Practice Test 3 Flashcards
Which of the following can allow Emily, a security analyst, to encrypt individual files on a system?
A) Single Sign-on
B) TLS
C) EFS
D) JFS
EFS
A security administrator is responsible for performing periodic reviews of user permission settings due to high turnover and internal transfers at a corporation. Which of the following BEST describes the procedure and security rationale for performing such reviews?
A) Review the permissions of all transferred users to ensure new permissions are granted so the employee can work effectively
B) Ensure all users have adequate permissions and appropriate group memberships, so the volume of help desk calls is reduced
C) Review all user permissions and group memberships to ensure only the minimum set of permissions required to perform a job is assigned
D) Ensure former employee accounts have no permissions so that they cannot access any network file stores and resources
Review all user permissions and group memberships to ensure only the minimum set of permissions required to perform a job is assigned
Company A sends a PGP encrypted file to company B. If company A used company B’s public key to encrypt the file, which of the following should be used to decrypt data at company B?
A) Public key
B) Private key
C) Shared key
D) CRLs
Public key
Which of the following types of application attacks would be used to specifically gain unauthorized information from databases that did not have any input validation implemented?
A) Buffer overflow and XSS
B) Cookies and attachments
C) SQL injection
D) Session hijacking and XML injection
SQL injection
Keith, a network administrator, has been asked to passively monitor network traffic for potential malicious activities to the company’s sales websites. Which of the following would be BEST suited for this task?
A) HIPS
B) Spam filter
C) Firewall
D) NIDS
NIDS
The Chief Information Officer (CIO) of your employer has mandated that the internal payroll software be replaced by a cloud based application. The new software is a web based industry standard and will be licensed for use by the company. Which of the following best describes this situation?
A) Infrastructure as a Service
B) Platform as a Service
C) Software as a Service
D) Hosted virtualization service
Software as a Service
An investigator recently discovered that an attacker placed a remotely accessible CCTV camera in a public area overlooking several Automatic Teller Machines (ATMs). It is also believed that user accounts belonging to ATM operators may have been compromised. Which of the following attacks has MOST likely taken place?
A) Whaling attack
B) Dumpster diving
C) Shoulder surfing
D) Vishing attack
Shoulder surfing
George, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following could be used to accomplish this task?
A) CRL
B) Private hash
C) Public key
D) Recovery agent
Recovery agent
Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?
A) Code review
B) Baseline reporting
C) Design reviews
D) Vulnerability scan
Vulnerability
Which of the following defines a business goal for system restoration and acceptable data loss?
A) MTTR
B) RTO
C) Warm site
D) MTBF
RTO
Datacenter access is controlled with proximity badges that record all entries and exits from the datacenter. The access records are used to identify which staff members accessed the data center in the event of equipment theft. Which of the following MUST be prevented in order for this policy to be effective?
A) Social engineering
B) Tailgating
C) Phishing
D) Password reuse
Tailgating
An information bank has been established to store contacts, phone numbers and other records. A UNIX application needs to connect to the index server using port 389. Which of the following authentication services should be used on this port by default?
A) Kerberos
B) RADIUS
C) TACACS+
D) LDAP
LDAP
Which of the following BEST explains the use of an HSM within the company servers?
A) Hardware encryption is faster than software encryption.
B) Data loss by removable media can be prevented with DLP.
C) Software encryption can perform multiple functions required by HSM.
D) Thumb drives present a significant threat which is mitigated by HSM.
Hardware encryption is faster than software encryption.
Which of the following is true about asymmetric encryption?
A) A message encrypted with the private key can be decrypted by the same key
B) A message encrypted with a shared key, can be decrypted by the same key
C) A message encrypted with the public key can be decrypted with a shared key
D) A message encrypted with the public key can be decrypted with the private key
A message encrypted with the public key can be decrypted with the private key
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?
A) CRC
B) Zero cipher
C) Hashing algorithm
D) Block cipher
Block cipher