How can we help?

You can also find more resources in our Help Center.

816 terms

Security+

STUDY
PLAY
Which of the following logical access control methods would a security administrator need to
modify in order to control network traffic passing through a router to a different network?

A. Configuring VLAN 1
B. ACL
C. Logical tokens
D. Role-based access control changes
ACL
Which of the following tools limits external access to the network?

A. IDS
B. VLAN
C. Firewall
D. DMZ
Firewall
Which of the following tools was created for the primary purpose of reporting the services that are
open for connection on a networked workstation?

A. Protocol analyzer
B. Port scanner
C. Password crackers
D. Vulnerability scanner
Port scanner
Which of the following is MOST likely to be an issue when turning on all auditing functions within a
system?

A. Flooding the network with all of the log information
B. Lack of support for standardized log review tools
C. Too much information to review
D. Too many available log aggregation tools
Too much information to review
Upon opening the browser, a guest user is redirected to the company portal and asked to agree to
the acceptable use policy. Which of the following is MOST likely causing this to appear?

A. NAT
B. NAC
C. VLAN
D. DMZ
NAC
USB devices with a virus delivery mechanism are an example of which of the following security
threats?

A. Adware
B. Trojan
C. Botnets
D. Logic bombs
Trojan
Cell phones with network access and the ability to store data files are susceptible to which of the
following risks?

A. Input validation errors
B. SMTP open relays
C. Viruses
D. Logic bombs
Viruses
When establishing a connection between two IP based routers, which of the following protocols is
the MOST secure?

A. TFTP
B. HTTPS
C. FTP
D. SSH
SSH
Which of the following algorithms provides better protection against brute force attacks by using a
160-bit message digest?

A. MD5
B. SHA-1
C. LANMAN
D. NTLM
SHA-1
Which of the following access control technologies provides a rolling password for one-time use?

A. RSA tokens
B. ACL
C. Multifactor authentication
D. PIV card
RSA Tokens
Which of the following technologies is used to verify that a file was not altered?

A. RC5
B. AES
C. DES
D. MD5
MD5
Which of the following uses an RC4 key that can be discovered by eavesdropping on plain text
initialization vectors?

A. WEP
B. TKIP
C. SSH
D. WPA
WEP
An administrator wants to crack passwords on a server with an account lockout policy. Which of
the following would allow this without locking accounts?

A. Try guessing passwords slow enough to reset the bad count interval.
B. Try guessing passwords with brute force.
C. Copy the passwordfile offline and perform the attack on it.
D. Try only real dictionary words.
Copy the password file offline and perform the attack on it
A user reports that each time they attempt to go to a legitimate website, they are sent to an
inappropriate website. The security administrator suspects the user may have malware on the
computer, which manipulated some of the user's files. Which of the following files on the user's
system would need to be checked for unauthorized changes?

A. SAM
B. LMhosts
C. Services
D. Hosts
Hosts
An administrator needs to limit and monitor the access users have to the Internet and protect the
internal network. Which of the following would MOST likely be implemented?

A. A heuristic firewall
B. DNS caching on the client machines
C. A pushed update modifying users' local host file
D. A content-filtering proxy server
A content-filtering proxy server
Which of the following is a malicious program used to capture information from an infected
computer?

A. Trojan
B. Botnet
C. Worm
D. Virus
Trojan
The security administrator needs to make a change in the network to accommodate a new remote
location. The new location will be connected by a serial interface, off the main router, through a
commercial circuit. This remote site will also have traffic completely separated from all other traffic.
Which of the following design elements will need to be implemented to accommodate the new
location?

A. VLANs need to be added on the switch but not the router.
B. The NAT needs to be re-configured to allow the remote location.
C. The current IP scheme needs to besubnetted.
D. The switch needs to be virtualized and a new DMZ needs to be created
The current IP scheme needs to be subnetted
Which of the following is the MOST secure authentication method?

A. Smartcard
B. Iris
C. Password
D. Fingerprints
Iris
Mitigating security risks by updating and applying hot fixes is part of:

A. patch management.
B. vulnerability scanning.
C. baseline reporting.
D. penetration testing.
Patch Management
When reviewing IDS logs, the security administrator notices many events pertaining to a "NOOP
sled". Which of the following attacks is occurring?

A. Man-in-the-middle
B. SQL injection
C. Buffer overflow
D. Session hijacking
Buffer Overflow
Which of the following is the MAIN difference between a hotfix and a patch?

A. Hotfixes follow a predetermined release schedule while patches do not.
B. Hotfixes are smaller than patches.
C. Hotfixes may be released at anytime and will later be included in a patch.
D. Patches can only be applied after obtaining proper approval, whilehotfixes do not need
management approval
Hotfixes may be released at anytime and will later be included in a patch
A vulnerability assessment was conducted against a network. One of the findings indicated an outdated
version of software. This is an example of weak:

A. security policies.
B. patch management.
C. acceptable use policies.
D. configuration baselines.
Patch Management
Which of the following tools can execute a ping sweep?

A. Protocol analyzer
B. Anti-virus scanner
C. Network mapper
D. Password cracker
Network Mapper
Which of the following is a newer version of SSL?
A. SSH
B. IPSec
C. TLS
D. L2TP
TLS
A technician visits a customer site which prohibits portable data storage devices. Which of the
following items would be prohibited? (Select TWO).

A. USB Memory key
B. Bluetooth-enabled cellular phones
C. Wireless network detectors
D. Key card
E. Items containing RFID chips
USB Memory Key, Bluetooth-Enabled Cellular Phones
Which of the following is used when performing a qualitative risk analysis?

A. Exploit probability
B. Judgment
C. Threat frequency
D. Asset value
Exploit Probability
A certificate has been revoked, and the administrator has issued new keys. Which of the following
must now be performed to exchange encrypted email?

A. Exchange private keys with each other
B. Recover old private keys
C. Recover old public keys
D. Exchange public keys with each other
Exchange public keys with each other
Exploitation of security vulnerabilities is used during assessments when which of the following is
true?

A. Security testers have clear and written authorization to conduct vulnerability scans.
B. Security testers are trying to document vulnerabilities without impacting network operations.
C. Network users have permissions allowing access to network devices with security weaknesses.
D. Security testers have clear and written authorization to conduct penetration testing.
Security testers have clear and written authorization to conduct penetration testing
Which of the following should a technician deploy to detect malicious changes to the system and
configuration?

A. Pop-up blocker
B. File integrity checker
C. Anti-spyware
D. Firewall
File Integrity Checker
In order to prevent data loss in case of a disk error which of the following options would an
administrator MOST likely deploy?

A. Redundant connections
B. RAID
C. Disk striping
D. Redundant power supplies
RAID
A technician has installed security software; shortly thereafter the response time slows
considerably. Which of the following can be used to determine the effect of the new software?

A. Event logs
B. System monitor
C. Performance monitor
D. Protocol analyzer
Performance Monitor
After installing database software the administrator must manually change the default
administrative password, remove a default database, and adjust permissions on specific files.
These actions are BEST described as:

A. vulnerability assessment.
B. mandatory access control.
C. application hardening.
D. least privilege
Mandatory Access Control
Which of the following is the BEST mitigation method to implement when protecting against a
discovered OS exploit?

A. NIDS
B. Patch
C. Antivirus update
D. HIDS
Patch
Which of the following is the primary concern of governments in terms of data security?

A. Integrity
B. Availability
C. Cost
D. Confidentiality
Confidentiality
Which of the following is BEST used to change common settings for a large number of deployed
computers?
A. Group policies
B. Hotfixes
C. Configuration baselines
D. Security templates
Group Policies
Which of the following solutions would a company be MOST likely to choose if they wanted to
conserve rack space in the data center and also be able to manage various resources on the
servers?

A. Install a manageable, centralized power and cooling system
B. Server virtualization
C. Different virtual machines on a local workstation
D. Centralize all blade servers and chassis within one or two racks
Server Virtualization
A rogue wireless network is showing up in the IT department. The network appears to be coming
from a printer that was installed. Which of the following should have taken place, prior to this
printer being installed, to prevent this issue?

A. Installation of Internet content filters to implement domain name kiting.
B. Penetration test of the network to determine any further rogue wireless networks in the area.
C. Conduct a security review of the new hardware to determine any possible security risks.
D. Implement a RADIUS server to authenticate all users to the wireless network.
Conduct a security review of the new hardware to determine any possible security risks
Which of the following characteristics distinguishes a virus from a rootkit, spyware, and adware?

A. Eavesdropping
B. Process hiding
C. Self-replication
D. Popup displays
Self-Replication
Which of the following is used to generate keys in PKI?

A. AES
B. RSA
C. DES
D. 3DES
RSA
Which of the following methods is a best practice for granting access to resources?

A. Add ACLs to computers; add computers to groups.
B. Add ACLs to users; add users to groups.
C. Add users to ACLs; add computers to groups.
D. Add groups to ACLs; add users and computers to groups.
Add groups to ACLs; add users and computers to groups
Which of the following may cause a user, connected to a NAC-enabled network, to not be
prompted for credentials?

A. The user's PC is missing the authentication agent.
B. The user's PC is not fully patched.
C. The user's PC is not at the latest service pack.
D. The user's PC has out-of-date antivirus software.
The user's PC is missing the authentication agent
When used to encrypt transmissions, which of the following is the MOST resistant to brute force
attacks?

A. SHA
B. MD5
C. 3DES
D. AES256
AES256
Which of the following BEST describes how the private key is handled when connecting to a
secure web server?

A. The key is not shared and remains on the server
B. Anyone who connects receives the key
C. Only users from configured IP addresses received the key
D. All authenticated users receive the key
The key is not shared and remains on the server
A user visits their normal banking website. The URL is correct and the website is displayed in the
browser, but the user gets an SSL warning that the SSL certificate is invalid as it is signed by an
unknown authority. Which of the following has occurred?

A. Domain name kiting
B. Privilege escalation
C. Replay attack
D. Man-in-the-middle attack
Man-in-the-middle attack
A technician reviews the system log entries for an internal DNS server. Which of the following
entries MOST warrants further investigation?

A. DNS query from a source outside the organization
B. DNS query from a source inside the organization
C. Zone transfer to a source inside the organization
D. Zone transfer to a source outside the organization
Zone transfer to a source outside the organization
Monitoring a computer's logs and critical files is part of the functionality of a:

A. NIPS.
B. HIDS.
C. firewall.
D. honeypot.
HIDS
Which of the following can be implemented as an OS hardening practice to mitigate risk?

A. Domain name kiting
B. Removable storage
C. Input validation
D. Security templates
Security templates
Continuously documenting state and location of hardware from collection to disposition during a
forensic investigation is known as:

A. risk mitigation.
B. data handling.
C. chain of custody.
D. incident response.
Incident Response
Which of the following is an example of two factor authentication?

A. PIN and password
B. Smartcard and token
C. Smartcard and PIN
D. Fingerprint and retina scan
Smartcard and PIN
Which of the following uses a three-way-handshake for authentication and is commonly used in
PPP connections?

A. MD5
B. CHAP
C. Kerberos
D. SLIP
CHAP
A security analyst has been notified that one of the web servers has stopped responding to web
traffic. The network engineer also reports very high bandwidth utilization to and from the Internet.
Which of the following logs is MOST likely to be helpful in finding the cause and source of the
problem?

A. Access log
B. Event log
C. System log
D. Firewall log
Firewall Log
Which of the following ports would need to be open to allow TFTP by default?

A. 69
B. 110
C. 137
D. 339
69
Which of the following transmission types would an attacker most likely use to try to capture data
packets?

A. Shielded twisted pair
B. Fiberoptic
C. Bluesnarfing
D. Wireless
Wireless
Which of the following describes a port that is left open in order to facilitate access at a later date?

A. Honeypot
B. Proxy server
C. Open relay
D. Backdoor
Backdoor
Which of the following is often bundled with freely downloaded software?

A. Cookies
B. Logic bomb
C. Adware
D. Spam
Adware
Which of the following security types would require the use of certificates to verify a user's
identity?

A. Forensics
B. CRL
C. PKI
D. Kerberos
PKI
Which of the following can increase risk? (Select TWO)

A. Vulnerability
B. Mantrap
C. Configuration baselines
D. Threat source
E. Mandatory vacations
Vulnerability, Threat Source
An administrator believes a user is secretly transferring company information over the Internet.
The network logs do not show any non-standard traffic going through the firewall. Which of the
following tools would allow the administrator to better evaluate the contents of the network traffic?

A. Vulnerability scanner
B. Network anomaly detection
C. Protocol analyzer
D. Proxy server
Protocol Analyzer
Which of the following monitoring technology types is MOST dependent on receiving regular
updates?

A. Signature-based
B. Kerberos-based
C. Behavior-based
D. Anomaly-based
Signature-based
A company has just recovered from a major disaster. Which of the following should signify the
completion of a disaster recovery?

A. Verify all servers are back online and working properly.
B. Update the disaster recovery plan based on lessons learned.
C. Conduct post disaster recovery testing.
D. Verify all network nodes are back online and working properly.
Update the disaster recovery plan based on lessons learned
Which of the following is a public key cryptosystem?

A. RSA
B. SHA-1
C. 3DES
D. MD5
RSA
A user tries to plug their laptop into the company's network and receives a warning that their
patches and virus definitions are out-of-date. This is an example of which of the following
mitigation techniques?

A. NAT
B. Honeypot
C. NAC
D. Subnetting
NAC
A file has been compromised with corrupt data and might have additional information embedded
within it. Which of the following actions should a security administrator follow in order to ensure
data integrity of the file on that host?

A. Disable the wireless network and copy the data to the next available USB drive to protect the
data
B. Perform proper forensics on the file with documentation along the way.
C. Begin chain of custody for the document and disallow access.
D. Run vulnerability scanners and print all reports of all diagnostic results.
Perform proper forensics on the file with documentation along the way
Every company workstation contains the same software prior to being assigned to workers. Which
of the following software options would give remote users the needed protection from outside
attackers when they are outside of the company's internal network?

A. HIDS
B. Vulnerability scanner
C. Personal firewall
D. NIPS
Personal Firewall
To ensure users are logging into their systems using a least privilege method, which of the
following should be done?

A. Create a user account without administrator privileges.
B. Employ a BIOS password that differs from the domain password.
C. Enforce a group policy with the least amount of account restrictions.
D. Allow users to determine their needs and access to resources.
Create a user account without administrator privileges
A recent security audit shows an organization has been infiltrated with a former administrator's
credentials. Which of the following would be the BEST way to mitigate the risk of this vulnerability?

A. Conduct periodic audits of disaster recovery policies.
B. Conduct periodic audits of password policies.
C. Conduct periodic audits of user access and rights.
D. Conduct periodic audits of storage and retention policies.
Conduct periodic audits of user access and rights
A security administrator is analyzing the packet capture from an IDS triggered filter. The packet
capture shows the following string:
<scrip>source=http://www.evilsite.jp/evil.js</script>
Which of the following attacks is occurring?

A. SQL injection
B. Redirection attack
C. Cross-site scripting
D. XLM injection
Cross-site scripting
A user wants to edit a file that they currently have read-only rights to; however, they are unable to
provide a business justification, so the request is denied. This is the principle of:

A. separation of duties.
B. job-based access control
C. least privilege.
D. remote access policy.
Least Privilege
Which of the following concepts addresses the threat of data being modified without authorization?

A. Integrity
B. Key management
C. Availability
D. Non-repudiation
Integrity
An attacker sends packets to a host in hopes of altering the host's MAC table. Which of the
following is the attacker attempting to do?

A. Port scan
B. Privilege escalation
C. DNS spoofing
D. ARP poisoning
ARP Poisoning
Which of the following is a best practice for organizing users when implementing a least privilege
model?

A. By function
B. By department
C. By geographic location
D. By management level
By Function
Which of the following describes how long email messages are available in case of a subpoena?

A. Backup procedures
B. Retention policy
C. Backup policy
D. Email server configuration
Retention Policy
Management would like to know if anyone is attempting to access files on the company file server.
Which of the following could be deployed to BEST provide this information?
A. Software firewall
B. Hardware firewall
C. HIDS
D. NIDS
HIDS
Which of the following is the correct risk assessment equation?

A. Risk = exploit x number of systems x cost of asset
B. Risk = infections x number of days infected x cost of asset
C. Risk = threat x vulnerability x cost of asset
D. Risk = vulnerability x daysunpatched x cost of asset
Risk = threat x vulnerability x cost of asset
Which of the following is of the GREATEST concern in regard to a rogue access point?

A. Rogue access points are hard to find and remove from the network.
B. Rogue access points can scan the company's wireless networks and find other unencrypted
and rouge access points
C. The radio signal of the rogue access point interferes with company approved access points.
D. Rogue access points can allow unauthorized users access the company's internal networks.
Rogue access points can allow unauthorized users access to the company's internal networks
The process of validating a user's claimed identity is called:

A. identification.
B. authorization.
C. validation.
D. repudiation.
Identification
Which of the following is a benefit of utilizing virtualization technology?

A. Lowered cost of the host machine
B. Less overhead cost of software licensing
C. Streamline systems to a single OS
D. Fewer systems to monitor physical access
Fewer systems to monitor physical access
The security administrator wants to increase the cipher strength of the company's internal root
certificate. Which of the following would the security administer use to sign a stronger root
certificate?

A. Certificate authority
B. Registration authority
C. Key escrow
D. Trusted platform module
Certificate Authority
Which of the following describes a semi-operational site that in the event of a disaster, IT
operations can be migrated?

A. Hot site
B. Warm site
C. Mobile site
D. Cold site
Warm Site
Which of the following devices hooks into a LAN and captures traffic?

A. Protocol analyzer
B. Protocol filter
C. Penetration testing tool
D. Vulnerability assessment tool
Protocol Analyzer
When assessing a network containing resources that require near 100% availability, which of the
following techniques should be employed to assess overall security?

A. Penetration testing
B. Vulnerability scanning
C. User interviews
D. Documentation reviews
Vulnerability Scanning
Which of the following would MOST likely contain a <SCRIPT> tag?

A. Cookies
B. XSS
C. DOS
D. Buffer overflow
XSS
Which of the following is a reason why wireless access points should not be placed near a
building's perimeter?

A. Rouge access points
B. Vampire taps
C. Port scanning
D. War driving
War Diving
A new enterprise solution is currently being evaluated due to its potential to increase the
company's profit margins. The security administrator has been asked to review its security
implications. While evaluating the product, various vulnerability scans were performed. It was
determined that the product is not a threat but has the potential to introduce additional
vulnerabilities. Which of the following assessment types should the security administrator also take
into consideration while evaluating this product?

A. Threat assessment
B. Vulnerability assessment
C. Code assessment
D. Risk assessment
Risk Assessment
Which of the following tools BEST identifies the method an attacker used after they have entered
into a network?

A. Input validation
B. NIDS
C. Port scanner
D. HIDS
NIDS
Which of the following is a major risk associated with cloud computing?
A. Loss of physical control over data
B. Increased complexity of qualitative risk assessments
C. Smaller attack surface
D. Data labeling challenges
Loss of physical control over data
Which of the following is MOST likely the reason why a security administrator would run a Nessus
report on an important server?

A. To analyze packets and frames
B. To report on the performance of the system
C. To scan for vulnerabilities
D. To enumerate and crack weak system passwords
To scan for vulnerabilities
Which of the following BEST describes how the mandatory access control (MAC) method works?

A. It is an access policy based on a set of rules.
B. It is an access policy based on the role that the user has in an organization.
C. It is an access policy based on biometric technologies.
D. It is an access policy that restricts access to objects based on security clearance.
It is an access policy that restricts access to objects based on security clearance
Using a smartcard and a physical token is considered how many factors of authentication?
A. One
B. Two
C. Three
D. Four
One
Which of the following protocols is considered more secure than SSL?

A. TLS
B. WEP
C. HTTP
D. Telnet
TLS
A NIDS monitoring traffic on the public-side of a firewall provides which of the following?

A. Faster alerting to internal compromises
B. Intelligence about external threats
C. Protection of the external firewall interface
D. Prevention of malicious traffic
Intelligence about external threats
Which of the following is an important part of disaster recovery training?

A. Schemes
B. Storage locations
C. Chain of custody
D. Table top exercises
Table top exercises
Which of the following would a network administrator implement to control traffic being routed
between networks or network segments in an effort to preserve data confidentiality?

A. NAT
B. Group policies
C. Password policies
D. ACLs
ACLs
The security administrator wants each user to individually decrypt a message but allow anybody to
encrypt it. Which of the following MUST be implemented to allow this type of authorization?

A. Use of digital certificates
B. Use of public keys only
C. Use of private keys only
D. Use of public and private keys
Use of public and private keys
A security administrator is analyzing the packet capture from an IDS triggered filter. The packet
capture shows the following string:
a or1 ==1--
Which of the following attacks is occurring?

A. Cross-site scripting
B. XML injection
C. Buffer overflow
D. SQL injection
SQL injection
Which of the following has been implemented if several unsuccessful login attempts were made in
a short period of time denying access to the user account, and after two hours the account
becomes active?

A. Account lockout
B. Password expiration
C. Password disablement
D. Screen lock
Account lockout
Which of the following BEST describes an intrusion prevention system?

A. A system that stops an attack in progress.
B. A system that allows an attack to be identified.
C. A system that logs the attack for later analysis.
D. A system that serves as ahoneypot.
A system that stops an attack in progress
In the event of a disaster, in which the main datacenter is immediately shutdown, which of the
following would a company MOST likely use with a minimum Recovery Time Objective?

A. Fault tolerance
B. Hot site
C. Cold site
D. Tape backup restoration
Hot site
Which of the following methods involves placing plain text data within a picture or document?

A. Steganography
B. Digital signature
C. Transport encryption
D. Stream cipher
Steganography
Which of the following is a detective security control?

A. CCTV
B. Firewall
C. Design reviews
D. Bollards
CCTV
Which of the following can cause hardware based drive encryption to see slower deployment?

A. A lack of management software
B. USB removable drive encryption
C. Role/rule-based access control
D. Multifactor authentication with smart cards
USB Removable drive encryption
Which of the following is a reason to implement Kerberos over local system authentication?

A. Authentication to multiple devices
B. Centralized file integrity protection
C. Non-repudiation
D. Greater password complexity
Centralized file integrity protection
Which of the following should a security administrator implement to ensure there are no security
holes in the OS?

