section 9-10 Flashcards

1
Q

A systems administrator needs to set up a secure, cloud-based file transfer environment between two data centers. Which of the following architecture models would meet this requirement?

a.
FTP.
b.
HSM.
c.
SDN.
d.
PKI.

A

d.
PKI.Your Answer: Correct
Public Key Infrastructure (PKI) provides the means to securely transfer files using encryption and digital certificates. This ensures secure communication and data transfer between the two data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company wants to deploy PKI on its internet-facing website. The applications that are currently deployed are www.company.com (main website) contact.us.company.com (for locating a nearby location) quotes.company.com (for requesting a price quote) The company wants to purchase one SSL certificate that will work for all the existing applications and any future applications that follow the same naming conventions, such as store.company.com. Which of the following certificate types would best meet the requirements?

a.
SAN.
b.
Wildcard.
c.
Extended validation.
d.
Self-signed.

A

b.
Wildcard.Your Answer: Correct
A wildcard certificate is designed to secure a single domain and all its subdomains. It will cover the existing applications and any future applications that follow the same naming conventions ‘(e.g., *.company.com).’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following describes the process of concealing code or text inside a graphical image?

a.
Symmetric encryption.
b.
Hashing.
c.
Data masking.
d.
Steganography.

A

d.
Steganography.Your Answer: Correct
Steganography is the process of concealing code or text inside a graphical image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?

a.
Encryption at rest.
b.
Masking.
c.
Data classification.
d.
Permission restrictions.

A

a.
Encryption at rest.Correct Answer
Encryption at rest ensures that data on stolen laptops remains unreadable to unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?

a.
Hashing.
b.
Tokenization.
c.
Encryption.
d.
Segmentation.

A

c.
Encryption.Your Answer: Correct
Encryption ensures that sensitive data at rest is rendered unreadable to unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is used to validate a certificate when it is presented to a user?

a.
OCSP.
b.
CSR.
c.
CA.
d.
CRC.

A

a.
OCSP.Your Answer: Correct
Online Certificate Status Protocol (OCSP) checks the revocation status of an X.509 digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An organization wants to limit potential impact to its log-in database in the event of a breach. Which of the following options is the security team most likely to recommend?

a.
Tokenization.
b.
Hashing.
c.
Obfuscation.
d.
Segmentation.

A

b.
Hashing.Your Answer: Correct
Hashing passwords ensures that even if the log-in database is breached, the actual passwords are not easily retrievable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A systems administrator uses a key to encrypt a message being sent to a peer in a different branch office. The peer then uses the same key to decrypt the message. Which of the following describes this example?

a.
Symmetric.
b.
Asymmetric.
c.
Hashing.
d.
Salting.

A

a.
Symmetric.Your Answer: Correct
Symmetric encryption uses the same key for both encryption and decryption, as described in the scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?

a.
Key stretching.
b.
Data masking.
c.
Steganography.
d.
Salting.

A

d.
Salting.Your Answer: Correct
Salting involves adding a unique, random value to the input before hashing to prevent attackers from using precomputed hash tables to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?

a.
Partition.
b.
Asymmetric.
c.
Full disk.
d.
Database.

A

c.
Full disk.Your Answer: Correct
Full disk encryption (FDE) ensures that all data on a laptop’s hard drive is encrypted, providing comprehensive protection against data breaches if the device is lost or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of the attendees at a meeting starts to notice delays in the connection, and the HTTPS site requests are reverting to HTTP. Which of the following BEST describes what is happening?

a.
Birthday collision on the certificate key.
b.
DNS hacking to reroute traffic.
c.
Brute force to the access point.
d.
A SSL/TLS downgrade.

A

d.
A SSL/TLS downgrade.Your Answer: Correct
An SSL/TLS downgrade attack forces the connection to revert from a secure HTTPS to an insecure HTTP, compromising the security of the data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An audit report showed that a former employee saved the following files to an external USB drive before the employee’s termination date annual_tax_form.pdfF encrypted_passwords.db team_picture.jpg contact_list.db human_resources.txt Which of the following could the former employee do to potentially compromise corporate credentials?

a.
Perform an offline brute-force attack.
b.
Use the files to create a rainbow table.
c.
Conduct a token replay.
d.
Release a network dictionary attack.

A

a.
Perform an offline brute-force attack.Your Answer: Correct
The file encrypted_passwords.db suggests that it contains encrypted passwords. The former employee could perform an offline brute-force attack to try to decrypt these passwords, potentially compromising corporate credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Choose two.)

a. Key escrow.
b. Certificate authority linking.
c. Digital signatures.
d. Data tokenization.
e. Public key management.
f. TPM presence.

A

a. Key escrow.Your Answer: Correct
Key escrow securely stores encryption keys for recovery, ensuring that data can be decrypted if keys are lost or corrupted.

f. TPM presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

a.
Key stretching.Incorrect
b.
Tokenization.
c.
Data masking.
d.
Salting.

A

d.
Salting.Your Answer: Correct
Adding a random string (salt) to a password before hashing it makes it significantly harder for attackers to use precomputed hash tables (rainbow tables) to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly