Question Set 4 Flashcards

1
Q

Who is responsible for establishing access permissions to network resources in the DAC access control model? A. The system administrator B. The owner of the resource C. The system administrator and the owner of the resource D. The user requiring access to the resource

A

B. The owner of the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which access control system allows the system administrator to establish access permissions to network resources? A. MAC B. DAC C. RBAC D. None of the above

A

A. MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following access control models uses roles to determine access permissions? A. MAC B. DAC C. RBAC D. None of the above

A

C. RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is access control permissions established in the RBAC access control model? A. The system administrator B. The owner of the resource C. The roles or responsibilities users have in the organization D. None of the above

A

C. The roles or responsibilities users have in the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the DAC access control model use to identify the users who have permissions to a resource? A. Predefined access privileges B. The role or responsibilities users have in the organization C. Access Control Lists D. None of the above

A

C. ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the MAC access control model use to identify the users who have permissions to a resource? A. Perdefined access privileges B. The role or responsibilities users have in the organization C. Access Control Lists D. None of the above

A

A. Predefined access privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements regarding the MAC access control models is TRUE? A. The Mandatory Access Control (MAC) model is a dynamic model. B. In the Mandatory Access Control (MAC) the owner of a resource establishes access privileges to that resource. C. In the Mandatory Access Control (MAC) users cannot share resources dynamically. D. The Mandatory Access Control (MAC) model is not restrictive.

A

C. In the Mandatory Access Control (MAC) users cannot share resources dynamically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are types of certificate-based authentication? (SELECT TWO) A. Many-to-one mapping B. One-to-one mapping C. One-to-many mapping D. Many-to-many mapping

A

A. Many-to-one mapping B. One-to-one mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ability to logon to multiple systems with the same credentials is typically known as: A. decentralized management B. single sign-on C. Role Based Access Control (RBAC) D. centralized management

A

B. single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote authentication allows you to authenticate Zendesk users using a locally hosted script. Which of the following is an example of remote authentication? A. A user on a metropolitan are network (MAN) accesses a host by entering a username and password pair while not connected to the LAN. B. A user on a campus are network (CAN) connects to a server in another building and enters a username and password pair. C. A user in one building logs on to the network by entering a username and password into a host in the same building. D. A user in one city logs onto a netwrok by connecting to a domain server in another city.

A

D. A user in one city logs onto a network by connecting to a domain server in another city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The DAC (Discretionary Access Control) model has an inherent flaw. Choose the option that describes this flaw. A. The DAC (Discretionary Access Control) model uses only the identity of the user or sspecific process to control access to a resource. This creates a security loophole for Trojan horse attacks. B. The DAC (Discretionary Access Control) model uses certificates to control access to resources. This creates an opportunity for attackers to use your certificates. C. The DAC (Discretionary Access Control) model does not use the identity of a user to control access to resources. This allows anyone to use an account to access resources. D. The DAC (Discretionary Access Control) model does not have any known security flaws.

A

A. The DAC (Discretionary Access Control) model uses only the identity of the user or sspecific process to control access to a resource. This creates a security loophole for Trojan horse attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You work as the network administrator for ABZ.com. The ABZ.com network uses the RBAC (Role Based Access Control) model. You must plan the security strategy for users to access resources on the ABZ.com network. The types of resources you must control access to our mailboxes and files and printers. ABZ.com is divided into distinct departments and functions named Finance Sales Research and Development and Production respectively. Each user has its own workstation and accesses resources based on the department wherein he/she works. You must determine which roles to create to support the RBAC (Role Based Access Control) model. Which of the following roles should you create? A. Create mailbox and file and printer roles. B. Create Finance Sales Research and Development and Production roles. C. Create user and workstation roles. D. Create allow access and deny access roles.

A

B. Create Finance Sales Research and Development and Production roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item. A. MACs (Mandatory Access Control) method B. RBACs (Role Based Access Control) method C. LBACs (List Based Access Control) method D. DACs (Discretionary Access Control) method

A

A. MACs (Mandatory Access Control) method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Choose the terminology or concept which best describes a (Mandatory Access Control) model. A. Lattice B. Bell La-Padula C. BIBA D. Clark and Wilson

A

A. Lattice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which authentiation method does the following sequence: Logon request encrypts value response server challenge compare encrypts results authorize or fail refer to? A. Certificates B. Security Tokens C. CHAP D. Kerberos

A

C. CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of publicly accessible servers should have anonymous logins disabled to prevent an attacker from transferring malicious data? A. FTP B. Email C. Web D. DNS

A

A. FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following will restrict access to files according to the identity of the user or group? A. MAC B. CRL C. PKI D. DAC

A

D. DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following network authentication protocols uses symmetric key cryptography stores a shared key for each network resource and uses a Key Distrobution Center (KDC)? A. RADIUS B. TACACS+ C. Kerberos D. PKI

A

C. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following access control models uses subject and object labels? A. Mandatory Access Control (MAC) B. Role Based Access Control (RBAC) C. Rule Based Access Control (RBAC) D. Discretionary Access Control (DAC)

A

A. Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following access decisions are based on a Mandatory Access Control (MAC) environment? A. Access control lists B. Ownership C. Group membership D. Sensitivity labels

A

D. Sensitivity labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following types of authentication BEST describes providing a username password and undergoing a thumb print scan to access a workstation? A. Multifactor B. Mutual C. Biometric D. Kerberos

A

A. Multifactor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Users would not like to enter credentials to each server or application to conduct their normal work. Which type of stategy can solve this problem? A. Biometrics B. Smart card C. Two-factor authentication D. SSO

A

D. SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Kerberos uses which of the following ports by default? A. 23 B. 88 C. 139 D. 443

A

B. 88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following authentication systems make use of the KDC Key Distribution Center? A. Certificates B. Security Tokens C. CHAP D. Kerberos

A

D. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following authentication methods increases the security of the authentication process because it must be in your physical possession? A. Smart Cards B. Kerberos C. CHAP D. Certificate

A

A. Smart Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Users need to access their email and several secure applications from any workstation on the network. In addition an authentication system implemented by the administraotr requires the use of a username password and a company issued smart card. This is an example of which of the following? A. Three factor authentication B. SSO C. ACL D. Least privilege

A

B. SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following statements regarding authentication protocols is FALSE? A. PAP is insecure because usernames and passwords are sent over the network in celar text. B. CHAP is more secure than PAP because it encrypts usernames and passwords before they are sent over the network. C. RADIUS is a client/server-based system that provides authenticaton authorization and accounting services for remote dial-up access. D. MS-CHAP version 1 is capable of mutual authentication of both the client and the server

A

D. MS-CHAP version 1 is capable of mutual authentication of both the client and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Many unauthorized staff has been entering the data center by piggybacking authorized staff. The CIO has mandated to stop this behavior. Which technology should be installed at the data center to prevent piggybacking? A. Mantrap B. Token access C. Security badges D. Hardware locks

A

A. Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which definition best defines what a challenge-response session is? A. A challenge-response session is a workstation or system that produces a random challange string that the user provides when prompted in conjunction with the proper PIN (Personal Identification Number). B. A challenge-response session is a workstation or system that produces a random login ID that the user provides when prompted in conjunction with the proper PIN (Personal Identification Number). C. A challenge-response session is a special hardware device used to produce random text in a cryptography system. D. A challenge-response session is the authentication mechanism in the workstation or system that does not determine whether the owner should be authenticated.

