After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer...
Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?
Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?
A. Protocol analyzer
B. Router
C....
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
A. WAF
B. NIDS
C. Routers
D. Switches
A...
A bank has a fleet of aging payment terminals used by merchants for transactional processing. The terminals currently support single DES but require an upgrade in order to be compliant with security standards. Which of the following is likely to be the simplest upgrade to the aging terminals which will improve in-transit protection of transactional data?
A bank has a fleet of aging payment terminals used by merchants for transactional processing. The terminals currently support single DES but require...
A merchant acquirer has the need to store credit card numbers in a transactional database in a high performance environment. Which of the following BEST protects the credit card data?
A merchant acquirer has the need to store credit card numbers in a transactional database in a high performance environment. Which of the following...
Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?
Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?
A. It...
After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the following is this an example of?
After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals...
A user attempting to log on to a workstation for the first time is prompted for the following information before being granted access: username, password, and a four-digit security pin that was mailed to him during account registration. This is an example of which of the following?
A user attempting to log on to a workstation for the first time is prompted for the following information before being granted access: username, password,...
Which of the following ciphers would be BEST used to encrypt streaming video?
Which of the following ciphers would be BEST used to encrypt streaming video?
A. RSA
B. RC4
C. SHA1
D. 3DES
Answer: ...
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs show repeated connection attempts from the following IPs:
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs show repeated connection attempts from the following...
A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN?
A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure...
Which of the following ports is used for SSH, by default?
Which of the following ports is used for SSH, by default?
A. 23
B. 32
C. 12
D. 22
Answer: ...
A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates. Which of the following processes could MOST effectively mitigate these risks?
A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated....
A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on which of the following?
A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people....
A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales department?
A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited...
Which of the following should an administrator implement to research current attack methodologies?
Which of the following should an administrator implement to research current attack methodologies?
A. Design reviews
B. Honeypot
C. Vulnerability...
Encryption used by RADIUS is BEST described as:
Encryption used by RADIUS is BEST described as:
A. Quantum
B. Elliptical curve
C. Asymmetric
D. Symmetric
Answer: ...
Due to limited resources, a company must reduce their hardware budget while still maintaining availability. Which of the following would MOST likely help them achieve their objectives?
Due to limited resources, a company must reduce their hardware budget while still maintaining availability. Which of the following would MOST likely...
Deploying a wildcard certificate is one strategy to:
Deploying a wildcard certificate is one strategy to:
A. Secure the certificate's private key.
B. Increase the certificate's encryption key length.
C....
A security manager must remain aware of the security posture of each system. Which of the following supports this requirement?
A security manager must remain aware of the security posture of each system. Which of the following supports this requirement?
A. Training staff...
Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?
Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?
A....
Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?
Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?
A....
Which of the following is a step in deploying a WPA2-Enterprise wireless network?
Which of the following is a step in deploying a WPA2-Enterprise wireless network?
A. Install a token on the authentication server
B. Install a DHCP...
Which of the following implementation steps would be appropriate for a public wireless hot-spot?
Which of the following implementation steps would be appropriate for a public wireless hot-spot?
A. Reduce power level
B. Disable SSID broadcast
C....
A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?
A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?
A. IPsec
B. SFTP
C. BGP
D. PPTP...
A software developer is responsible for writing the code on an accounting application. Another software developer is responsible for developing code on a system in human resources. Once a year they have to switch roles for several weeks. Which of the following practices is being implemented?
A software developer is responsible for writing the code on an accounting application. Another software developer is responsible for developing code...
Establishing a published chart of roles, responsibilities, and chain of command to be used during a disaster is an example of which of the following?
Establishing a published chart of roles, responsibilities, and chain of command to be used during a disaster is an example of which of the following?
A....
Which of the following should be done before resetting a user's password due to expiration?
Which of the following should be done before resetting a user's password due to expiration?
A. Verify the user's domain membership.
B. Verify the...
Users require access to a certain server depending on their job function. Which of the following would be the MOST appropriate strategy for securing the server?
Users require access to a certain server depending on their job function. Which of the following would be the MOST appropriate strategy for securing...
A customer service department has a business need to send high volumes of confidential information to customers electronically. All emails go through a DLP scanner. Which of the following is the BEST solution to meet the business needs and protect confidential information?
A customer service department has a business need to send high volumes of confidential information to customers electronically. All emails go through...
An administrator notices an unusual spike in network traffic from many sources. The administrator suspects that:
An administrator notices an unusual spike in network traffic from many sources. The administrator suspects that:
A. it is being caused by the presence...
In order to prevent and detect fraud, which of the following should be implemented?
In order to prevent and detect fraud, which of the following should be implemented?
A. Job rotation
B. Risk analysis
C. Incident management
D. Employee...
Pete, the Chief Executive Officer (CEO) of a company, has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?
Pete, the Chief Executive Officer (CEO) of a company, has increased his travel plans for the next two years to improve business relations. Which of...
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee's credential?
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee's credential?
A....
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the following attacks? (Select TWO).
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the following attacks? (Select TWO).
A. Spoofing
B....
Corporate IM presents multiple concerns to enterprise IT. Which of the following concerns should Jane, the IT security manager, ensure are under control? (Select THREE).
Corporate IM presents multiple concerns to enterprise IT. Which of the following concerns should Jane, the IT security manager, ensure are under control?...
