In a secure environment, which authentication mechanism performs better?
A. RADIUS because it encrypts client/server passwords.
B. TACACS+ because...
Which of the following threats is not associated with Bluetooth?
Which of the following threats is not associated with Bluetooth?
A. Discovery mode
B. Bluesnarfing
C. Fraggle attack
D. Bluejacking
Answer:...
What is the primary purpose of network address translation (NAT)?
What is the primary purpose of network address translation (NAT)?
A. To hide the public network from internal hosts
B. To convert IP addresses into...
Which of the following types of firewalls provides inspection of data at layer 7 of the OSI model?
Which of the following types of firewalls provides inspection of data at layer 7 of the OSI model?
A. Network address translation
B. Stateful inspection
C....
Which device uses stateful packet inspection?
Which device uses stateful packet inspection?
A. Switch
B. Firewall
C. Hub
D. IDS
Answer: ...
Which of the following would a DMZ typically contain?
Which of the following would a DMZ typically contain?
A. FTP server
B. SQL server
C. Customer account database
D. User workstations
Answer:...
A Uniform Resource Locator (URL) is a type of Uniform Resource Identifier (URI) that specifies where an identified resource is available. When a user attempts to go to a website, she notices the URL has changed. Which attack is the most likely cause of the problem?
A Uniform Resource Locator (URL) is a type of Uniform Resource Identifier (URI) that specifies where an identified resource is available. When a user...
A client contracts you to prevent users from accessing inappropriate websites. Which of the following technologies should you implement?
A client contracts you to prevent users from accessing inappropriate websites. Which of the following technologies should you implement?
A. NIDS
B....
Which of the following technologies was originally designed to decrease broadcast traffic and reduce the likelihood of having information compromised by network sniffers?
Which of the following technologies was originally designed to decrease broadcast traffic and reduce the likelihood of having information compromised...
The IT director asks you to create a solution to protect your network from Internet-based attacks. The solution should include pre-admission security checks and automated remediation and should also integrate with existing network infrastructure devices. Which of the following solutions should you implement?
The IT director asks you to create a solution to protect your network from Internet-based attacks. The solution should include pre-admission security...
Which of the following are best practices when installing and securing a new computer for a home user? (Select the three best answers.)
Which of the following are best practices when installing and securing a new computer for a home user? (Select the three best answers.)
A. Install...
Which of the following will most likely enable an attacker to force a switch to function like a hub?
Which of the following will most likely enable an attacker to force a switch to function like a hub?
A. DNS spoofing
B. ARP poisoning
C. MAC flooding
D....
Which of the following transport protocols and port numbers does Secure Shell use?
Which of the following transport protocols and port numbers does Secure Shell use?
A. UDP (User Datagram Protocol) port 19
B. TCP (Transmission Control...
Which of the following attacks involve intercepting a session and modifying network packets? (Select the two best answers.)
Which of the following attacks involve intercepting a session and modifying network packets? (Select the two best answers.)
A. TCP/IP hijacking
B....
Which of the following best describes the baseline process of securing a device within a network infrastructure?
Which of the following best describes the baseline process of securing a device within a network infrastructure?
A. Active prevention
B. Enumerating
C....
Your manager has asked you to run cables for your network through a boiler room where there is a furnace and air conditioning equipment. These devices are known to cause interference. Which of the following types of cabling will have the best chance of preventing interference when working in this area?
Your manager has asked you to run cables for your network through a boiler room where there is a furnace and air conditioning equipment. These devices...
Which of the following is a Class B private IP address?
Which of the following is a Class B private IP address?
A. 10.254.254.1/16
B. 192.168.1.1/16
C. 172.16.1.1/16
D. 169.254.50.1/24
Answer: ...
Which of the following enables an attacker to hide the presence of malicious code by altering Registry entries?
Which of the following enables an attacker to hide the presence of malicious code by altering Registry entries?
A. Worm
B. Logic bomb
C. Rootkit
D....
Which of the following is often misused by spyware to collect and report a user's activities?
Which of the following is often misused by spyware to collect and report a user's activities?
A. Session cookie
B. Tracking cookie
C. Persistent cookie
D....