A

A. A challenge-response session is a workstation or system that produces a random challange string that the user provides when prompted in conjunction with the proper PIN (Personal Identification Number).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The hashing algorithm is created from a hash value making it nearly impossible to derive the original input number. Which item can implement the strongest hashing algorithm? A. NTLMv2 B. LANMAN C. NTLM D. VLAN

A

A. NTLMv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

For which reason are clocks used in Kerberos authentication? A. Clocks are used to ensure proper connections. B. Clocks are used to ensure that tickets expire correctly. C. Clocks are used to generate the seed value for the encryptions key. D. Clocks are used to both benchmark and specify the optimal encryption algorithm.

A

B. Clocks are used to ensure that tickets expire correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A VPN typically provides a remote access link from one host to another over: A. an intranet B. a modern C. a network interface card D. the Internet

A

D. the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In which authentication model a ticket granting server is an important concept? A. CHAP B. PAP C. Kerberos D. RADIUS

A

C. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In a secure environment which authentication mechanism will perform better? A. RADIUS because it encrypts client-server passwords. B. TACACS because it encrypts client-server negotiation dialogs. C. TACACS because it is a remote access authentication service. D. RADIUS because it is a remote access authentication service

A

B. TACACS because it encrypts client-server negotiation dialogs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which goals can be achieved by use of secuity templates? (SELECT TWO) A. To ensure that PKI will work properly within the company’s trust model B. To ensure that performance is standardized across all servers. C. To ensure that servers are in compliance with the corporate security policy. D. To ensure that all servers start from a common security configuration.

A

C. To ensure that servers are in compliance with the corporate security policy. D. To ensure that all servers start from a common security configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A newly hired security specialist is aked to evaluate a company’s network security. The secuity specialist discovers that users have installed personal software; the network OS has default settings and no patches have been installed and passwords are not required to be changed regularly. Which of the following would be the FIRST step to take? A. Install software patches B. Disable non-essential services C. Enforce the security policy D. Password management

A

C. Enforce the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following can be used to implement a procedure to control inbound and outbound traffic on a network segment? A. Proxy B. NIDS C. ACL D. HIDS

A

C. ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Giving each user or a group of users only the access they need to do their job is an example of which of the following security principals? A. Least privilege B. Defense in depth C. Separation of duties D. Access control

A

A. Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The CHAP (Challenge Handshake Authentication Protocol) sends a logon request from the client to the server and the server sends a challenge back to the client. At which stage does the CHAP protocol perform the handshake process? Choose the best complete answer. A. At the stage when the connection is established and at whichever time after the connection has been established. B. At the stage when the connection is established and when the connection is disconnected. C. At the stage when the connection is established. D. At the stage when the connection is diconnected.

A

A. At the stage when the connection is established and at whichever time after the connection has been established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Most key fob based identification systems use which of the following types of authentication mechanisms? A. Kerberos B. Biometrics C. Username/password D. Token

A

C. Username/password D. Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A graphical user interface (GUI) is a type of user interface which allows people to interact with electronic devices such as computers; hand-held devices such as MP3 Players Portable Media Players or Gaming devices; household appliances and office equipment. Which of the following will allow a technician to restrict a user accessing to the GUI? A. Use of logical tokens B. Group policy implementation C. Password policy enforcement D. Access control lists

A

B. Group policy implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which authentication method will prevent a replay attack from occuring? A. RADIUS B. L2TP C. Kerberos D. CHAP

A

C. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Access controls based on security labels associated with each data item and each user are known as: A. Mandatory Access Control (MAC) B. Role Based Access Control (RBAC) C. List Based Access Control (LBAC) D. Discrectionay Access Control (DAC)

A

A. MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A user is assigned access rights explicitly. This is feature of which of the following access control models? A. Discretionary Access Control (DAC) B. Mandatory Access Control (MAC) C. Rule Based Access Control (RBAC) D. Role Based Access Control (RBAC)

A

A. DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

During which phase of identification and authentication does proofing occur? A. Authenication B. Testing C. Verification D. Identification

A

D. Indentification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

During which phase of identification and authentication does proofing occur? A. Authentication B. Testing C. Verification D. Identification

A

D. Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following describes the process by which a single user name and password can be entered to access multiple computer applications? A. Single sign-on B. Encryption protocol C. Access control lists D. Constrained user interfaces

A

A. Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which security action should be finished before access is given to the network? A. Identification and authorization B. Identification and authentication C. Authentication and authorization D. Authentication and password

A

B. Identifciation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The authendication process wehre the user can access several resources without the need for multiple credentials is known as: A. Discretionary Access Control (DAC) B. Need to know C. Decentralized management D. single sign-on

A

D. Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which item best describes an instance where a biometric system identifies legitimate users as being unauthorized? A. False acceptance B. False positive C. False rejection D. False negative

A

C. False rejection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following is the best description about the method of controlling how and when users can connect in from home? A. Remote access policy B. Remote authentication C. Terminal access control D. Virtual Private Networking (VPN)

A

A. Remote Access Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The implicit deny will block anything you didn’t specifically allow but you may have allowed stuff that you don’t need. A technician is reviewing the system logs for a firewall and is told that there is an implicit deny whithin the ACL. Which is an example of an implicit deny? A. An implicit deny statement denies all traffic from one network to another B. Each item is denied by default because of the implicit deny. C. Items which are not specifically given access are denied by default. D. An ACL is a way to secure traffic from one network to another

A

C. Items which are not specifically given access are denied by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

In order to allow for more oversight of past transactions a company decides to exchange positions of the purchasing agent and the accounts receivable agent. Which is an example of this? A. Seperation of duties B. Least privilege C. Implicit deny D. Job rotation

A

D. Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which method could identify when unauthorized access has occurred? A. Implement session termination mechanism. B. Implement previous logon notification. C. Implement session lock mechanism D. Implement two-factor authentication.