Matt, the Chief Information Security Officer (CISO), tells the network administrator that a security company has been hired to perform a penetration test against his network. The security company asks Matt which type of testing would be most beneficial for him. Which of the following BEST describes what the security company might do during a black box test?
Matt, the Chief Information Security Officer (CISO), tells the network administrator that a security company has been hired to perform a penetration...
Matt, a systems security engineer, is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credential type authentication method BEST fits these requirements?
Matt, a systems security engineer, is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for...
Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what services and operating systems are running on the corporate network. Which of the following should be used to complete this task?
Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what services and operating systems are running on the corporate...
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?
Which of the following should be implemented to stop an attacker from mapping out addresses and/or devices on a network?
A. Single sign on
B. IPv6
C....
A security administrator is aware that a portion of the company's Internet-facing network tends to be nonsecure due to poorly configured and patched systems. The business owner has accepted the risk of those systems being compromised, but the administrator wants to determine the degree to which those systems can be used to gain access to the company intranet. Which of the following should the administrator perform?
A security administrator is aware that a portion of the company's Internet-facing network tends to be nonsecure due to poorly configured and patched...
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
A. Disabling SSID broadcast
B. MAC filtering
C. WPA2
D....
Which of the following policies is implemented in order to minimize data loss or theft?
Which of the following policies is implemented in order to minimize data loss or theft?
A. PII handling
B. Password policy
C. Chain of custody
D....
Which of the following is an attack vector that can cause extensive physical damage to a datacenter without physical access?
Which of the following is an attack vector that can cause extensive physical damage to a datacenter without physical access?
A. CCTV system access
B....
Which of the following is BEST utilized to identify common misconfigurations throughout the enterprise?
Which of the following is BEST utilized to identify common misconfigurations throughout the enterprise?
A. Vulnerability scanning
B. Port scanning
C....
Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to restore those services?
Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies,...
An administrator wants to minimize the amount of time needed to perform backups during the week. It is also acceptable to the administrator for restoration to take an extended time frame. Which of the following strategies would the administrator MOST likely implement?
An administrator wants to minimize the amount of time needed to perform backups during the week. It is also acceptable to the administrator for restoration...
Which of the following would BEST be used to calculate the expected loss of an event, if the likelihood of an event occurring is known? (Select TWO).
Which of the following would BEST be used to calculate the expected loss of an event, if the likelihood of an event occurring is known? (Select TWO).
A....
Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
A. NAT
B. Virtualization
C. NAC
D. ...
The public key is used to perform which of the following? (Select THREE).
The public key is used to perform which of the following? (Select THREE).
A. Validate the CRL
B. Validate the identity of an email sender
C. Encrypt...
Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue and still provide coverage where needed? (Select TWO).
Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that AP and gain unauthorized access. Which...
Matt, a security administrator, wants to configure all the switches and routers in the network in order to securely monitor their status. Which of the following protocols would he need to configure on each device?
Matt, a security administrator, wants to configure all the switches and routers in the network in order to securely monitor their status. Which of the...
Which of the following authentication services uses a ticket granting system to provide access?
Which of the following authentication services uses a ticket granting system to provide access?
A. RADIUS
B. LDAP
C. TACACS+
D. Kerberos
Answe...
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
A. Penetration test
B....
Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days' hashes. Which of the following security concepts is Sara using?
Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days' hashes. Which of...
Which of the following access controls enforces permissions based on data labeling at specific levels?
Which of the following access controls enforces permissions based on data labeling at specific levels?
A. Mandatory access control
B. Separation...
Which of the following is an example of a false negative?
Which of the following is an example of a false negative?
A. The IDS does not identify a buffer overflow.
B. Anti-virus identifies a benign application...
A security administrator examines a network session to a compromised database server with a packet analyzer. Within the session there is a repeated series of the hex character 90 (x90). Which of the following attack types has occurred?
A security administrator examines a network session to a compromised database server with a packet analyzer. Within the session there is a repeated...
Who should be contacted FIRST in the event of a security breach?
Who should be contacted FIRST in the event of a security breach?
A. Forensics analysis team
B. Internal auditors
C. Incident response team
D. Software...
Which of the following protocols allows for the LARGEST address space?
Which of the following protocols allows for the LARGEST address space?
A. IPX
B. IPv4
C. IPv6
D. Appletalk
Answer: ...
Which of the following application attacks is used against a corporate directory service where there are unknown servers on the network?
Which of the following application attacks is used against a corporate directory service where there are unknown servers on the network?
A. Rogue...
Which of the following is characterized by an attack against a mobile device?
Which of the following is characterized by an attack against a mobile device?
A. Evil twin
B. Header manipulation
C. Blue jacking
D. Rogue AP
A...
Which of the following malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-ups based on browsing habits?
Which of the following malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-ups based on browsing...
Which of the following malware types typically allows an attacker to monitor a user's computer, is characterized by a drive-by download, and requires no user interaction?
Which of the following malware types typically allows an attacker to monitor a user's computer, is characterized by a drive-by download, and requires...
Which of the following can be implemented if a security administrator wants only certain devices connecting to the wireless network?
Which of the following can be implemented if a security administrator wants only certain devices connecting to the wireless network?
A. Disable SSID...
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and corporate data is stolen. Which of the following would BEST prevent this from occurring again?