A. Encryption protocols
B. Firewall definitions
C. Patch management
D. Virus definitions
Patch Management
Which of the following cipher types is used by AES?

A. Block
B. Fourier
C. Stream
D. Turing
Block
Which of the following control systems is used to maintain proper environmental conditions in a
datacenter?

A. HVAC
B. Bollards
C. CCTV
D. Mantrap
HVAC
A penetration test shows that almost all database servers were able to be compromised through a
default database user account with the default password. Which of the following is MOST likely
missing from the operational procedures?

A. Application hardening
B. OS hardening
C. Application patch management
D. SQL injection
OS Hardening
A user reports that their 802.11n capable interface connects and disconnects frequently to an
access point that was recently installed. The user has a Bluetooth enabled laptop. A company in
the next building had their wireless network breached last month. Which of the following is MOST
likely causing the disconnections?

A. An attacker inside the company is performing abluejacking attack on the user's laptop.
B. Another user's Bluetooth device is causing interference with the Bluetooth on the laptop.
C. The new access point wasmis-configured and is interfering with another nearby access point.
D. The attacker that breached the nearby company is in the parking lot implementing a war driving
attack.
The new access point wasmis-configured and is interfering with another nearby access point.
Which of the following facilitates computing for heavily utilized systems and networks?

A. Remote access
B. Provider cloud
C. VPN concentrator
D. Telephony
VPN Concentrator
A security administrator finished taking a forensic image of a computer's memory. Which of the
following should the administrator do to ensure image integrity?

A. Run the image through AES128.
B. Run the image through a symmetric encryption algorithm.
C. Compress the image to a password protected archive.
D. Run the image through SHA256.
Run the image through SHA256
Which of the following is a reason to use TACACS+ over RADIUS?

A. Combines authentication and authorization
B. Encryption of all data between client and server
C. TACACS+ uses the UDP protocol
D. TACACS+ has less attribute-value pairs
Encryption of all data between client and server
A customer has called a company to report that all of their computers are displaying a rival
company's website when the user types the correct URL into the browser. All of the other websites
the user visits work correctly and other customers are not having this issue. Which of the following
has MOST likely occurred?

A. The website company has amisconfigured firewall.
B. The customer has a virus outbreak.
C. The customer's DNS has been poisoned.
D. The company's website has been attacked by the rival company
The customer's DNS has been poisoned
A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?

A. Whaling
B. Bluesnarfing
C. Vishing
D. Dumpster diving
Whaling
Which of the following describes an attack technique by which an intruder gains physical access
by following an authorized user into a facility before the door is closed?

A. Shoulder surfing
B. Tailgating
C. Escalation
D. Impersonation
Tailgating
Which of the following should be reviewed periodically to ensure a server maintains the correct
security configuration?

A. NIDS configuration
B. Firewall logs
C. User rights
D. Incident management
Firewall Logs
Which of the following is true when a user browsing to an HTTPS site receives the message: a
Site name mismatch'?

A. The certificate CN is different from the site DNS A record.
B. The CA DNS name is different from the root certificate CN.
C. The certificate was issued by the intermediate CA and not by the root CA.
D. The certificate file name is different from the certificate CN.
The certificate CN is different from the site DNS A record.
Which of the following will contain a list of unassigned public IP addresses?

A. TCP port
B. 802.1x
C. Loop protector
D. Firewall rule
Firewall Rule
DRPs should contain which of the following?

A. Hierarchical list of non-critical personnel
B. Hierarchical list of critical systems
C. Hierarchical access control lists
D. Identification of single points of failure
Hierarchical list of critical systems
Which of the following access control methods provides the BEST protection against attackers
logging on as authorized users?

A. Require a PIV card
B. Utilize time of day restrictions
C. Implement implicit deny
D. Utilize separation of duties
Utilize separation of duties
Several PCs are running extremely slow all of a sudden. Users of the PCs report that they do a lot
of web browsing and explain that a disgruntled employee from their department was recently fired.
The security administrator observes that all of the PCs are attempting to open a large number of
connections to the same destination. Which of the following is MOST likely the issue?

A. A logic bomb has been installed by the former employee
B. A man-in-the-middle attack is taking place.
C. The PCs have downloaded adware.
D. The PCs are being used in a botnet
The PCs are being used as a botnet
Which of the following is the BEST way to secure data for the purpose of retention?

A. Off-site backup
B. RAID 5 on-site backup
C. On-site clustering
D. Virtualization
Off-site backup
In the event of a disaster resulting in the loss of their data center, a company had determined that
they will need to be able to be back online within an hour or two, with all systems being fully up to
date. Which of the following would BEST meet their needs?

A. Off-site storage of backup tapes
B. A hot backup site
C. A cold backup site
D. A warm backup site
A hot backup site
Which of the following has a programmer MOST likely failed to consider if a user entering
improper input is able to compromise the integrity of data?

A. SDLM
B. Error handling
C. Data formatting
D. Input validation
Input Validation
Which of the following provides EMI protection?

A. STP
B. UTP
C. Grounding
D. Anti-static wrist straps
Anti-static wrist straps
A user reports that a web browser stopped working after it was updated. Which of the following
BEST describes a probable cause of failure?

A. The browser was previously compromised and corrupted during the update.
B. Anti-spyware is preventing the browser from accessing the network.
C. A faulty antivirus signature has identified the browser as malware.
D. A network based firewall is blocking the browser as it has been modified.
A network based firewall is blocking the browser as it has been modified.
Which of the following devices is MOST likely to be installed to prevent malicious attacks?

A. VPN concentrator
B. Firewall
C. NIDS
D. Protocol analyzer
Firewall
Which of the following would allow traffic to be redirected through a malicious machine by sending
false hardware address updates to a switch?
A. ARP poisoning
B. MAC spoofing
C. pWWN spoofing
D. DNS poisoning
MAC Spoofing
Which of the following protocols uses UDP port 69 by default?

A. Kerberos
B. TFTP
C. SSH
D. DNS
TFTP
Which of the following would a security administrator use to diagnose network issues?

A. Proxy
B. Host-based firewall
C. Protocol analyzer
D. Gateway
Protocol Analyzer
Which of the following should be implemented on a mobile phone to help prevent a conversation
from being captured?

A. Device encryption
B. Voice encryption
C. GPS tracking
D. Sniffer
Voice Encryption
A user wishes to encrypt only certain files and folders within a partition. Which of the following
methods should a technician recommend?

A. EFS
B. Partition encryption
C. Full disk
D. BitLocker
EFS
Centrally authenticating multiple systems and applications against a federated user database is an
example of:

A. smart card.
B. common access card.
C. single sign-on.
D. access control list.
Single Sign-On
Which of the following characteristics distinguishes a virus from a rootkit, spyware, and adware?

A. Eavesdropping
B. Process hiding
C. Self-replication
D. Popup displays
Self-replication
A security administrator needs to implement a site-to-site VPN tunnel between the main office and
a remote branch. Which of the following protocols should be used for the tunnel?

A. RTP
B. SNMP
C. IPSec
D. 802.1X
IPSec
Which of the following uses tickets to identify users to the network?

A. RADIUS
B. LDAP
C. TACACS+
D. Kerberos
Kerberos
Which of the following forensic artifacts is MOST volatile?

A. CD-ROM
B. Filesystem
C. Random access memory
D. Network topology
Filesystem
A security administrator notices an unauthorized vehicle roaming the area on company grounds.
The security administrator verifies that all network connectivity is up and running and that no
unauthorized wireless devices are being used to authenticate other devices; however, the
administrator does notice an unusual spike in bandwidth usage. This is an example of which of the
following attacks?

A. Rogue access point
B. Bluesnarfing
C. Evil twin
D. War driving
War driving
Which of the following is a best practice when securing a switch from physical access?

A. Disable unnecessary accounts
B. Print baseline configuration
C. Enable access lists
D. Disable unused ports
Disable unused ports
Risk can be managed in the following ways EXCEPT:

A. mitigation.
B. acceptance.
C. elimination.
D. transference.
Mitigation
A security administrator needs to implement a wireless system that will only be available within a
building. Which of the following configurations can the administrator modify to achieve this?
(Select TWO).

A. Proper AP placement
B. Disable SSID broadcasting
C. Use CCMP
D. Enable MAC filtering
E. Reduce the power levels
Proper AP placement, Enable MAC Filter
Which of the following environmental variables reduces the potential for static discharges?

A. EMI
B. Temperature
C. UPS
D. Humidity
Humidity
Which of the following is an example of implementing security using the least privilege principle?

A. Confidentiality
B. Availability
C. Integrity
D. Non-repudiation
Availability
A user reports that the spreadsheet they use for the department will not open. The spreadsheet is
located on a server that was recently patched. Which of the following logs would the technician
review FIRST?

A. Access
B. Firewall
C. Antivirus
D. DNS
Access
Which of the following helps prevent a system from being fingerprinted?

A. Personal firewall
B. Complex passwords
C. Anti-spam software
D. OS patching
Personal Firewall
An attacker captures valid wireless traffic in hopes of transmitting it repeatedly to generate enough
traffic to discover the encryption key. Which of the following is the attacker MOST likely using?

A. War driving
B. Replay attack
C. Bluejacking
D. DNS poisoning
Replay Attack
Which of the following is an authentication method that uses symmetric key encryption and a key
distribution center?

A. MS-CHAP
B. Kerberos
C. 802.1x
D. EAP
Kerberos
Which of the following is a preventative physical security measure?

A. Video surveillance
B. External lighting
C. Physical access log
D. Access control system
Access Control System
An employee keeps getting pop-ups from a program on their computer stating it blocked an
attacking IP address. Which of the following security applications BEST explains this behavior?

A. Antivirus
B. Anti-spam
C. Personal firewall
D. Pop-up blocker
Personal Firewall
A Maintenance Manager requests that a new group be created for a new development project,
concerning power distribution, in order to email and setup conference meetings to the whole
project team. Which of the following group types would need to be created?

A. Default power users
B. Restricted group
C. Distribution
D. Security
Distribution
Which of the following is an example of data obfuscation within a data stream?

A. Cryptography
B. Steganography
C. Hashing
D. Fuzzing
Cryptography
Which of the following is a malicious program that infects a host computer and has the ability to
replicate itself?

A. Spyware
B. Virus
C. Rootkit
D. Spam
Virus
Which of the following concepts is applied FIRST when a user logs into a domain?

A. Virealization
B. Non-repudiation
C. Authorization
D. Identification
Identification
Which of the following tools will allow a technician to detect devices and associated IP addresses
on the network?

A. Network intrusion detection software
B. Network mapping software
C. Port scanner
D. Protocol analyzers
Network Mapping Software
An application programmer at a company conducts security assessments and reports findings to
senior management. Which of the following principles does this scenario violate?

A. Separation of duties
B. Job rotation
C. Vulnerability assessment
D. Least privilege
Separation of duties
Which of the following attacks involves sending unsolicited contact information to Bluetooth
devices configured in discover mode?

A. Impersonation
B. Bluejacking
C. War driving
D. Bluesnarfing
Bluejacking
Which of the following has the capability to perform onboard cryptographic functions?

A. Smartcard
B. ACL
C. RFID badge
D. Proximity badge
Smartcard
Shielded communications media is MOST often used to prevent electrical emanations from being
detected and crosstalk between which of the following?

A. Networks
B. Cables
C. VLANs
D. VPNs
Cables
Which of the following measures ensures unauthorized users cannot access a WAP in a user's home?

A. Proper WAP placement
B. Turn off the computers when not in use
C. Set the SSID to hidden
D. Change the administrator password on the computer
Set the SSID to hidden
Which of the following BEST describes where L2TP is used?

A. VPN encryption
B. Authenticate users using CHAP
C. Default gateway encryption
D. Border gateway protocol encryption
VPN encryption
The president of the company is trying to get to their bank's website, and the browser is displaying
that the webpage is being blocked by the system administrator. Which of the following logs would
the technician review?

A. DNS
B. Performance
C. System
D. Content filter
Content Filter
Which of the following should a technician run to find user accounts that can be easily
compromised?

A. NMAP
B. SNORT
C. John the Ripper
D. Nessus
John the Ripper
Which of the following defines the role of a root certificate authority (CA) in PKI?

A. The root CA is the recovery agent used to encrypt data when a user's certificate is lost.
B. The CA stores the user's hash value for safekeeping.
C. The CA is the trusted root that issues certificates.
D. The root CA is used to encrypt email messages to prevent unintended disclosure of data
The CA is the trusted root that issues certificates
Which of the following malicious programs compromises system security by exploiting system
access through a virtual backdoor?

A. Virus
B. Trojan
C. Spam
D. Adware
Trojan
Which of the following BEST represents why a system administrator should download security
patches from the manufacturer's website directly?

A. Maintain configuration baseline
B. Implement OS hardening
C. Ensure integrity of the patch
D. Ensure patches are up-to-date
Ensure integrity of the patch
While responding to a confirmed breach of the organization's web server, the security
administrator determines the source of the attack was from a rival organization's IP address range. Which of the following should the security administer do with this information?

A. Notify the Help Desk
B. Notify ICANN
C. Notify management
D. Notify the rival organization's IT department
Notify Management
The BEST location for a spam filter is

A. on the local LAN.
B. on a proxy server.
C. behind the firewall.
D. in front of the mail relay server
Infront of the mail relay server
Biometrics is an example of which of the following type of user authentication?

A. Something the user is
B. Something the user has
C. Something the user does
D. Something the user knows
Something the user is
Which of the following contains a database of users and passwords used for authentication?

A. CHAP
B. SAM
C. TPM
D. DNS
SAM
Mandatory Access Control (MAC) allows:

A. access rights indicated by the role of the individual
B. access associated with the classification of data.
C. a system administrator to centralize policy.
D. rights to be assigned by the data owner.
Access associated with the classification of data
The accounting group, clinical group and operations group only have access to their own
applications. The company often needs auditors to have access to all three groups' applications
with little notice. Which of the following would simplify the process of granting auditors permissions
to all the applications?

A. Create an auditors group and merge the members of the accounting, clinical and operations
groups.
B. Create an auditors group and add each user to the accounting, clinical and operations groups
individually.
C. Create an auditors group and add each of the accounting, clinical and operations groups to the
auditors group
D. Create an auditors group and add the group to each of the accounting, clinical and operations
groups.
Create an auditors group and add the group to each of the accounting, clinical and operations
groups.
Which of the following solutions would an administrator MOST likely perform in order to keep upto-
date with various fixes on different applications?

A. Service pack installation
B. Patch management
C. Different security templates
D. Browserhotfixes
Patch Management
Attackers may be able to remotely destroy critical equipment in the datacenter by gaining control
over which of the following systems?

A. Physical access control
B. Video surveillance
C. HVAC
D. Packet sniffer
HVAC
Which of the following situations applies to disaster recovery exercises?

A. Vulnerability scans should be performed after each exercise.
B. Separation of duties should be implemented after each exercise.
C. Passwords should be changed after each exercise.
D. Procedures should be updated after each exercise.
Procedures should be updated after each exercise
The administrator needs to require all users to use complex passwords. Which of the following
would be the BEST way to do this?

A. Set a local password policy on each workstation and server
B. Set a domain password policy
C. Set a group policy to force password changes
D. Post a memo detailing the requirement of the new password complexity requirements
Set a domain password policy
Purchasing insurance on critical equipment is an example of which of the following types of risk
mitigation techniques?

A. Risk avoidance
B. Risk transfer
C. Risk retention
D. Risk reduction
Risk transfer
Which of the following would be used to eliminate the need for an administrator to manually
configure passwords on each network device in a large LAN?

A. RADIUS
B. OVAL
C. RAS
D. IPSec VPN
RADIUS
A security administrator responds to a report of a web server that has been compromised. The
security administrator observes the background has been changed to an image of an attacker
group. Which of the following would be the FIRST step in the incident response process?

A. Run an antivirus scan
B. Disable the network connection
C. Power down the server
D. Print a copy of the background
Disable the network connection
After completing a forensic image of a hard drive, which of the following can be used to confirm
data integrity?

A. Chain of custody
B. Image compression
C. AES256 encryption
D. SHA512 hash
SHA512 Hash
A security administrator wants to prevent corporate users from being infected with viruses from
flash based advertisements while using web browsers at work. Which of the following could be
used to mitigate this threat?

A. Content filter
B. Firewall
C. IDS
D. Protocol analyzer
Content Filter
Which of the following tools provides the MOST comprehensive view of the network's security?

A. Vulnerability assessment
B. Network anomaly detection
C. Penetration test
D. Network mapping program
Penetration Test
Which of the following practices improves forensic analysis of logs?

A. Ensuring encryption is deployed to critical systems.
B. Ensuring SNMP is enabled on all systems.
C. Ensuring switches have a strong management password.
D. Ensuring the proper time is set on all systems.
Ensuring the proper time is set on all systems
A user is concerned about threats regarding social engineering and has asked the IT department
for advice. One suggestion offered might be to:

A. install a removable data backup device for portability ease.
B. verify the integrity of all data that is accessed across the network.
C. ensure that passwords are not named after relatives.
D. disallow all port 80 inbound connection attempts.
Ensure that passwords are not named after relatives
When disposing of old or damaged computer systems, which of the following is the primary
security concern?

A. Integrity of company HR information
B. Compliance with industry best practices
C. Confidentiality of proprietary information
D. Adherence to local legal regulations
Confidentiality of proprietary information
Which of the following is performed during a security assessment?

A. Remediate the machines with incorrectly configured controls.
B. Quarantine the machines that have no controls in place.
C. Calculate the cost of bringing the controls back into compliance.
D. Determine the extent to which controls are implemented correctly
Determine the extent to which controls are implemented correctly
The root certificate for the CA for a branch in a city was generated by the CA in a city in another
country. Which of the following BEST describes this trust model?

A. Chain of trust
B. Linear trust
C. Hierarchical trust
D. Web of trust
Hierarchical Trust
The security administrator needs to determine whether common words and phrases are being
used as passwords on the company server. Which of the following attacks would MOST easily
accomplish this task?

A. NTLM hashing
B. Dictionary
C. Brute force
D. Encyclopedia
Dictionary
Conducting periodic user rights audits can help an administrator identity:
A. new user accounts that have been created.
B. users who are concurrently logged in under different accounts.
C. unauthorized network services.
D. users who can view confidential information.
Users who can view confidential information
Which of the following has a 128-bit message digest?

A. NTLM
B. MD5
C. SHA
D. 3DES
MD5
Which of the following BEST describes a security benefit of a virtualization farm?

A. Increased anomaly detection
B. Stronger authentication
C. Stronger encryption
D. Increased availability
Increased availability
The company president wants to replace usernames and passwords with USB security tokens for
company systems. Which of the following authentication models would be in use?

A. Two factor
B. Form factor
C. Physical factor
D. Single factor
Single factor
A security administrator wants to detect and prevent attacks at the network perimeter. Which of
the following security devices should be installed to address this concern?

A. NIPS
B. IDS
C. HIPS
D. NDS
NIPS
Which of the following presents the GREATEST security risk to confidentiality of proprietary
corporate data when attackers have physical access to the datacenter?

A. Solid state drives
B. Cell phone cameras
C. USB drives
D. NAS
USB Drives
Which of the following allows a systems administrator to regain lost keys within a PKI?

A. Recovery agent
B. One time pad
C. CRL
D. Asymmetric keys
Recovery Agent
A vulnerable service is required between two systems on a network. Which of the following should
an administrator use to prevent an attack on that service from outside the network?

A. Proxy server
B. NIDS
C. Firewall
D. HIDS
Firewall
A technician needs to validate that a sent file has not been modified in any way. A co-worker
recommends that a thumbprint be taken before the file is sent. Which of the following should be
done?

A. Take an AES hash of the file and send the receiver both the hash and the original file in a
signed and encrypted email.
B. Take a MD5 hash of the file and send the receiver both the hash and the original file in a signed
and encrypted email.
C. Take a NTLM hash of the file and send the receiver both the hash and the original file in a
signed and encrypted email.
D. Take a LANMAN hash of the file and send the receiver both the hash and the original file in a
signed and encrypted email.
Take a MD5 hash of the file and send the receiver both the hash and the original file in a signed and encrypted email.
A technician needs to setup a secure room to enable a private VTC system. Which of the following
should be installed to prevent devices from listening to the VTC?

A. Shielding
B. HIDS
C. HVAC
D. MD5 hashing
Shielding
Which of the following is a primary effect of allowing P2P connections on a network?

A. Increased amount of spam
B. Input validation on web applications
C. Possible storage of illegal materials
D. Tracking cookies on the website
Possible storage of illegal materials
Which of the following services should be turned off on a printer to prevent malicious
reconnaissance attempts?

A. FTP
B. Spooler
C. SNMP
D. IP printing
SNMP
Environmental monitoring includes which of the following? (Select TWO)

A. EMI shielding
B. Redundancy
C. Video monitoring
D. Humidity controls
E. Load balancing
Video Monitoring, Humidity Controls
Which of the following is the security concept that describes a user who only has enough access
to complete their work?

A. Least privilege
B. Single sign-on
C. Explicit allow
D. Implicit deny
Least Privilege
A security administrator wants to ensure that only authorized personnel are able to gain entry into
a secure area. There is currently no physical security other than a badge reader. Which of the
following would MOST likely be installed to regulate right of entry?

A. Security alarms
B. Video surveillance
C. Access list
D. Proximity readers
Access list
Which of the following can be a risk of consolidating servers onto a single virtual host?

A. Data emanation
B. Non-repudiation
C. Environmental control
D. Availability
Availability
Which of the following is a security best practice that allows a user to have one ID and password
for all systems?

A. SSO
B. PIV
C. Trusted OS
D. Token
SSO
An administrator is explaining the conditions under which penetration testing is preferred over
vulnerability testing. Which of the following statements correctly describes these advantages?

A. Identifies surface vulnerabilities and can be run on a regular basis
B. Proves that the system can be compromised
C. Safe for even inexperienced testers to conduct
D. Can be fairly fast depending on number of hosts
Proves that the system can be compromised
An employee is not able to receive email from a specific user at a different organization; however,
they can receive emails from other users. Which of the following would the administrator MOST
likely check to resolve the user's issue?