A

B. Implement previous logon notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which item is not a logical access control method? A. biometrics B. Group Policy C. ACL D. Software token

A

A. Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which one of the following options will create a security buffer zone between two rooms? A. Mantrap B. Anti-pass back C. DMZ D. Turnstile

A

A. Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

On the basis of certain ports which of the following will allow wireless access to network resources? A. 802.11a B. 802.11n C. 802.1x D. 802.11g

A

C. 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

An organization has a hierarchical-based concept of privilege management with administrators having full access human resources personnel having slightly less access and managers having access to their own department files only. This is BEST described as: A. Discretionary Access Control (DAC) B. Rule Based Access Control (RBAC) C. Mandatory Access Control (MAC) D. Role Based Access Control (RBAC)

A

D Role Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The first step in creating a security baseline would be: A. identifying the use case B. installing software patches C. vulnerability testing D. creating a security policy

A

D. Creating a security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

You work as a network administrator for your company. Your company requires you to improve the physical security of a data center located inside the office building. The data center already maintains a physical access log and has a video surveillance system. Which additional control can be performed? A. ACL B. Defense-in-depth C. Logical token D. Mantrap

A

D. Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which solution can be used by a user to implement very tight security controls for technicians that seek to enter the user’s datacenter? A. Combination locks and key locks B. Smartcard and proximity readers C. Magnetic lock and pin D. Biometric reader and smartcard

A

D. Biometric reader and smartcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

The difference between identification and authentication is that: A. authentication verifies a set of credentials while identification verifies the identity of the network. B. Authentication verifies a user ID belongs to a specific user while identification verifies the identity of a user group. C. authentication verifies a set of credentials while identification verifies the identity of a user requesting credentials. D. authentication verifies the identity of a user requesting credentials while identification verifies a set of credentials.

A

C. authentication verifies a set of credentials while identification verifies the identity of a user requesting credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

From the listing of attacks which analyzes how the operating system (OS) responds to specific network traffic in an attempt to determine the operating system running in your networking environment? A. Operating system scanning B. Reverse engineering C. Fingerprinting D. Host hijacking

A

C. Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Both the server and the client authenticate before exchanging data. This is an example of which of the following? A. SSO B. biometrics C. mutual authentication D. multifactor authentication

A

C. mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

After the maximum number attempts have failed which of the following could set an account to lockout for 30 minutes? A. Account lockout threshold B. Account lockout duration C. Password complexity requirements D. Key distribution center

A

B. Account lockout duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which of the following has largely replaced SLIP? A. SLIP (Serial Line Internet Protocol) B. PPP (Point-to-Point Protocol) C. VPN D. RADIUS (Remote Authentication Dial-In User Service)

A

B PPP (Point-to-Point Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which of the following definitions fit correctly to RADIUS? A. is an older protocol that was used in early remote access environments. B. has largely replaced SLIP and offers multiple protocol support including Appletalk IPX and DECnet. C. are used to make connections between private networks across a public network such as the Internet. D. is a mechanism that allows authentication of dial-in and other network connections

A

D. is a mechanism that allows authentication of dial-in and other network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Which of the definitions fit correctly to TACACS? A. is an older protocol that was used in early remote access environments. B. has largely replaced SLIP and offers multiple protocol support including AppleTalk IPX and DECnet. C. are used to make connections between private networks across a public network such as the Internet. D. It allows credentials to be accepted from muliple methods including Kerberos.

A

D. It allows credentials to be accepted from multiple methods including Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Job rotation is a cross-training technique where organizations minimize collusion amongst staff. A. True B. False

A

A. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The Lightweight Directory Access Protocol or LDAP is an application protocol for querying and modifying directory services running over TCP/IP. A user needs to implement secure LDAP on the network. Which port number will secure LDAP use by default? A. 53 B. 389 C. 443 D. 636

A

D 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

An end-to-end traffic performance guarantee made by a service provider to a customer is a: A. DRP B. BCP C. SLA D. VPN

A

C. SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

The staff must be cross-trained in different functional areas in order to detect fraud. Which of the following is an example of this? A. Implicit deny B. Least privilege C. Separation of duties D. Job rotation

A

D. Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which of the following improves security in a wireless system? A. IP spoofing B. MAC filtering C. SSID spoofing D. Closed network

A

B. MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following is a list of discrete entries that are known to be benign? A. whitelist B. signature C. Blacklist D. ACL

A

A. Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

IDS is short for Intrusion Detection Systems. Which option is the MOST basic form of IDS? A. Signature B. Statistical C. Anomaly D. Behavioral

A

A. Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which description is correct concerning the process of comparing cryptographic hash functions of system executables configuration files and log files? A. File integrity auditing B. Stateful packet filtering C. Host based intrusion detection D. Network based intrusion detection

A

A. File integrity auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which tool can best monitor changes to the approved system baseline? A. Enterprise antivirus software B. Enterprise performance monitoring software C. Enterprise key management software D. Enterprise resource planning software

A

B. Enterprise performance monitoring software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Audit log information can BEST be protected by: (SELECT TWO) A. using a VPN B. an IDS C. access controls that restrict usage D. recording to write-once media

A

C. Access controls that restrict usage D. recording to write-once media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

John works as a network administrator for his company. He uses a tool to check SMTP DNS POP3 and ICMP packets on the network. This is an example of which of the following? A. A vulnerability scan B. A protocol analyzer C. A penetration test D. A port scanner

A

B. A protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the following should be done if an audit recording fails in an information system? A. Log off the user B. Overwrite the oldest audit records C. Stop generating audit records D. Send an alert to the appropriate personnel

A

D. Send an alert to the approprate personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following steps is MOST often overlooked during the auditing process? A. Reviewing event logs regularly B. Enabling auditing on the system C. Auditing every system event D. Deciding what events to audit

A

A. Reviewing event logs regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What should be taken into consideration while exexcuting proper logging procedures? (SELECT TWO) A. The information that is needed to recontruct events B. The password requirements for user accounts C. The virtual memory allocated on the log server D. The amount of disk space required

A

A. The information that is needed to recontruct events D. The amount of disk space required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

In computer programming DLL injection is a technique used to run code within the address space of another process by forcing it to load a dynamic-link library. Which activity is MOST closely associated with DLL injection? A. Penetration testing B. SQL servers C. Network mapping D. Vulnerability assessment

A

A. Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Network utilization is the ratio of current network traffic to the maximum traffic that the port can handle. Which of the following can most effectively determine whether network utilization is abnormal? A. Application log B. Performance baseline C. Systems monitor D. Security log

A

B. Performance baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

When an IDS is configured to match a specific traffic pattern then which of the following is this referring to? A. Signature-based B. Behavior-based C. Anomaly-based D. Heuristic-based

A

A. Signature-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A system admin reports that an unauthorized user has accessed the network. Which of the following would be the FIRST action to take? A. Notify management B. Determine the business impact C. Contact law enformcement officials D. Contain the problem

A

D. Contain the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

After analyzing vulnerability and applying a security patch which non-intrusive action should be taken to verify that the vulnerability was truly removed? A. Update the antivirus definition file B. Apply a security patch from the vendor C. Repeat the vulnerability scan D. Perform a penetration test

A

C. Repeat the vulnerability test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which NIDS configuration is based on specific netwrok traffic? A. Anomaly-based B. Host-based C. Behavior-based D. Signature-based

A

D. Signature-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which tool can help the technician to fine all open ports on the network? A. Router ACL B. Performance monitor C. Protocol analyzer D. Network scanner

A

D. Network scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Malicious port scanning is a method of attack to determine which of the following? A. Computer name B. The fingerprint of the operating system C. The physical cabling topology of a network D. User IDs and passwords

