Security Plus (Part 3)

Created by anuanes 

Upgrade to
remove ads

Questions 254-

A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers of personnel. Which of the following solutions would allow the small company to save money on hiring additional personnel and minimize the footprint in the current datacenter?

Software as a service

Which of the following should be installed to prevent employees from receiving unsolicited emails?

Spam filters

Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems, the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to identify the issue?

Vulnerability scan

Which of the following devices is often used to cache and filter content?

Proxies

Which of the following features should be enabled on perimeter doors to ensure that unauthorized access cannot be gained in the event of a power outage?

Fail closed

Which of the following would need to be configured correctly to allow remote access to the network?

ACLs

Used in conjunction, which of the following are PII? (Select TWO)

Birthday, Full name

The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likely occurring?

The development team is transferring data to test systems using SFTP and SCP

Jane, the company's Chief Information Officer (CIO), contacts the security administrator about an email asking for money in order to receive the key that would decrypt the source code that the attacker encrypted. Which of the following malware types is this MOST likely to be in this situation?

Ransomware

Which of the following BEST describes the process of key escrow?

Maintains a secured copy of a user's private key for the sole purpose of recovering the key if it is lost

Which of the following should be used to help prevent device theft of unused assets?

Locking cabinet

Which of the following BEST describes the purpose of fuzzing?

To discover buffer overflow vulnerabilites

When a user first moves into their residence, the user receives a key that unlocks and locks their front door. This key is only given to them but may be share with others they trust. Which of the following cryptography concepts is illustrated in the example above?

Symmetric key sharing

Which of the following devices would be installed on a single computer to prevent intrusion?

Host-based firewall

Which of the following attacks is BEST described as an attempt to convince Matt, an authorized user, to provide information that can be used to defeat technical security controls?

Impersonation

Which of the following would provide the MOST reliable proof that a datacenter was accessed at a certain time of day?

Video surveillance

Which of the following port numbers is used for SCP, by default?

22

Which of the following security controls is the BEST mitigation method to address mobile device data theft? (Select TWO)

Remote wipe, Device encryption

Which of the following is an example of the type of access control methodology provided on Windows systems by default?

Discretionary Access Control (DAC)

Which of the following is the primary difference between a virus and a worm?

A worm is self-replicating

By default, which of the following stops network traffic when the traffic is not identified in the firewall rule set?

Implicit deny

Jane, a system administrator, sees a firewall rule that applies to 10.4.4.58/27. Which of the following IP address ranges are encompassed by this rule?

10.4.4.32, 10.4.4.63

Which of the following is a control that is gained by using cloud computing?

High availability of the data

Matt, a security technician, is using TFTP. Which of the following port numbers is used for TFTP?

69

Which of the following may cause a user, connected to a NAC-enabled network, to not be prompted for credentials?

The user's PC is missing the authentication agent

Which of the following protocols should Pete, a security administrator, use to ensure that the data remains encrypted during transport over the internet? (Select THREE)

TLS, SSL, SSH

Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?

Business impact analysis

In order to ensure high availability of all critical servers, backups of the main datacenter are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in the case of a disaster?

Having the offsite location of tapes also be the hot site

Which of the following uses tickets to identify users to the network?

Kerberos

Which of the following network security techniques can be easily circumvented by using a network sniffer?

Implementing MAC filtering on WAPs

Which of the following is the correct formula for calculating mean time to restore (MTTR)?

MTTR = (Time of restore)#(time of fail)

Which of the following is used when performing a quantitative risk analysis?

Asset value

By default, CCMP will use which of the following to encrypt wireless transmission?

AES

Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?

Man-in-the-middle

Which of the following describes the importance of enacting and maintaining a clean desk policy?

To avoid passwords and sensitive data from being unsecured?

Which of the following relies on creating additional traffic to congest networks? (Select TWO)

Smurf attack, DDoS

Which of the following is an example of a smart card?

PIV

Which of the following can the security administrator implement to BEST prevent laptop device theft?

Cable locks

Which of the following is true about the private key in a PKI?

It is used to encrypt the email hash in signed emails

A security administrator has discovered though a password auditing software that most passwords can be discovered by cracking the first seven characters and then cracking the second part of the password. Which of the following is in use by the company?