A. Browser pop-up settings
B. Spam folder settings
C. User local antivirus settings
D. The local firewall settings
Spam folder settings
Which of the following encryption schemes can be configured as the LEAST secure?

A. RC4
B. Twofish
C. 3DES
D. DES
DES
Which of the following security precautions needs to be implemented when securing a wireless
network? (Select THREE)
A. Enable data encryption on all wireless transmissions using WPA2.
B. Enable the lowest power setting necessary to broadcast to the targeted range.
C. Enable the highest power setting possible to make sure the broadcast reaches the targeted
range.
D. Enable data encryption on all wireless transmissions using WEP.
E. Authentication should take place using a pre-shared key (PSK) of no more than six characters.
F. Enable the ability to verify credentials on an authentication server.
Enable data encryption on all wireless transmissions using WPA2. Enable the lowest power setting necessary to broadcast to the targeted range. Enable the ability to verify credentials on an authentication server.
Which of the following is reversible when encrypting data?

A. A private key
B. A public key
C. A hashing algorithm
D. A symmetric key
A symmetric key
Which of the following can be exploited for session hijacking while accessing the Internet?

A. P2P
B. Browser history
C. Cookies
D. SQL
Cookies
A large amount of continuous small transmissions are originating from multiple external hosts to
the corporate web server, which is also inaccessible to users. Which of the following attacks is
MOST likely the cause?

A. Spoofing
B. DNS poisoning
C. DDoS
D. DoS
DDoS
Which of the following asymmetric algorithms was designed to provide both encryption and digital
signatures?

A. Diffie-Hellman
B. DSA
C. SHA
D. RSA
RSA
Which of the following can cause data leakage from web based applications?

A. Device encryption
B. Poor error handling
C. Application hardening
D. XML
Poor Error Handling
Which of the following describes a design element that requires unknown computers connecting to
the corporate network to be automatically part of a specific VLAN until certain company
requirements are met?

A. RAS
B. NAC
C. NAT
D. RADIUS
NAC
The benefit of using software whole disk encryption is:

A. the data can be retrieved easier if the disk is damaged
B. the disk's MBR is encrypted as well.
C. unauthorized disk access is logged in a separate bit.
D. the entire file system is encrypted in case of theft.
The entire file system is encrypted in case of theft
Which of the following organizational disaster recovery types would provide a building and network
equipment but not current application data?

A. Warm site
B. Field site
C. Cold site
D. Hot site
Warm site
Which of the following best practices would a security administrator implement in order to prevent
one user from having too many administrative rights?

A. Complex passwords
B. Least privilege
C. Job rotation
D. System accounts with minimal rights
Least privilege
An administrator is providing management with a mobile device that allows email access. The
mobile device will be password protected in case of loss. Which of the following additional security
measures should the administrator ensure is in place?

A. The mobile device should erase itself after a set number of invalid password attempts.
B. The password should be alpha-numeric only, due to keypad limitations.
C. The password should be common so that the mobile device can be re-assigned.
D. The mobile device should use and be equipped with removal storage for sensitive data
retrieval.
The mobile device should erase itself after a set number of invalid password attempts
Which of the following BEST identifies the sensitivity of a document?

A. Metadata
B. Information classification
C. Risk transference
D. Access control list
Information Classification
Which of the following alternate site types is the MOST affordable after implementation?

A. Cold site
B. Off site
C. Hot site
D. Warm site
Cold site
Which of the following can use a trust system where public keys are stored in an online directory?

A. DES
B. AES
C. PGP
D. WEP
PGP
Which of the following elements has the ability to hide a node's internal address from the public
network?

A. NAT
B. NAC
C. NDS
D. VLAN
NAT
An administrator would like to update a network machine with a number of vendor fixes
concurrently. Which of the following would accomplish this with the LEAST amount of effort?

A. Install a service pack
B. Install a patch.
C. Install ahotfix.
D. Install a new version of the program
Install a service pack
A port scan of a network identified port 25 open on an internal system. Which of the following
types of traffic is this typically associated with?

A. Web traffic
B. File sharing traffic
C. Mail traffic
D. Network management traffic
Mail traffic
If an end-user forgets the password that encrypts the content of a critical hard drive, which of the
following would aid in recovery of the data?

A. Key escrow
B. Symmetric key
C. Certificate authority
D. Chain of custody
Key escrow
A technician needs to ensure that all major software revisions have been installed on a critical
network machine. Which of the following must they install to complete this task?

A. HIDS
B. Hotfixes
C. Patches
D. Service packs
Service Packs
A security administrator needs to determine if an assistant's workstation is sending out corporate
information. Which of the following could be used to review the assistant's network traffic?

A. Systems monitoring
B. Performance monitoring
C. Performancebaselining
D. Protocol analysis
Protocol Analysis
An administrator has discovered that regular users are logging into a stand-alone computer and
editing files they should have read-only access to. Which of the following should the administrator
investigate FIRST?

A. Users installing worms under their own accounts to mine data.
B. Users escalating their privileges using an administrator account.
C. Users remotely connecting from their workstation with administrator privileges.
D. Users creating new accounts with full control to the files.
Users escalating their privileges using an administrator account
Which of the following is a reason to perform a penetration test?

A. To passively test security controls within the enterprise
B. To provide training to white hat attackers
C. To identify all vulnerabilities and weaknesses within the enterprise
D. To determine the impact of a threat against the enterprise
To identify all vulnerabilities and weaknesses within the enterprise
A technician notices that unauthorized users are connecting to a wireless network from outside of
the building. Which of the following can BEST be implemented to mitigate this issue?

A. Change the SSID
B. The wireless router needs to be replaced
C. Install CAT6 network cables
D. The wireless output range can be reduced
The wireless output range can be reduced
The company's NIDS system is setup to match specifically configured traffic patterns. Which of the
following BEST describes this configuration?

A. Anomaly-based
B. Behavior-based
C. OVAL-based
D. Role-based
Behavior-based
Which of the following is commonly used to secure HTTP and SMTP traffic?

A. SHA
B. SFTP
C. TLS
D. SCP
TLS
Company A recently purchased the much smaller Company B. The security administrator for
Company A reviews the servers of Company B and determines that all employees have access to
all of the files on every server. Which of the following audits did the security administrator perform?

A. User access and rights
B. Group policy
C. Storage policy
D. System policy
User access and rights
An administrator is concerned that users are not utilizing strong passwords. Which of the following
can be done to enforce user compliance?

A. Implement a strict domain level group policy.
B. Supply the users with suggested password guidelines.
C. Offer user training regarding proper policy.
D. Supply the users with a third-party application to hash their passwords.
Implement a strict domain level group policy
Hooking processes and erasing logs are traits of which of the following?

A. Spam
B. Rootkit
C. Buffer overflow
D. Cross-site scripting
Rootkit
Which of the following are used by security companies to discover the latest Internet attacks?

A. Port scanner
B. Firewall
C. NIPS
D. Honeypot
Honeypot
Which of the following is true about PKI? (Select TWO).

A. When encrypting a message with the public key, only the public key can decrypt it.
B. When encrypting a message with the private key, only the private key can decrypt it
C. When encrypting a message with the public key, only the CA can decrypt it.
D. When encrypting a message with the public key, only the private key can decrypt it.
E. When encrypting a message with the private key, only the public key can decrypt it.
When encrypting a message with the public key, only the CA can decrypt it. When encrypting a message with the public key, only the private key can decrypt it.
An email server appears to be running with an increased load. Which of the following can be used
to compare historical performance?

A. Performance baselines
B. Systems monitor
C. Protocol analyzer
D. Performance monitor
Performance baselines
Which of the following allows a security administrator to separate networks from each other?

A. Implicit deny
B. Subnetting
C. SaaS
D. laaS
Subnetting
A user wants to send personally identifiable information to the security office via email, so they can
perform a background check. Which of the following should be used to send the information to the
security office?

A. Level of importance
B. Digital signature
C. Encryption
D. Signature line
Encryption
Which of the following is used to prevent attacks against the OS on individual computers and
servers?

A. NAT
B. HIDS
C. HIPS
D. NIPS
HIPS
Which of the following is reversible when encrypting data?

A. A private key
B. A public key
C. A hashing algorithm
D. A symmetric key
A symmetric key
Which of the following is an example of a smart card?

A. PIV
B. MAC
C. One-time passwords
D. Tokens
MAC
Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?

A. Recovery agent
B. Certificate authority
C. Trust model
D. Key escrow
Key escrow
Which of the following is seen as non-secure based on its ability to only store seven uppercase
characters of data making it susceptible to brute force attacks?

A. PAP
B. NTLMv2
C. LANMAN
D. CHAP
LANMAN
A user reports that after a recent business trip, their laptop started having performance issues and
unauthorized emails have been sent out from the laptop. Which of the following will resolve this
issue?

A. Updating the user's laptop with current antivirus
B. Updating the anti-spam application on the laptop
C. Installing a new pop-up blocker
D. Updating the user's digital signature
Updating the user's laptop with current antivirus
Which of the following describes the direction a signal will emanate from if a Yagi antenna is
placed parallel to the floor?

A. In a downward direction, perpendicular to the floor
B. Up and down, perpendicular to the floor
C. Side to side, parallel with the floor
D. Directly from the point of the antenna, parallel to the floor
Side to side, parallel with the floor
Which of the following is a trusted OS implementation used to prevent malicious or suspicious
code from executing on Linux and UNIX platforms?

A. SELinux
B. vmlinuz
C. System File Checker (SFC)
D. Tripwire
SELinux
Which of the following wireless attacks uses a counterfeit base station with the same SSID name
as a nearby intended wireless network?

A. War driving
B. Evil twin
C. Rogue access point
D. War chalking
Evil Twin
Which of the following should be performed if a smartphone is lost to ensure no data can be
retrieved from it?

A. Device encryption
B. Remote wipe
C. Screen lock
D. GPS tracking
Remote Wipe
A user receives an unsolicited email to change their online banking password. After clicking on the
link contained in the email the user enters their banking credentials and changes their password.
Days later, when checking their account balance they notice multiple money transfers to other
accounts. Which of the following BEST describes the type of attack?

A. Malicious insider
B. Phishing
C. Smurf attack
D. Replay
Phishing
A company is testing their backup procedures and realizes that certain critical systems are unable
to be restored properly with the latest tapes. Which of the following is the MOST likely cause?

A. The backups are differential
B. EMI is affecting backups
C. Backup contingency plan is out-of-date
D. The backups are incremental
EMI is affecting backups
Which of the following is a way to control system access by department function?

A. Role-Based Access Control
B. Rule-Based Access Control
C. Mandatory Access Control
D. Discretionary Access Control
Role-based Access Control
Which of the following BEST describes the function of TPM?

A. High speed secure removable storage device
B. Third party certificate trust authority
C. Hardware chip that stores encryption keys
D. A trusted OS model
Hardware chip that stores encryption keys
A new product is being evaluated by the security team. Which of the following would take financial
and business impacts into consideration if this product was likely to be purchased for large scale
use?

A. Risk assessment
B. Strength of security controls
C. Application vulnerability
D. Technical threat
Risk Assessment
A user reports that the spreadsheet they use for the department will not open. The spreadsheet is
located on a server that was recently patched. Which of the following logs would the technician
review FIRST?

A. Access
B. Firewall
C. Antivirus
D. DNS
Access
An administrator is taking an image of a server and converting it to a virtual instance. Which of the
following BEST describes the information security requirements of a virtualized server?

A. Virtual servers require OS hardening but not patching or antivirus.
B. Virtual servers have the same information security requirements as physical servers.
C. Virtual servers inherit information security controls from the hypervisor.
D. Virtual servers only require data security controls and do not require licenses.
Virtual servers have the same information security requirements as physical servers
Which of the following access control methods requires significant background investigations?

A. Discretionary Access Control (DAC)
B. Rule-based Access Control (RBAC)
C. Role-based Access Control (RBAC)
D. Mandatory Access Control (MAC)
Role-based Access Control (RBAC)
Which of the following is capable of providing the HIGHEST encryption bit strength?

A. DES
B. 3DES
C. AES
D. WPA
AES
Which of the following risk mitigation strategies would ensure that the proper configurations are
applied to a system?

A. Incident management
B. Applicationfuzzing
C. Change management
D. Tailgating
Incident Management
Which of the following is the way of actively testing security controls on a system?

A. White box testing
B. Port scanning
C. Penetration testing
D. Vulnerability scanning
Penetration Testing
A hard drive of a terminated employee has been encrypted with full disk encryption, and a
technician is not able to decrypt the data. Which of the following ensures that, in the future, a
technician will be able to decrypt this information?

A. Certificate authority
B. Key escrow
C. Public key
D. Passphrase
Key Escrow
Employees are allowed access to webmail while on the company network. The employees use
this ability to upload attachments and send email from their corporate accounts to their webmail.
Which of the following would BEST mitigate this risk?

A. Clean Desk Policy
B. Acceptable Use Policy
C. Data Leak Prevention
D. Fuzzing
Data Leak Prevention
When WPA is implemented using PSK, which of the following authentication types is used?

A. MD5
B. LEAP
C. SHA
D. TKIP
TKIP
Which of the following is another name for a malicious attacker?

A. Black hat
B. White hat
C. Penetration tester
D. Fuzzer
Black Hat
Which of the following logical controls does a flood guard protect against?

A. Spanning tree
B. Xmas attacks
C. Botnet attack
D. SYN attacks
SYN Attacks
Which of the following allows a security administrator to divide a network into multiple zones?(Select Two)

A. PAT
B. EIGRP
C. VLAN
D. NAT
E. Subnetting
VLAN, Subnetting
Isolation mode on an AP provides which of the following functionality types?

A. Segmentation of each wireless user from other wireless users
B. Disallows all users from communicating directly with the AP
C. Hides the service set identifier
D. Makes the router invisible to other routers
Segmentation of each wireless user from other wireless users
Which of the following assessments is directed towards exploiting successive vulnerabilities to bypass security controls?

A. Vulnerability scanning
B. Penetration testing
C. Port scanning
D. Physical lock testing
Penetration testing
Which of the following is MOST relevant to a buffer overflow attack?

A. Sequence numbers
B. Set flags
C. IV length
D. NOOP instructions
NOOP instructions
The benefit of using software whole disk encryption is:

A. the data can be retrieved easier if the disk is damaged
B. the disk's MBR is encrypted as well.
C. unauthorized disk access is logged in a separate bit.
D. the entire file system is encrypted in case of theft.
The entire file system is encrypted in case of theft
The company Chief Information Officer (CIO) contacts the security administrator about an email
asking for money in order to receive the key that would decrypt the source code that the attacker
stole and encrypted. Which of the following malware types is this MOST likely to be?

A. Worm
B. Virus
C. Spyware
D. Ransomware
Ransomware
Which of the following is an advantage of an employer providing smartphones to their employees
instead of regular cellular phones?

A. Smartphones can be tied to multiple PCs for data transferring.
B. Smartphone calls have a second layer of encryption.
C. Smartphones can encrypt and password protect data.
D. Smartphones can be used to access open WAPs for coverage redundancy.
Smartphones can be used to access open WAPs for coverage redundancy
Which of the following is specific to a buffer overflow attack?

A. Memory addressing
B. Directory traversal
C. Initial vector
D. Session cookies
Memory addressing
A security administrator performs various audits of a specific system after an attack. Which of the
following BEST describes this type of risk mitigation?

A. Change management
B. Incident management
C. User training
D. New policy implementation
Incident Management
Which of the following is the BEST choice for encryption on a wireless network?

A. WPA2-PSK
B. AES
C. WPA
D. WEP
WPA2-PSK
Which of the following protocols assists in identifying a user, by the generation of a key, to
establish a secure session for command line administration of a computer?

A. SFTP
B. FTP
C. SSH
D. DNS
SSH
In which of the following locations can password complexity be enforced via group policy?

A. Domain controllers
B. Local SAM databases
C. ACLs
D. NAC servers
Domain controllers
Security related training should be used to teach the importance of which of the following
behaviors?

A. Routine audits
B. Data mining
C. Data handling
D. Cross-site scripting
Routine audits
A company has remote workers with laptops that house sensitive data. Which of the following can
be implemented to recover the laptops if they are lost?

A. GPS tracking
B. Whole disk encryption
C. Remote sanitation
D. NIDS
GPS tracking
An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?

A. Event Viewer
B. Router's System Log
C. Change Management System
D. Compliance Review System
Change Management System
Which of the following reduces the likelihood of a single point of failure when a server fails?

A. Clustering
B. Virtualization
C. RAID
D. Cold site
Clustering
Which of the following is an example of requiring users to have a password that consists of alphanumeric and two special characters?

A. Password complexity requirements
B. Password recovery requirements
C. Password length requirements
D. Password expiration requirements
Password complexity requirements
Which of the following elements of PKI are found in a browser's trusted root CA?

A. Privatekey
B. Symmetric key
C. Recovery key
D. Public key
Public key
Which of the following tools can execute a ping sweep?

A. Protocol analyzer
B. Anti-virus scanner
C. Networkmapper
D. Password cracker
Network Mapper
Which of the following would be used to distribute the processing effort to generate hashes for a password cracking program?

A. RAID
B. Clustering
C. Redundancy
D. Virtualization
Clustering
Which of the following will help prevent unauthorized access to a smartphone?

A. Remote wipe
B. GPS tracking
C. Screen lock
D. Voice encryption
Voice encryption
Several classified mobile devices have been stolen. Which of the following would BEST reduce
the data leakage threat?

A. Use GPS tracking to find the devices.
B. Use stronger encryption algorithms.
C. Immediately inform local law enforcement.
D. Remotely sanitize the devices.
Remotely sanitize the device
A security administrator is setting up a corporate wireless network using WPA2 with CCMP but
does not want to use PSK for authentication. Which of the following could be used to support
802.1x authentication?

A. LDAP
B. RADIUS
C. Kerberos
D. Smart card
RADIUS
Which of the following would a security administrator implement if a parking lot needs to be constantly monitored?

A. Video surveillance
B. Mandatory access control
C. Mantraps
D. Proximity readers
Video surveillance
Which of the following devices would be installed on a single computer to prevent intrusion?

A. Host intrusion detection
B. Network firewall
C. Host-based firewall
D. VPN concentrator
Host-based firewall
A CRL is comprised of:

A. malicious IP addresses
B. trusted CA's.
C. untrusted private keys.
D. public keys.
Untrusted Private Keys
When examining HTTP server logs the security administrator notices that the company's online
store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?

A. Spim
B. DDoS
C. Spoofing
D. DoS
DoS
Which of the following components is MOST integral to HTTPS?

A. PGP
B. Symmetric session keys
C. Diffie-Hellman key exchange
D. Mutual authentication
Diffie-Hellman key exchange
Which of the following uses TCP port 22 by default?

A. SSL, SCP,andTFTP
B. SSH, SCP, and SFTP
C. HTTPS, SFTP,andTFTP
D. TLS, TELNET, and SCP
SSH, SCP, and SFTP
A system administrator sees a firewall rule that applies to 10.4.4.58/27. Which of the following IP
address ranges are encompassed by this rule?

A. 10.4.4.27 10.4.4.58
B. 10.4.4.32 10.4.4.63
C. 10.4.4.58 10.4.4.89
D. 10.4.4.58 10.4.4.127
10.4.4.32 10.4.4.63
A security administrator wants to implement a more secure way to login to a VPN in addition to a
username and password. Which of the following is the MOST secure way to log in to a VPN?

A. Implementing an ACL
B. Setting up a PKI
C. Implementing a single sign on process
D. Setting up two VPNs
Setting Up A PKI
Which of the following is the BEST example of a physical security policy?

A. All doors to the server room must have signage indicating that it is a server room.
B. All server room users are required to have unique usernames and passwords.
C. All new employees are required to be mentored by a senior employee for their first few months
on the job.
D. New server room construction requires a single entrance that is heavily protected.
New server room construction requires a single entrance that is heavily protected
Which of the following audit types would a security administrator perform on the network to ensure
each workstation is standardized?

A. Group policy
B. Domain wide password policy
C. Storage and retention policy
D. User access and rights
Group Policy
The success of a user security education and awareness plan is largely dependent on support
from:

A. contractors.
B. project management.
C. human resources.
D. senior management.
Senior Management
Which of the following signature-based monitoring systems is used to detect and remove known
worms and Trojans on a host?

A. NIPS
B. Antivirus
C. Anti-spam
D. HIDS
Antivirus
Which of the following is the MOST efficient way to secure a single laptop from an external attack?

A. NIPS
B. HIDS
C. Software firewall
D. Hardware firewall
Software firewall
Disabling the SSID broadcast removes the identifier from which of the following wireless packets?

A. Probe
B. ACK
C. Beacon
D. Data
Beacon
Which of the following describes the role of a proxy server?

A. Analyzes packets
B. Serves as ahoneypot
C. Blocks access to the network
D. Forwards requests for services from a client
Forwards requests for services from a client
Which of the following standards encodes in 64-bit sections, 56 of which are the encryption key?

A. SHA
B. AES
C. DES
D. Blowfish
DES

(DES encrypts and decrypts data in 64-bit blocks, using a 64-bit key, although the effective key
strength is only 56 bits. The least significant (right-most) bit in each byte is a parity bit, and should
be set so that there are always an odd number of 1s in every byte. These parity bits are ignored,
so only the seven most significant bits of each byte are used, resulting in a key length of 56 bits.)
Which of the following would be used for authentication in Active Directory?

A. TACACS
B. RAS
C. PPTP
D. Kerberos
Kerberos
Which of the following is used to both deploy and reapply baseline security configurations?

A. Performance baseline
B. Security agent
C. Security template
D. Configuration baseline
Security Template
Which of the following is BEST suited to detect local operating system compromises?

A. Personal firewall
B. HIDS
C. Anti-spam
D. System log
HIDS
Why is an ad-hoc network a security risk?

A. An ad-hoc network allows access to another computer at the same level of the logged in user,
compromising information.
B. An ad-hoc network allows access to the nearest access point which may allow a direct
connection to another computer.
C. An ad-hoc network allows access to the nearest access point which may give elevated rights to
the connecting user.
D. An ad-hoc network allows access to another computer but with no rights so files cannot be
copied or changed.
An ad-hoc network allows access to another computer at the same level of the logged in user, compromising information

(A wireless network operates in one of two modes, ad-hoc or infrastructure. In the ad hoc mode,
each station is a peer to the other stations and communicates directly with other stations within the
network. No AP is involved. All stations can send Beacon and Probe frames.)
Which of the following is a benefit of network access control (NAC)?