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out...
A security administrator needs to image a large hard drive for forensic analysis. Which of the following will allow for faster imaging to a second hard drive?
A security administrator needs to image a large hard drive for forensic analysis. Which of the following will allow for faster imaging to a second hard...
Which of the following is a best practice when securing a switch from physical access?
Which of the following is a best practice when securing a switch from physical access?
A. Disable unnecessary accounts
B. Print baseline configuration
C....
Which of the following would a security administrator use to verify the integrity of a file?
Which of the following would a security administrator use to verify the integrity of a file?
A. Time stamp
B. MAC times
C. File descriptor
D. Ha...
In order to use a two-way trust model the security administrator MUST implement which of the following?
In order to use a two-way trust model the security administrator MUST implement which of the following?
A. DAC
B. PKI
C. HTTPS
D. TPM
Answer:&...
Which of the following may cause Jane, the security administrator, to seek an ACL work around?
Which of the following may cause Jane, the security administrator, to seek an ACL work around?
A. Zero day exploit
B. Dumpster diving
C. Virus outbreak
D....
Full disk encryption is MOST effective against which of the following threats?
Full disk encryption is MOST effective against which of the following threats?
A. Denial of service by data destruction
B. Eavesdropping emanations
C....
Which of the following is the MOST likely cause of users being unable to verify a single user's email signature and that user being unable to decrypt sent messages?
Which of the following is the MOST likely cause of users being unable to verify a single user's email signature and that user being unable to decrypt...
The fundamental information security principals include confidentiality, availability and which of the following?
The fundamental information security principals include confidentiality, availability and which of the following?
A. The ability to secure data against...
Highly sensitive data is stored in a database and is accessed by an application on a DMZ server. The disk drives on all servers are fully encrypted. Communication between the application server and end- users is also encrypted. Network ACLs prevent any connections to the database server except from the application server. Which of the following can still result in exposure of the sensitive data in the database server?
Highly sensitive data is stored in a database and is accessed by an application on a DMZ server. The disk drives on all servers are fully encrypted....
Which of the following is the MOST important step for preserving evidence during forensic procedures?
Which of the following is the MOST important step for preserving evidence during forensic procedures?
A. Involve law enforcement
B. Chain of custody
C....
Which of the following BEST allows Pete, a security administrator, to determine the type, source, and flags of the packet traversing a network for troubleshooting purposes?
Which of the following BEST allows Pete, a security administrator, to determine the type, source, and flags of the packet traversing a network for troubleshooting...
Which of the following identifies certificates that have been compromised or suspected of being compromised?
Which of the following identifies certificates that have been compromised or suspected of being compromised?
A. Certificate revocation list
B. Access...
Which of the following can hide confidential or malicious data in the whitespace of other files (e.g. JPEGs)?
Which of the following can hide confidential or malicious data in the whitespace of other files (e.g. JPEGs)?
A. Hashing
B. Transport encryption
C....
Which of the following attacks allows access to contact lists on cellular phones?
Which of the following attacks allows access to contact lists on cellular phones?
A. War chalking
B. Blue jacking
C. Packet sniffing
D. Bluesnar...
Which of the following is where an unauthorized device is found allowing access to a network?
Which of the following is where an unauthorized device is found allowing access to a network?
A. Bluesnarfing
B. Rogue access point
C. Honeypot
D....
Which of the following would Pete, a security administrator, do to limit a wireless signal from penetrating the exterior walls?
Which of the following would Pete, a security administrator, do to limit a wireless signal from penetrating the exterior walls?
A. Implement TKIP...
Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websites?
Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websites?
A. 21
B. 25
C. 80
D. 3389
A...
Which of the following software allows a network administrator to inspect the protocol header in order to troubleshoot network issues?
Which of the following software allows a network administrator to inspect the protocol header in order to troubleshoot network issues?
A. URL filter
B....
Visitors entering a building are required to close the back door before the front door of the same entry room is open. Which of the following is being described?
Visitors entering a building are required to close the back door before the front door of the same entry room is open. Which of the following is being...
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared...
Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?
Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?
A. Error and...
Which the following flags are used to establish a TCP connection? (Select TWO).
Which the following flags are used to establish a TCP connection? (Select TWO).
A. PSH
B. ACK
C. SYN
D. URG
E. FIN
Answer:
B...
Which statement is TRUE about the operation of a packet sniffer?
Which statement is TRUE about the operation of a packet sniffer?
A. It can only have one interface on a management network.
B. They are required...
Which of the following best practices makes a wireless network more difficult to find?
Which of the following best practices makes a wireless network more difficult to find?
A. Implement MAC filtering
B. UseWPA2-PSK
C. Disable SSD broadcast
D....
Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption?
Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption?
A. AES
B. Blowfish
C. RC5
D....
Matt, a security administrator, wants to ensure that the message he is sending does not get intercepted or modified in transit. This concern relates to which of the following concepts?
Matt, a security administrator, wants to ensure that the message he is sending does not get intercepted or modified in transit. This concern relates...
Upper management decides which risk to mitigate based on cost. This is an example of:
Upper management decides which risk to mitigate based on cost. This is an example of:
A. Qualitative risk assessment
B. Business impact analysis
C....
Which of the following has serious security implications for large organizations and can potentially allow an attacker to capture conversations?