LANMAN

In a disaster recovery situation, operations are to be moved to an alternate site. Computers and network connectivity are already present; however, production backups are several days out-of-date. Which of the following sites types is being described?

Warm site

Which of the following are the two basic components upon which cryptography relies?

Algorithms and keys

Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of data making it susceptible to brute force attacks?

LANMAN

Which of the following is susceptible to reverse lookup attacks if not configured properly?

DNS

Which of the following devices should Jane, a security administrator, use to allow secure remote network access for mobile users?

VPN concentrator

Which of the following is the BEST approach to perform risk mitigation of user access control rights?

Perform routine user permission reviews

The security administrator wants to ensure messages traveling between point A and point B are encrypted and authenticated. Which of the following accomplishes this task?

RSA

During the analysis of a malicious code, a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?

Buffer overflow

Which of the following malware types is an antivirus scanner MOST unlikely to discover? (Select TWO)

Pharming, Logtic bomb

Which of the following BEST describes the proper method and reason to implement port security?

Apply a security control which ties specific port to end-device MAC addresses and prevents additional devices from being connected to the network.

If continuity plans are not regularly exercised, which of the following aspects of business continuity planning are often overlooked until a disaster occurs?

Single points of failure

Matt, a security technician, needs to increase his password's key space. Which of the following increases the key space of a password the MOST?

Letters, numbers and special characters

Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?

Tailgating

Which of the following environmental control would BEST be used to regulate cooling within a datacenter?

Hot and cold aisles

When an attack using a publicly unknown vulnerability compromises a system, it is considered to be which of the following?

Zero day attack

A programmer allocates 16 bites for a string variable, but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?

Buffer overflow

Which of the following devices provides storage for RSA or asymmetric keys and may assists in user authentication? (Select TWO)

Trusted platform module, Hardware security module

A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?

Integrity

Providing elastic computing resources that give a client access to more resources, allowing for distribution of large jobs across a flexible number of machines, or allowing for distributed storage of information are all hallmarks of which technology?

Cloud computing

Which of the following is MOST likely to be the last rule contained on any firewall?

Implicit deny

Which of the following is MOST relevant for Jan, a security administrator, to use when investigating a SQL injection attack?

Stored procedures

A security administrator wants to prevent users in sales from accessing their servers after ^pm, and prevent them from accessing accounting's network at all times. Which of the following should the administrator implement to accomplish these goals? (Select TWO)

Time of day restrictions, Access control lists

In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (select TWO)

Firewall, VPN

Which of the following file transfer protocols is an extension of SSH?

SFTP

Which of the following would an administrator do to ensure that an application is secure an all unnecessary services are disabled?

Application hardening

A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last month. Which of the following is MOST likely causing the disconnections?

The new access point was mis-configured and is interfering with another nearby access point.

Which of the following is a reason to perform a penetration test?

To determine the impact of a threat against the enterprise

Which of the following is a method to prevent ad-hoc configuration mistakes?

Implement a change management strategy

Which of the following is a form of photo identification used to gain access into a secure location?

CAC

Which of the following is a management control type?

Vulnerability scanning

Which of the following has a programmer MOST likely failed to consider if a user entering improper input is able to crash a program?

Error handling

Pete, a security administrator, is considering using TACACS+. Which of the following is a reason to use TACACS+ over RADIUS?

Encryption of all dtat between client and server

Which of the following would an administrator apply to mobile devices to BEST ensure the confidentiality of data?

Device encryption

Which of the following devices would allow a technician to view IP headers on a data packet?

Protocol analyzer

Matt, an attacker, incorrectly submits data on a website's form and is able to determine the type of database used by the application and the SQL statements used to query that database. Which of the following is responsible for this information disclosure?

Error handling

Which of the following environmental variables reduces the potential for static discharges?

Humidity

Which of the following methods BEST describes the use of hiding data within other files?

Steganography

Which of the following is an example of authentication using something Sara, a user, has and something she is?

Token and fingerprint scan

A professor at a university is given two keys. One key unlocks a classroom door and the other locks it. The key used to lock the door is available to all other faculty. The key used to unlock the door is only given to the professor. Which of the following cryptography concepts is illustrated in the example above?

Asymmetric key sharing

When granting access, which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?

TACACS+

Which of the following web application security weakness can be mitigated by preventing the use of HTML tags?