A. A user is able to distribute connections to the network for load balancing using a centralized list
of approved devices.
B. A user is able to distribute connections to the network using cached credentials on a local
machine.
C. A user is able to control connections to the network using a centralized list of approved devices.
D. A user is able to control connections to the network using cached credentials on a local
machine.
A user is able to control connections to the network using a centralized list of approved devices
Which of the following uses multiple encryption keys to repeatedly encrypt its output?

A. AES256
B. DES
C. 3DES
D. AES128
3DES

(Triple DES is a variation of Data Encryption Standard (DES). It uses a 64-bit key consisting of 56
effective key bits and 8 parity bits. The size of the block for Triple-DES is 8 bytes. Triple-DES
encrypts the data in 8-byte chunks. The idea behind Triple DES is to improve the security of DES
by applying DES encryption three times using three different keys. Triple DES algorithm is very
secure (major banks use it to protect valuable transactions), but it is also very slow.)
Which of the following encryption technologies is BEST suited for small portable devices such as
PDAs and cell phones?

A. TKIP
B. PGP
C. AES192
D. Elliptic Curve
Elliptic Curve
Which of the following protocols correspond to port 514 by default?

A. SYSLOG
B. SNMP
C. IMAP
D. FTP
SYSLOG
Which of the following is achieved and ensured by digitally signing an email?

A. Availability
B. Confidentiality
C. Delivery
D. Integrity
Integrity
A penetration tester is required to conduct a port scan on a network. Which of the following
security tools can be used to conduct this scan? (Select TWO).

A. Kismet
B. Snort
C. netcat
D. nslookup
E. Nmap
Netcat, Nmap
Which of the following is BEST used for providing protection against power fluctuation?

A. Generator
B. Voltmeter
C. UPS
D. Redundant servers
UPS
A technician wants to make sure all users in the network are in compliance with company
standards for login. Which of the following tools can the technician use?

A. Network mapping software
B. Digital signatures
C. Password crackers
D. Performance baselines
Performance baselines
Which of the following increases availability during periods of electromagnetic interference?
(Select TWO).

A. Fiber optic cable
B. Straight-through cable
C. STP cable
D. Crossover cable
E. UTP cable
Fiber-optic cable, STP cable
A secure company portal, accessible publicly but only to company employees, frequently fails to
renew its certificates, resulting in expired certificate warnings for users. These failures: (Select
TWO).

A. Increase resources used by the company's web-servers.B. Expose traffic sent between the server and the user's computer.
C. Breed complacency among users for all certificate warnings.
D. Permit man-in-the-middle attacks to steal users' credentials.
E. Are irritating to the user but the traffic remains encrypted.
Bredd complacency among users for all certificate warnings, are irritating to the user but the traffic remains encrypted
Which of the following security controls would a company use to verify that their confidential and
proprietary data is not being removed?

A. Man traps
B. Chain of custody
C. Video surveillance
D. Vulnerability scanners
Video Surveillance
The last company administrator failed to renew the registration for the corporate web site (e.g. https://wrtw.comptia.org). When the new administrator tried to register the website it is discovered
that the registration is being held by a series of small companies for very short periods of time.
This is typical of which of the following?

A. Spoofing
B. TCP/IP hijacking
C. Domain name kiting
D. DNS poisoning
Domain name kiting

(Domain name kiting is a practice in which participants leverage the 5-day add/drop grace period
mandated by ICANN to "keep" names at no cost by perpetually adding and dropping them. Under
this scheme, a domain name can deliver profit to the owner even if it yields just pennies per year._
Which of the following should a web application programmer implement to avoid SQL injection
attacks?

A. Encryption and hashing
B. Session cookie handling
C. Authentication and authorization
D. Proper input validation
Proper input validation

(To protect against SQL injection, user input must not directly be embedded in SQL statements.
Instead, parameterized statements must be used (preferred), or user input must be carefully
escaped or filtered.)
Which of the following system security threats negatively affects confidentiality?

A. Spam
B. Adware
C. Spyware
D. Worm
Spyware
Which of the following describes an action taken after a security breach?

A. Disaster recovery planning
B. Business continuity planning
C. Forensic evaluation
D. Change management
Forensic evaluation
Which of the following is true about the application of machine virtualization?

A. Virtualization hosting is only possible on one specific OS.
B. Machine vitalization is only possible in a 64-bit environment.
C. Some malware is able to detect that they are running in a virtual environment.
D. The vitalization host OS must be within two revisions of the guest OS
Some malware is able to detect that they are running in a virtual environment
Which of the following can be implemented to prevent malicious code from executing?

A. Hardware fire wall
B. Anti-spam software
C. Antivirus software
D. Personal software firewall
Antivirus Software
All administrators are now required to use 15 character passwords. Which of the following is the
BEST method to enforce this new password policy?

A. Email announcements
B. Account expiration configuration
C. Group policy
D. Forcing all users to change their password on next login
Group Policy
Which of the following BEST describes a reason to implement virtualization technology?

A. Reduce data center footprint
B. Decreased administrative overhead
C. Smaller routing tables
D. Diminishing number of end users
Reduce data center footprint
Management has requested increased visibility into how threats might affect their organization.
Which of the following would be the BEST way to meet their request without attempting to exploit those risks?

A. Conduct a penetration test.
B. Conduct a risk assessment.
C. Conduct a social engineering test.
D. Conduct a security awareness seminar.
Conduct a risk assessment
Which of the following stores information with a trusted agent to decrypt data at a later date, even
if the user destroys the key?

A. Key registration
B. Recovery agent
C. Key escrow
D. Public trust model
Key escrow
Which of the following will help hide the IP address of a computer from servers outside the
network?

A. NAT
B. PAT
C. ACL
D. NAC
NAT
When developing a new firewall policy, which of the following methods provides the MOST secure starting point?

A. Implicit deny
B. Least privilege
C. Stateful inspection
D. Due diligence
Implicit Deny

(Implicit deny means that the firewall only permits the specific needed applications to pass through
the firewall, and everything else is denied.)
Which of the following should be updated whenever software is upgraded on a production system?

A. Baseline
B. Group policy
C. LDAP entry
D. Antivirus
Baseline
An administrator is required to keep certain workstations free of malware at all times, but those workstations need to be able to access any Internet site. Which of the following solutions would be the BEST choice?

A. Updated antivirus software
B. Pop-up blockers
C. Personal firewall
D. Updated anti-spam software
Updated antivirus software

(The best initial protection against malicious code is antivirus software.)
Which of the following combinations of items would constitute a valid three factor authentication
system?

A. Password, retina scan, and a one-time token
B. PIN, password, and a thumbprint
C. PKI smartcard, password and a one-time token
D. Fingerprint, retina scan, and a hardware PKI token
Password, retina scan, and a one time token
Which of the following BEST describes a tool used to encrypt emails in transit?

A. Whole disk encryption
B. SSL over VPN
C. Digital signatures
D. S/MIME certificates
S/MIME Certificates

(Secure Multipurpose Internet Mail Extensions (S/MIME) is a standard used for encrypting e-mail.
S/MIME contains signature data. It uses the PKCS #7 standard (Cryptographic Message Syntax
Standard) and is the most widely supported standard used to secure e-mail communications.)
Which of the following security threats would MOST likely use IRC?

A. Botnets
B. Adware
C. Logic bombs
D. Spam
Botnets
A user reports that after opening an email from someone they knew, their computer is now
displaying unwanted images. Which of the following software can the technician MOST likely
install on the computer to mitigate this threat?

A. Anti-spam
B. Antivirus
C. HIDS
D. Firewall
Antivirus
Which of the following tools will detect protocols that are in use?

A. Spoofing
B. Port scanner
C. Proxy server
D. DMZ
Port scanner
An auditor would use credentials harvested from a SQL injection attack during which of the
following?

A. Forensic recovery
B. Vulnerability assessment
C. Penetration test
D. Password strength audit
Forensic recovery
Key escrow is the process of:

A. Entrusting the keys to a third party.
B. Backing up the key to local storage.
C. Removing the public key.
D. Removing the private key.
Entrusting the keys to a third party

(A key escrow system stores keys for the purpose of law enforcement access. One of the
proposed methods of dealing with key escrow involves the storage of key information with a third party referred to as a key escrow agency)
Which of the following will allow a technician to restrict access to one folder within a shared folder?

A. NTLM
B. IPSec
C. NTLMv2
D. NTFS
NTFS
A data entry technician uses an application from the Internet to gain administrative rights on a
system. Gaining unauthorized domain rights is an example of:

A. A logic bomb.
B. Arootkit.
C. Spyware.
D. Privilege escalation.
Privilege escalation
Which of the following would be implemented to provide a check and balance against social
engineering attacks?

A. Password policy
B. Single sign-on
C. Separation of duties
D. Biometric scanning
Separation of duties
Which of the following tools would BEST allow a security administrator to view the contents of
unencrypted network traffic?

A. Web application firewall
B. Protocol analyzer
C. Network access control
D. Honeypot
Protocol Analyzer
A NIPS is primarily used for which of the following purposes?

A. To monitor network traffic in promiscuous mode
B. To alert the administrator to known anomalies
C. To log any known anomalies
D. To take action against known threats
To take action against known threats
Which of the following algorithms provides the LOWEST level of encryption?

A. SHA1
B. Blowfish
C. DES
D. AES
DES
At midnight on January 1st, an administrator receives an alert from the system monitoring the
servers in the datacenter. All servers are unreachable. Which of the following is MOST likely to have caused the DOS?

A. Rootkit
B. Virus
C. Logic bomb
D. Botnet
Logic bomb

(Logic bombs are programs or snippets of code that execute when a certain predefined event
occurs. Logic bombs may also be set to go off on a certain date or when a specified set of
circumstances occurs.)
Which of the following would an auditor use to determine if an application is sending credentials in
clear text?

A. Vulnerability scanner
B. Protocol analyzer
C. Rainbow table
D. Port scanner
Protocol Analyzer
Which of the following security controls targets employee accounts that have left the company
without going through the proper exit process?

A. Password complexity policy
B. Account expiration policy
C. Account lockout policy
D. Access control lists
Account expiration policy
Which of the following logs would MOST likely indicate that there is an ongoing brute force attack
against a servers local administrator account?

A. Firewall
B. System
C. Performance
D. Access
System

(System logs will frequently tell you what was accessed and in what manner. These logs are
usually explicit in describing the events that occurred during a security violation.)
A technician reports that an employee that retired five years ago still has access to the marketing
department's folders. Which of the following should have been conducted to avoid this security risk?

A. Job rotation review
B. Separation of duties review
C. Retention policy review
D. Regular user access review
Regular user access review
Which of the following security concepts is supported by HVAC systems?

A. Availability
B. Integrity
C. Confidentiality
D. Privacy
Availability
Which of the following can be implemented to mitigate the risks associated with open ports on a
server?

A. Enable MAC filtering
B. Implement a password policy
C. Disable unnecessary programs
D. Disable network cards
Disable unnecessary programs
After a disaster, a security administrator is helping to execute the company disaster recovery plan. Which of the following security services should be restored FIRST?

A. Auditing and logging of transactions.
B. Authentication mechanisms for guests.
C. Help desk phones and staffing.
D. New user account creation services.
Auditing and logging of transactions
Which of the following security concerns stern from the use of corporate resources on cell
phones? (Select TWO).

A. Cell phones are easily lost or stolen.
B. MITM attacks are easy against cell phones.
C. There is no antivirus software for cell phones.
D. Cell phones are used for P2P gaming.
E. Encryption on cell phones is not always possible.
Cell phones are easily lost or stolen, there is no antivirus software for cell phones
A user notices that in the morning the email system is slow. Which of the following tools would the technician use FIRST to identify the issue?

A. Protocol analyzer
B. VPN
C. Performance monitor
D. Spam filter
Performance Monitor
A network security administrator is worried about potential man-in-the-middle attacks against
users when they access a corporate website from their workstations. Which of the following is the
BEST mitigation against this type of attack?

A. Implementing server-side PKI certificates for all connections
B. Mandating only client-side PKI certificates for all connections
C. Requiring client and server PKI certificates for all connections
D. Requiring strong authentication for all DNS queries
Requiring client and server PKI certificates for all connections
Which of the following should be disabled to help prevent boot sector viruses from launching when a computer boots?

A. SNMP
B. DMZ
C. USB
D. Hard Drive
USB
Which of the following technologies will ensure the datacenter remains operational until backup
power can be obtained?

A. UPS
B. Transfer switch
C. Circuit breaker
D. Backup generator
UPS

(A UPS will allow you to continue to function in the absence of power for only a short duration. For
fault tolerance in situations of longer duration, you will need a backup generator. Backup
generators run off of gasoline or diesel and generate the electricity needed to provide steady
power.)
In a standard PKI implementation, which of the following keys is used to sign outgoing messages?

A. Sender's private key
B. Recipient's public key
C. Sender's public key
D. Recipient's private key
Sender's private key
The security administrator is investigating a breach of the company's web server. One of the web
developers had posted valid credentials to a web forum while troubleshooting an issue with a vendor. Logging which of the following would have created the BEST way to determine when the breach FIRST occurred? (Select TWO).

A. Unsuccessful login
B. Source OS
C. Destination IP
D. Number of hops from source
E. Source IP
F. Successful login
Source IP, Successful Login
Which of the following authentication models often requires different systems to function together and is complicated to implement in non-homogeneous environments?

A. One factor authentication
B. Single sign-on
C. Two factor authentication
D. Three factor authentication
Three factor authentication
Which of the following would be MOST useful for a security technician to run on a single, standalone
machine with no network interface to verify its overall security posture?

A. Password cracker
B. Protocol analyzer
C. Networkmapper
D. Port scanner
Password Cracker
One of the primary purposes of visualization in a data center is to reduce which of the following?

A. Volume of physical equipment needing to be secured
B. Total complexity of the overall security architecture
C. Number of logical hosts providing services for users
D. Amount of application logging required for security
Volume of physical equipment needing to be secured
Which of the following would MOST likely determine which user inadvertently shut down the company's web server?

A. Access logs
B. Application logs
C. DNS logs
D. Performance logs
Access Logs
Patches and updates should be applied to production systems:

A. After vetting in a test environment that mirrors the production environment.
B. As soon as the vendor tests and makes the patch available.
C. After baselines of the affected systems are recorded for future comparison.
D. As soon as the Configuration Control Board is alerted and begins tracking the changes.
After vetting in a test environment that mirrors the production environment
On network devices where strong passwords cannot be enforced, the risk of weak passwords is
BEST mitigated through the use of which of the following?

A. Limited logon attempts
B. Removing default accounts
C. Reverse proxies
D. Input validation
Limited logon attempts
Which of the following can ensure the integrity of email?

A. MD5
B. NTLM
C. Blowfish
D. LANMAN
MD5
Which of the following allows management to track whether staff members have accessed an authorized area?

A. Physical tokens
B. Physical access logs
C. Man-traps
D. Hardware locks
Physical Access Logs
Which of the following is used to provide a fixed-size bit-string regardless of the size of the input
source?

A. SHA
B. 3DES
C. PGP
D. WEP
SHA
A new application support technician is unable to install a new approved security application on a
departmental's workstation. The security administrator needs to do which of the following?

A. Add that user to the local power users group
B. Add that user to the domain administrators group
C. Add that user to the domain remote desktop group
D. Add that user to the security distribution group
Add that user to the domain administrators group
An intruder has gained access to a server and installed an application to obtain credentials. Which
of the following applications did the intruder MOST likely install?

A. Account dictionary
B. Vulnerability scanner
C. Protocol analyzer
D. Password cracker
Password Cracker
Which of the following is a goal of penetration testing?

A. Passively assess web vulnerabilities
B. To check compliance of the router configuration
C. Provide a passive check of the network's security
D. Actively assess deployed security controls
Actively assess deployed security controls
The BEST way to protect data-at-rest from an attacker is:

A. strong authentication.
B. restricting read permission.
C. secure network protocols.
D. whole disk encryption.
Whole disk encryption
The firewall administrator sees an outbound connection on IP port 50 and UDP port 500. Which of the following is the cause?

A. IPSec VPN connection
B. SSH tunneling
C. Certificate revocation list look-up
D. Incorrect DNS setup
IPSec VPN Connection
A penetration tester is attempting to run a brute-force attack to discover network passwords.
Which of the following tools would be BEST suited to this task?

A. John the Ripper
B. Metasploit
C. OVAL
D. Milw0rm
John the Ripper

(John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are
officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its
primary purpose is to detect weak Unix passwords.)
A user reports that they cannot print anything from the file server or off the web to the network
printer. No other users are having any problems printing. The technician verifies that the user's
computer has network connectivity. Which of the following is the MOST probable reason the user
cannot print?

A. The printer is not setup up correctly on the server.
B. The user does not have full access to the file server.
C. The user does not have Internet access.
D. The user does not have access to the printer.
The user does not have access to the printer
A remote network administrator calls the helpdesk reporting that they are able to connect via VPN but are unable to make any changes to the internal web server. Which of the following is MOST likely the cause?

A. IPSec needs to be reinstalled on the administrator's workstation.
B. The administrator needs to be added to the web server's administration group.
C. The VPN concentrator needs to be configured.
D. The administrator does not have the correct access rights to dial in remotely.
The administrator needs to be added to the web server's administration group
Which of the following standards could be used to rate the risk exposure of vulnerabilities on a
network?

A. RADIUS
B. Certificate authority
C. OVAL
D. TACACS
OVAL

(The Open Vulnerability and Assessment Language (OVAL) is a community standard written in
XML that strives to promote open and publicly available security content. It consists of a language,
interpreter, and repository and is meant to standardize information between security tools.)
A security administrator has reports of an employee writing harassing letters on a workstation, but
every time the security administrator gets on the workstation there is no evidence of the letters.
Which of the following techniques will allow the security administrator to acquire the necessary
data?

A. VLAN
B. Memory forensics
C. Firewall
D. Dumpster diving
Memory Forensics
An administrator needs to implement a backup strategy that provides the fastest recovery in case
of data corruption. Which of the following should the administrator implement?

A. Fullbackup on Sunday and differential backups every other day
B. Fullbackup on Sunday and incremental backups every other day
C. Fullbackup on Sunday and a full backup every day
D. Fullbackup on Sunday and alternating differential and incremental every other day
Fullbackup on Sunday and a fullback up everyday
A network administrator places a firewall between a file server and the public Internet and another firewall between the file server and the company's internal servers. This is an example of which of
the following design elements?

A. DMZ
B. Subnetting
C. VLAN
D. NAT
DMZ
Which of the following describes what has occurred after a user has successfully gained access to a secure system?

A. Authentication
B. Authenticity
C. Identification
D. Confidentiality
Authentication
Which of the following security attacks would be MOST likely to occur within the office without the
use of technological tools?

A. Phishing
B. Cold calling
C. Shoulder surfing
D. SPIM
Shoulder Surfing

(One form of social engineering is known as shoulder surfing and involves nothing more than
watching someone when they enter their sensitive data. They can see you entering a password,
typing in a credit card number, or entering any other pertinent information. The best defense
against this type of attack is simply to survey your environment before entering personal data.)
Which of the following is a service that provides authentication, authorization and accounting to
connecting users?

A. LANMAN
B. WPA
C. RADIUS
D. CHAP
RADIUS
Which of the following would MOST likely monitor user web traffic?

A. A proxy server
B. Enable cookie monitoring
C. A software firewall
D. Enable Internet history monitoring
Enable Internet history monitoring
When implementing a group policy restricting users from running software installations, the
administrator needs to be aware of which of the following disadvantages?

A. The policy will restrict remote patching of user workstations.
B. Such a policy requires a great deal of administrative overhead.
C. Not all users will know which files are executable installations.
D. Some users may have a legitimate need for installing applications.
Some users may have a legitimate need for installing applications
Which of the following uses a trusted third party key distribution center to generate authentication
tokens?

A. TACACS
B. CHAP
C. LDAP
D. Kerberos
Kerberos
Which of the following key types would a user MOST likely receive from a secure e-commerce
website?

A. Private key
B. Public key
C. CRL
D. Key Escrow
Public Key
Which of the following can be used to prevent ongoing network based attacks?

A. NIDS
B. HIDS
C. NAT
D. NIPS
NIPS`
Regression testing and deployment are part of the:

A. Least privilege principle.
B. Vulnerability assessment process.
C. Patch management process.
D. Disaster recovery process.
Patch Management Process
A user reports that they opened an attachment from an email received through a distribution list. At a later date, several computers started behaving abnormally. Which of the following threats has MOST likely infected the computer?

A. Pop-ups
B. Spyware
C. Spam
D. Logic bomb
Logic Bomb
A technician notices that folder permissions are changing randomly on the server. Which of the
following tools would the technician use to identify the issue?

A. System monitor
B. DMZ
C. Firewall
D. Protocol analyzer
Protocol Analyzer
Which of the following protocols allows a user to selectively encrypt the contents of an email
message at rest?

A. SSL/TLS
B. Digital signature
C. Secure SMTP
D. S/MIME
S/MIME
A technician completes a WLAN audit and notices that a number of unknown devices are
connected. Which of the following can BEST be completed to mitigate the issue?

A. Replace the wireless access point
B. Replace the firewall
C. Change the SSID
D. Enable MAC filtering
Enable MAC Filtering
Which of the following is provided at a cold site?

A. Fully operational equipment and installed network equipment
B. Live redundant computers, network connections and UPS
C. Active network jacks
D. New equipment ready to be installed
New equipment ready to be installed
A company sets up wireless access points for visitors to use wireless devices. Which of the
following encryption methods should they implement to provide the highest level of security?

A. SHA-256
B. WEP
C. WPA2
D. WPA
WPA2
Which of the following would a security administrator be MOST likely to use if a computer is suspected of continually sending large amounts of sensitive data to an external host?

A. Performance baseline
B. Virus scanner
C. Honeypot
D. Protocol analyzer
Protocol Analyzer
Which of the following contains a list of certificates that are compromised and invalid?

A. CA
B. CRL
C. TTP
D. RA
CRL

(Certificate revocation is the process of revoking a certificate before it expires. A certificate may
need to be revoked because it was stolen, an employee moved to a new company, or someone
has had their access revoked. A certificate revocation is handled through a Certificate Revocation List (CRL)
Which of the following is part of the patch management process?