A

B. The fingerprint of the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Network traffic is data in a network. Which tool can be used to review network traffic for clear text passwords? A. Port scanner B. Protocol analyzer C. Firewall D. Password cracker

A

B Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which of the following is not identified within the penetration testing scope of work? A. a complete list of all network vulnerabilities B. handling of information collected by the penetration testing team C. IP addresses of machines from which penetration testing will be exexcuted D. a list of acceptable testing techniques and tools to be utilized

A

A. a complete list of all network vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Choose the figure which represents the number of ports in the TCP/IP which are vulnerable to being scanned attacked and exploited. A. 32 ports B. 1024 ports C. 65535 ports D. 16777216 ports

A

C. 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

After installing new software on a machine what needs to be updated to the baseline? A. Honeypot B. Signature-based NIPS C. Signature-based NIDS D. Behavior-based HIDS

A

D. Behavior-based HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

A network technician suspects that a piece of malware is consuming too many CPU cycles and slowing down a system. Which item can help determine the amount of CPU cycles being consumed? A. Install malware scanning software B. Run performance monitor to evaluate the CPU usage C. Use a protocol analyzer to find the cause of the traffic D. Install HIDS to determine the CPU usage

A

B. Run performance monitor to evaluate the CPU usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which of the following ports are typically used by email clients? (SELECT TWO) A. 3389 B. 194 C. 143 D. 110

A

C. 143 D. 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

A DNS server uses a specific port number. Choose this port number from the options. A. Port 32 B. Port 53 C. Port 65535 D. Port 16777216

A

B. 53

98
Q

Which practice is the best to secure log files? A. Copy or save the logs to a remote log server. B. Change security settings to avoid corruption. C. Log all failed and successful login attempts D. Deny administrators all access to log files to prevent write failures.

A

A. Copy or save the logs to a remote log server

99
Q

Nmap has been run against a server and more open ports than expected have been discovered. Which of the following would be the FIRST step to take? A. All ports should be closed and observed to see whether a process tries to reopen the port. B. NMAP should be run again and observed to see whether different results are obtained. C. All ports should be left open and traffic monitored for malicious activity. D. The process using the ports should be examined.

A

D. The process using the ports should be examined

100
Q

Which scanner can find a rootkit? A. email scanner B. malware scanner C. anti-spam scanner D. Adware scanner

A

B. Malware scanner

101
Q

Which of the following is the MOST effective way for an administrator to determine what security holes reside on a network? A. Perform a vulnerability assessment B. Run a port scan C. Run a sniffer D. Install and monitor an IDS

A

A. Perform a vulnerability assessment

102
Q

Your company has already implemented two-factor authentication adn wants to install a third authentication factor. If the existing authentication system uses strong passwords and PKI tokens which item would provide a third factor? A. Six digit PINs B. Pass phrases C. Fingerprint scanner D. Elliptic curve

A

C. Fingerprint scanner

103
Q

Identify the item that can determine which flags are set in a TCP/IP handshake? A. Network mapper B. FIN/RST C. Protocol analyzer D. SYN/ACK

A

C. Protocol analyzer

104
Q

Which of the following BEST describes an attempt to transfer DNS zone data? A. Evasion B. Fraggle C. Teardrop D. Reconnaissance

A

D. Reconnaissance

105
Q

Which method is the LEAST intrusive to check the environement for known software flaws? A. Port scanner B. Vulnerability scanner C. Penetration test D. Protocol analyzer

A

B. Vulnerability scanner

106
Q

After auditing file which log will show unauthorized usage attempts? A. application B. performance C. security D. system

A

C. Security

107
Q

Which of the following is a reason to use a vulnerability scanner? A. To identify open ports on a system B. To assist with protocol analyzing C. To identfiy remote access policies D. To assist with PKI implementation

A

A. To identify open ports on a system

108
Q

Look at the following intrustion detection systems carefuly which one uses well defined models of how an attack occurs? A. Anomaly B. Protocol C. Signature D. Behavior

A

C. Signature

109
Q

Which of the following logs shows when the workstation was last shutdown? A. DHCP B. Security C. Access D. System

A

D. System

110
Q

One of the below is a description for a password cracker which one is it? A. A program that can locate and read a password file B. A program that provides software registration passwords and keys C. A program that performs comparative analysis. D. A program that obtains privileged access to the system

A

C. A program that performs comparative analysis

111
Q

Risk assessment is a common first step in a risk managment process. Risk assessment is the determination of quantitative or qualitative vaule of risk related to a concrete situation and a recognized threat (also called hazard.) As a best practice risk assessment should be based upon which of the following? A. An absolute measurement of threats B. A qualitative measurement of risk and impact C. A quantitative measurement of risk impact and asset value D. A survey of annual loss potential threats and asset value.

A

C. A quantitative measurement of risk impact and asset value

112
Q

Which of the below options would you consider as a program that constantly observes data traveling over a network? A. Smurfer B. Sniffer C. Fragmenter D. Spoofer

A

B. Sniffer

113
Q

Which of the following will requre setting a baseline? (SELECT TWO) A. Anomaly-based monitoring B. Signature-based monitoring C. NIPS D. Behavior-based monitoring

A

A. Anomaly-based monitoring D. Behavior-based monitoring

114
Q

Choose the most effective method of preventing computer viruses from spreading throughout the network. A. You should require root/administrator access to run programs and applications B. You should enable scanning of all e-mail attachments C. You should prevent the execution of .vbs files D. You should install a host based IDS

A

B. You should enable scanning of all e-mail attachments

115
Q

An Auditing system is necessary to prevent attacks on what part of the system? A. the files B. the operating system C. the systems memory D. none of the above

A

A. the files

116
Q

Choose the network mapping tool (scanner) which uses ICMP. A. A port scanner B. A map scanner C. A ping scanner D. A share scanner

A

C. A ping scanner

117
Q

One type of port scan can determine which ports in a listening state on the network and can then perform a two way handshake. Which type of port scan can perform this set of actions? A. A TCP SYN scan B. A TCP connect scan C. A TCP fin scan D. A TCP null scan

A

A. TCP SYN scan

118
Q

Which security measures should be recommended while implementing system logging procedures? (SELECT TWO) A. Collect system temporary files B. Apply retention policies on the log files C. Perform CRC checks D. Perform hashing of the log files

A

B. Apply retention policies on the log files C. Perform CRC checks

119
Q

Tom is a network administrator of his company. He suspects that files are being copied to a remote location during off hours. The file server does not have logging enabled. Which logs will be the BEST place to look for information? A. Antivirus logs B. Firewall logs C. DNS logs D. Intrusion detection logs

A

B. Firewall logs

120
Q

A technician is auditing the security posture of an organization. The audit shows that many of the users have the ability to access the company’s accounting information. Which of the following should the technician recommend to address this problem? A. Changing file level audit settings B. Implementing a host based intrusion detection system. C. Changing the user rights and security groups D. Implementing a host based intrusion prevention system

