) It must be placed on a single virtual LAN interface.
D) The Ethernet card must be placed in promiscuous mode.
The Ethernet card must be placed in promiscuous mode.
Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning?
A) Implementation of account lockout procedures.
B) A recent security breach in which passwords were cracked
C) Implementation of configuration management processes
D) Enforcement of password complexity requirements
A recent security breach in which passwords were cracked
Which of the following application security testing techniques is implemented when an automated system generates random input data?
A) Input validation
B) XSRF
C) Hardening
D) Fuzzing
Fuzzing
Geneson, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Geneson when deploying a new access point?
A) Disabling SSID
B) Implementing WPA2
C) Placement of antenna
D) Enabling the MAC filtering
Placement of antenna
A user ID and password together provide which of the following?
A) Authentication
B) Authorization
C) Identifcation
D) Auditing
Authentication
A network administrator has recently updated their network devices to ensure redundancy is in place so that:
A) Single points of failure are removed
B) Environmental monitoring can be performed
C) Hot and cold aisles are functioning
D) Switches can redistribute routes across the network
Single points of failure are removed
Sara, an application developer, has just implemented error and exception handling in an application. Which of the following does this help prevent?
A) Buffer overflow
B) Cross-site scripting
C) Fuzzing
D) Pop-up blockers
Buffer overflow