One of your users complains that files are being randomly renamed and deleted. The last action the user took was to download and install a new screensaver on the computer. The user says that the file activity started immediately after installation of the screensaver. Which of following would be the best description for this screensaver?
One of your users complains that files are being randomly renamed and deleted. The last action the user took was to download and install a new screensaver...
Which of the following threats has the highest probability of being increased by the availability of devices such as USB flash drives on your network?
Which of the following threats has the highest probability of being increased by the availability of devices such as USB flash drives on your network?
A....
Which of the following is the most effective way of preventing adware?
Which of the following is the most effective way of preventing adware?
A. Install an antivirus program.
B. Install a host-based intrusion detection...
You want to make sure that the most recent hotfixes have been applied to a Windows server, and you want to minimize the effort necessary to maintain this solution. What is the best way to accomplish this?
You want to make sure that the most recent hotfixes have been applied to a Windows server, and you want to minimize the effort necessary to maintain...
What kind of attack enables an attacker to access administrator-level resources using a Windows service that uses the local system account?
What kind of attack enables an attacker to access administrator-level resources using a Windows service that uses the local system account?
A. Trojan
B....
Which of the following methods should you use to fix a single security issue on a computer?
Which of the following methods should you use to fix a single security issue on a computer?
A. Configuration baseline
B. Patch
C. Service pack
D....
What are kernel-level rootkits designed to do to a computer? (Select the two best answers.)
What are kernel-level rootkits designed to do to a computer? (Select the two best answers.)
A. Make a computer susceptible to pop-ups
B. Extract...
E-mail servers can be maliciously exploited in many ways, for example, spoofing e-mail messages. Which of the following is a common component that attackers would use to spoof e-mails?
E-mail servers can be maliciously exploited in many ways, for example, spoofing e-mail messages. Which of the following is a common component that attackers...
The IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you take into consideration?
The IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you take into consideration?
A....
You are the network administrator for your organization and are in charge of many servers, including one web server. Which of the following is the best way to reduce vulnerabilities on your web server?
You are the network administrator for your organization and are in charge of many servers, including one web server. Which of the following is the best...
Which of the following is the first step in creating a security baseline?
Which of the following is the first step in creating a security baseline?
A. Define a security policy.
B. Install software patches.
C. Perform vulnerability...
Which of the following statements best defines a computer virus?
Which of the following statements best defines a computer virus?
A. It is a find mechanism, initiation mechanism, and can propagate.
B. It is a search...
Which of the following will a Faraday cage prevent the usage of?
Which of the following will a Faraday cage prevent the usage of?
A. USB flash drives
B. Uninterruptible power supplies
C. Cell phones
D. Wired keyboards
Answer:...
You are the network security administrator for your organization. You recently audited a server and found that a user logged in to the server with a regular account, executed a program, and performed activities that should be available only to an administrator. What type of attack does this describe?
You are the network security administrator for your organization. You recently audited a server and found that a user logged in to the server with a...
The IT director recommends that you require your service provider to give you an end-to-end traffic performance guarantee. What document will include this guarantee?
The IT director recommends that you require your service provider to give you an end-to-end traffic performance guarantee. What document will include...
One of your database servers is mission-critical. You cannot afford any downtime. What is the best item to implement to ensure minimal downtime of the server and ensure fault tolerance of the data stored on the database server?
One of your database servers is mission-critical. You cannot afford any downtime. What is the best item to implement to ensure minimal downtime of the...
The IT director tasks you to set up a backup plan to ensure that your organization can be back up and running within hours if a disaster occurs. Which of the following should you implement?
The IT director tasks you to set up a backup plan to ensure that your organization can be back up and running within hours if a disaster occurs. Which...
What should you be concerned with when transferring evidence?
What should you be concerned with when transferring evidence?
A. Change management
B. Job rotation
C. Due diligence
D. Chain of custody
Answer:...
You have been contracted to conduct a forensics analysis on a server. Which of the following should you do first?
You have been contracted to conduct a forensics analysis on a server. Which of the following should you do first?
A. Analyze temporary files.
B. Run...
You are designing the environmental controls for a server room that contains several servers and other network devices. What role will an HVAC system play in this environment? (Select the two best answers.)
You are designing the environmental controls for a server room that contains several servers and other network devices. What role will an HVAC system...