A

C. Changing the user rights and security groups

121
Q

What description is true about penetration testing? A. Simulating an actual attack on a network B. Establishing a security baseline C. Hacking into a network for malicious reasons D. Detecting active intrusions

A

A. Simulating an actual attack on a network

122
Q

Which of the following would be MOST useful in determining which internal user was the source of an attack that compromised another computer in its network? A. The firewall’s logs B. the attacking computer’s audit logs C. The target computer’s audit logs D. The domain controller’s logs

A

C. The target computer’s audit logs

123
Q

On a company’s LAN port 3535 is typically blocked for outbound traffic. An end-user has recently purchased a legitimate business program that needs to make outbound calls through this port. Which step should be taken by a technician to allow this? (SELECT TWO) A. Change the users subnet mask B. Open the port on the company’s firewall C. Open the port on the VLAN D. Open the port on the users personal software firewall

A

B. Open the port on the company’s firewall D. Open the port on the users personal software firewall

124
Q

The purpose of a DNS server is to enable people and applications to lookup records in DNS tables. Why implement security logging on a DNS server? A. To monitor unauthorized zone transfers B. To control unauthorized DNS DoS C. To measure the DNS server performance. D. To perform penetration testing on the DNS server

A

A. To monitor unauthorized zone transfers

125
Q

Which of the following statements are true regarding File Sharing? A. FTP is a protocol a client and a server. B. Security was based on the honor system C. As discussed earlier SSH is a program that allows connections to be secured by encrypting the session between the client and the server D. When files are stored on a workstation the connection is referred to as a peer-to-peer connection

A

D. When files are stored on a workstation the connection is referred to as a peer-to-peer connection

126
Q

Which of the following BEST be used to determine the topology of a network and discover unknown devices? A. Vulnerability scanner B. NIPS C. Protocol analyzer D. Network mapper

A

D. Network mapper

127
Q

When should a technician perform penetration testing? A. When the technician suspects that weak passwords exist on the network. B. When the technician is trying to guess passwords on a network C. When the technician has permission from the owner of the network D. When the technician is war driving and trying to gain access

A

C. When the technician has permission from the owner of the network

128
Q

On which of the following is a security technician MOST likely to find usernames? A. DNS logs B. Application logs C. Firewall logs D. DHCP logs

A

B. Application logs

129
Q

Most current encryption schemes are based on: A. digital rights management B. time stamps C. randomizing D. algorithms

A

D. algorithms

130
Q

Most current encryption schemes are based on: A. digital rights management B. time stamps C. randomizing D. algorithms

A

D. algorithms

131
Q

Which of the following types of cryptography is typically used to provide an integrity check? A. Public key B. Asymmetric C. Symmetric D. Hash

A

D. Hash

132
Q

The Public Key Infrastructure (PKI) is a set of hardware software people policies and procedures needed to create manage store distribute and revoke digital certificates. The public key infrastructure is based on which encryption schemes? A. Symmetric B. Quantum C. Asymmetric D. Elliptical curve

A

C. Asymmetric

133
Q

Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons? A. non-repundiation B. Integrity C. Authentication D. Confidentiality

A

D. Confidentiality

134
Q

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. Hashing is used to index and retrieve items in a database. Which description is correct when a hashing algorithm generates the same hash for two different messages? A. A one-way hash occurred B. A hashing chain occurred C. A collision occurred D. A deviation occurred

A

C. A collision occurred

135
Q

Which of the following describes a type of algorithm that cannot be reversed in order to decode the data? A. Symmetric B. One Way Function C. Asymmetric D. Pseudorandom Number Generator (PRNG)

A

B. One Way Function

136
Q

CRL is short for Certificate Revocation List. Which types of keys are included in a CRL? A. Both public and private keys B. Public keys C. Steganographic keys D. Private keys

A

A. Both public and private keys

137
Q

Secret key encryption is also known as: A. symmetrical B. replay C. one way function D. asymmetrical

A

A. symmetrical

138
Q

What may happen when hashing two different files creates the same result? A. a mirror B. a collision C. a duplication D. a pseudo-random event

A

B. collision

139
Q

Password cracking tools are available worldwide over the Internet. Which one of the following items is a password cracking tool? A. Wireshark B. Nessus C. John the Ripper D. AirSnort

A

C. John the Ripper

140
Q

Which statement is true about the cryptographic algorithm employed by TLS to establish a session key? A. Blowfish B. Diffie-Hellman C. IKE D. RSA

A

B. Diffie-Hellman

141
Q

Which of the following would be an easy way to determine whether a secure web page has a valid certificate? A. Right click on the lock at the bottom of the browser and check the certificate information. B. Contact Thawte or Verisign and ask about the web page C. Contact the web page’s web master D. Ensure that the web URL starts with https

A

A. Right click on the lock at the bottom of the browser and check the certificate information.

142
Q

Encryption is the conversion of data into a form called a ciphertext that cannot be easily understood by unauthorized people. Which of the following is considered the weakest encryption? A. SHA B. DES C. RSA D. AES

A

B. DES

143
Q

Which method will most effectively verify that a patch file downloaded from the third party has not been modified since the time that the original manufacturer released the patch? A. Compare the final MD5 hash with the original. B. Compare the final LANMAN hash with the original. C. Download the patch file through a SSL connection. D. Download the patch file over an AES encrypted VPN connection.

A

A. Compare the final MD5 hash with the original

144
Q

A digital signature or digital signature scheme is a type of asymmetric cryptography. For messages sent through an insecure channel a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature the message digest is encrypted with which of the following keys? A. Senders public key B. Recievers private key C. Recievers public key D. Senders private key

A

D. Senders private key

145
Q

Which password management system best provides for a system with a large number or users? A. Self service password reset management systems B. Locally saved passwords management systems C. Multiple access methods management systems D. Synchronized passwords management systems

A

A. Self service password reset management systems

146
Q

Removable storage has been around almost as long as the computer itself. Which of the following is the GREATEST security risk regarding removable storage? A. Availability of data B. Integrity of data C. Not enough space available D. Confidentiality of data

A

D. Confidentiality of data

147
Q

Which of the following would be needed to ensure that a user who has received an email cannot claim that the email was not received? A. Anti-aliasing B. Data integrity C. Asymmetric cryptography D. Non-repudiation

A

D non-repudiation

148
Q

IP Authentication Header (AH) is used to provide connectionless integrity and data origin authentication for IP datagrams (hereafter referred to as just authentication) and to provide protection against replays. Which of the following is correct about authentication headers (AH)? A. The authentication information is a keyed hash based on all of the bytes in the packet. B. The authentication information may be the same on different packets if the integrity remains in place. C. The authentication information hash will increase by one if the bytes remain the same on transfer. D. The authentication information hash will remain the same if the bytes change on transfer.