A. Documenting the security assessment and decision.
B. Reverse engineering non-vendor supplied patches.
C. Examining firewall and NIDS logs.
D. Replacing aging network and computing equipment.
Documenting the security assessment and decision
If an administrator wanted to be able to identify exactly which Internet sites are being accessed most frequently, which of the following tools would MOST likely be used?

A. Port scanner
B. IDS
C. Proxy server
D. Firewall
Proxy server
Which of the following methods allows the administrator to create different user templates to comply with the principle of least privilege?

A. Rule-based access control
B. Mandatory access control
C. Physical access control
D. Role-based access control
Role-based access control
Which of the following processes describes identity proofing?

A. Access control and identity verification
B. Identification and non-repudiation
C. Identification and authentication
D. Authentication and authorization
Identification and non-repudiation
In order for an organization to be successful in preventing fraud from occurring by a disgruntled employee, which of the following best practices should MOST likely be in place?

A. Job rotation
B. Least privilege
C. Separation of duties
D. Access controls
Access Control
A web server that the employees use to fill out their time cards needs to be protected. The web
server needs to be accessible to employees both inside the campus and at remote sites. Some of the employees use computers that do not belong to the company to do their work. Which of the
following would BEST protect the server?

A. Place the server in a DMZ and require all users to use the company's VPN software to access
it.
B. Place the server in a subnet that is blocked at the firewall.
C. Place the server in a DMZ after hardening the OS.
D. Require all users to use a PKI token stored on a physical smart card to authenticate to the
server.
Place the server in a DMZ after hardening the OS
The director of security for a company needs to determine how the security and network
administrators would respond to a compromised system. Which of the following would be the BEST way for the director to test the team's response?

A. Penetration test
B. Vulnerability scan
C. Port scan
D. Social engineering
Vulnerability scan
The security administrator wants to know if a new device has any known issues with its available applications. Which of the following would be BEST suited to accomplishing this task?

A. Vulnerability scanner
B. Port scanner
C. Networkmapper
D. Protocol analyzer
Vulnerability scanner
Which of the following are BEST practices in regards to backup media? (Select TWO).

A. Format tapes annually.
B. Keep the tapes user accessible.
C. Store tapes near the servers.
D. Storebackup's off site.
E. Label the media.
Store backup's off site, label the media
During an annual risk assessment, it is discovered the network administrators have no clear timeline of when patches must be installed. Which of the following would BEST solve this issue?

A. Creating and disseminating a patch management policy
B. Report the issue to management and revisit it during the next risk assessment
C. Training network administrators on the importance of patching
D. Hiring more administrators to better assist in the patching of servers
Creating and disseminating a patch management policy
Which of the following is an advanced security tool used by security administrators to divert
malicious attacks to a harmless area of the network?

A. Firewall
B. TCP/IP hijacking
C. Proxy server
D. Honeypot
Honeypot
Which of the following would be the BEST course of action to maintain network availability during an extended power outage?

A. Install UPS units on each critical device
B. Implement a SONET ring
C. Install backup generators
D. Use multiple servers for redundancy
Install backup generators
When investigating data breaches caused by possible malicious action, it is important for
members of the CIRT to document the location of data at all times. Which of the following BEST
describes what the CIRT is trying to document?

A. Proper authorization procedures
B. Disaster recovery plan
C. Chain of custody
D. Damage mitigation
Chain of Custody
Which of the following redundancy planning concepts is generally the LEAST expensive?

A. Warm site
B. Hot site
C. Mobile site
D. Cold site
Cold site
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

A. Restore a random file.
B. Perform a full restore.
C. Read the first 512 bytes of the tape.
D. Read the last 512 bytes of the tape.
Perform a full restore
Which of the following groups should be able to view the results of the risk assessment for an
organization? (Select TWO).

A. HR employees
B. Information security employees
C. All employees
D. Executive management
E. Vendors
Information security employees, Executive management
Which of the following does a risk assessment include?

A. Exploits, attacks, and social engineering
B. Threats, vulnerabilities, and asset values
C. Management, cost, and budget
D. Policies, procedures, and enforcement
Threats, vulnerabilities, and asset values
Identification is the process of verifying which of the following?

A. The user or computer system
B. The user's access level
C. The uniqueness of a user's token
D. The association of a user
The user or computer system
In general, which of the following is considered the MOST resistant to physical eavesdropping
methods?

A. Coaxial cable
B. Wireless access points
C. Fiberoptic cable
D. CAT5 network cable
Fiber-optic cable
Which of the following behavioral biometric authentication models should a technician deploy in a secure datacenter?

A. Voice recognition
B. Fingerprint recognition
C. Iris scan
D. Retina scan
Voice recognition
Which of the following is a tactic used by malicious domain purchasing organizations?

A. ARP spoofing
B. Kiting
C. DNS
D. DDoS
Kiting
Which of the following would allow an administrator to perform internal research on security threats and common viruses on multiple operating systems without risking contamination of the
production environment?

A. AVLAN
B. A firewall
C. A virtual workstation
D. A honey pot
A honey pot
Which of the following threats is mitigated by ensuring operating system patches are current?

A. ARP poisoning
B. DistributedDoS
C. Unknown threats
D. Known threats
Known threats
Which of the following environmental controls would require a thermostat within the datacenter?

A. Airflowcontrol
B. Moisture control
C. Temperature control
D. Fire suppression
Temperature control
A server needs to be configured to allow the sales department ability to read and write a file.
Everyone else in the company only needs read access. Which of the following access control lists will do this?

A. Sales: Read=Allow; Write=Allow
Everyone: Read=Allow; Write=None
B. Sales: Read=Allow; Write=Allow
Everyone: Read=Deny; Write=Deny
C. Sales: Read=None; Write=Allow
Everyone: Read=Allow; Write=Allow
D. Sales: Read=Allow; Write=Allow
Everyone: Read=None; Write= None
Sales: Read=Allow; Write=Allow
Everyone: Read=Allow; Write=None
Which of the following will allow a security administrator to help detect a DDoS?

A. Performance baseline
B. Task manager
C. NetBIOS
D. NIC bindings
Performance baselines
An administrator wants to make sure that all users of a large domain are restricted from installing software. Which of the following should MOST likely be done?

A. A security policy template is implemented
B. A security IP audit is completed
C. Administrative rights are manually removed
D. All workstations are rebuilt
A security policy template is implemented
A single point of failure is a security concern primarily because it affects which of the following?

A. Cryptography
B. Confidentiality
C. Integrity
D. Availability
Availability
Which of the following is MOST likely the reason why a security administrator would run a NMAP report on an important server?

A. To correlate which MAC addresses are associated with aswitchport
B. To identify vulnerabilities in available services
C. To determine open ports and services
D. To capture network packets for analysis
To determine open ports and services
Which of the following should be done if a USB device is found in a parking lot?

A. Call the manufacturer of the USB device.
B. Plug it in to a computer to see who it belongs to.
C. Turn it in to the appropriate security person.
D. Reformat it for personal use at home.
Turn it in to the appropriate security person
Which of the following, if implemented on a server, will ensure availability if half of the drives fail?

A. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5
RAID 1

(RAID level 1 RAID 1 is disk mirroring. Disk mirroring provides 100 percent redundancy because
everything is stored on two disks. If one disk fails, another disk continues to operate. The failed disk can be replaced, and the RAID 1 array can be regenerated.)
Proper planning for disaster recovery includes which of the following?

A. Testing the plan on a regular basis
B. Having system administrators electronically sign the plan
C. Documenting all HDD serial numbers
D. Executing the continuity plan at random
Testing the plan on a regular basis
Using a digital signature during an online transaction is a form of:

A. Key management.
B. Availability.
C. Confidentiality.
D. Non-repudiation.
Non-repudiation
Which of the following is a best practice relating to non-administrative user rights on a server?

A. Deny printer access
B. Deny local logon
C. Deny file access
D. Deny network logon
Deny network logon
Which of the following is MOST likely to occur if the input of a web form is not properly sanitized?
(Select TWO).

A. SQL injection
B. Backendfile system crash
C. Web load balancing
D. Cross-site scripting
E. Logic bomb
SQL Injection, Cross-site scripting
Rainbow tables are primarily used to expose which of the following vulnerabilities?

A. Available ports
B. Weak encryption keys
C. Weak passwords
D. Available IP addresses
Weak passwords
Which of the following can be an attack vector against employees who share pictures, location,
and updates with family and friends online?

A. Social networking sites
B. Personal electronic devices
C. Clean desk policy
D. Zero day exploits
Social networking sites
Which of the following tools allows a security company to identify the latest unknown attacks
utilized by attackers?

A. IDS
B. Honeypots
C. Port scanners
D. Code reviews
Honeypots
Which of the following is the BEST reason to conduct annual security awareness training?

A. To reinforces user compliance with security policies
B. To remind users of the consequences of noncompliance
C. To teach users about the latest malware attacks
D. To allow the organization to meet due diligence
To reinforces user compliance with security policies
If continuity plans are not regularly exercised, which of the following aspects of business continuity
planning are often overlooked until a disaster occurs?

A. Zero day exploits
B. Succession planning
C. Tracking of man hours
D. Single points of failure
Single points of failure
Large, partially self-governing, collection of hosts executing instructions for a specific purpose is an example of which type of malware?

A. Virus
B. Worm
C. Trojan
D. Botnet
Botnet
Which of the following attacks is BEST described as the interruption of network traffic
accompanied by the insertion of malicious code?

A. Spoofing
B. Man-in-the-middle
C. Spear phishing
D. DoS
Man-in-the-middle
Which of the following attacks is BEST described as an attempt to convince an authorized user to
provide information that can be used to defeat technical security controls?

A. Shoulder surfing
B. Tailgating
C. Impersonation
D. Packet sniffing
Impersonation
Randomly attempting to connect to wireless network access points and documenting the locations of accessible networks is known as which of the following?

A. Packet sniffing
B. War chalking
C. Evil twin
D. War driving
War chalking
Penetration testing should only be used during controlled conditions with express consent of the system owner because:

A. white box penetration testing cannot identify zero day exploits.
B. vulnerability scanners can cause massive network flooding during risk assessments.
C. penetration testing passively tests policy controls and can identify vulnerabilities.
D. penetration testing actively tests security controls and can cause system instability.
Penetration testing actively tests security controls and can cause system instability
Which of the following PKI implementation element is responsible for verifying the authenticity of
certificate contents?

A. CRL
B. Key escrow
C. Recovery agent
D. CA
CA
Which of the following should be checked regularly to avoid using compromised certificates?

A. CRL
B. PKI
C. Key escrow
D. CA
CRL
A user was able to access a system when they arrived to work at 5:45 a.m. Just before the user
left at 6:30 p.m., the user was unable to access the same system, even though the user could ping the system. In a Kerberos realm, which of the following is the MOST likely reason for this?

A. The user's ticket has expired.
B. The system has lost network connectivity.
C. The CA issued a new CRL.
D. The authentication server is down.
The user's ticket has expired
A network consists of various remote sites that connect back to two main locations. The security
administrator needs to block TELNET access into the network. Which of the following, by default,
would be the BEST choice to accomplish this goal?

A. Block port 23 on the L2 switch at each remote site.
B. Block port 23 on the network firewall.
C. Block port 25 on the L2 switch at each remote site.
D. Block port 25 on the network firewall.
Block port 23 on the network firewall
A company is looking at various solutions to manage their large datacenter. The company has a lot of sensitive data on unreliable systems. Which of the following would allow the company to minimize their footprint?

A. Infrastructure as a Service
B. Implement a NAC server
C. Software as a Service
D. Create a new DMZ
Infrastructure as a Service
A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would
allow the small company to save money on hiring additional personnel and minimize the footprint
in their current datacenter?

A. Allow users to telecommute
B. Setup a load balancer
C. Infrastructure as a Service
D. Software as a Service
Software as a Service
Which of the following is a policy that would force all users to organize their areas as well as help
in reducing the risk of possible data theft?

A. Password behaviors
B. Clean desk policy
C. Data handling
D. Data disposal
Clean desk policy
he security administrator has recently informed all users of a new attack from individuals sending
out emails pretending to represent reputable companies to gain personal and financial information. Which of the following attacks is the security administrator trying to make users aware of in the
company?
A. Vishing attacks
B. Phishing attacks
C. Smurf attacks
D. Zero day attacks
Phishing attacks
The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffic on the network. Which of the following is the MOST likely cause?

A. NIPSis blocking activities from those specific websites.
B. NIDS is blocking activities from those specific websites.
C. The firewall is blocking web activity.
D. The router is denying all traffic from those sites.
NIPSis blocking activities from those specific websites.
A visitor plugs their laptop into the network and receives a warning about their antivirus being out-of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is the MOST likely cause?

A. The IDS detected that the visitor's laptop did not have the right patches and updates so the IDS
blocked access to the network.
B. The security posture is disabled on the network but remediation must take place before access
is given to the visitor on that laptop.
C. The security posture is enabled on the network and remediation must take place before access
is given to the visitor on that laptop.
D. The IPS detected that the visitor's laptop did not have the right patches and updates so it
prevented its access to the network.
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop
A security administrator notices unusual activity from a server when reviewing system logs and finds it has been compromised. After investigating the incident, the administrator determines the attack successfully exploited a vulnerability in IIS. This application can be disabled to prevent any further incidents because it was not necessary for any server functions. Which of the following could have prevented this incident?

A. Disabling unnecessary accounts
B. Reviewing centralized logs
C. Disabling unnecessary services
D. Enhanced password complexity
Disabling unnecessary services
Which of the following is true about the private key in a PKI?

A. It is used by the recovery agent to generate a lost public key
B. It is used by the CA to validate a user's identity
C. It is used to decrypt the email hash in signed emails
D. It is used to encrypt the email hash in signed emails
It is used to encrypt the email hash in signed emails
Which of the following is true about the CRL?

A. It should be kept public
B. It signs other keys
C. It must be kept secret
D. It must be encrypted
It should be kept public
Which of the following is an example of authentication using something a user has and something a user is?

A. Username and PIN
B. Token and PIN
C. Password and retina scan
D. Token and fingerprint scan
Token and fingerprint scan
The recovery agent is used to recover the:

A. root certificate.
B. key in escrow.
C. public key.
D. private key.
Private Key
Which of the following must a security administrator do when the private key of a web server has been compromised by an intruder?

A. Submit the public key to the CRL.
B. Use the recovery agent to revoke the key.
C. Submit the private key to the CRL.
D. Issue a new CA.
Submit the public key to the CRL
Which of the following is a security administrator MOST likely to use to centrally manage
authentication across network devices? (Select TWO).

A. TACACS+
B. Kerberos
C. RADIUS
D. LDAP
E. MSSQL
TACACS+, RADIUS
Which of the following should a security administrator implement to prevent users from disrupting network connectivity, if a user connects both ends of a network cable to different switch ports?

A. VLAN separation
B. Access control
C. Loop protection
D. DMZ
Loop Protection
Which of the following attacks is MOST likely prevented when a website does not allow the a?<' character as the input in a web form field?

A. Integer overflow
B. SQL injection
C. Buffer overflow
D. Cross-site scripting
Cross-site scripting
Which of the following must be installed on a flash drive to allow for portable drive data
confidentiality?

A. USB encryptor
B. Hardwarewrite lock
C. USB extension cable
D. Ext2 file system
USB Encryptor
A disgruntled employee inserts additional code into the payroll system which will activate only if
the employee is dismissed. Which of the following BEST describes this type of threat?

A. Logic bomb
B. Backdoor
C. Rootkit
D. Spyware
Logic Bomb
While browsing the Internet, an administrator notices their browser behaves erratically, appears to download something, and then crashes. Upon restarting the PC, the administrator notices performance is extremely slow and there are hundreds of outbound connections to various websites. Which of the following BEST describes what has occurred?

A. The PC has become part of a botnet.
B. The PC has become infected with spyware.
C. The PC has become a spam host.
D.The PC has become infected with adware
The PC has become part of a botnet
A user downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

A. Logic bomb
B. Worm
C. Trojan
D. Adware
Trojan
An online banking portal is not accessible by customers during a holiday season. IT and network administrators notice sustained, extremely high network traffic being directed towards the web
interface of the banking portal from various external networks. Which of the following BEST
describes what is occurring?

A. X-Mas attack
B. DDoS attack
C. DNS poisoning
D. DOS attack
DDoS attack
While chatting with friends over IM, a user receives numerous instant messages from strangers advertising products or trying to send files. Which of the following BEST describes the threat?

A. Spear phishing
B. Spam
C. Spim
D. Spoofing
Spim
Which of the following is the MOST secure way of storing keys or digital certificates used for
decryption/encryption of SSL sessions?

A. Database
B. HSM
C. Key escrow
D. Hard drive
HSM
Which of the following is the MOST likely implication of a corporate firewall rule that allows TCP port 22 from any internal IP to any external site?

A. Data leakage can occur as an SSH tunnel may be established to home PCs.
B. NAT of external websites to the internal network will be limited to TCP port 22 only.
C. Host based firewalls may crash due to protocol compatibility issues.
D. IPSec VPN access for home users will be limited to TCP port 22 only.
Data leakage can occur as an SSH tunnel may be established to home PCs
Which of the following is MOST likely to result in data leakage?

A. Accounting transferring confidential staff details via SFTP to the payroll department.
B. Back office staff accessing and updating details on the mainframe via SSH.
C. Encrypted backup tapes left unattended at reception for offsite storage.
D. Developers copying data from production to the test environments via a USB stick.
Developers copying data from production to the test environments via a USB stick
A network administrator changes the default users and passwords on an 802.11n router. Which of
the following is an example of network management?

A. System hardening
B. Rule-based management
C. Network separation
D. VLAN management
System hardening
Which of the following is the file transfer function that utilizes the MOST secure form of data
transport?

A. TFTP
B. FTP active
C. FTP passive
D. SFTP
SFTP
Which of the following, when used in conjunction with software-based encryption, enhances
platform authentication by storing unique RSA keys and providing cryptoprocessing?

A. LDAP
B. TPM
C. Kerberos
D. Biometrics
TPM
Which of the following is the BEST way to mitigate data leakage if a portable device is compromised?

A. Full disk encryption
B. Common access card
C. Strong password complexity
D. Biometric authentication
Full disk encryption
Which of the following is a removable device that may be used to encrypt in a high availability
clustered environment?

A. Cloud computer
B. HSM
C. Biometrics
D. TMP
HSM
Which of the following devices provides storage for RSA or asymmetric keys and may assist in
user authentication? (Select TWO).

A. Trusted platform module
B. Hardware security module
C. Facial recognition scanner
D. Full disk encryption
E. Encrypted USB
Trusted platform module, hardware security module
Which of the following exploitation types involves injection of pseudo-random data in order to crash or provide unexpected results from an application?

A. Cross-site forgery
B. Brute force attack
C. Cross-site scripting
D. Fuzzing
Fuzzing
Which of the following can be disabled to prevent easy identification of a wireless network?

A. WEP
B. MAC filtering
C. SSID
D. LEAP
SSID
Which of the following should be enabled to ensure only certain wireless clients can access the network?

A. DHCP
B. SSID broadcast
C. MAC filtering
D. AP isolation
MAC filtering
The security administrator implemented privacy screens, password protected screen savers, and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate? (Select TWO).

A. Whaling
B. Dumpster diving
C. Shoulder surfing
D. Tailgating
E. Impersonation
Dumpster Diving, Shoulder Surfing
A security administrator wants to prevent users in sales from accessing their servers after 6:00
p.m., and prevent them from accessing accounting's network at all times. Which of the following should the administrator implement to accomplish these goals? (Select TWO).

A. Separation of duties
B. Time of day restrictions
C. Access control lists
D. Mandatory access control
E. Single sign-on
Time of day restrictions, access control lists
Which of the following would be implemented if an administrator wants a door to electronically
unlock when certain employees need access to a location?

A. Device locks
B. Video surveillance
C. Mantraps
D. Proximity readers
Proximity readers
Which of the following protocols can be implemented to monitor network devices?

A. IPSec
B. FTPS
C. SFTP
D. SNMP
SNMP
Which of the following attacks allows a user to access a location by following someone who has access?

A. Session hijacking
B. Bluesnarfing
C. Tailgating
D. Shoulder surfing
Tailgating
Which of the following is considered strong authentication?

A. Trusted OS
B. Smart card
C. Biometrics
D. Multifactor
Multifactor
Which of the following access control methods is considered the MOST difficult to forge?

A. RFIDs
B. Biometrics
C. Passwords
D. User IDs
Biometrics
Which of the following is MOST likely to be the last rule contained on any firewall?

A. IP allow anyany
B. Implicit deny
C. Separation of duties
D. Time of day restrictions
Implicit deny
Which of the following allows a user to have a one-time password?

A. Biometrics
B. SSO
C. PIV
D. Tokens
Tokens
Which of the following is an example of the type of access control methodology provided on
Windows systems by default?

A. Single Sign-On
B. Discretionary Access Control (DAC)
C. Mandatory Access Control (MAC)
D. Rule based Access Control (RBAC)
Discretionary Access Control (DAC)
Which of the following is the MOST thorough way to discover software vulnerabilities after its
release?

A. Baseline reporting
B. Design review
C. Code review
D. Fuzzing
Code review
Which of the following identifies some of the running services on a system?

A. Determine open ports
B. Review baseline reporting
C. Review honeypot logs
D. Risk calculation
Determine open ports
Which of the following describes a passive attempt to identify weaknesses?

A. Vulnerability scanning
B. Zero day attack
C. Port scanning
D. Penetration testing
Vulnerability scanning
Which of the following is another name for fuzzing proprietary software?

A. Grey box testing
B. Black box testing
C. White box testing
D. Blue jacking
Black box testing
Which of the following application attacks can be used against Active Directory based systems?

A. XML injection
B. SQL injection
C. LDAP injection
D. Malicious add-ons
LDAP injection
Which of the following is a security best practice implemented before placing a new server online?

A. On-demand computing
B. Host softwarebaselining
C. Virtualization
D. Code review
Host
Which of the following can be implemented as a physical security control?

A. Antivirus
B. GPS tracking
C. Cable locks
D. Device encryption
Cable locks
Which of the following software types helps protect against non-malicious but irritating malware?