Which of the following social engineering attacks relies on impersonation in an attempt to gain personal information?
Which of the following social engineering attacks relies on impersonation in an attempt to gain personal information?
A. Hoaxes
B. Phishing
C. Dumpster...
Which of the following OSI model layers is where SSL provides encryption?
Which of the following OSI model layers is where SSL provides encryption?
A. Network
B. Application
C. Transport
D. Session
Answer: ...
In this scenario, your organization and a sister organization use multiple certificate authorities (CAs). Which component of PKI is necessary for one CA to know whether to accept or reject certificates from another CA?
In this scenario, your organization and a sister organization use multiple certificate authorities (CAs). Which component of PKI is necessary for one...
Which the following algorithms is used by the protocol TLS to establish a session key?
Which the following algorithms is used by the protocol TLS to establish a session key?
A. AES
B. RSA
C. RC4
D. HTTPS
Answer: ...
What is secret key encryption also called?
What is secret key encryption also called?
A. Asymmetrical encryption
B. One-way function
C. Symmetrical encryption
D. Quantum encryption
Answer:...
For a user to obtain a certificate from a certificate authority, the user must present two items. The first is proof of identity. What is the second?
For a user to obtain a certificate from a certificate authority, the user must present two items. The first is proof of identity. What is the second?
A....
Which of the following types of keys are stored in a CRL?
Which of the following types of keys are stored in a CRL?
A. Private keys only
B. TPM keys
C. Public and private keys
D. Public keys only
Answer:...
Which of the following is the most complicated centralized key management scheme?
Which of the following is the most complicated centralized key management scheme?
A. Asymmetric
B. Symmetric
C. Whole disk encryption
D. Steganography
Answer:...
You look through some graphic files and discover that confidential information has been encoded into the files. These files are being sent to a sister company outside your organization. What is this an example of?
You look through some graphic files and discover that confidential information has been encoded into the files. These files are being sent to a sister...
What are most of the current encryption methods based on?
What are most of the current encryption methods based on?
A. PKI
B. Timestamps
C. Algorithms
D. DRM
Answer: ...
You suspect that files are being illegitimately copied to an external location.The file server that the files are stored on does not have logging enabled. Which log should you access to find out more about the files that are being copied illegitimately?
You suspect that files are being illegitimately copied to an external location.The file server that the files are stored on does not have logging enabled....
Which of the following tools can be used to check network traffic for cleartext passwords?
Which of the following tools can be used to check network traffic for cleartext passwords?
A. Password cracker
B. Protocol analyzer
C. Port scanner
D....
Which of the following items is a protocol analyzer?
Which of the following items is a protocol analyzer?
A. Wireshark
B. John the Ripper
C. Nessus
D. Cain & Abel
Answer: ...
Which of the following tools require a computer with a network adapter that can be placed in promiscuous mode? (Select the two best answers.)
Which of the following tools require a computer with a network adapter that can be placed in promiscuous mode? (Select the two best answers.)
A. Password...
Which of the following tools can find the open ports on a network?
Which of the following tools can find the open ports on a network?
A. Performance monitor
B. Network scanner
C. Protocol analyzer
D. Cain & Abel
Answer:...
You work as a network administrator for your organization and use a tool to capture ICMP, HTTP, FTP, and other packets of information. Which of the following tools should you use?
You work as a network administrator for your organization and use a tool to capture ICMP, HTTP, FTP, and other packets of information. Which of the...
You've created a baseline for your Windows Server file server. Which of the following tools can best monitor changes to your system baseline?
You've created a baseline for your Windows Server file server. Which of the following tools can best monitor changes to your system baseline?
A. Key...
Again, you perform risk assessment for your organization. What should you do during the impact assessment?
Again, you perform risk assessment for your organization. What should you do during the impact assessment?
A. Determine actions that can be taken...
The IT director asks you to perform a risk assessment of your organization's network. Which of the following should you do first?
The IT director asks you to perform a risk assessment of your organization's network. Which of the following should you do first?
A. Identify vulnerabilities.
B....
Password-cracking tools are easily available over the Internet. Which of the following is a password-cracking tool?
Password-cracking tools are easily available over the Internet. Which of the following is a password-cracking tool?