Which of the following has serious security implications for large organizations and can potentially allow an attacker to capture conversations?
A....
Which of the following is BEST utilized to actively test security controls on a particular system?
Which of the following is BEST utilized to actively test security controls on a particular system?
A. Port scanning
B. Penetration test
C. Vulnerability...
Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department's server, and the accounting department should not have access to the HR department's server. The network is separated by switches. Which of the following is designed to keep the HR department users from accessing the accounting department's server and vice-versa?
Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department's server, and the...
A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal?
A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into...
A company's security administrator wants to manage PKI for internal systems to help reduce costs. Which of the following is the FIRST step the security administrator should take?
A company's security administrator wants to manage PKI for internal systems to help reduce costs. Which of the following is the FIRST step the security...
Which of the following common access control models is commonly used on systems to ensure a "need to know" based on classification levels?
Which of the following common access control models is commonly used on systems to ensure a "need to know" based on classification levels?
A. Role...
A hospital IT department wanted to secure its doctor's tablets. The IT department wants operating system level security and the ability to secure the data from alteration. Which of the following methods would MOST likely work?
A hospital IT department wanted to secure its doctor's tablets. The IT department wants operating system level security and the ability to secure the...
Ann works at a small company and she is concerned that there is no oversight in the finance department; specifically, that Joe writes, signs and distributes paychecks, as well as other expenditures. Which of the following controls can she implement to address this concern?
Ann works at a small company and she is concerned that there is no oversight in the finance department; specifically, that Joe writes, signs and distributes...
Ann, the network administrator, has learned from the helpdesk that employees are accessing the wireless network without entering their domain credentials upon connection. Once the connection is made, they cannot reach any internal resources, while wired network connections operate smoothly. Which of the following is MOST likely occurring?
Ann, the network administrator, has learned from the helpdesk that employees are accessing the wireless network without entering their domain credentials...
A company hired Joe, an accountant. The IT administrator will need to create a new account for Joe. The company uses groups for ease of management and administration of user accounts. Joe will need network access to all directories, folders and files within the accounting department. Which of the following configurations will meet the requirements?
A company hired Joe, an accountant. The IT administrator will need to create a new account for Joe. The company uses groups for ease of management and...
A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has experienced several laptop thefts from the cafe during peek shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate laptop theft. Which of the following would provide the IT department wit the BEST solution?
A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has...
Several employee accounts appear to have been cracked by an attacker. Which of the following should the security administrator implement to mitigate password cracking attacks? (Select TWO).
Several employee accounts appear to have been cracked by an attacker. Which of the following should the security administrator implement to mitigate...
A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389 are in a `listening' state. No other ports are open. Which of the following services should be disabled to ensure secure communications?
A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the...
A group policy requires users in an organization to use strong passwords that must be changed every 15 days. Joe and Ann were hired 16 days ago. When Joe logs into the network, he is prompted to change his password; when Ann logs into the network, she is not prompted to change her password. Which of the following BEST explains why Ann is not required to change her password?
A group policy requires users in an organization to use strong passwords that must be changed every 15 days. Joe and Ann were hired 16 days ago. When...
Ann has taken over as the new head of the IT department. One of her first assignments was to implement AAA in preparation for the company's new telecommuting policy. When she takes inventory of the organizations existing network infrastructure, she makes note that it is a mix of several different vendors. Ann knows she needs a method of secure centralized access to the company's network resources. Which of the following is the BEST service for Ann to implement?
Ann has taken over as the new head of the IT department. One of her first assignments was to implement AAA in preparation for the company's new telecommuting...
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-to peer network that cannot connect to the Internet. The ISSO can update the antivirus definitions manually, but which of the following steps is MOST important?
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-topeer network that cannot connect to the Internet. The...
A system administrator has been instructed by the head of security to protect their data at-rest. Which of the following would provide the strongest protection?
A system administrator has been instructed by the head of security to protect their data at-rest. Which of the following would provide the strongest...
Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles during the week. Further investigation by the system engineering team determined that a timed .exe file had been uploaded to the system control console during a visit by international contractors. Which of the following actions should Joe recommend?
Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles during the week. Further investigation by the system...
Joe, a network security engineer, has visibility to network traffic through network monitoring tools. However, he's concerned that a disgruntled employee may be targeting a server containing the company's financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe's suspicion?
Joe, a network security engineer, has visibility to network traffic through network monitoring tools. However, he's concerned that a disgruntled employee...
The act of magnetically erasing all of the data on a disk is known as:
The act of magnetically erasing all of the data on a disk is known as:
A. Wiping
B. Dissolution
C. Scrubbing
D. Degaussing
Answer: ...
Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mis-configurations or faults?
Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mis-configurations or faults?
A. VLAN
B....
Which of the following would prevent a user from installing a program on a company-owned mobile device?
Which of the following would prevent a user from installing a program on a company-owned mobile device?
A. White-listing
B. Access control lists
C....
Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network?
Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network?
A. Application white listing
B. Remote...
Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture on a popular social media site together with the message: "Heading to our two weeks vacation to Italy." Upon returning home, Joe discovers that the house was burglarized. Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe's home address?
Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture...
Which of the following is the BEST concept to maintain required but non-critical server availability?
Which of the following is the BEST concept to maintain required but non-critical server availability?