Cross-site scripting

Which of the following can cause hardware based drive encryption to see slower deployment?

A lack of management software

Which of the following should the security administrator look at FRIST when implementing an AP to gain more coverage?

Power levels

Large, partially self-governing, collection of hosts executing instructions for a specific purpose is an example of which type of malware?

Botnet

Matt, a security administrator, is using AES. Which of the following cipher types is used by AES?

Block

Which of the following is a reason to perform user awareness and training?

To mimimize the organizational risk posed by users

DRPs should contain which of the following?

Hierarchical list of critical systems

Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?

Protocol analyzer

The MAIN difference between qualitative and quantitative risk assessment is:

quantitative is based on hard numbers while qualitative is based on subjective ranking

Pete, a system administrator, was recently laid off for compromising various accounting systems within the company. A few months later, the finance department reported their applications were not working correctly. Upon further investigation, it was determined that unauthorized accounting software was installed onto a financial system and several application exploits existed within that system. This is an example of which of the following?

Trojan horse

A hard drive of a terminated employee has been encrypted with full disk encryption, and Sara, a technician, is not able to decrypt the data. Which of the following ensures that, in the future, Sara will be able to decrypt this information?

Key escrow

Jane, a security technician, needs to transfer files. Which of the following is the file transfer function that utilizes the MOST secure form of data transport?

SFTP

A security administrator has been receiving support tickets for unwanted windows appearing on user's workstations. Which of the following can the administrator implement to help prevent this from happening?

Pop-up blockers

Which of the following exploitation types involves injection of pseudo-random data in order to crash or provide unexpected results from an application?

Fuzzing

Due to sensitive data concerns, a security administrator has enacted a policy preventing the use of flash drives. Additionally, which of the following can the administrator implement to reduce the risk of data leakage?

Enact a policy banning users from bringing in personal music devices

Which of the following asymmetric encryption keys is used to encrypt data to ensure only the intended recipient can decrypt the ciphertext?

public

An application log shows that the text "test; rm -rf/ect/passwd" was entered into a HTML form. Which of the following describes the type of attack that was attempted?

Command injection

Which of the following can prevent an unauthorized employee from entering a data center? (Select TWO)

Security guard, Proximity reader

Which of the following can Matt, a security administrator, use to provide integrity verification when storing data?

Hashing

Which of the following is the MOST effective method to provide security for an in-house created application during software development?

Explicity include security gates during the SDLC

Which of the following penetration testing types is performed by security professionals with limited inside knowledge of the network?

Gray box

Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?

25

A thumbprint scanner is used to test which of the following aspects of human authentication?

Something a user is

A security engineer is troubleshooting a server in the DMZ, which cannot be reached from the internet or the internal network.. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?

The server is missing the default gateway

Which of the following can Jane, a security administrator, used to help prevent man-in-the middle attacks?

Kerberos

A business-critical application will be installed on an internet facing server. Which of the following is the BEST security control that should be performed in conjunction with updating the application to the MOST current version?

Vendor-provided hardening documentation should be reviewed and applied

Upper management decides which risk to mitigate based on cost. This is an example of:

quantitative risk assessment

Which of the following, when used in conjunction with software-based encryption, enhances platform authentication by storing unique RSA keys and providing crypto processing?

TPM

Using both a username and a password is an example of:

Single factor authentication

A security administrator ensures that certain characters and commands entered on a web server are not interpreted as legitimate data and not passed onto backend server. This is an example of which of the following?

Input validation

A certificate that has not been compromised should be published to which of the following?

CRL

A programmer cannot change the production system directly and must have code changes reviewed and approved by the production system manager. Which of the following describes this control type?

Separation of dutes

A security administrator needs to install a new switch for a conference room where two different groups will be having separate meetings. Each of the groups uses different subnets and need to have their traffic separated. Which of the following would be the SIMPLEST solution?

Creat two VLANs on the switch

Which of the following describes a passive attempt to identify weakness?

Vulnerability scanning

Which of the following would be a reason to implement DAC as an access control model?

The owner of the data should decide who has access

When configuring multiple computers for RDP on the same wireless router, it may be necessary to do which of the following?

Forward to different RDP listening ports.

All of the following are valid cryptographic hash functions EXCEPT:

RC4

Which of the following is a best practice to identify fraud from an employee in a sensitive position?

Mandatory vacations

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set