A. Pop-up blockers
B. Antivirus
C. Host-based firewalls
D. Anti-spyware
Pop-up blockers
Which of the following is the MOST common security issue on web-based applications?

A. Hardware security
B. Transport layer security
C. Input validation
D. Fuzzing
Input validation
Which of the following is a preventative physical security control?
A. CCTV
B. Armed guard
C. Proper lighting
D. Access list
Armed guard
Which of the following is a technical control that should be implemented to prevent data loss from
laptop theft?
A. GPS tracking
B. Antivirus
C. Hard drive encryption
D. Cable locks
Hard drive encryption
Which of the following security concerns is MOST prominent when utilizing cloud computing
service providers?

A. Video surveillance
B. Mobile device access
C. Removable storage media
D. Blended systems and data
Blended systems and data
Which of the following is an example of forcing users to change their password every 90 days?

A. Password recovery requirements
B. Password length requirements
C. Password expiration requirements
D. Password complexity requirements
Password expiration requirements
Which of the following is an example of requiring users to have a password of 16 characters or
more?

A. Password recovery requirements
B. Password complexity requirements
C. Password expiration requirements
D. Password length requirements
Password length requirements
Which of the following is an example of allowing a user to perform a self-service password reset?

A. Password length
B. Password recovery
C. Password complexity
D. Password expiration
Password recovery
Which of the following is a security control that can utilize a command such as a 'deny ip any
any'?

A. ACL
B. Content inspection
C. Networkbridge
D. VPN
ACL
Which of the following is a security best practice when an employee leaves the company?

A. Account password complexity
B. Account disablement
C. Account password recovery
D. Account reissue
Account disablement
Which of the following is an account management principle for simplified user administration?

A. Ensure password complexity requirements are met.
B. Disable unused system accounts.
C. Implement access based on groups.
D. Ensure minimum password length is acquired.
Implement access based on groups
Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?

A. LDAP injection
B. SQL injection
C. Error and exception handling
D. Cross-site scripting
Cross-site scripting
Which of the following appears to the user as a legitimate site but is in fact an attack from a
malicious site?

A. Phishing
B. DoS
C. XSRF
D. XSS
XSRF
Role-based access control is:

A. multifactor.
B. single sign-on.
C. user specific.
D. job function specific.
Job function specific
A system administrator could have a user level account and an administrator account to prevent:

A. password sharing.
B. escalation of privileges.
C. implicit deny.
D. administrative account lockout.
Escalation of privileges
Which of the following would be the BEST action to perform when conducting a corporate
vulnerability assessment?

A. Document scan results for the change control board.
B. Organize data based on severity and asset value.
C. Examine the vulnerability data using a network analyzer.
D. Update antivirus signatures and apply patches.
Organize data based on severity and asset value
A Black Box assessment of an application is one where the security assessor has:

A. access to the source code and the development documentation.
B. no access to the application's source code and development documentation.
C. access to the UAT documentation but not the source code.
D. no access to the source code but access to the development documentation.
No access to the application's source code and development documentation
A user browsing the Internet sees a message on a webpage indicating their computer is infected. The message states that antivirus software should be downloaded from the site to clean the infection. Which of the following is occurring in this situation?

A. Social engineering
B. Adware
C. Botnet
D. Trojan
Social engineering
Which of the following BEST explains the security benefit of a standardized server image?

A. All current security updates for the operating system will have already been applied.
B. Mandated security configurations have been made to the operating system.
C. Anti-virus software will be installed and current.
D. Operating system license use is easier to track
Mandated security configurations have been made to the operating system
A business-critical application will be installed on an Internet facing server. Which of the following
is the BEST security control that should be performed in conjunction with updating the application to the MOST current version?

A. The firewall should be configured to allow the application to auto-update.
B. The firewall should be configured to prevent the application from auto-updating.
C. A port scan should be run against the application's server.
D. Vendor-provided hardening documentation should be reviewed and applied.
Vendor-provided hardening documentation should be reviewed and applied
A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?

A. Change the server's SSL key andadd the previous key to the CRL.
B. Install a host-based firewall.
C. Install missing security updates for the operating system.
D. Add input validation to forms.
Add input validation to forms
A company needs to reduce the risk of employees emailing confidential data outside of the company. Which of the following describes an applicable security control to mitigate this threat?

A. Install a network-based DLP device
B. Prevent the use of USB drives
C. Implement transport encryption
D. Configure the firewall to block port 110
Install a network-based DLP device
Which of the following security controls should be implemented to prevent server administrators from accessing information stored within an application on a server?

A. File encryption
B. Full disk encryption
C. Change management
D. Implicit deny
File encryption
Which of the following should be enforced on mobile devices to prevent data loss from stolen
devices?

A. Device encryption
B. HIDS
C. USB encryption
D. Host-based firewall
Device encryption
Which of the following can be deployed to provide secure tunneling services?

A. IPv6
B. DNSSEC
C. SNMPv2
D. SNMPv3
IPv6
Which of the following is MOST likely used to secure the creation of cryptographic keys?

A. Common access card
B. Hashing algorithm
C. Trusted platform module
D. One-time pad
Trusted platform module
Which of the following is MOST likely to reduce the threat of a zero day vulnerability?

A. Patch management
B. Network-based intrusion detection system
C. Disabling unnecessary services
D. Host-based intrusion detection system
Disabling unnecessary services
A proximity badge is provided to all users, each with the owners' photo. The photos are not checked and users trade badges to be able to access resources for which they are not personally authorized. This is an example of which of the following?

A. Authentication without authorization verification
B. Authorization verification without authentication
C. Neither authentication nor authorization verification
D. Both authentication and authorization verification
Authorization verification without authentication
During the analysis of malicious code, a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?

A. Buffer overflow
B. XML injection
C. SQL injection
D. Distributed denial of service
Buffer overflow
A security administrator discovers that Server1 and Server2 have been compromised, and then
observes unauthorized outgoing connections from Server1 to Server2. On Server1 there is an
executable named tcpdump and several files that appear to be network dump files. Finally, there
are unauthorized transactions in the database on Server2. Which of the following has MOST likely
occurred?

A. A logic bomb has been installed on Server1.
B. A backdoor has been installed on Server2.
C. A replay attack has been used against Server2.
D. Abotnet command and control has been installed on Server1.
A replay attack has been used against Server2
Which of the following MOST likely occurs when a user discovers a packet capture attack on a
computer connected to a wireless network?

A. Invalid checksums
B. Large dump files
C. Sequence numbers
D. Header manipulation
Large dump files
Which of the following is MOST relevant when investigating a SQL injection attack?

A. Stored procedures
B. Header manipulation
C. Malformed frames
D. Java byte code
Stored procedures
Which of the following MOST relevant to a buffer overflow attack?

A. Sequence numbers
B. Set flags
C. IV length
D. NOOP instructions
NOOP instructions
Which of the following is specific to header manipulation?

A. Overlap
B. Java instructions
C. Payload section
D. Flags
Flags
A system administrator was recently laid off for compromising various accounting systems within the company. A few months later, the finance department reported their applications were not
working correctly. Upon further investigation, it was determined that unauthorized accounting
software was installed onto a financial system and several application exploits existed within that system. This is an example of which of the following?

A. Rootkit
B. Logic bomb
C. Worm
D. Trojan horse
Trojan horse
A user reports that there have been several invalid charges on their company credit card. The user
said these charges occurred after a recent phone call to the bank due to an unusual email the user received. While examining the email, the security administrator notices that the phone number on the email does not match the phone number listed on the bank's website. Upon calling that number, the technician did reach the exact answering system as the bank and eventually to an
actual bank representative. This is an example of which of the following?

A. Vishing
B. Phishing
C. SPIM
D. Spear Phishing
Vishing
During a company's relocation, a security administrator notices that several hard copies of
company directories are being thrown away in public dumpsters. Which of the following attacks is
the company vulnerable to without the proper user training and awareness?

A. Hoaxes
B. Pharming
C. Social engineering
D. Brute force
Social engineering
A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?

A. Interference
B. Rogue access points
C. IV attack
D. Bluejacking
Rogue access points
Users of specific systems are reporting that their data has been corrupted. After a recent patch
update to those systems, the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to identify the issue?

A. Hardware baseline review
B. Vulnerability scan
C. Data integrity check
D. Penetration testing
Vulnerability scan
A security administrator has recently performed a detailed datacenter inventory of all hardware
and software. This analysis has resulted in identifying a lot of wasted resources. Which of the following design elements would eliminate the wasted resources and improve the datacenter's
footprint?

A. NAC
B. Virtualization
C. Remote access implementation
D. Hosted IP Centrex
Virtualization
A user reports that after a recent business trip, their laptop started having performance issues and
unauthorized emails have been sent out from the laptop. Which of the following will resolve this
issue?

A. Updating the user's laptop with current antivirus
B. Updating the anti-spam application on the laptop
C. Installing a new pop-up blocker
D. Updating the user's digital signature
Updating the user's laptop with current antivirus
The company encryption policy requires all encryption algorithms used on the corporate network to have a key length of 128-bits. Which of the following algorithms would adhere to company policy?

A. DES
B. SHA
C. 3DES
D. AES
AES
If a security administrator is reviewing a JPEG's metadata and hash against an unverified copy of the graphic, which of the following is the administrator looking for?

A. Steganography
B. Chain of custody
C. Digital signatures
D. Whole disk encryption
Steganography
Which of the following technologies is often used by attackers to hide the origin of an attack?

A. Open proxy
B. Load balancer
C. Flood guard
D. URL filtering
Open proxy
Which of the following is susceptible to reverse lookup attacks if not configured properly?

A. SSL
B. IPSec
C. ICMP
D. DNS
DNS
Which of the following are the two basic components upon which cryptography relies?

A. PKI and keys
B. Algorithms and key escrow
C. Key escrow and PKI
D. Algorithms and keys
Algorithms and keys
Which of the following can be used to verify the integrity of a message's content as well as the
identity of the sender?

A. Recovery agent
B. Digital signature
C. Key escrow
D. Trust models
Digital Signature
Which of the following describes the direction the signal will emanate from if a wireless omnidirectional
antenna is placed parallel to the floor?

A. In a downward direction, perpendicular to the floor
B. Directly from the point of the antenna, parallel to the floor
C. Side to side, parallel with the floor
D. Up and down, perpendicular to the floor
Up and down, perpendicular to the floor
Which of the following should be checked for when conducting a wireless audit? (Select TWO).

A. Open relays
B. Antenna placement
C. Encryption of wireless traffic
D. URL filtering
E. Open proxies
Antenna placement, encryption of wireless traffic
Which of the following passwords have the MOST similar key space? (Select TWO).

A. AnDwWe9
B. check123
C. Mypassword!2~
D. C0mPTIA
E. 5938472938193859392
AnDwWe9, C0mPTIA
A security administrator has discovered through a password auditing software that most
passwords can be discovered by cracking the first seven characters and then cracking the second part of the password. Which of the following is in use by the company?

A. LANMAN
B. MD5
C. WEP
D. 3DES
LANMAN
A security engineer working at a public CA is implementing and installing a new CRL. Where should the administrator logically place the server?

A. On a wireless network
B. Inside the DMZ
C. Onan non-routable network
D. On a secure internal network
Inside the DMZ
A security engineer is deploying a new CA. Which of the following is the BEST strategy for the root CA after deploying an intermediate trusted CA?

A. It should be placed outside of the firewall.
B. It should be placed in the DMZ.
C. It should be placed within an internal network.
D. It should be shut down and kept in a secure location.
It should be shut down and kept in a secure location
A security administrator has installed a new server and has asked a network engineer to place the server within VLAN 100. This server can be reached from the Internet, but the security engineer is unable to connect from the server to internal company resources. Which of the following is the
MOST likely cause?

A. The server is connected with a crossover cable.
B. VLAN 100 does not have a default route.
C. The server is in the DMZ.
D. VLAN 100 is on the internal network.
The server is in the DMZ
A security administrator is researching the main difference between TACACS and TACACS+
before deciding which one to install. The administrator has discovered that:

A. TACACS does not encrypt authentication while TACACS+ does.
B. TACACS+ uses TCP while TACACS can use either TCP or UDP.
C. TACACS can only be used on switches and routers while TACACS+ supports firewalls as well.
D. TACACS uses IPX and TACACS+ only supports IP.
TACACS+ uses TCP while TACACS can use either TCP or UDP
Which of the following is true when a user browsing to an HTTPS site receives the message: "The site's certificate is not trusted'?

A. The certificate has expired and was not renewed.
B. The CA is not in the browser's root authority list.
C. The intermediate CA was taken offline.
D. The CA is not in the default CRL
The CA is not in the browser's root authority list
An security administrator shows a user a method of hiding information by printing text so small that it appears as a period or colon. Which of the following BEST describes this security type?

A. Steganography
B. Quantum cryptography
C. Transport encryption
D. Hashing
Steganography
An IT administrator wants to provide 250 staff with secure remote access to the corporate network.
Which of the following BEST achieves this requirement?

A. Software based firewall
B. Mandatory Access Control (MAC)
C. VPN concentrator
D. Web security gateway
VPN concentrator
A network administrator must configure an FTP server in active-mode. Which of the following is
the control port by default?

A. 20
B. 21
C. 22
D. 23
21
A technician must configure a network device to allow only certain protocols to the external servers and block requests to other internal sources. This is an example of a:

A. demilitarized zone.
B. load balancer.
C. layer 2switch.
D. stateful firewall.
Stateful firewall
Which of the following protocols should be used to ensure that the data remains encrypted during
transport over the Internet? (Select THREE).

A. TLS
B. SSL
C. FTP
D. SSH
E. HTTP
F. TFTP
TLS, SSL, SSH
A user is no longer able to transfer files to the FTP server. The security administrator has verified
the ports are open on the network firewall. Which of the following should the security administrator
check?

A. Anti-virus software
B. ACLs
C. Anti-spam software
D. NIDS
ACLs
Which of the following can be used to help prevent man-in-the-middle attacks?

A. HTTP
B. HTTPS
C. SFTP
D. Kerberos
Kerberos
Which of the following controls would the security administrator implement if clients have to use at least ten upper and lower case alpha-numeric characters and special symbols?

A. Password complexity
B. Username lockout
C. File encryption strength
D. Account disablement
Password complexity
Which of the following account policies would be enforced if a user tried to log into their account
several times and was disabled for a set amount of time?

A. Recovery
B. Expiration
C. Lockout
D. Disablement
Lockout
Which of the following security controls should be implemented if an account was created for a
temporary user that will only be employed for the next four months?

A. Expiration
B. Disablement
C. Lockout
D. Complexity
Expiration
Which of the following should be used to help prevent device theft of unused assets?

A. HSM device
B. Locking cabinet
C. Device encryption
D. GPS tracking
Locking cabinet
Which of the following is BEST described as a scenario where organizational management decides not to provide a service offering because it presents an unacceptable risk to the organization?

A. Mitigation
B. Acceptance
C. Deterrence
D. Avoidance
Avoidance
Which of the following ports would a security administrator block if the administrator wanted to
stop users from accessing outside SMTP services?

A. 21
B. 25
C. 110
D. 143
25
Which of the following should be integrated into the fire alarm systems to help prevent a fire from
spreading?

A. HVAC
B. Humidity controls
C. Video monitoring
D. Thermostats
HVAC
Which of the following can be implemented that will only prevent viewing the home screen on a
mobile device if left momentarily unattended?

A. Whole disk encryption
B. Screen lock
C. Cable lock
D. Remote wipe
Screen lock
An in-line network device examines traffic and determines that a parameter within a common protocol is well outside of expected boundaries. This is an example of which of the following?

A. Anomaly based detection
B. Behavior based detection
C. IV attack detection
D. Signature based detection
Anomaly based detection
A malicious insider obtains a copy of a virtual machine image for a server containing client
financial records from the in-house virtualization cluster. Which of the following would BEST
prevent the malicious insider from accessing the client records?

A. Cloud computing
B. Separation of duties
C. Portable media encryption
D. File and folder encryption
File and folder encryption
Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss, but the insider's lawyer insists the laptop cannot be identified. Which of
the following would BEST be used to identify the specific computer used by the insider?

A. IP address
B. User profiles
C. MAC address
D. Computer name
MAC address
Which of the following is the MOST effective method to provide security for an in-house created application during software development?

A. Third-party white box testing of the completed application before it goes live
B. Third-party black box testing of the completed application before it goes live
C. Explicitly include security gates during the SDLC
D. Ensure an application firewall protects the application
Explicitly include security gates during the SDLC
Which of the following is MOST likely occurring if a website visitor has passwords harvested from the web browser's cache?

A. Buffer overflow
B. XSRF
C. Cookies
D. Pharming
XSRF
An attacker incorrectly submits data on a website's form and is able to determine the type of database used by the application and the SQL statements used to query that database. Which of the following is responsible for this information disclosure?

A. SQL injection
B. Fuzzing
C. XSS
D. Error handling
Error Handling
Which of the following describes why the sender of an email may encrypt the email with a private
key?

A. Confidentiality
B. Non-repudiation
C. Transmission speed
D. Transport encryption
Non-repudation
When granting access, which of the following protocols uses multiple-challenge responses for
authentication, authorization and audit?

A. TACACS
B. TACACS+
C. LDAP
D. RADIUS
TACACS+
Upper management decides which risk to mitigate based on cost. This is an example of:

A. qualitative risk assessment.
B. business impact analysis.
C. risk management framework.
D. quantitative risk assessment.
Quantitative risk assessment
Which of the following is the primary purpose of using a digital signature? (Select TWO).

A. Encryption
B. Integrity
C. Confidentiality
D. Non-repudiation
E. Availability
Integrity, non-repudiation
Which of the following authentication methods is typical among corporate environments to
authenticate a list of employees?

A. Twofish
B. ACLs
C. LDAP
D. Kerberos
LDAP
Which of the following attacks is manifested as an embedded HTML image object or JavaScript
image tag in an email?

A. Exception handling
B. Adware
C. Cross-site request forgery
D. Cross-site scripting
Cross-site scripting
Which of the following increases the key space of a password the MOST?

A. Letters, numbers, and special characters
B. 25 or more alpha-numeric characters
C. Two-factor authentication
D. Sequential alpha-numeric patterns
Letters, numbers, and special characters
Which of the following file transfer protocols is an extension of SSH?

A. FTP
B. TFPT
C. SFTP
D. FTPS
SFTP
Which of the following is the primary security reason why social networking sites should be blocked in a large corporation?

A. The proxy server needs to be specially configured for all social networking sites.
B. The data traffic can cause system strain and can overwhelm the firewall rule sets.
C. The users' work productivity decreases greatly.
D. The users can unintentionally post sensitive company information.
The users can unintentionally post sensitive company information
Which of the following describes the importance of enacting and maintaining a clean desk policy?

A. To ensure that data is kept on encrypted network shares
B. To avoid passwords and sensitive data from being unsecured
C. To verify that users are utilizing data storage resources
D. To guarantee that users comply with local laws and regulations
To avoid passwords and sensitive data from being unsecured
An online book review forum is being designed for anonymous customers to share feedback with
other potential readers. The intention for the forum is to integrate into an existing online bookstore in order to boost sales. Which of the following BEST represents the expected level of confidentiality, integrity, and availability needed for the forum content that has been contributed by users?

A. High confidentiality, high integrity, low availability
B. Low confidentiality, low integrity, low availability
C. High confidentiality, high integrity, high availability
D. Low confidentiality, medium to high integrity, medium availability
Low, confidentiality, medium to high integrity, medium availability
Which of the following protocols implements security at the lowest OSI layer?

A. IPSec
B. SSL
C. ICMP
D. SSH
IPSec
In which of the following locations would a forensic analyst look to find a hooked process?

A. BIOS
B. Slack space
C. RAM
D. Rootkit
RAM
Which of the following processes collects business/unit requirements as a main input when developing a business continuity plan?

A. SLA
B. DRP
C. BIA
D. NIST
BIA
Which of the following is a method for validating a BCP?

A. Business impact analysis
B. Annual test
C. Disaster recovery planning
D. Review audit logs
Annual test
Which of the following provides integrity verification when storing data?

A. Encryption
B. Hashing
C. PKI
D. ACL
Hashing
Proper wireless antenna placement and radio power setting reduces the success of which of the
following reconnaissance methods?

A. Rogue APs
B. War driving
C. Packet analysis
D. RF interference
War driving
Which of the following is the MOST secure wireless protocol?

A. WPA
B. TKIP
C. CCMP
D. WEP
CCMP
The decision to build a redundant data center MOST likely came from which of the following?

A. Application performance monitoring
B. Utilities cost analysis
C. Business impact analysis
D. Security procedures review
Business impact analysis
During business continuity planning, it is determined that a critical application can have no more than one hour of recovery time. Which of the following will be needed to meet this objective?

A. Off-site storage
B. Hot site
C. Warm site
D. Cold site
Hot site
A bulk update process fails and writes incorrect data throughout the database. Which of the
following concepts describes what has been compromised?

A. Authenticity
B. Integrity
C. Availability
D. Confidentiality
Integrity
In high traffic areas, security guards need to be MOST concerned about which of the following attacks?

A. War driving
B. Blue jacking
C. Shoulder surfing
D. Tailgating
Tailgating
Which of the following BEST describes an attack whereby unsolicited messages are sent to
nearby mobile devices?

A. Smurf attack
B. Bluejacking
C. Bluesnarfing
D. War driving
Bluejacking
Which of the following protocols would an administrator MOST likely use to monitor the
parameters of network devices?

A. SNMP
B. NetBIOS
C. ICMP
D. SMTP
SNMP
Which of the following mitigation strategies is established to reduce risk when performing updates
to business critical systems?

A. Incident management
B. Server clustering
C. Change management
D. Forensic analysis
Change management
Which of the following network ACL entries BEST represents the concept of implicit deny?

A. Deny UDP any
B. Deny TCP any
C. Deny ANYany
D. Deny FTP any
Deny ANYany
Applying detailed instructions to manage the flow of network traffic at the edge of the network, including allowing or denying traffic based on port, protocol, address, or direction is an
implementation of which of the following?

A. Virtualization
B. Port security
C. IPSec
D. Firewall rules
Firewall rules
Which of the following cloud computing concepts is BEST described as providing an easy-toconfigure
OS and on-demand computing for customers?