A. SaaS site
B. Cold site
C. Hot site
D. Warm...
Environmental control measures include which of the following?
Environmental control measures include which of the following?
A. Access list
B. Lighting
C. Motion detection
D. EMI shielding
Answer: ...
The security manager received a report that an employee was involved in illegal activity and has saved data to a workstation's hard drive. During the investigation, local law enforcement's criminal division confiscates the hard drive as evidence. Which of the following forensic procedures is involved?
The security manager received a report that an employee was involved in illegal activity and has saved data to a workstation's hard drive. During the...
Which of the following describes the purpose of an MOU?
Which of the following describes the purpose of an MOU?
A. Define interoperability requirements
B. Define data backup process
C. Define onboard/offboard...
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario?
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers...
A company's legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO).
A company's legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption...
An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to integrate the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?
An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to integrate the security controls...
A security team has identified that the wireless signal is broadcasting into the parking lot. To reduce the risk of an attack against the wireless network from the parking lot, which of the following controls should be used? (Select TWO).
A security team has identified that the wireless signal is broadcasting into the parking lot. To reduce the risk of an attack against the wireless network...
A security engineer is reviewing log data and sees the output below:
A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HOST: localhost
Accept: /
Referrer: http://localhost/
*******
HTTP/1.1...
A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security controls?
A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security...
It is important to staff who use email messaging to provide PII to others on a regular basis to have confidence that their messages are not intercepted or altered during transmission. They are concerned about which of the following types of security control?
It is important to staff who use email messaging to provide PII to others on a regular basis to have confidence that their messages are not intercepted...
Joe, a security administrator, is concerned with users tailgating into the restricted areas. Given a limited budget, which of the following would BEST assist Joe with detecting this activity?
Joe, a security administrator, is concerned with users tailgating into the restricted areas. Given a limited budget, which of the following would BEST...
A company recently experienced data loss when a server crashed due to a midday power outage. Which of the following should be used to prevent this from occurring again?
A company recently experienced data loss when a server crashed due to a midday power outage. Which of the following should be used to prevent this from...
A company is looking to reduce the likelihood of employees in the finance department being involved with money laundering. Which of the following controls would BEST mitigate this risk?
A company is looking to reduce the likelihood of employees in the finance department being involved with money laundering. Which of the following controls...
A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue?
A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they...
A company has recently implemented a high density wireless system by having a junior technician install two new access points for every access point already deployed. Users are now reporting random wireless disconnections and slow network connectivity. Which of the following is the MOST likely cause?
A company has recently implemented a high density wireless system by having a junior technician install two new access points for every access point...
Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives?
Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of...
The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and Standard Operating Procedures documentation in order to successfully respond to future incidents. Which of the following stages of the Incident Handling process is the team working on?
The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and...
Joe, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Joe insisted that he was not aware of any company policy that prohibits the use of such web sites. Which of the following is the BEST method to deter employees from the improper use of the company's information systems?
Joe, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Joe insisted that he was not...
The network security engineer just deployed an IDS on the network, but the Chief Technical Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the following types of IDS has been deployed?
The network security engineer just deployed an IDS on the network, but the Chief Technical Officer (CTO) has concerns that the device is only able to...
A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic. Which of the following would accomplish this task?
A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers, and wants to...
A security technician wishes to gather and analyze all Web traffic during a particular time period. Which of the following represents the BEST approach to gathering the required data?
A security technician wishes to gather and analyze all Web traffic during a particular time period. Which of the following represents the BEST approach...
After an audit, it was discovered that the security group memberships were not properly adjusted for employees' accounts when they moved from one role to another. Which of the following has the organization failed to properly implement? (Select TWO).
After an audit, it was discovered that the security group memberships were not properly adjusted for employees' accounts when they moved from one role...
The method to provide end users of IT systems and applications with requirements related to acceptable use, privacy, new threats and trends, and use of social networking is:
The method to provide end users of IT systems and applications with requirements related to acceptable use, privacy, new threats and trends, and use...
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
A. Data integrity is susceptible to being...
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:
A. Redundant systems.
B....
Ann, a technician, is attempting to establish a remote terminal session to an end user's computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Ann ensure is open?
Ann, a technician, is attempting to establish a remote terminal session to an end user's computer using Kerberos authentication, but she cannot connect...
Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group. Which of the following would prevent her from denying accountability?
Ann, a newly hired human resource employee, sent out confidential emails with digital signatures, to an unintended group. Which of the following would...
A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access?
A security analyst needs to logon to the console to perform maintenance on a remote server. Which of the following protocols would provide secure access?
A....
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
A. Packet Filter Firewall
B. Stateful Firewall
C....
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a result of a misconfigured router access list, allowing outside access to an SSH server. Which of the following should Joe search for in the log files?
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a result of a misconfigured router access list, allowing...
Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network printing?
Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email,...
At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?
At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to...
When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes. Which of the following design elements would be implemented to comply with the security administrator's request?
When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network...
A technician is unable to manage a remote server. Which of the following ports should be opened on the firewall for remote server management? (Select TWO).
A technician is unable to manage a remote server. Which of the following ports should be opened on the firewall for remote server management? (Select...
Which of the following offerings typically allows the customer to apply operating system patches?
Which of the following offerings typically allows the customer to apply operating system patches?
