A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers of personnel. Which of the following solutions would allow the small company to save money on hiring additional personnel and minimize the footprint in the current datacenter?
Software as a service
Which of the following should be installed to prevent employees from receiving unsolicited emails?
Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems, the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to identify the issue?
Which of the following devices is often used to cache and filter content?
Which of the following features should be enabled on perimeter doors to ensure that unauthorized access cannot be gained in the event of a power outage?
Which of the following would need to be configured correctly to allow remote access to the network?
Used in conjunction, which of the following are PII? (Select TWO)
Birthday, Full name
The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likely occurring?
The development team is transferring data to test systems using SFTP and SCP
Jane, the company's Chief Information Officer (CIO), contacts the security administrator about an email asking for money in order to receive the key that would decrypt the source code that the attacker encrypted. Which of the following malware types is this MOST likely to be in this situation?
Which of the following BEST describes the process of key escrow?
Maintains a secured copy of a user's private key for the sole purpose of recovering the key if it is lost
Which of the following should be used to help prevent device theft of unused assets?
Which of the following BEST describes the purpose of fuzzing?
To discover buffer overflow vulnerabilites
When a user first moves into their residence, the user receives a key that unlocks and locks their front door. This key is only given to them but may be share with others they trust. Which of the following cryptography concepts is illustrated in the example above?
Symmetric key sharing
Which of the following devices would be installed on a single computer to prevent intrusion?
Which of the following attacks is BEST described as an attempt to convince Matt, an authorized user, to provide information that can be used to defeat technical security controls?
Which of the following would provide the MOST reliable proof that a datacenter was accessed at a certain time of day?
Which of the following port numbers is used for SCP, by default?
Which of the following security controls is the BEST mitigation method to address mobile device data theft? (Select TWO)
Remote wipe, Device encryption
Which of the following is an example of the type of access control methodology provided on Windows systems by default?
Discretionary Access Control (DAC)
Which of the following is the primary difference between a virus and a worm?
A worm is self-replicating
By default, which of the following stops network traffic when the traffic is not identified in the firewall rule set?
Jane, a system administrator, sees a firewall rule that applies to 10.4.4.58/27. Which of the following IP address ranges are encompassed by this rule?
Which of the following is a control that is gained by using cloud computing?
High availability of the data
Matt, a security technician, is using TFTP. Which of the following port numbers is used for TFTP?
Which of the following may cause a user, connected to a NAC-enabled network, to not be prompted for credentials?
The user's PC is missing the authentication agent
Which of the following protocols should Pete, a security administrator, use to ensure that the data remains encrypted during transport over the internet? (Select THREE)
TLS, SSL, SSH
Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Business impact analysis
In order to ensure high availability of all critical servers, backups of the main datacenter are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in the case of a disaster?
Having the offsite location of tapes also be the hot site
Which of the following uses tickets to identify users to the network?
Which of the following network security techniques can be easily circumvented by using a network sniffer?
Implementing MAC filtering on WAPs
Which of the following is the correct formula for calculating mean time to restore (MTTR)?
MTTR = (Time of restore)#(time of fail)
Which of the following is used when performing a quantitative risk analysis?
By default, CCMP will use which of the following to encrypt wireless transmission?
Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
Which of the following describes the importance of enacting and maintaining a clean desk policy?
To avoid passwords and sensitive data from being unsecured?
Which of the following relies on creating additional traffic to congest networks? (Select TWO)
Smurf attack, DDoS
Which of the following is an example of a smart card?
Which of the following can the security administrator implement to BEST prevent laptop device theft?
Which of the following is true about the private key in a PKI?
It is used to encrypt the email hash in signed emails
A security administrator has discovered though a password auditing software that most passwords can be discovered by cracking the first seven characters and then cracking the second part of the password. Which of the following is in use by the company?
In a disaster recovery situation, operations are to be moved to an alternate site. Computers and network connectivity are already present; however, production backups are several days out-of-date. Which of the following sites types is being described?
Which of the following are the two basic components upon which cryptography relies?
Algorithms and keys
Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of data making it susceptible to brute force attacks?
Which of the following is susceptible to reverse lookup attacks if not configured properly?
Which of the following devices should Jane, a security administrator, use to allow secure remote network access for mobile users?
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
Perform routine user permission reviews
The security administrator wants to ensure messages traveling between point A and point B are encrypted and authenticated. Which of the following accomplishes this task?
Which of the following malware types is an antivirus scanner MOST unlikely to discover? (Select TWO)
Pharming, Logtic bomb
Which of the following BEST describes the proper method and reason to implement port security?
Apply a security control which ties specific port to end-device MAC addresses and prevents additional devices from being connected to the network.
If continuity plans are not regularly exercised, which of the following aspects of business continuity planning are often overlooked until a disaster occurs?
Single points of failure
Matt, a security technician, needs to increase his password's key space. Which of the following increases the key space of a password the MOST?
Letters, numbers and special characters
Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Which of the following environmental control would BEST be used to regulate cooling within a datacenter?
Hot and cold aisles
When an attack using a publicly unknown vulnerability compromises a system, it is considered to be which of the following?
Zero day attack
A programmer allocates 16 bites for a string variable, but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Which of the following devices provides storage for RSA or asymmetric keys and may assists in user authentication? (Select TWO)
Trusted platform module, Hardware security module
A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Providing elastic computing resources that give a client access to more resources, allowing for distribution of large jobs across a flexible number of machines, or allowing for distributed storage of information are all hallmarks of which technology?
Which of the following is MOST likely to be the last rule contained on any firewall?
Which of the following is MOST relevant for Jan, a security administrator, to use when investigating a SQL injection attack?