A

A. The authentication information is a keyed hash based on all of the bytes in the packet.

149
Q

Which of the following refers to the ability to be reasonably certain that data is not modified or tampered with? A. Authentication B. Integrity C. Non-repudiation D. Confidentiality

A

B. Integrity

150
Q

A security specialist has downloaded a free security software tool from a trusted industry site. The source has published the MD5 hash values for the executable program. The specialist performs a successful virus scan on the download but the MD5 hash is different. Which of the following steps should the specialist take? A. Avoid executing the file and contact the source website administrator. B. Ignore the MD5 hash values can change during IP fragmentation. C. Re-run the anti-virus program to ensure that it contains no virus execute D. Install the executable program because there was probably a mistake with the MD5 vaule.

A

A. Avoid executing the file and contact the source website administrator.

151
Q

Which algorithms can best encrypt large amounts of data? A. Asymmetric key algorithms B. Symmetric key algorithms C. ECC algorithms D. Hashing algorithms

A

B. Symmetric key algorithms

152
Q

Which of the following connectivity is required for a web server that is hosting an SSL based web site? A. Port 443 inbound B. Port 443 outbound C. Port 80 inbound D. Port 80 outbound

A

A. Port 443 inbound

153
Q

Which item will effectively allow for fast highly secure encryption of a USB flash drive? A. 3DES B. SHA-1 C. MD5 D. AES256

A

D. AES 256

154
Q

Which types of keys will be used if a server and workstation communicate via SSL? (SELECT TWO) A. Public Key B. Recovery Key C. Session Key D. Keylogger

A

A. Public Key C. Session Key

155
Q

Which of the following could cause communication errors with an IPSec VPN tunnel because of changes made to the IP header? A. SOCKS B. NAT C. DNS D. Private addressing

A

B. NAT

156
Q

How to make sure that when an employee leaves the company permanently the company will have access to their private keys? A. Store the keys in escrow B. Store them in a CRL C. Obtain the employees hardware token D. Immediately delete the account

A

A. Store the keys in escrow

157
Q

Identify the service provided by message authentication code (MAC) hash: A. data recovery B. fault tolerance C. key recovery D. inetegrity

A

D. inegrity

158
Q

Which key can be used by a user to log into their network with a smart card? A. Public key B. Cipher key C. Shared key D. Private key

A

D. Private key

159
Q

Which of the following would be an effective way to ensure that a compromised PKI key can not access a system? A. Reconfigure the key B. Revoke the key C. Delete the key D. Renew the key

A

B. Revoke the key

160
Q

Which of the following provides the MOST secure form of encryption? A. 3DES B. Diffie-Hellman C. DES D. AES

A

D. AES

161
Q

Which of the following describes the validation of a messages origin? A. integrity B. Confidentiality C. Non-repudiation

A

C. Non-repudiation

162
Q

Using software on a individual computer to generate a key pair is an example of which of the following approaches to PKI architecture? A. Decentralized B. Centralized C. Hub and spoke D. Distrubuted key

A

A. Decentralized

163
Q

Which description is true about how to accomplish steganography in graphic files? A. Replacing the most significant bit of each byte. B. Replacing the most significant byte of each bit C. Replacing the least significant byte of each bit D. Replacing the least significant bit of each byte

A

D. Replacing the least signifcant bit of each byte

164
Q

Which of the following types of encryption would be BEST to use for a large amount of data? A. Asymmetric B. Symmetric C. ROT13 D. Hash

A

B. Symmetric

165
Q

What is steganography primarily used for? A. Data integrity B. Message digest C. Hide information D. Encrypt information

A

C. Hide information

166
Q

A company has instituted a VPN to allow remote users to connect to the office. As time progresses multiple security associations are created with each association being more secure. Which of the following should be implemented to automate the selection of the BEST security association for each user? A. AES B. 3DES C. SHA D. IKE

A

D. IKE

167
Q

A small manufacturing company wants to deploy secure wireless on their network. Which of the following wireless security protocols could be used? (SELECT TWO) A. WEP B. IPX C. WPA D. WAN

A

A. WEP C. WPA

168
Q

Which of the following uses private key/public key technology to secure web sites? A. SSL B. TCP C. Media Access Control (MAC) D. Access Control List (ACL)

A

A. SSL

169
Q

Which of the following is the MOST significant flaw in Pretty Good Privacy (PGP) authentication? A. Private keys can be compromised. B. A user must trust the public key that is received C. It is subject to a man-in-the-middle attack D. Weak encryption can easily be broken

A

B. A user must trust the public key that is received

170
Q

Which option is correct about a hash algorithms ability to avoid the same output from two guessed inputs? A. Collision strength B. Collision resistance C. Collision strength D. Collision metric

A

B. Collision resistance

171
Q

Which of the following would be an example of a hardware device where keys can be stored? (SELECT TWO) A. PCI Card B. Smart card C. PCMCIA card D. Network Interface Card (NIC)

A

B. Smart Card C. PCMCIA card

172
Q

Encryption is the conversion of data into a form called a ciphertext that cannot be easily understood by unauthorized people. Which encryption is the strongest by use of mathematical evaluation techniques? A. 3DES B. ROT13 C. AES D. DES

A

C. AES

173
Q

The Diffie-Hellman encryption algorithm relies on which of the following? A. Tunneling B. Digital signatures C. Key exchange D. Passwords

A

C. Key exchange

174
Q

Non-repudiation is enforced by which of the following? A. Secret keys B. Digital signatures C. PKI D. Cipher Block chaining

A

B. Digital signatures

175
Q

Which is the primary objective to implement performance monitoring applications on network systems from a security standpoint? A. To detect host intrusions from external networks B. To detect network intrusions from external attackers C. To detect integrity degradations to network attached storage D. To detect availability degradations caused by attackers

A

D. To detect availability degradations caused by attackers

176
Q

Which key is generally applied FIRST to a message digest to provide non-repudiation by use of asymmetric cryptography? A. Private key of the receiver B. Private key of the sender C. Public key of the sender D. Public key of the receiver

A

B. Private key of the sender

177
Q

Which item can easily create an unencrypted tunnel between two devices? A. PPTP B. AES C. L2TP D. HTTPS

A

C. L2TP

178
Q

In order to encrypt credit card data which will be the most secure algorithm with the least CPU utilization? A. 3DES B. AES C. SHA-1 D. MD5

A

B. AES

179
Q

Which of the following encryption algorithms relies on the inability to factor large prime numbers? A. Eliptic Curve B. AES256 C. RSA D. SHA-1

A

C. RSA

180
Q

The Public Key Infrastructure (PKI) is a set of hardware software people policies and procedures needed to create manage store distribute certificates. An executive uses PKI to encrypt sensitive emails sent to an assistant. In addition to encrypting the body of an email the executive wants to encrypt the signature so that the assistant can verify that the email actually came from the executive. Which asymmetric key should be used by the executive to encrypt the signature? A. Shared B. Private C. Hash D. Public

A

B. Private

181
Q

Which protocol can be used to ensure transmissions on port 443? A. HTTPS B. SHTTP C. Telnet D. SFTP

A

A. HTTPS

182
Q

Which of the following protocols is used to transmit data between a web browser and a web server? A. SSH B. HTTP C. SFTP D. IMAP4

A

B. HTTP

183
Q

Which statement correctly describes the difference between a secure cipher and a secure hash? A. A hash can be reversed a cipher cannot. B. A hash produces a variable output for any input size a cipher does not. C. A cipher can be reversed a hash cannot. D. A cipher produces the same size output for any input size a hash does not.