A. Software as a service
B. Public Clouds
C. Cloud...
Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains?
Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains?
Server...
A review of the company's network traffic shows that most of the malware infections are caused by users visiting gambling and gaming websites. The security manager wants to implement a solution that will block these websites, scan all web traffic for signs of malware, and block the malware before it enters the company network. Which of the following is suited for this purpose?
A review of the company's network traffic shows that most of the malware infections are caused by users visiting gambling and gaming websites. The security...
Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails resulting in system outages?
Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails resulting in system outages?
A. Risk...
Which of the following is true about the recovery agent?
Which of the following is true about the recovery agent?
A. It can decrypt messages of users who lost their private key.
B. It can recover both the...
Which of the following is built into the hardware of most laptops but is not setup for centralized management by default?
Which of the following is built into the hardware of most laptops but is not setup for centralized management by default?
A. Whole disk encryption
B....
Which of the following types of application attacks would be used to identify malware causing security breaches that have NOT yet been identified by any trusted sources?
Which of the following types of application attacks would be used to identify malware causing security breaches that have NOT yet been identified by...
Which of the following types of wireless attacks would be used specifically to impersonate another WAP in order to gain unauthorized information from mobile users?
Which of the following types of wireless attacks would be used specifically to impersonate another WAP in order to gain unauthorized information from...
Fuzzing is a security assessment technique that allows testers to analyze the behavior of software applications under which of the following conditions?
Fuzzing is a security assessment technique that allows testers to analyze the behavior of software applications under which of the following conditions?
A....
Which of the following is a security benefit of providing additional HVAC capacity or increased tonnage in a datacenter?
Which of the following is a security benefit of providing additional HVAC capacity or increased tonnage in a datacenter?
A. Increased availability...
Which of the following ports is used to securely transfer files between remote UNIX systems?
Which of the following ports is used to securely transfer files between remote UNIX systems?
A. 21
B. 22
C. 69
D. 445
Answer: ...
Which of the following ports should be used by a system administrator to securely manage a remote server?
Which of the following ports should be used by a system administrator to securely manage a remote server?
A. 22
B. 69
C. 137
D. 445
Answer:&nbs...
After visiting a website, a user receives an email thanking them for a purchase which they did not request.
After visiting a website, a user receives an email thanking them for a purchase which they did not request.
Upon investigation the security administrator...
In the case of a major outage or business interruption, the security office has documented the expected loss of earnings, potential fines and potential consequence to customer service. Which of the following would include the MOST detail on these objectives?
In the case of a major outage or business interruption, the security office has documented the expected loss of earnings, potential fines and potential...
Which of the following disaster recovery strategies has the highest cost and shortest recovery time?
Which of the following disaster recovery strategies has the highest cost and shortest recovery time?
A. Warm site
B. Hot site
C. Cold site
D. Co-location...
When using PGP, which of the following should the end user protect from compromise? (Select TWO).
When using PGP, which of the following should the end user protect from compromise? (Select TWO).
A. Private key
B. CRL details
C. Public key
D....
Which of the following tests a number of security controls in the least invasive manner?
Which of the following tests a number of security controls in the least invasive manner?
A. Vulnerability scan
B. Threat assessment
C. Penetration...
Which of the following provides dedicated hardware-based cryptographic functions to an operating system and its applications running on laptops and desktops?
Which of the following provides dedicated hardware-based cryptographic functions to an operating system and its applications running on laptops and...
Which of the following protocols is used by IPv6 for MAC address resolution?
Which of the following protocols is used by IPv6 for MAC address resolution?
A. NDP
B. ARP
C. DNS
D. NCP
Answer: ...
A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to connect to it. Only after an authorized client has connected and the hacker was able to capture the client handshake with the AP can the hacker begin a brute force attack to discover the encryption key. Which of the following attacks is taking place?
A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to connect to it. Only after an authorized client has...
Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following? Users report that after downloading several applications, their systems' performance has noticeably decreased. Which of the following would be used to validate programs prior to installing them?
Public key certificates and keys that are compromised or were issued fraudulently are listed on which of the following? Users report that after downloading...
One of the most consistently reported software security vulnerabilities that leads to major exploits is:
One of the most consistently reported software security vulnerabilities that leads to major exploits is:
A. Lack of malware detection.
B. Attack...
While previously recommended as a security measure, disabling SSID broadcast is not effective against most attackers because network SSIDs are:
While previously recommended as a security measure, disabling SSID broadcast is not effective against most attackers because network SSIDs are:
A....
Which of the following is a common coding error in which boundary checking is not performed?
Which of the following is a common coding error in which boundary checking is not performed?
A. Input validation
B. Fuzzing
C. Secure coding
D. Cross-site...
Multi-tenancy is a concept found in which of the following?
Multi-tenancy is a concept found in which of the following?
A. Full disk encryption
B. Removable media
C. Cloud computing
D. Data loss preventio...
The practice of marking open wireless access points is called which of the following?
The practice of marking open wireless access points is called which of the following?
A. War dialing
B. War chalking
C. War driving
D. Evil twin...
ABC company has a lot of contractors working for them. The provisioning team does not always get notified that a contractor has left the company. Which of the following policies would prevent contractors from having access to systems in the event a contractor has left?
ABC company has a lot of contractors working for them. The provisioning team does not always get notified that a contractor has left the company. Which...
