Practice Test 3 Flashcards

1
Q

Which of the following can allow Emily, a security analyst, to encrypt individual files on a system?

A) Single Sign-on

B) TLS

C) EFS

D) JFS

A

EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security administrator is responsible for performing periodic reviews of user permission settings due to high turnover and internal transfers at a corporation. Which of the following BEST describes the procedure and security rationale for performing such reviews?

A) Review the permissions of all transferred users to ensure new permissions are granted so the employee can work effectively

B) Ensure all users have adequate permissions and appropriate group memberships, so the volume of help desk calls is reduced

C) Review all user permissions and group memberships to ensure only the minimum set of permissions required to perform a job is assigned

D) Ensure former employee accounts have no permissions so that they cannot access any network file stores and resources

A

Review all user permissions and group memberships to ensure only the minimum set of permissions required to perform a job is assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Company A sends a PGP encrypted file to company B. If company A used company B’s public key to encrypt the file, which of the following should be used to decrypt data at company B?

A) Public key

B) Private key

C) Shared key

D) CRLs

A

Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following types of application attacks would be used to specifically gain unauthorized information from databases that did not have any input validation implemented?

A) Buffer overflow and XSS

B) Cookies and attachments

C) SQL injection

D) Session hijacking and XML injection

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keith, a network administrator, has been asked to passively monitor network traffic for potential malicious activities to the company’s sales websites. Which of the following would be BEST suited for this task?

A) HIPS

B) Spam filter

C) Firewall

D) NIDS

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Chief Information Officer (CIO) of your employer has mandated that the internal payroll software be replaced by a cloud based application. The new software is a web based industry standard and will be licensed for use by the company. Which of the following best describes this situation?

A) Infrastructure as a Service

B) Platform as a Service

C) Software as a Service

D) Hosted virtualization service

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An investigator recently discovered that an attacker placed a remotely accessible CCTV camera in a public area overlooking several Automatic Teller Machines (ATMs). It is also believed that user accounts belonging to ATM operators may have been compromised. Which of the following attacks has MOST likely taken place?

A) Whaling attack

B) Dumpster diving

C) Shoulder surfing

D) Vishing attack

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

George, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following could be used to accomplish this task?

A) CRL

B) Private hash

C) Public key

D) Recovery agent

A

Recovery agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?

A) Code review

B) Baseline reporting

C) Design reviews

D) Vulnerability scan

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following defines a business goal for system restoration and acceptable data loss?

A) MTTR

B) RTO

C) Warm site

D) MTBF

A

RTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Datacenter access is controlled with proximity badges that record all entries and exits from the datacenter. The access records are used to identify which staff members accessed the data center in the event of equipment theft. Which of the following MUST be prevented in order for this policy to be effective?

A) Social engineering

B) Tailgating

C) Phishing

D) Password reuse

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An information bank has been established to store contacts, phone numbers and other records. A UNIX application needs to connect to the index server using port 389. Which of the following authentication services should be used on this port by default?

A) Kerberos

B) RADIUS

C) TACACS+

D) LDAP

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following BEST explains the use of an HSM within the company servers?

A) Hardware encryption is faster than software encryption.

B) Data loss by removable media can be prevented with DLP.

C) Software encryption can perform multiple functions required by HSM.

D) Thumb drives present a significant threat which is mitigated by HSM.

A

Hardware encryption is faster than software encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is true about asymmetric encryption?

A) A message encrypted with the private key can be decrypted by the same key

B) A message encrypted with a shared key, can be decrypted by the same key

C) A message encrypted with the public key can be decrypted with a shared key

D) A message encrypted with the public key can be decrypted with the private key

A

A message encrypted with the public key can be decrypted with the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?

A) CRC

B) Zero cipher

C) Hashing algorithm

D) Block cipher

A

Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?

A) Anti-spyware software

B) Host based firewall

C) Anti-spam software

D) Network based firewall

A

Anti-spyware software

17
Q

A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks. Which of the following is MOST likely the reason for the sub-interfaces?

A) The sub-interfaces each implement quality of service

B) The switch has several VLANs configured on it

C) The sub-interfaces are configured for VoIP traffic

D) The network uses the subnet of 255.255.255.128

A

The switch has several VLANs configured on it

18
Q

Which of the following presents the STRONGEST access control?

A) TACACS

B) MAC

C) DAC

D) RBAC

A

MAC

19
Q

An administrator notices that former temporary employees’ accounts are still active on a domain. Which of the following can be implemented to increase security and prevent this from happening?

A) Implement an account expiration date for temporary employees

B) Implement time of day restrictions for all temporary employees

C) Implement a password expiration policy

D) Run a last logon script to look for inactive accounts

A

Implement an account expiration date for temporary employees

20
Q

Separation of duties is often implemented between developers and administrators in order to separate which of the following?

A) The network access layer from the application access layer

B) Changes to program code and the ability to deploy to production

C) More experienced employees from less experienced employees

D) Upper level management users from standard development employees

A

Changes to program code and the ability to deploy to production