A. AirSnort
B. Nessus
C. Wireshark
D....
You review the system logs for your organization's firewall and see that an implicit deny is within the ACL. Which is an example of an implicit deny?
You review the system logs for your organization's firewall and see that an implicit deny is within the ACL. Which is an example of an implicit deny?
A....
Which of the following inbound ports must be opened on a server to allow a user to log in remotely?
Which of the following inbound ports must be opened on a server to allow a user to log in remotely?
A. 53
B. 3389
C. 389
D. 636
Answer:...
In which of the following phases of identification and authentication does proofing occur?
In which of the following phases of identification and authentication does proofing occur?
A. Verification
B. Authentication
C. Authorization
D. Identification
Answer:...
Which of the following authentication models places importance on a ticket granting server?
Which of the following authentication models places importance on a ticket granting server?
A. PAP
B. CHAP
C. Kerberos
D. RADIUS
Answer:...
Which of the following access control methods does a smart card rely on?
Which of the following access control methods does a smart card rely on?
A. Password policies
B. Logical token
C. Access control lists
D. Username...
Which port does Kerberos use by default?
Which port does Kerberos use by default?
A. 21
B. 80
C. 88
D. 389
Answer: ...
Your organization has several separate logins necessary to gain access to several different sets of resources. What access control method could solve this problem?
Your organization has several separate logins necessary to gain access to several different sets of resources. What access control method could solve...
Which of the following access control methods is best described as providing a username, password, and biometric thumbprint scan to gain access to a network?
Which of the following access control methods is best described as providing a username, password, and biometric thumbprint scan to gain access to a...
Which of the following can restrict access to resources according to the identity of the user?
Which of the following can restrict access to resources according to the identity of the user?
A. Mandatory access control
B. Role-based access control
C....
Which of the following network authentication protocols uses symmetric key cryptography, stores a shared key for each network resource, and uses a Key Distribution Center (KDC)?
Which of the following network authentication protocols uses symmetric key cryptography, stores a shared key for each network resource, and uses a Key...
Your organization asks you to design a web-based application. It wants you to design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk if an attack occurs. Which of the following security concepts does this describe?
Your organization asks you to design a web-based application. It wants you to design the application so that it runs under a security context that allows...
Which of the following does the discretionary access control model use to identify users who have permissions to a resource?
Which of the following does the discretionary access control model use to identify users who have permissions to a resource?
A. Roles that users have...
You have been commissioned by a customer to implement a network access control model that limits remote users' network usage to normal business hours only. You create one policy that applies to all the remote users. What access control model are you implementing?
You have been commissioned by a customer to implement a network access control model that limits remote users' network usage to normal business hours...
Which of the following is used to transmit data between a web server and a web browser?
Which of the following is used to transmit data between a web server and a web browser?
A. IMAP
B. SSH
C. HTTP
D. FTP
Answer: ...
Which of the following security applications cannot proactively detect computer anomalies?
Which of the following security applications cannot proactively detect computer anomalies?
A. NIDS
B. HIPS
C. Antivirus software
D. Personal software...
Which one of the following attacks misuses the Transmission Control Protocol three-way handshake process in an attempt to overload network servers so that authorized users are denied access to network resources?
Which one of the following attacks misuses the Transmission Control Protocol three-way handshake process in an attempt to overload network servers so...
What is one of the potential risks associated with WEP when that protocol is used to secure a WLAN?
What is one of the potential risks associated with WEP when that protocol is used to secure a WLAN?
A. SSID broadcast
B. Weak encryption
C. Data emanation
D....
Which of the following is the strongest password?
Which of the following is the strongest password?
A. password
B. Apassword
C. Apassword123
D. A#password123
Answer: ...
Of the following, which type of device attempts to serve client requests without the user actually contacting the remote server?
Of the following, which type of device attempts to serve client requests without the user actually contacting the remote server?
A. IP proxy
B. HTTP...
Which of the following attacks is best described as an attacker capturing part of a communication, and then later sending some or all of that communication to a server while pretending to be the original client?
Which of the following attacks is best described as an attacker capturing part of a communication, and then later sending some or all of that communication...
Which of the following is a type of packet filtering used by firewalls that retains memory of the packets that pass through the firewall?