One of the most basic ways to protect the confidentiality of data on a laptop in the event the device is physically stolen is to implement which of the following?
One of the most basic ways to protect the confidentiality of data on a laptop in the event the device is physically stolen is to implement which of...
A security administrator is tasked with calculating the total ALE on servers. In a two year period of time, a company has to replace five servers. Each server replacement has cost the company $4,000 with downtime costing $3,000. Which of the following is the ALE for the company?
A security administrator is tasked with calculating the total ALE on servers. In a two year period of time, a company has to replace five servers. Each...
Which of the following is a concern when encrypting wireless data with WEP?
Which of the following is a concern when encrypting wireless data with WEP?
A. WEP displays the plain text entire key when wireless packet captures...
Which of the following is a Data Loss Prevention (DLP) strategy and is MOST useful for securing data in use?
Which of the following is a Data Loss Prevention (DLP) strategy and is MOST useful for securing data in use?
A. Email scanning
B. Content discovery
C....
Which of the following concepts is a term that directly relates to customer privacy considerations?
Which of the following concepts is a term that directly relates to customer privacy considerations?
A. Data handling policies
B. Personally identifiable...
A security administrator wants to test the reliability of an application which accepts user provided parameters. The administrator is concerned with data integrity and availability. Which of the following should be implemented to accomplish this task?
A security administrator wants to test the reliability of an application which accepts user provided parameters. The administrator is concerned with...
Which of the following relies on the use of shared secrets to protect communication?
Which of the following relies on the use of shared secrets to protect communication?
A. RADIUS
B. Kerberos
C. PKI
D. LDAP
Answer: ...
A security analyst informs the Chief Executive Officer (CEO) that a security breach has just occurred. This results in the Risk Manager and Chief Information Officer (CIO) being caught unaware when the CEO asks for further information. Which of the following strategies should be implemented to ensure the Risk Manager and CIO are not caught unaware in the future?
A security analyst informs the Chief Executive Officer (CEO) that a security breach has just occurred. This results in the Risk Manager and Chief Information...
A security administrator needs a locally stored record to remove the certificates of a terminated employee. Which of the following describes a service that could meet these requirements?
A security administrator needs a locally stored record to remove the certificates of a terminated employee. Which of the following describes a service...
A Chief Information Security Officer (CISO) is tasked with outsourcing the analysis of security logs. These will need to still be reviewed on a regular basis to ensure the security of the company has not been breached. Which of the following cloud service options would support this requirement?
A Chief Information Security Officer (CISO) is tasked with outsourcing the analysis of security logs. These will need to still be reviewed on a regular...
Which of the following types of security services are used to support authentication for remote users and devices?
Which of the following types of security services are used to support authentication for remote users and devices?
A. Biometrics
B. HSM
C. RADIUS
D....
Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash?
Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash?
A. Input validation
B....
Which of the following helps to apply the proper security controls to information?
Which of the following helps to apply the proper security controls to information?
A. Data classification
B. Deduplication
C. Clean desk policy
D....
Which of the following practices reduces the management burden of access management?
Which of the following practices reduces the management burden of access management?
A. Password complexity policies
B. User account audit
C. Log...
When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com. Which of the following BEST describes this type of record?
When reviewing security logs, an administrator sees requests for the AAAA record of www.comptia.com. Which of the following BEST describes this type...
An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files should be copied from srv4 to accomplish this?
An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com....
A software firm posts patches and updates to a publicly accessible FTP site. The software firm also posts digitally signed checksums of all patches and updates. The firm does this to address:
A software firm posts patches and updates to a publicly accessible FTP site. The software firm also posts digitally signed checksums of all patches...
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?
A....
Which of the following allows an organization to store a sensitive PKI component with a trusted third party?
Which of the following allows an organization to store a sensitive PKI component with a trusted third party?
A. Trust model
B. Public Key Infrastructure
C....
An incident response team member needs to perform a forensics examination but does not have the required hardware. Which of the following will allow the team member to perform the examination with minimal impact to the potential evidence?
An incident response team member needs to perform a forensics examination but does not have the required hardware. Which of the following will allow...
Which of the following provides the BEST explanation regarding why an organization needs to implement IT security policies?
Which of the following provides the BEST explanation regarding why an organization needs to implement IT security policies?
A. To ensure that false...
Which of the following provides the strongest authentication security on a wireless network?
Which of the following provides the strongest authentication security on a wireless network?
A. MAC filter
B. WPA2
C. WEP
D. Disable SSID broadc...
Which of the following are examples of network segmentation? (Select TWO).
Which of the following are examples of network segmentation? (Select TWO).
A. IDS
B. IaaS
C. DMZ
D. Subnet
E. IPS
Answer:
C...
The finance department works with a bank which has recently had a number of cyber attacks. The finance department is concerned that the banking website certificates have been compromised. Which of the following can the finance department check to see if any of the bank's certificates are still valid?
The finance department works with a bank which has recently had a number of cyber attacks. The finance department is concerned that the banking website...
The Human Resources department has a parent shared folder setup on the server. There are two groups that have access, one called managers and one called staff. There are many sub folders under the parent shared folder, one is called payroll. The parent folder access control list propagates all subfolders and all subfolders inherit the parent permission. Which of the following is the quickest way to prevent the staff group from gaining access to the payroll folder?