A

C. A cipher can be reversed a hash cannot.

184
Q

Recently your company has implemented a work from home program. Employees should connect securely from home to the corporate network. Which encryption technology can be used to achieve this goal? A. L2TP B. IPSec C. PPPoE D. PPTP

A

B. IPSec

185
Q

In cryptography a pre-shared key or PSK is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used. Pre-shared keys can be applied to which of the following? A. TPM B. PGP C. Digital Signature D. CA

A

B. PGP

186
Q

Which of the following definitions fit correctly to PPTP? A. It supports encapsulation in a single point-to-point environment. B. It was created by Cisco as a method of creating tunnels primarily for dial-up connections. C. It is primarily a point-to-point protocol. D. It is tunneling protocol originally designed for UNIX systems.

A

A. It supports encapsulation in a single point-to-point environment.

187
Q

From the list of protocols which two are VPN tunneling protocols? (CHOOSE TWO Protocols) A. PPP B. SLIP C. L2TP D. PPTP

A

C. L2TP D. PPTP

188
Q

Which encryption algorithms can be used to encrypt and decrypt data? A. NTLM B. MD5 C. SHA-1 D. RC5

A

D. RC5

189
Q

Choose the option that details one of the primary benefits of using S/MIME (Secure/Multipurpose Internet Mail Extension)? A. S/MIME allows users to send both encrypted and digitally signed e-mail messages. B. S/MIME allows users to send anonymous e-mail messages. C. S/MIME allows users to send e-mail messages with a return receipt. D. S/MIME expedites the delivery of e-mail messages.

A

A. S/MIME allows users to send both encrypted and digitally signed e-mail messages

190
Q

Choose the scheme or system used by PGP (Pretty Good Privacy) to encrypt data. A. Asymmetric scheme B. Symmetric scheme C. Symmetric key distribution system D. Asymmetric key distribution system

A

A. Asymmetric scheme

191
Q

All of the following provide confidentiality protection as part of the underlying protocol EXCEPT: A. SSL B. SSH C. L2TP D. IPSec

A

C. L2TP

192
Q

Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data? A. Steganography B. Worm C. Trojan horse D. Virus

A

A. Steganography

193
Q

Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key? A. 3DES B. AES C. DH-ECC D. MD5

A

C. DH-ECC

194
Q

How many keys are utilized with asymmetric cryptography? A. One B. Two C. Five D. Seven

A

B. Two

195
Q

Which of the following increases the collision resistance of a harsh? A. Salt B. Increase the input length C. Rainbow Table D. Larger key space

A

A. Salt

196
Q

You work as a network administrator for your company. Taking personal safely into consideration what fire suppression substances types can effectively prevent damage to electronic equipment? A. Halon B. CO2 C. Water D. Foam

A

B. CO2

197
Q

Which of the following would be MOST important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction? A. Disaster recovery plan B. Alternate sites C. Offsite storage D. Fault tolerant systems

A

A. Disaster recovery plan

198
Q

Documentation describing a group of expected minimum behaviors is known as: A. the need to know B. acceptable usage C. the seperation of duties D. a code of ethics

A

D. a code of ethics

199
Q

Sending a patch through a testing and approval process is an example of which option? A. Acceptable use policies B. Change management C. User education and awareness training D. Disaster planning

A

B. Change management

200
Q

A company’s new employees are asked to sign a document that describes the methods of and purposes for accessing the company’s IT systems. Which of the following BEST describes this document? A. Privacy Act of 1974 B. Authorized Access Policy C. Due dilligence form D. Acceptable Use Policy

A

D. Acceptable Use Policy

201
Q

In addition to bribery and forgery which of the following are the MOST common techniques that attackers use to socially engineer people? (SELECT TWO) A. Phreaking B. Dumpster diving C. Flattery D. Assuming a position of authority

A

C. Flattery D. Assuming a position of authority

202
Q

The risks of social engineering can be decreased by implementing: (SELECT TWO) A. security awareness training B. risk assessment policies C. operating system patching instructions D. identity verification methods

A

A. security awareness training D. identity verification methods

203
Q

Non-essential services are often appealing to attackers because non-essential services: (SELECT TWO) A. consume less bandwidth B. are not visible to an IDS C. are not typically configured correctly or secured D. sustain attacks that go unnoticed

A

C. are not typically configured correctly or secured D. sustain attacks that go unnoticed

204
Q

In order to recover discarded company documents which of the following might an attacker resort to? A. Shoulder surfing B. Phishing C. Dumpster diving D. Insider theft

A

C. Dumpster diving

205
Q

Turnstiles double entry doors and security guards are all prevention measures for which of the following types of social engineering? A. Piggybacking B. Looking over a co-worker’s shoulds to retrieve information C. Looking through a co-worker’s trash to retrieve information D. Impersonation

A

A. Piggybacking

206
Q

Alex is a network administrator of his company. He is backing up all server data nightly to a local NAS device. Which additional action should Alex perform to block disaster in the case the primary site is permanently lost? A. Backup all data at a present interval to removable disk and store the disk in a fireproof safe in the buildings basement. B. Backup all data at a preset interval to tape and store those tapes at a sister site in another city. C. Backup all data at a present interval to tape and store those tapes at a sister stite across the street. D. Backup all data at a present interval to removable disk and store the disk in a safety deposit box at the administrators home.

A

B. Backup all data at a present interval to tape and store and store those tapes at a sister site in another city.

207
Q

A travel reservation organization conducts the majority of its transactions via a public facing website. Any downtime to this website will lead to serious financial damage for this organization. One web server is connected to several distrubuted database servers. Which statement is correct about this scenario? A. RAID B. Warm site C. Proxy server D. Single point of failure

A

D. Single point of failure

208
Q

A technician is conducting a forensics analysis on a computer system. Which step should be taken FIRST? A. Search for Trojans B. Look for hidden files C. Get a binary copy of the system D. Analyze temporary files

A

C. Get a binary copy of the system

209
Q

Which is the correct order in which crucial equipment should draw power? A. Backup generator UPS battery UPS line conditioner B. Uninterruptible Power Supply batter UPS line conditioner backup generator C. Backup generator UPS line conditioner UPS battery D. UPS line conditioner UPS battery and backup generator

A

D. UPS line conditioner UPS battery and backup generator

210
Q

Which description is correct about the form used while transferring evidence? A. evidence log B. booking slip C. chain of custody D. Affidavit

A

C. Chain of custody

211
Q

Disguising oneself as a reputable hardware manufacturer’s field technician who is picking up a server for repair would be described as: A. a phishing attack B. a Trojan horse C. a man-in-the-middle attack D. social engineering