A. Platform as a Service
B. Software as a Service
C. Infrastructure as a Service
D. Trusted OS as a Service
Platform as a Service
User awareness training about proper disclosure of information, handling of corporate data, and
security policies is important due to the popularity of which of the following?

A. Social networking sites
B. Wireless networks
C. Virtual private networks
D. Zero day exploits
Social networking sites
Which of the following environmental controls would BEST be used to regulate cooling within a
datacenter?

A. Fire suppression
B. Video monitoring
C. EMI shielding
D. Hot and cold aisles
Hot and cold aisles
Information classification is used to protect which of the following?

A. Best practices
B. Phishing attacks
C. Clustering
D. Sensitive data
Sensitive data
Which of the following is the MOST appropriate risk mitigation strategy to use in order to identify
an unauthorized administrative account?

A. Change management
B. Incident management
C. Routine audits of system logs
D. User's rights and permissions review
User's rights and permissions review
Which of the following would be used to notify users of proper system usage?

A. Acceptable Use Policy
B. Separation of Duties
C. Audit Logs
D. Job Description
Acceptable Use Policy
Which of the following concepts ensures that the data is only viewable to authorized users?

A. Availability
B. Biometrics
C. Integrity
D. Confidentiality
Confidentiality
Which of the following concepts ensures that the data does not change in route to its final
destination?

A. Integrity
B. Redundancy
C. Confidentiality
D. Availability
Integrity
A security administrator is in charge of a datacenter, a hot site and a cold site. Due to a recent disaster, the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensure is in place for a cold site?

A. Location with all required equipment loaded with all current patches and updates
B. Location with duplicate systems found in the datacenter
C. Location near the datacenter that meets power requirements
D. Location that meets power and connectivity requirements
Location that meets power and connectivity requirements
Which of the following business continuity activities would a company implement in order to restore a critical system after a disruption or failure?

A. Continuity of day to day operations
B. Business continuity testing
C. Disaster recovery
D. Succession planning
Disaster recovery
Which of the following would a security administrator MOST likely look for during a vulnerability assessment?

A. Ability to gain administrative access to various systems
B. Identify lack of security controls
C. Exploit vulnerabilities
D. Actively test security controls
Identify lack of security controls
Which of the following is used in conjunction with PEAP to provide mutual authentication between
peers?

A. LEAP
B. MSCHAPv2
C. PPP
D. MSCHAPv1
MSCHAPv2
A security administrator must implement AES encryption throughout a company's wireless
network. Which of the following MUST be configured?

A. WPA
B. TKIP
C. 802.11n
D. CCMP
CCMP
The MAIN difference between qualitative and quantitative risk assessment is:

A. quantitative is based on the number of assets while qualitative is based on the type of asset.
B. qualitative is used in small companies of 100 employees or less while quantitative is used in
larger companies of 100 employees or more.
C. quantitative must be approved by senior management while qualitative is used within
departments without specific approval.
D. quantitative is based on hard numbers while qualitative is based on subjective ranking.
Quantitative is based on hard numbers while qualitative is based on subjective ranking
Performing routine security audits is a form of which of the following controls?

A. Preventive
B. Detective
C. Protective
D. Proactive
Detective
Which of the following is used when performing a quantitative risk analysis?

A. Focus groups
B. Asset value
C. Surveys
D. Best practice
Asset value
In an 802.11n network, which of the following provides the MOST secure method of both
encryption and authorization?

A. WEP with802.1x
B. WPA Enterprise
C. WPA2-PSK
D. WPA with TKIP
WPA Enterprise
Which of the following is the MOST secure method of utilizing FTP?

A. FTP active
B. FTP passive
C. SCP
D. FTPS
FTPS
An offsite location containing the necessary hardware without data redundancy would be an
example of which of the following off-site contingency plans?

A. Cluster
B. Cold site
C. Warm site
D. Hot site
Warm site
Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?

A. Trojan
B. Virus
C. Logic bomb
D. Rootkit
Rootkit
Which of the following is an example of obtaining unauthorized information by means of casual
observation?

A. Whaling
B. Shoulder surfing
C. Dumpster diving
D. War driving
Shoulder surfing
Which of the following is an example of allowing another user physical access to a secured area
without validation of their credentials?

A. Evil twin
B. Tailgating
C. Impersonation
D. Shoulder surfing
Tailgating
Which of the following methods of access, authentication, and authorization is the MOST secure by default?

A. Kerberos
B. TACACS
C. RADIUS
D. LDAP
Kerberos
Which of the following would be implemented to allow access to services while segmenting access
to the internal network?

A. IPSec
B. VPN
C. NAT
D. DMZ
DMZ
Which of the following devices BEST allows a security administrator to identify malicious activity
after it has occurred?

A. Spam filter
B. IDS
C. Firewall
D. Malware inspection
IDS
Which of the following is the technical implementation of a security policy?

A. VLAN
B. Flood guards
C. Cloud computing
D. Firewall rules
Firewall rules
Which of the following prevents numerous SYN packets from being accepted by a device?

A. VLAN management
B. Transport encryption
C. Implicit deny
D. Flood guards
Flood guards
Which of the following stops malicious traffic from affecting servers?

A. NIDS
B. Protocol analyzers
C. Sniffers
D. NIPS
NIPS
Which of the following protocols should be blocked at the network perimeter to prevent host
enumeration by sweep devices?

A. HTTPS
B. SSH
C. IPv4
D. ICMP
ICMP
Which of the following should be performed before a hard drive is analyzed with forensics tools?

A. Identify user habits
B. Disconnect system from network
C. Capture system image
D. Interview witnesses
Capture system image
Which of the following assists in identifying if a system was properly handled during transport?

A. Take a device system image
B. Review network traffic and logs
C. Track man hours and incident expense
D. Chain of custody
Chain of custody
Which of the following requires special handling and explicit policies for data retention and data
distribution?

A. Personally identifiable information
B. Phishing attacks
C. Zero day exploits
D. Personal electronic devices
Personally identifiable information
Which of the following will teach employees about malicious attempts from an attacker to obtain bank account information?

A. Password complexity requirements
B. Phishing techniques
C. Handling PII
D. Tailgating techniques
Phishing techniques
Which of the following software types BEST dissects IP frames for inspection or review by a
security administrator?

A. Protocol analyzer
B. Load balancer
C. Software firewall
D. Gateway
Protocol analyzer
Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?

A. Load balancer
B. URL filter
C. VPN concentrator
D. Protocol analyzer
Load balancer
Actively monitoring data streams in search of malicious code or behavior is an example of:

A. load balancing.
B. an Internet proxy.
C. URL filtering.
D. content inspection.
Content Inspection
Which of the following port numbers is used for SCP, by default?

A. 22
B. 69
C. 80
D. 443
22
A technician needs to allow seven specific users connection to a new access point. Which of the following should be performed to achieve this action?

A. Enable MAC filtering
B. Disable SSID broadcast
C. Adjust antenna placement
D. Decrease WAP power levels
Enable MAC filtering
Which of the following systems implements a secure key distribution system that relies on
hardcopy keys intended for individual sessions?

A. Blowfish
B. PGP/GPG
C. One-time pads
D. PKI
One-time pads
The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses:

A. multiple keys for non-repudiation of bulk data.
B. different keys on both ends of the transport medium.
C. bulk encryption for data transmission over fiber.
D. the same key on each end of the transmission medium.
The same key on each end of the transmission medium
Which of the following devices is typically used at the enclave boundary to inspect, block, and reroute network traffic for security purposes?

A. Load balancers
B. Protocol analyzers
C. Firewalls
D. Spam filter
Firewalls
Which of the following BEST describes the proper method and reason to implement port security?

A. Apply a security control which ties specific ports to end-device MAC addresses and prevents
additional devices from being connected to the network.
B. Apply a security control which ties specific networks to end-device IP addresses and prevents
new devices from being connected to the network.
C. Apply a security control which ties specific ports to end-device MAC addresses and prevents all
devices from being connected to the network.
D. Apply a security control which ties specific ports to end-device IP addresses and prevents
mobile devices from being connected to the network.
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network
Which of the following secure protocols is MOST commonly used to remotely administer
Unix/Linux systems?

A. SSH
B. SCP
C. SFTP
D. SNMP
SSH
Which of the following BEST describes the process of key escrow?

A. Maintains a copy of a user's public key for the sole purpose of recovering messages if it is lost
B. Maintains a secured copy of a user's private key to recover the certificate revocation list
C. Maintains a secured copy of a user's private key for the sole purpose of recovering the key if it
is lost
D. Maintains a secured copy of a user's public key in order to improve network performance
Maintains a secured copy of a user's private key for the sole purpose of recovering the key if it is lost
Which of the following devices should be used to allow secure remote network access for mobile users?

A. NIDS
B. Protocol analyzer
C. SFTP
D. VPN concentrator
VPN concentrator
Which of the following technologies is used to verify that a file was not altered?

A. RC5
B. AES
C. DES
D. MD5
MD5
Webmail is classified under which of the following cloud-based technologies?

A. Demand Computing
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS)
D. Platform as a Service (PaaS)
Software as Service (SaaS)
IPSec has been chosen for remote access VPN connections for telecommuters. Which of the following combinations would BEST secure the connection?

A. Transport mode, ESP
B. Transport mode, AH
C. Tunnel mode, AH
D. Tunnel mode, ESP
Tunnel mode, ESP
Which of the following ports are used for NetBIOS by default? (Select TWO).

A. 135
B. 139
C. 143
D. 443
E. 445
139, 445
Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following
BCP concepts?

A. Succession planning
B. Remove single points of failure
C. Risk management
D. Business impact analysis
Business impact analysis
Employees are unable to open internal company documents as they all appear to be encrypted.
The company CIO has received an email asking for $10,000 in exchange for the documents
decryption key. Which of the following BEST describes this type of attack?

A. Adware
B. Ransomware
C. Trojan attack
D. Rootkit attack
Ransomware
Which of the following should the network administrator use to remotely check if a workstation is running a P2P application?

A. Port scanner
B. Networkmapper
C. Ping sweeper
D. ARP scanner
Port scanner
Which of the following is mitigated by implementing proper data validation?

A. Rootkits
B. DNS poisoning
C. SMTP open relays
D. Cross-site scripting
Cross-site scripting
Which of the following practices is MOST relevant to protecting against operating system security flaws?

A. Patch management
B. Antivirus selection
C. Network intrusion detection
D. Firewall configuration
Patch Management
Which of the following is MOST commonly implemented to transport network device logs to a
logging server?

A. SOCKS
B. SHTTP
C. SYSLOG
D. SMTP
SYSLOG
Which of the following access control methods prevents a user from accessing network resources after the end of the users typical shift?

A. Group policy
B. Time of day restrictions
C. Password policy
D. Acceptable use policy
Time of day restrictions
A user reports that after searching the Internet for office supplies and visiting one of the search
engine results websites, they began receiving unsolicited pop-ups on subsequent website visits. Which of the following is the MOST likely cause of the unsolicited pop-ups?

A. Virus
B. Spam
C. Trojan
D. Adware
Adware
Which of the following is a required component for deploying Kerberos?

A. Extensible authentication protocol
B. Ticket granting server
C. Remote access server
D. Certificate authority
Ticket granting server
Which of the following would protect an employees network traffic on a non-company owned
network?

A. 802.1x
B. VPN
C. RADIUS
D. Antivirus
VPN
The technician just finished bringing up a new server in a live environment. Which of the following should the technician perform NEXT?

A. Update group policies
B. Install antivirus software
C. Performance baseline
D. Install OS patches
Install OS patches
Assigning access on a need-to-knows basis is a best practice in which of the following controls?

A. Account management
B. Risk assessment
C. Vulnerability assessment
D. Patch management
Account management
Which of the following security threats MOST frequently uses IRC to communicate with a remote
host?

A. Spam
B. Phishing
C. Botnets
D. Worm
Botnets
Which of the following can restrict a computer from receiving network traffic?

A. HIDS
B. NIDS
C. Antivirus
D. Software firewall
Software firewall
The newly hired security administrator for a company suspects that the previous security administrator has maliciously left code to corrupt the logging systems in 30 days. Which of the following is suspected to be in the system?

A. Virus
B. Trojan
C. Logic bomb
D. Spyware
Logic bomb
PGP is a cryptosystem based on which of the following encryption method?

A. SSL
B. Certificate authority
C. Symmetric
D. Asymmetric
Asymmetric
Which of the following is the BEST solution for an administrator to implement in order to learn
more about the zeroday exploit attacks on the internal network?

A. A stateful firewall
B. An IDS
C. A Honeypot
D. A HIDS
A Honeypot
A user reports that their system is slow and reboots on its own. The technician is unable to
remotely control the computer and realizes that they no longer have administrative rights to that
workstation. Which of the following is MOST likely the cause?

A. Rootkit
B. DDoS
C. Adware
D. Spam
Rootkit
Most mission impacting vulnerabilities in a formal risk assessment should be:

A. accepted.
B. ignored.
C. avoided.
D. mitigated.
Mitigated
Which of the following is a mitigation technique that addresses signal emanation?

A. Placing shielding on one side of a wireless router
B. Turning off the SSID broadcast on the wireless router
C. Installing a WIDS in addition to the wireless router
D. Configuring WPA instead of WEP on the wireless router
Placing shielding on one side of a wireless router
Which of the following describes bringing risk to an acceptable level?

A. Risk avoidance
B. Risk mitigation
C. Leveraging positive risk
D. Avoiding negative risk
Risk mitigation
Which of the following are reasons why a key may be revoked? (Select TWO).

A. Lost password
B. CA compromise
C. Key compromise
D. Lost trust
E. Public key compromise
CA compromise, Key compromise
System resource monitors and baselines on web servers should be used by security team
members to detect:

A. the need for increased bandwidth availability.
B. denial-of-service conditions.
C. expired accounts in use.
D. new server policies.
Denial-of-service conditions
Which of the following security tools can view the SSIDs of wireless networks even when they
have SSID broadcasting disabled?

A. NMAP
B. Kismet
C. RADIUS
D. Netstumbler
Kismet
A recent risk assessment has identified vulnerabilities on a production server. The technician
realizes it was recently re-imaged after a component failed on it. Which of the following is the
FIRST item to assess when attempting to mitigate the risk?

A. If all current service packs and hotfixes were re-applied
B. If the spam filters have been properly applied
C. If all device drivers were updated
D. If the firewall rule set does not allow incoming traffic to the vulnerable port
If all current service packs and hotfixes were re-applied
The security policy at a company clearly specifies that server administrators cannot have access to log servers or permissions to review log files. These rights are granted only to security administrators. This policy is an example of which of the following industry best practices?

A. Separation of duties
B. Implicit deny
C. Privilege escalation
D. Job rotation
Separation of duties
Multiple machines are detected connecting to a specific web server during non-business hours
and receiving instructions to execute a DNS attack. Which of the following would be responsible?

A. Adware
B. Logic Bomb
C. Virus
D. Botnet
Botnet
Which of the following security tools can be used for vulnerability scanning?

A. Nessus
B. RADIUS
C. L0phtcrack
D. Milw0rm
Nessus
A network administrator is alerted to an incident on a file server. The alerting application is a file
integrity checker. Which of the following is a possible source of this HIDS alert?

A. ARP poisoning
B. Teardrop attack
C. Rootkit
D. DDOS
Rootkit
Which of the following is the BEST mitigation against DoS attacks?

A. Distributed, redundant datacenters with IPS
B. Redundant ISPs, power sources, and NAT
C. Distributed power sources, NAC, and VLANs
D. Two-factor server authentication, NIDS, and VPNs
Distributed, redundant datacenters with IPS
When managing user access to files and system resources with groups, users should be placed
into groups based on which of the following?

A. Concept of least privilege, required access, and security role
B. Job rotation, server location, and MAC
C. Concept of implicit deny, printer location, and biometrics
D. MAC, RBAC, and IP address
Concept of least privilege, required access, and security role
Which of the following is the MOST common way to allow a security administrator to securely
administer remote *NIX based systems?

A. SSH
B. IPSec
C. PPTP
D. SSL/TLS
SSH
Which of the following is the BEST way for an attacker to conceal their identity?

A. Deleting the cookies
B. Increase the max size of the log
C. Shoulder surfing
D. Disable logging
Disable logging
Which of the following is the primary location where global policies are implemented in an
organization?

A. Domain
B. Physical memory
C. User documentation
D. Security group
Domain
The physical location of rogue access points can be discovered by using which of the following?

A. War driving
B. Remote monitoring
C. IPS
D. Creating honeypots
War driving
Which of the following should be implemented to mitigate the security threat of adware?

A. Antivirus
B. Pop-up blockers
C. Anti-spam
D. Subnetting
Pop-up blockers
Which of the following security measures can be used with 802.1x?

A. Network address translation
B. Network access control
C. IPSec VPNs
D. Internet content filter
Network Access Control
Which of the following BEST secures ingress and egress points in a data center?

A. ID badges
B. Proximity cards
C. Escorts
D. Log book
Proximity cards
Virtualization technology can be implemented to positively affect which of the following security
concepts?

A. Non-repudiation
B. Integrity
C. Confidentiality
D. Availability
Availability
After disabling SSID broadcast for all wireless routers on the network, the administrator noticed that the Same unauthorized users were still accessing the network. Which of the following did the
administrator fail to do?

A. Change the SSID.
B. Disallow 802.11a traffic on the network.
C. Enable ARP cache spoofing protection.
D. Re-enable the SSID.
Change the SSID
Which of the following best practices should be applied to print resources to enforce existing information assurance controls?

A. Remove unnecessary users from groups with permissions to the resources.
B. Restrict group membership to users who do not print often.
C. Set the printer to standby mode after hours.
D. Ensure that all user groups have permission to all printers.
Remove unnecessary users from groups with permissions to the resources
Wireless access points with SSID broadcast make it easier to do which of the following?

A. War driving
B. Implement encryption
C. Physically tap the network
D. Decrease wireless coverage
War driving
A company is having a problem with users setting up rogue access points. Which of the following solutions would be the BEST for the administrator to implement?

A. Implement least privilege access
B. Password policy hardening
C. MAC address filtering
D. Stop SSID broadcasting
MAC address filtering
A recipient's public key can be used by a data sender to ensure which of the following?

A. Sender anonymity
B. Data confidentiality
C. Sender authentication
D. Data availability
Data confidentiality
Limiting access to a file resource to only the creator by default, is an example of applying which of
the following security concepts?

A. Behavior-based security
B. Logical tokens
C. Least privilege
D. Role-based access control
Least privileges
Which of the following SSH configurations mitigate brute-force login attacks? (Select THREE).

A. Disabling default accounts
B. Enabling SSH version 2
C. Changing the default service port
D. Limiting failed logon attempts
E. Enforcing use of cryptographic keys
F. Filtering based upon source address
Disabling default accounts, limiting failed logon attempts, enforcing use of cryptographic keys
Which of the following is MOST likely to be used to transfer malicious code to a corporate network by introducing viruses during manufacturing?

A. Cell phones
B. USB drives
C. BIOS chips
D. P2P software
USB drives
Which of the following authentication models is the MOST vulnerable to password crackers?

A. Two factor
B. Physical tokens
C. Single factor
D. Three factor
Single factor
Which of the following is an email attack targeted at a specific individual to trick the individual into revealing personal information?

A. Hoax
B. Pharming
C. Phishing
D. Spear phishing
Spear phishing
Integrity is BEST provided by which of the following technologies?

A. Symmetric key cryptography
B. Whole disk encryption
C. Asymmetric key cryptography
D. Digital signatures
Digital signatures
Which of the following is the EASIEST to implement for protecting an individual system?

A. Protocol analyzer
B. Internet content filter
C. Proxy server
D. Personal software firewall
Personal software firewall
A user reports a problem with resetting a password on the company website. The help desk
determined the user was redirected to a fraudulent website. Which of the following BEST describes attack type?

A. Spyware
B. Logic bomb
C. XSS
D. Worm
XSS
During a change management meeting, changes within the firewall were approved. Which of the following processes should an administrator follow?

A. Put firewall offline to perform all changes and return it online.
B. Log all changes being performed.
C. Save all current entries and perform changes.
D. Backup all current entries, perform and log all changes.
Backup all current entries, perform and log all changes
Which of the following audit systems should be enabled in order to audit user access and be able to know who is trying to access critical systems?

A. Password policy
B. Failed logon attempts
C. Account expiration
D. Group policy
Failed log on attempts
During a data exfiltration penetration test, which of the following is the NEXT step after gaining access to a system?

A. Privilege escalation
B. Attack weak passwords
C. DoS
D. Use default accounts
Privilege escalation
Which of the following should be protected from disclosure?

A. Public key infrastructure
B. User's private key passphrase
C. User's public key
D. Certificate revocation list
User's private key passphrase
Rule-based access control is closely aligned with which of the following?

A. Implicit deny
B. Mandatory access control
C. Access control lists
D. Role-based access control
Mandatory access control
A user is recording a file on disk. Which of the following will allow a user to verify that the file is the
original?

A. NTFS
B. MD5
C. RSA
D. 3DES
MD5
The administrator needs to set permissions for the new print server for a company comprised of 320 people in 18 departments. Each department has its own set of printers. Which of the following options is the BEST way to do this?

A. Place all the people into distribution groups. Assign printer access by access group.
B. Place all the people into departmental groups. Assign printer access by matching individuals to printer groups.
C. Place all the people into departmental groups. Assign access to all printers for each group.
D. Place all the people into departmental groups. Assign printer access by matching group to department.
Place all the people into departmental groups. Assign printer access by matching group to department
Which of the following BEST describes the function of a NIDS?

A. Analyzing network traffic for suspicious traffic
B. Analyzing LAN traffic for file sharing software
C. Diverting suspicious traffic in real-time
D. Diverting spyware traffic to the DMZ
Analyzing network traffic for suspicious traffic
An employee with a regular user account has downloaded a software program which allowed the user to join the administrator group. Which of the following is occurring?

A. Buffer overflow
B. Privilege escalation
C. Trojan
D. Virus
Privilege escalation
Command-and-Control is a key element of a:

A. logic bomb.
B. trojan.
C. rootkit.
D. botnet.
Botnet
WPA2-Enterprise can use which of the following to authenticate a user?

