Security (1) Flashcards
Which of the following is a useful feature in the use of mantraps and entry control rosters?
Key fob
Security guard
Biometric lock
Security guard
A security guard is helpful in making a mantrap more effective and to maintain the entry control roster
An organization has contacted you for help in stopping security breaches on its servers. The latest breach involved the use of a flash drive to steal credentials. Which of the following is designed to stop this type of security breach?
Privacy screen
Cable lock
USB lock
USB lock
A USB lock prevents unused USB ports from being “borrowed” for data theft
RFID, magnetic strip, barcode, and QR code technologies can all be used by which of the following?
Badge reader
Smart card
Mantrap
Badge reader
Different types of badge readers use these technologies
A Kensington lock connector is used by which of the following devices?
Door lock
USB lock
Cable lock
Cable lock
The cable lock connector was developed by Kensington, hence the name
A mantrap is specifically designed to achieve which of the following?
Stop viruses from being introduced by users
Prevent multiple users from entering a secure area at the same time
Catch users who evade biometric locks
Prevent multiple users from entering a secure area at the same time
A mantrap is specifically designed to prevent tailgating. One door leads into the mantrap, and only when a single authorized person is present in the mantrap will the other door into the secure area be opened
Which of the following violates the principle of least privilege?
Making all users administrators
Creating home folders
Using smart cards to restrict access
Making all users administrators
The principle of least privilege states that users should have permission to access only the resources they need to perform for their jobs—so making all users administrators is the opposite
You are in charge of managing two different departments that need different types of access. Which of the following is the easiest way to provide the settings for each department?
Put each department into a separate domain
Write login scripts for each user in each department
Put each department into its own OU
Put each department into its own OU
Putting each department into its own organizational unit (OU) via Active Directory makes it easy to have separate settings for each department
You are creating an MDM policy for your department, which tests and uses a wide variety of devices. Which of the following device types does not need to be included in the MDM policy?
Laptop
Smart phone
Desktop
Desktop
Desktop computers are not mobile, so they don’t need to be included in a mobile device management (MDM) policy
You are working on security for a router that is used with a defined list of devices. Which of the following should you create to restrict access?
Whitelist
Blue screen
Blacklist
Whitelist
Creating a whitelist of MAC addresses allowed access is part of router security when it is used with a known list of devices. A blacklist is used to block specific computers by MAC address
Your network uses self-signed security certificates for its intranet. A new user is alarmed because her browser displayed a certificate warning when trying to connect to a website on the intranet. Which of the following should you tell the user?
Never go to a website that displays a certificate warning.
Always ignore certificate warnings.
Company intranet sites are safe and you can proceed despite the warning.
Company intranet sites are safe and you can proceed despite the warning.
The user needs to know the difference between intranet and Internet sites because it affects the rules for handling browser warnings
If you log in to a server with your user name and password, which type of authentication is being used?
Multifactor
TACACS
Single-factor
Single-factor
This is single-factor authentication because the user name and password together are a single factor (knowledge)
WPA/WPA2 Enterprise uses which type of server for authentication?
TKIP
AES
RADIUS
RADIUS
A RADIUS server is used for authentication instead of storing the encryption key in the router (as with SOHO networks)
If a wireless network uses both TKIP and AES encryption, which two types of wireless security is it using? (Choose two.)
WPA
WEP
WPA2
Multifactor
WPA
WPA2
Many routers support both WPA and WPA2 protocols by enabling the use of both TKIP and AES encryption
Entering a code sent to a device along with a user name and password constitutes which type of authentication?
RADIUS authentication
Multifactor authentication
Single-factor authentication
Multifactor authentication
This is multifactor authentication because the user name/password combo is one factor (knowledge) and the code is the second factor (possession)
Which of the following is true of WEP encryption? (Choose all that apply.)
Features 40-bit encryption
Some versions feature 256-bit encryption
Strongest wireless encryption standard
Weakest wireless encryption standard
Features 40-bit encryption
Weakest wireless encryption standard
The original version of WEP encryption uses 40-bit codes, and WEP is by far the weakest and easiest-to-crack wireless encryption standard