The Human Resources department has a parent shared folder setup on the server. There are two groups that have access, one called managers and one called...
The security department has implemented a new laptop encryption product in the environment. The product requires one user name and password at the time of boot up and also another password after the operating system has finished loading. This setup is using which of the following authentication types?
The security department has implemented a new laptop encryption product in the environment. The product requires one user name and password at the time...
Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print checks while only two other employees may sign the checks. Which of the following concepts would enforce this process?
Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked that only one group of employees may print...
Two programmers write a new secure application for the human resources department to store personal identifiable information. The programmers make the application available to themselves using an uncommon port along with an ID and password only they know. This is an example of which of the following?
Two programmers write a new secure application for the human resources department to store personal identifiable information. The programmers make the...
A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used?
A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used?
A. RC4
B. DES
C. 3DES
D. AES
Answer:&nbs...
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select TWO).
The librarian wants to secure the public Internet kiosk PCs at the back of the library. Which of the following would be the MOST appropriate? (Select...
Which of the following provides data the best fault tolerance at the LOWEST cost?
Which of the following provides data the best fault tolerance at the LOWEST cost?
A. Load balancing
B. Clustering
C. Server virtualization
D. RAID...
Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST level of security training for the executives? (Select TWO).
Human Resources (HR) would like executives to undergo only two specific security training programs a year. Which of the following provides the BEST...
How must user accounts for exiting employees be handled?
How must user accounts for exiting employees be handled?
A. Disabled, regardless of the circumstances
B. Disabled if the employee has been terminated
C....
What is a system that is intended or designed to be broken into by an attacker?
What is a system that is intended or designed to be broken into by an attacker?
A. Honeypot
B. Honeybucket
C. Decoy
D. Spoofing system
Answer:...
Which device monitors network traffic in a passive manner?
Which device monitors network traffic in a passive manner?
A. Sniffer
B. IDS
C. Firewall
D. Web browser
Answer: ...
A financial company requires a new private network link with a business partner to cater for realtime and batched data flows. Which of the following activities should be performed by the IT security staff member prior to establishing the link?
A financial company requires a new private network link with a business partner to cater for realtime and batched data flows. Which of the following...
Which of the following authentication services should be replaced with a more secure alternative?
Which of the following authentication services should be replaced with a more secure alternative?
A. RADIUS
B. TACACS
C. TACACS+
D. XTACACS
An...
A new MPLS network link has been established between a company and its business partner. The link provides logical isolation in order to prevent access from other business partners. Which of the following should be applied in order to achieve confidentiality and integrity of all data across the link?
A new MPLS network link has been established between a company and its business partner. The link provides logical isolation in order to prevent access...
A small company has a website that provides online customer support. The company requires an account recovery process so that customers who forget their passwords can regain access. Which of the following is the BEST approach to implement this process?
A small company has a website that provides online customer support. The company requires an account recovery process so that customers who forget their...
An insurance company requires an account recovery process so that information created by an employee can be accessed after that employee is no longer with the firm. Which of the following is the BEST approach to implement this process?
An insurance company requires an account recovery process so that information created by an employee can be accessed after that employee is no longer...
An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests. Which of the following describes how this private key should be stored so that it is protected from theft?
An SSL/TLS private key is installed on a corporate web proxy in order to inspect HTTPS requests. Which of the following describes how this private key...
A team of firewall administrators have access to a `master password list' containing service account passwords. Which of the following BEST protects the master password list?
A team of firewall administrators have access to a `master password list' containing service account passwords. Which of the following BEST protects...
Which of the following is a best practice for error and exception handling?
Which of the following is a best practice for error and exception handling?
A. Log detailed exception but display generic error message
B. Display...
A security administrator must implement all requirements in the following corporate policy: Passwords shall be protected against offline password brute force attacks. Passwords shall be protected against online password brute force attacks. Which of the following technical controls must be implemented to enforce the corporate policy? (Select THREE).
A security administrator must implement all requirements in the following corporate policy: Passwords shall be protected against offline password brute...
A software development company has hired a programmer to develop a plug-in module to an existing proprietary application. After completing the module, the developer needs to test the entire application to ensure that the module did not introduce new vulnerabilities. Which of the following is the developer performing when testing the application?
A software development company has hired a programmer to develop a plug-in module to an existing proprietary application. After completing the module,...
The security administrator is analyzing a user's history file on a Unix server to determine if the user was attempting to break out of a rootjail. Which of the following lines in the user's history log shows evidence that the user attempted to escape the rootjail?
The security administrator is analyzing a user's history file on a Unix server to determine if the user was attempting to break out of a rootjail. Which...
Which of the following was launched against a company based on the following IDS log?
Which of the following was launched against a company based on the following IDS log?
122.41.15.252 - - [21/May/2012:00:17:20 +1200] "GET
/index.php?
username=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
The security administrator installed a newly generated SSL certificate onto the company web server. Due to a mis-configuration of the website, a downloadable file containing one of the pieces of the key was available to the public. It was verified that the disclosure did not require a reissue of the certificate. Which of the following was MOST likely compromised?
The security administrator installed a newly generated SSL certificate onto the company web server. Due to a mis-configuration of the website, a downloadable...
Subscribe to:
Posts (Atom)