A. RRAS
B. TKIP
C. RADIUS
D. RSA
RADIUS
The IT department has been having issues lately with vulnerabilities occurring on the network due to outdated software on new computers that are deployed. Which of the following would be the BEST way for the administrator to address this issue?

A. Establish configuration baselines for the images
B. Implement group policies
C. Build security templates for the OS
D. Ensure that all patches are installed by employees
Establish configuration baselines for the images
Which of the following authentication models often requires different systems to function together and is complicated to implement in non-homogeneous environments?

A. Three factor authentication
B. Single sign-on
C. One factor authentication
D. Two factor authentication
Single sign-on
Which of the following attacks can be mitigated by shredding confidential documents?

A. Shoulder surfing
B. Phishing
C. Hoax
D. Dumpster diving
Dumpster diving
The manager has tasked an administrator to test the security of the network. The manager wants to know if there are any issues that need to be addressed, but the manager is concerned about affecting normal operations. Which of the following should be used to test the network?

A. Use a protocol analyzer.
B. Use a vulnerability scanner.
C. Launch aDDoD attack in the network and see what occurs.
D. Read the log files on each system on the network.
Use a vulnerability scanner
In order to help maintain system security, employees are only given rights to perform their current job function. Which of the following BEST describes this practice?

A. Implicit deny
B. Job rotation
C. Separation of duties
D. Least privilege
Least privilege
Which of the following relies on prime numbers to generate keys?

A. IPSec
B. Elliptic curve
C. RSA
D. AES
RSA
The network administrator has been asked to turn off access to the command prompt for some
users. Which of the following is the BEST choice to complete this request?

A. Deploy ahotfix.
B. Deploy patches.
C. Deploy service packs.
D. Deploy a group policy.
Deploy a group policy
A computer is displaying an MBR error upon restart. The technician is told the user has just installed new software. Which of the following threats is the MOST likely cause of this error?

A. DistributedDoS
B. Boot sector virus
C. Trojan
D. ActiveX
Boot sector virus
Which of the following is a best practice when creating groups of user and computer accounts in a
directory service?

A. Naming conventions and technical aptitude
B. Delegation of administration and policy deployment
C. Department and salary divisions
D. Seniority at the company and access level
Delegation of an administration and policy deployment
Which of the following can be implemented to ensure an employee cannot use the system outside of normal business hours?

A. Time of day restrictions
B. Implicit deny
C. Account expiration
D. Two factor authentication
Time of day restrictions
Which of the following BEST describes NAC?

A. Provides access based on predetermined characteristics
B. Translates between DHCP requests and IP addresses
C. Provides access based on ARP requests
D. Translates between private addresses and public addresses
Provides access based on predetermined characteristics
Which of the following tools is used to report a wide range of security and configuration problems on a network?

A. Vulnerability scanner
B. Port scanner
C. TACACS
D. Protocol analyzer
Vulnerability scanner
Which of the following will allow a security administrator to determine potentially malicious traffic traversing the network?

A. Protocol analyzer
B. Systems monitor
C. Task manager
D. Performance monitor
Protocol analyzer
Which of the following is MOST closely associated with email?

A. S/MIME
B. IPSec
C. TLS
D. SSH
S/MIME
Which of the following is performed when conducting a penetration test?

A. Documentation of security vulnerabilities and policy gaps.
B. Demonstrations of network capabilities and resiliency.
C. Demonstrations of security vulnerabilities and flaws in policy implementation.
D. Documentation of network security settings, policy gaps and user errors.
Demonstrators of security vulnerabilities and flaws in policy implementation
On which of the following algorithms is PGP based?

A. DES
B. MD5
C. WPA
D. RSA
RSA
Which of the following allows two people to communicate securely without having to know each
other prior to communicating?

A. AES
B. 3DES
C. Symmetric keys
D. PKI
PKI
The MOST expensive and effective alternate site that provides the HIGHEST level of availability, is called a:

A. primary site.
B. warm site.
C. cold site.
D. hot site.
Hot site
Which of the following is an example of a single sign-on?

A. Authentication to individual systems with a single authentication factor.
B. The use of three factor authentication on single systems.
C. Access to individual systems with a single password.
D. Access to multiple systems with a single authentication method.
Access to multiple systems with a single authentication method
A security administrator has detected that the company websites source code contains suspicious numbers of white spaces and non-printable characters at the end of each line of code. Which of the following is being used in order to leak sensitive information to the competition?

A. Encryption
B. Steganography
C. Obfuscation
D. Codefuzzing
Steganography
A system administrator wants to verify that the corporate users are following the security policy on
password complexity requirements. Which of the following could be used to verify the passwords?

A. Password hashing
B. Password hardening
C. Password enumeration
D. Password cracking
Password cracking
The company's NIDS system is configured to pull updates from the vendor and match traffic
patterns based on these updates. Which of the following BEST describes this configuration?

A. Signature-based
B. OVAL-based
C. Anomaly-based
D. Behavior-based
Signature-based
Which of the following desktop solutions can a user implement to detect and delete downloaded
malware?

A. Desktop firewall
B. HIPS
C. HIDS
D. Antivirus
Antivirus
After deploying a new IDS, an administrator notices a large amount of notifications coming from a filter inspecting port 445. Which of the following can BEST help the administrator in determining if the notifications are false positives?

A. The router tables
B. Firewall log
C. IDS performance monitor
D. Protocol analyzer
Protocol analyzer
Which of the following BEST characterizes a DMZ?

A. A trusted network that is encrypted end-to-end.
B. A connection between two trusted networks.
C. A trusted segment to a VPN concentrator.
D. A network that resides between trusted and non-trusted networks.
A network that resides between trusted and non-trusted networks
Which of the following would be used to gain access to a data center where the administrator
would have to use multiple authentication factors?

A. Fingerprint and retina scan
B. Enter two different passwords
C. Fingerprint scan and password
D. ID badge and smartcard
Fingerprint scan and password
A security manager decides to assign the daily responsibility of firewall and NIDS administration to different technicians. This is an example of which of the following?

A. Job rotation
B. Implicit deny
C. Separation of duties
D. Least privilege
Separation of duties
A security administrator is worried about attackers accessing a specific server within the
company's network. Which of the following would allow the security staff to identify unauthorized
access to the server?

A. Honeypot
B. Antivirus
C. HIDS
D. Anti-spyware
HIDS
Which of the following ports is susceptible to DNS poisoning?

A. 23
B. 8080
C. 80
D. 53
53
Which of the following is the main disadvantage of implementing a certificate revocation list?

A. It is a single point of failure and expensive to maintain.
B. Only a certain number of certificates can be revoked.
C. Revocation is not instantaneous.
D. The CRL database cannot be duplicated
It is a single point of failure and expensive to maintain
Which of the following would an administrator MOST likely update after deploying a service pack?

A. Group policy
B. Hotfix
C. Configuration baseline
D. Patch
Configuration baseline
A computer or device that is setup on the network merely to monitor the habits and techniques of a suspected attack is known as a:

A. content filter.
B. proxy.
C. honeypot.
D. dummy terminal.
Honeypot
Which of the following devices would be used to gain access to a secure network without affecting
network connectivity?

A. Fiber-optic splicer
B. Firewall
C. Vampire tap
D. Router
Vampire tap
Which operating system hardening procedure can be implemented to ensure all systems have the most up-todate version available?

A. Patch management
B. Configuration baselines
C. Group policies
D. Security templates
Patch management
Which of the following is the primary difference between role-based access control and rule-based access control?

A. Both are based on local legal regulations but role based provides greater security.
B. One is based on job function and the other on a set of approved instructions.
C. One is based on identity and the other on authentication.
D. Both are based on job title but rule based provides greater user flexibility.
One is based on job function and the other on a set of approved instructions
The network administrator has determined that a large number of corporate workstations on the
network are connecting to an IRC server on the Internet, and these same workstations are
executing DDOS attacks on remote systems. Which of the following terms BEST describes this situation?

A. Worm
B. Botnet
C. Rootkit
D. Spam
Botnet
Which of the following is used to determine who transported a hard drive during an incident
response investigation?

A. Damage and loss control
B. Disclosure guidelines
C. Chain of custody
D. Forensic policy
Chain of custody
Which of the following is the MAIN difference between bluejacking and bluesnarfing?

A. Bluejacking involves some social engineering while bluesnarfing does not.
B. Bluejacking involves sending unsolicited messages to a phone while bluesnarfing involves
accessing the phone data.
C. Bluesnarfing can be done from a greater distance than bluejacking.
D. Bluesnarfing involves sending unsolicited messages to a phone while bluejacking involves
accessing the phone data.
Bluejacking involves sending unsolicited messages to a phone while bluesnarfing involves accessing the phone data
Which of the following keys is used to sign an email message?

A. CA key
B. Symmetric
C. Private
D. Public
Private
Which of the following BEST describes the purpose of risk mitigation?

A. Reducing the time from vulnerability discovery to patch deployment.
B. Reducing the work associated with patch management.
C. Reducing the chances that a threat will exploita vulnerability.
D. Reducing the cost to recover from a security incident.
Reducing the chances that a threat will exploit a vulnerability
Organizational policy requiring employees to login using their username and password and a
random number from their key fob is an example of:

A. two factor authentication.
B. four factor authentication.
C. single factor authentication.
D. three factor authentication.
Two factor authentication
A server administrator wants to do a vulnerability assessment on a server that is not on the
production network to see if FTP is open. Which of the following tools could be used?

A. Intrusion detection system
B. Port scanner
C. Antivirus software
D. Anti-spyware software
Port scanner
A network device contains a feature that provides emergency administrator access from any port by sending a specific character sequence. This is an example of a:

A. DDoS attack.
B. default account.
C. back door.
D. DoS attack.
Back door
Which of the following provides active protection to critical operating system files?

A. HIDS
B. Firewall
C. HIPS
D. NIPS
HIPS
Which of the following redundancy planning concepts would MOST likely be used when trying to strike a balance between cost and recovery time?

A. Warm site
B. Field site
C. Cold site
D. Hot site
Warm site
Which of the following was created to standardize the security assessment process?

A. OVAL
B. Vulnerability scanner
C. TACACS
D. Network mapper
OVAL
In PKI, which of the following keys should be kept secret at all times?

A. Private key
B. Public key
C. Diffie-Hellman key
D. Shared key
Private key
Employee A sends employee B an encrypted message along with a digital signature. Employee B
wants to make sure that the message is truly from employee A. Which of the following will
employee B do to verify the source of the message?

A. Use employee B's public key to unencrypted the message.
B. Use employee A's public key to verify the digital signature.
C. Use employee B's private key to unencrypted the message.
D. Use employee A's private key to verify the digital signature.
Use employee A's public key to verify the digital signature
An administrator is having difficulty getting staff to adhere to group policy directives regarding streaming audio. Bandwidth utilization increases around the time that a popular radio show is broadcast. Which of the following is the BEST solution to implement?

A. Implement time of day restrictions
B. Change the password policy
C. Deploy content filters
D. Enforce group policy
Deploy content filters
Which of the following is the FINAL phase of disaster recovery?

A. Hold a follow-up meeting to review lessons learned.
B. Notify all personnel that a disaster has taken place.
C. Restore all network connectivity.
D. Perform a full recovery so all devices are back in working order.
Hold a follow-up meeting to review lessons learned
A small company wants to hire a security assessment team for the server and network infrastructure. Which of the following needs to be defined before penetration testing occurs?

A. Vulnerability scan
B. Bandwidth requirements
C. Protocols analysis
D. Rules of engagement
Rules of engagement
A user logs onto a laptop with an encrypted hard drive. There is one password for unlocking the
encryption and one password for logging onto the network. Both passwords are synchronized and
used to login to the machine.
Which of the following authentication types is this?

A. Two factor
B. Biometric
C. Single sign-on
D. Three factor
Single sign-on
A user wants to ensure that if a computer's hard drive is removed, the files cannot be accessed without authentication. Which of the following would be used?

A. Disk encryption
B. Single sign-on
C. Digital signature
D. Biometric reader
Disk encryption
Which of the following would a user need to decrypt a data file that has been encrypted with the
user's public key?

A. PGP's public key
B. Sender's private key
C. User's public key
D. User's private key
User's private key
Which of the following is BEST suited to determine which services are running on a remote host?

A. Protocol analyzer
B. Antivirus
C. Log analyzer
D. Port scanner
Port scanner
A security administrator would use which of the following to control access between network
segments?

A. Firewall
B. NIDS
C. Subnetting
D. RADIUS
Firewall
Verifying the time and date certain users access a server is an example of which of the following
audit types?

A. Retention policy
B. Account lockout
C. Account login
D. User rights
Account login
A technician wants to implement a change across the production domain. Which of the following
techniques should the technician perform?

A. Edit the access control list.
B. Deploy a group policy.
C. Install service packs on the domain.
D. Change the acceptable use policy.
Deploy a group policy
Which of the following has a primary goal of hiding its processes to avoid detection?

A. Logic bomb
B. Rootkit
C. Worm
D. Virus
Rootkit
Which of the following is the BEST example of a technical security policy?

A. Posting a sign on the door to the server room indicating that access is restricted to authorized
personnel only.
B. Installing electronic locks on the door to the server room that only allow access to a person
swiping anadministrators smartcard.
C. Removing all the keyboards from the server room and requiring all administrators to bring
keyboards from their desks.
D. Building a new server room that only has a single entrance that is heavily protected.
Installing electronic locks on the door to the server room that only allow access to a person swiping an an administrators smart card
Employee A wants to send employee B an encrypted message that will identify employee A as the source of the message. Which of the following will employee A do to accomplish this? (Select TWO).

A. Use employee A's private key to sign the message.
B. Use the message application to mark the message as urgent.
C. Use only symmetric encryption to send the message.
D. Use employee B's private key to encrypt the message.
E. Use employee B's public key to encrypt the message.
F. Use employee A's public key to sign the message.
Use employee A's private key to sign the message, use employee B's public key to encrypt the message
From which of the following can a virus be loaded before an OS starts?

A. TPM
B. P2P
C. USB drive
D. Hardware locks
USB drive
Management wants a security assessment conducted on their network. The assessment must be
conducted during normal business hours without impacting users. Which of the following would BEST facilitate this?

A. A vulnerability scan
B. A penetration test
C. Ahoneynet
D. A risk assessment
A vulnerability scan
Which of the following activities often involves consulting with the legal department?

A. Updating domain password policies
B. Network infrastructure planning
C. User account creation and management
D. Reviewing storage and retention policies
Reviewing storage and retention policies
Which of the following protocols is used to connect a remote office LAN into the central office so
resources can be shared?

A. SSH
B. HTTPS
C. IPSec
D. SNMP
IPSec
Which of the following protocols uses a three-way handshake during communication with multiple hosts?

A. UDP
B. RDP
C. SMTP
D. TCP
TCP
Which of the following technologies requires encryption and authentication?

A. WEP
B. 802.1x
C. 802.11n
D. TKIP
802.1x
A security administrator has received an SD memory card for the purpose of forensic analysis.
The memory card is left on the administrator's office desk at the end of the day. The next day the
security guard returns the SD card to the administrator because it was found by the night janitor.
Which of the following incident response procedures has been violated?

A. Securing the site
B. Chain of custody
C. Evidence gathering
D. Data retention
Chain of custody
Organization policy requiring employees to display their corporate badge at all times is an example of:

A. non-repudiation.
B. identification.
C. authentication.
D. confidentiality.
Identification
Which of the following cryptographic methods provides the STRONGEST security when
implemented correctly?

A. Elliptic curve
B. NTLM
C. MD5
D. WEP
Elliptic Curve
An on-going attack on a web server has just been discovered. This server is non-critical but holds data that could be very damaging to the company if it is disclosed. Which of the following should the administrator choose as their FIRST response?

A. Launch a counter attack on the other party.
B. Disconnect the server from the network.
C. Call over a manager and document the attack.
D. Monitor the attack until the attacker can be identified.
Disconnect the server from the network
Which of the following is a common evasion technique by attackers to avoid reverse engineering?

A. Determining if the host is already infected
B. Determining if the host if a virtual or physical
C. Determining if the host is Windows or Linux based
D. Determining if the host can connect to the Internet
Determining if the host is a virtual or physical
When used properly, a one time pad is considered an unbreakable algorithm because:

A. it is a symmetric key.
B. it uses a stream cipher.
C. the key is not reused.
D. it is based on the generation of random numbers
The key is not reused
Which of the following uses multiple encryption keys to repeatedly encrypt its output?

A. AES256
B. AES128
C. DES
D. 3DES
3DES
Employees in the accounting department move between accounts payable and accounts
receivable roles every three months. This is an example of which of the following security
concepts?

A. Separation of duties
B. Group policies
C. Least privilege
D. Job rotation
Job rotation
After accessing several different Internet sites a user reports their computer is running slow. The
technician verifies that the antivirus definitions on that workstation are current. Which of the following security threats is the MOST probable cause?

A. Spam
B. Worm
C. Trojan
D. Spyware
Spyware
A technician reports that the email server is being compromised. Files are being uploaded to change the email portal webpage. Which of the following tools can be used to determine how the
files are being uploaded?

A. VPN
B. Protocol analyzer
C. DMZ
D. Performance monitor
Protocol Analyzer
The primary purpose of a hot site is to ensure which of the following?

A. Adequate HVAC to meet environmental initiatives
B. Recovery of operations within 30 days after a disaster
C. Transition of operations in a short time period in a disaster
D. Seamless operations in the event of a disaster
Transition of operations in a short time period in a disaster
User A moved from Human Resources to Accounting. A year later they mistakenly print to a
network printer back in HR. This indicates which of the following needs to happen?

A. Updates and patching of the users workstation
B. Installation of antivirus software on theusers workstation
C. An audit of the security logs
D. An account access and rights audit
An account access and rights audit
Which of following protocols can operate in tunnel mode?

A. SHTTP
B. IPSec
C. SFTP
D. SSL
IPSec
Cloud computing uses which of the following technologies to automatically provision guests on demand?

A. Cloning
B. Spoofing
C. Imaging
D. Virtualization
Virtualization
Which of the following encryption methods is being used when both parties share the same secret
key?

A. Kerberos
B. Asymmetric
C. Symmetric
D. Certificate based
Symmetric
An administrator discovers evidence that a co-worker has been violating the law with the contents of some of their emails. Which of the following should the administrator do FIRST?

A. Inform upper management or law enforcement.
B. Confront the co-worker and demand all illegal actions cease.
C. Take what was found to another peer and have the peer confront the co-worker.
D. Go through the email server and accumulate as much evidence as possible.
Inform upper management or law enforcement
Which of the following should an HVAC system do when a fire is detected in a data center?

A. It should shut down.
B. It should change to full cooling.
C. It should decrease humidity.
D. It should increase humidity.
It should shut down
Which of the following encryption implementations would be the MOST secure?

A. 3DES
B. SHA1
C. MD4
D. WEP
3DES
Which of the following allows a technician to retroactively identify a security incident?

A. NIDS
B. Internet content filter
C. DMZ
D. Proxy server
NIDS
A number of users on the company network have been contracting viruses from required social networking sites. Which of the following would be MOST effective to prevent this from happening?

A. Firewall
B. Honeypot
C. NIDS
D. Proxy server
Proxy server
Which of the following would a technician implement to mitigate SQL injection security risks?

A. Use software firewalls.
B. Use input validation.
C. Disable Java on Internet browsers.
D. Delete Internet history.
Use input validation
Which of the following concepts is applied when a user enters a password to gain authorized
access to a system?

A. Authentication
B. Non-repudiation
C. Privatization
D. Identification
Authentication
Which of the following vulnerability assessment tools would be used to identify weaknesses in a company's router ACLs or firewall?

A. Brute force attacks
B. Rainbow tables
C. Port scanner
D. Intrusion prevention systems
Port scanner
Multiple users are having trouble connecting to a secure corporate website and experience a
minor delay when logging onto the website. The URL for the website is also slightly different than normal once the users are connected. The network administrator suspects which of the following attacks is being carried out?

A. Phishing
B. Man-in-the-middle
C. Spam
D. Bluesnarfing
Man-in-the-middle
A company is looking for the lowest cost option for their disaster recovery operations, regardless of the amount of time it will take to bring their systems back online. Which of the following would be BEST suited for their needs?

A. Live site
B. Cold site
C. Warm site
D. Hot site
Cold site
Which of the following tools depends MOST heavily on regular updates to remain effective?

A. Network Mapper
B. Vulnerability scanner
C. Protocol analyzer
D. Port scanner
Vulnerability scanner
Which of the following can be used to create a unique identifier for an executable file?

A. DES
B. Blowfish
C. NTLM
D. SHA
SHA
An administrator is configuring a new system in a domain. Which of the following security events is
MOST important to monitor on the system?

A. Password changes
B. Logon attempts
C. Failed data moves
D. Data file updates
Logon attempts
Which of the following cryptography concepts requires two keys?

A. Secret
B. Symmetric
C. Asymmetric
D. TPM
Asymmetric
Which of the following would be used to observe a runaway process?

A. Protocol analyzer
B. Performance monitor
C. Performance baseline
D. Application log
Performance Monitor
Which of the following determines if traffic is blocked or allowed?

A. Logical keys
B. Network-based Intrusion Detection System (NIDS)
C. Access Control List (ACL)
D. Username and passwords
Access Control List (ACL)
Which of the following is MOST often used in a DDoS?

A. Worm
B. Virus
C. Trojan
D. Botnet
Botnet
IPSec provides which of the following?

A. NAT traversal
B. Payload encryption
C. New IP headers
D. Payload compression
Payload encryption
The company's administrative assistant acts as the main point of contact for outside sales vendors
and provides information over the phone. Which of the following is the GREATEST threat that the
administrative assistant should be educated about?

A. Providing the corporate mailing address to unidentified callers
B. Data information verification and up-to-date reporting structure
C. Providing employee personal contact information
D. Non-redundant personnel role distribution
Providing employee personal contact information
Which of the following centralizes authentication on a wireless network?

A. RADIUS
B. CHAP
C. RDP
D. VPN
RADIUS
Which of the following is the BEST course of action to ensure an email server is not an open
relay?

A. Require authentication for all inbound SMTP traffic.
B. Require authentication for all inbound and outbound SMTP traffic.
C. Block all inbound traffic on SMTP port 25.
D. Require authentication for all outbound SMTP traffic.
Require authentication for all outbound SMTP traffic