A security administrator wants to prevent users in sales from accessing their servers after ^pm, and prevent them from accessing accounting's network at all times. Which of the following should the administrator implement to accomplish these goals? (Select TWO)
Time of day restrictions, Access control lists
In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (select TWO)
Which of the following file transfer protocols is an extension of SSH?
Which of the following would an administrator do to ensure that an application is secure an all unnecessary services are disabled?
A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last month. Which of the following is MOST likely causing the disconnections?
The new access point was mis-configured and is interfering with another nearby access point.
Which of the following is a reason to perform a penetration test?
To determine the impact of a threat against the enterprise
Which of the following is a method to prevent ad-hoc configuration mistakes?
Implement a change management strategy
Which of the following is a form of photo identification used to gain access into a secure location?
Which of the following is a management control type?
Which of the following has a programmer MOST likely failed to consider if a user entering improper input is able to crash a program?
Pete, a security administrator, is considering using TACACS+. Which of the following is a reason to use TACACS+ over RADIUS?
Encryption of all dtat between client and server
Which of the following would an administrator apply to mobile devices to BEST ensure the confidentiality of data?
Which of the following devices would allow a technician to view IP headers on a data packet?
Matt, an attacker, incorrectly submits data on a website's form and is able to determine the type of database used by the application and the SQL statements used to query that database. Which of the following is responsible for this information disclosure?
Which of the following environmental variables reduces the potential for static discharges?
Which of the following methods BEST describes the use of hiding data within other files?
Which of the following is an example of authentication using something Sara, a user, has and something she is?
Token and fingerprint scan
A professor at a university is given two keys. One key unlocks a classroom door and the other locks it. The key used to lock the door is available to all other faculty. The key used to unlock the door is only given to the professor. Which of the following cryptography concepts is illustrated in the example above?
Asymmetric key sharing
When granting access, which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?
Which of the following web application security weakness can be mitigated by preventing the use of HTML tags?
Which of the following can cause hardware based drive encryption to see slower deployment?
A lack of management software
Which of the following should the security administrator look at FRIST when implementing an AP to gain more coverage?
Large, partially self-governing, collection of hosts executing instructions for a specific purpose is an example of which type of malware?
Matt, a security administrator, is using AES. Which of the following cipher types is used by AES?
Which of the following is a reason to perform user awareness and training?
To mimimize the organizational risk posed by users
DRPs should contain which of the following?
Hierarchical list of critical systems
Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
The MAIN difference between qualitative and quantitative risk assessment is:
quantitative is based on hard numbers while qualitative is based on subjective ranking
Pete, a system administrator, was recently laid off for compromising various accounting systems within the company. A few months later, the finance department reported their applications were not working correctly. Upon further investigation, it was determined that unauthorized accounting software was installed onto a financial system and several application exploits existed within that system. This is an example of which of the following?
A hard drive of a terminated employee has been encrypted with full disk encryption, and Sara, a technician, is not able to decrypt the data. Which of the following ensures that, in the future, Sara will be able to decrypt this information?
Jane, a security technician, needs to transfer files. Which of the following is the file transfer function that utilizes the MOST secure form of data transport?
A security administrator has been receiving support tickets for unwanted windows appearing on user's workstations. Which of the following can the administrator implement to help prevent this from happening?
Which of the following exploitation types involves injection of pseudo-random data in order to crash or provide unexpected results from an application?
Due to sensitive data concerns, a security administrator has enacted a policy preventing the use of flash drives. Additionally, which of the following can the administrator implement to reduce the risk of data leakage?
Enact a policy banning users from bringing in personal music devices
Which of the following asymmetric encryption keys is used to encrypt data to ensure only the intended recipient can decrypt the ciphertext?
An application log shows that the text "test; rm -rf/ect/passwd" was entered into a HTML form. Which of the following describes the type of attack that was attempted?
Which of the following can prevent an unauthorized employee from entering a data center? (Select TWO)
Security guard, Proximity reader
Which of the following can Matt, a security administrator, use to provide integrity verification when storing data?
Which of the following is the MOST effective method to provide security for an in-house created application during software development?
Explicity include security gates during the SDLC
Which of the following penetration testing types is performed by security professionals with limited inside knowledge of the network?
Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
A thumbprint scanner is used to test which of the following aspects of human authentication?
Something a user is
A security engineer is troubleshooting a server in the DMZ, which cannot be reached from the internet or the internal network.. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway
Which of the following can Jane, a security administrator, used to help prevent man-in-the middle attacks?
A business-critical application will be installed on an internet facing server. Which of the following is the BEST security control that should be performed in conjunction with updating the application to the MOST current version?
Vendor-provided hardening documentation should be reviewed and applied
Upper management decides which risk to mitigate based on cost. This is an example of:
quantitative risk assessment
Which of the following, when used in conjunction with software-based encryption, enhances platform authentication by storing unique RSA keys and providing crypto processing?
Using both a username and a password is an example of:
Single factor authentication
A security administrator ensures that certain characters and commands entered on a web server are not interpreted as legitimate data and not passed onto backend server. This is an example of which of the following?
A certificate that has not been compromised should be published to which of the following?
A programmer cannot change the production system directly and must have code changes reviewed and approved by the production system manager. Which of the following describes this control type?
Separation of dutes
A security administrator needs to install a new switch for a conference room where two different groups will be having separate meetings. Each of the groups uses different subnets and need to have their traffic separated. Which of the following would be the SIMPLEST solution?
Creat two VLANs on the switch
Which of the following describes a passive attempt to identify weakness?
Which of the following would be a reason to implement DAC as an access control model?
The owner of the data should decide who has access
When configuring multiple computers for RDP on the same wireless router, it may be necessary to do which of the following?
Forward to different RDP listening ports.
All of the following are valid cryptographic hash functions EXCEPT:
Which of the following is a best practice to identify fraud from an employee in a sensitive position?