Which of the following is a type of packet filtering used by firewalls that retains memory of the packets that pass through the firewall?
A. Stateless...
Which of the following is most often used to enable a client or a partner access to your network?
Which of the following is most often used to enable a client or a partner access to your network?
A. Intranet
B. Extranet
C. DMZ
D. VLAN
Answer:...
What are the two best ways to protect a Voice over IP PBX from man-in-the middle attacks? (Select the two best answers.)
What are the two best ways to protect a Voice over IP PBX from man-in-the middle attacks? (Select the two best answers.)
A. Update the Voice over...
Which of the following is an area of the network infrastructure that enables a person to put public-facing systems into it without compromising the entire infrastructure?
Which of the following is an area of the network infrastructure that enables a person to put public-facing systems into it without compromising the...
Study the following items carefully. Which one permits a user to "float" a domain registration for a maximum of 5 days?
Study the following items carefully. Which one permits a user to "float" a domain registration for a maximum of 5 days?
A. DNS poisoning
B. Domain...
Which of the following services uses port 49?
Which of the following services uses port 49?
A. File Transfer Protocol
B. Post Office Protocol version 3
C. Terminal Access Controller Access-Control...
If a switch enters fail open mode because its CAM table memory has been filled, then it will cease to function properly as a switch. What type of attack could cause this?
If a switch enters fail open mode because its CAM table memory has been filled, then it will cease to function properly as a switch. What type of attack...
You are in charge of monitoring a workstation for application activity and/or modification. Which of the following types of systems should you use?
You are in charge of monitoring a workstation for application activity and/or modification. Which of the following types of systems should you use?
A....
Of the following software components, which is usually associated with a web browser?
Of the following software components, which is usually associated with a web browser?
A. Personal firewall
B. Anti-spyware
C. Pop-up blocker
D. Service...
Which of the following attacks cannot occur through e-mail?
Which of the following attacks cannot occur through e-mail?
A. Phage virus
B. Dictionary attack
C. Polymorphic virus
D. Trojan horse
Answer:...
Which of the following security threats can be updated remotely from a command center?
Which of the following security threats can be updated remotely from a command center?
A. Virus
B. Worm
C. Spam
D. Zombie
Answer: ...
Which of the following characterizations best suits the term Java applet?
Which of the following characterizations best suits the term Java applet?
A. Java applets include a digital signature.
B. Java applets allow for customized...
You are attempting to apply corporate security settings to a workstation. Which the following would be the best solution?
You are attempting to apply corporate security settings to a workstation. Which the following would be the best solution?
A. Hotfix
B. Security template
C....
You are the network security administrator for your organization. You are in charge of deploying 50 new computers on the network. Which of the following should be completed first?
You are the network security administrator for your organization. You are in charge of deploying 50 new computers on the network. Which of the following...
A hacker develops a piece of malicious code. It is not designed to automatically spread from one system to another. Instead, it is designed to spread from one file to another file on the individual computer. What type of malware is this?
A hacker develops a piece of malicious code. It is not designed to automatically spread from one system to another. Instead, it is designed to spread...
Which of the following are components of hardening an operating system? (Select the two best answers.)
Which of the following are components of hardening an operating system? (Select the two best answers.)
A. Disabling unnecessary services
B. Configuring...
Malware can use virtualization techniques. Why would this be difficult to detect?
Malware can use virtualization techniques. Why would this be difficult to detect?
A. A portion of the malware might have already been removed by an...
Your company uses instant messaging between the central office and satellite offices. What is the most important security issue that you need to deal with when it comes to instant messaging?
Your company uses instant messaging between the central office and satellite offices. What is the most important security issue that you need to deal...
Closing open mail relays can help prevent what type of malware?
Closing open mail relays can help prevent what type of malware?
A. Virus
B. Worm
C. Spam
D. Trojan
Answer: ...
Which of the following best describes a backdoor?
Which of the following best describes a backdoor?
A. Code inserted into software that initiates one of several types of functions when specific criteria...
What is software that is designed to infiltrate a computer system without the user's knowledge or consent?
What is software that is designed to infiltrate a computer system without the user's knowledge or consent?
A. Malware
B. Privilege escalation
C....
Subscribe to:
Posts (Atom)