A

D. Social engineering

212
Q

Which of the following describes an attacker encouraging a person to perform an action in order to be successful? A. Man-in-the-middle B. Social engineering C. Back door D. Password guessing

A

B. Social engineering

213
Q

A user has received an email from a mortgage company asking for personal information including bank account numbers. This would BEST be described as: A. spam B. phishing C. packet sniffing D. a hoax

A

B. phishing

214
Q

To preserve evidence for later use in court which of the following needs to be documented? A. Audit trail of systems usage B. Disaster recovery plan C. Chain of certificates D. Chain of custody

A

D. Chain of custody

215
Q

Which of the following is a major reason that social engineering attacks succeed? A. Strong passwords are not required B. Lack of security awareness C. Multiple logins are allowed D. Audit logs are not monitored frequently

A

B. Lack of security awareness

216
Q

Which of the following types of backups requires that files and software that have been changed since the last full backup be copied to storage media? A. Incremental B. Differential C. Full D. Delta

A

B. Differential

217
Q

When setting password rules which of the following would lower the level of security of a network? A. Passwords must be greater than six characters and contain at least one non-alpha B. All passwords are set to expire at regular intervals and users are required to choose new passwords that have not been used before. C. Complex passwords that users can not remotely change are randomly generated by the administrator and given to users. D. After a set number of failed attempts the server will lock out any user account forcing the user to call the administrator to re-enable the account.

A

C. Complex passwords that users can not remotely change are randomly generated by the administrator and given to users.

218
Q

How to test the integrity of a company’s backup data? A. by reviewing the written procedures B. by conducting another backup C. by restoring part of the backup D. by using software to recover deleted files

A

C. By restoring part of the backup

219
Q

Social engineering attacks would be MOST effective in which of the following environments? (SELECT TWO) A. A locked windowless building B. A military facility with computer equipment containing biometrics C. A public building that has shared office space. D. A company with a help desk whose personnel have minimal training.

A

C. A public building that has shared office space. D. A company with a help desk whose personnel have minimal training.

220
Q

For the following sites which one has the means (e.g. equipment software and communications) to facilitate a full recovery within minutes? A. Cold site B. Hot site C. Warm site D. Reciprocal site

A

B. Hot site

221
Q

Which description is true about the external security testing? A. Conducted from outside the perimeter switch but inside the border router. B. Conducted from outside the perimeter switch but inside the firewall. C. Conducted from outside the organizations security perimeter. D. Conducted from outside the building that hosts the organizations servers.

A

C. Conducted from outside the organizations security perimeter

222
Q

What should be established immediately upon evidence seizure? A. Forensic analysis B. Start the incident respond plan C. Chain of custody D. Damage and loss control

A

C. Chain of custody

223
Q

Which of the following would be the MOST effective backup site for disaster recovery? A. Cold site B. Warm site C. Hot site D. Reciprocal agreement

A

C. Hot site

224
Q

Which of the following describes backing up files and software that have changed since that last full or incremental backup? A. Full backup B. Differential backup C. Incremental backup D. Delta backup

A

B. Differential backup

225
Q

Human resource department personnel should be trained about security policy: A. guidelines and enforcement B. maintenance C. monitoring and administration D. implemenation

A

A. guidelines and enforcement

226
Q

An enclosure that prevents radio frequency signals from emanating out of a controlled environment is BEST described as which of the following? A. Faraday cage B. Mantrap C. Grounded wiring frame D. TEMPEST

A

A. Faraday cage

227
Q

Which of the following is not a step in the incident response? A. recovery B. repudiation C. containment D. eradication

A

B. repudiation

228
Q

In a classified environment a clearance into a Top Secret compartment only allows access to certain information within that compartment. This is known as: A. dual control B. need to know C. separation of duties D. acceptable use

A

B. Need to know

229
Q

A representative from the human resouces department informs a security specialist that an employee has been terminated. Which of the following would be the BEST action to take? A. Disable the employee’s user accounts and keep the data for a specified period of time. B. Disable the employee’s user accounts and delete all data. C. Contact the employee’s supervisor regarding disposition of user accounts. D. Change the employee’s user password and keep the data for a specified period.

A

A. Disable the employee’s user accounts and keep the data for a specified period of time.

230
Q

Which one of the following processes is best to remove PII data from a disk drive before reuse? A. Reformatting B. Sanitization C. Degaussing D. Destruction

A

B. Sanitization

231
Q

Default passwords in hardware and software should be changed: A. if a threat becomes known B. once each month C. when the hardware or software is turned on D. when the vendor requires it

A

C. when the hardware or software is turned on

232
Q

The main objective of risk management in an organization is to reduce risk to a level: A. where the ALE is lower than the SLE B. where the ARO equals the SLE C. the organization will mitigate D. the organization will accept

A

D. the organization will accept

233
Q

Following a disaster which of the following functions should be returned FIRST from the backup facility to the primary facility? A. Web services B. Systems functions C. Executive functions D. Least critical functions

A

D. Least critical functions

234
Q

Choose the attack or mailicious code that cannot be prevented or deterred solely through using technical measures. A. Dictionary attacks B. Man in the middle attacks C. DoS attacks D. Social engineering

A

D. Social engineering

235
Q

Which one of the following options will allow for a network to remain operational after a T1 failure? A. Redundant servers B. Redundant ISP C. RAID 5 drive array D. Uninterruptible Power Supply (UPS)

A

B. Redundant ISP

236
Q

Which description is correct about a tool used by organizations to verify whether or not a staff member has been involved in mailicious activity? A. Mandatory vacations B. Time of day restrictions C. Implicit deny D. Implicit allow

A

A. Mandatory vacations

237
Q

Which of the following need to be backed up on a domain controller to be able to recover Active Directory? A. System Files B. User date C. system date D. Operating system

A

C. System state

238
Q

On the topic of comaring viruses and hoaxes which statement is TRUE? Choose the best TRUE statement. A. Hoaxes can create as much damage as a real virus. B.Hoaxes are harmless pranks and should be ignored. C. Hoaxes can help educate users about a virus D. Hoaxes carry a mailicious payload and can be destructive

A

A. Hoaxes can create as much damage as a real virus

239
Q

Which security measure should be used while implementing access control? A. Password complexity requirements B. Disabling SSID broadcast C. Time of day restrictions D. Changing default passwords

A

A. Password complexity requirements

240
Q

An administrator wants to make usre that no equipment is damaged when encountering a fire or false alarm in the server room. Which type of fire suppression system should be used? A. Carbon dioxide B. deluge sprinkler C. Hydrogen Peroxide D. Wet pipe sprinkler

A

A. Carbon dioxide

241
Q

When power must be delivered to critical systems which of the following is a countermeasure? A. Backup generator B. Warm site C. Redundant power supplies D. Uninterruptible power supplies (UPSs)

A

A. backup generator

242
Q

Who is finally in charge of the amount of residual risk? A. the senior management B. The DRP coordinator C. The security technician D. The organizations security officer

A

A. The senior management