Users received a spam email from an unknown source and chose the option in the email to unsubscribe and are now getting more spam as a result. Which...
An organization is looking for a mobile solution that allows both executives and employees to discuss sensitive information without having to travel to secure company locations. Which of the following fulfills this requirement?
An organization is looking for a mobile solution that allows both executives and employees to discuss sensitive information without having to travel...
The process of making an operating system more secure by closing known vulnerabilities and addressing security issues is known as which of the following?
The process of making an operating system more secure by closing known vulnerabilities and addressing security issues is known as which of the following?
a....
Which one of the following best describes the type of attack designed to bring a network to a halt by flooding the systems with useless traffic?
Which one of the following best describes the type of attack designed to bring a network to a halt by flooding the systems with useless traffic?
a....
Which of the following is a common storage networking standard chosen by businesses for ease of installation, cost, and utilization of current Ethernet networks?
Which of the following is a common storage networking standard chosen by businesses for ease of installation, cost, and utilization of current Ethernet...
Which of the following is included in a BYOD policy?
Which of the following is included in a BYOD policy?
a. Key management
b. Data ownership
c. Credential management
d. Transitive trusts
Answer:...
Never inserting untrusted data except in allowed locations can be used to mitigate which of the following attacks? (Select two answers.)
Never inserting untrusted data except in allowed locations can be used to mitigate which of the following attacks? (Select two answers.)
a. Buffer...
A physical security plan should include which of the following? (Select all correct answers.)
A physical security plan should include which of the following? (Select all correct answers.)
a. Description of the physical assets being protected
b....
Which one of the following is not considered a physical security component?
Which one of the following is not considered a physical security component?
a. VPN tunnel
b. Mantrap
c. Fence
d. CCTV
Answer: A
A VPN tunnel...
You have been tasked with mitigating the risk of password-based attacks. Which of the following should you consider to provide a control beyond just what someone knows?
You have been tasked with mitigating the risk of password-based attacks. Which of the following should you consider to provide a control beyond just...
Security guards are a form of which specific type of control?
Security guards are a form of which specific type of control?
a. Management
b. Technical
c. Physical
d. Access
Answer: C
Physical controls...
You want to be sure that the FTP ports that are required for a contract worker's functionality have been properly secured. Which of the following ports would you check?
You want to be sure that the FTP ports that are required for a contract worker's functionality have been properly secured. Which of the following ports...
Which of the following is the best choice for encrypting large amounts of data?
Which of the following is the best choice for encrypting large amounts of data?
a. Asymmetric encryption
b. Symmetric encryption
c. Elliptical curve...
Which of the following is an example of a false negative result?
Which of the following is an example of a false negative result?
a. An authorized user is granted access to a resource.
b. An unauthorized user...
After a new switch was implemented, some sporadic connectivity issues on the network have occurred. The issues are suspected to be device related. Which of the following would the organization implement as a method for additional checks in order to prevent issues?
After a new switch was implemented, some sporadic connectivity issues on the network have occurred. The issues are suspected to be device related. Which...
Due to organizational requirements, strong encryption cannot be used. Which of the following is the most basic form of encryption that can be used on 802.11-based wireless networks to provide privacy of data sent between a wireless client and its access point?
Due to organizational requirements, strong encryption cannot be used. Which of the following is the most basic form of encryption that can be used on...
While performing regular security audits, you suspect that your company is under attack and someone is attempting to use resources on your network. The IP addresses in the log files belong to a trusted partner company, however. Assuming an attack, which of the following might be occurring?
While performing regular security audits, you suspect that your company is under attack and someone is attempting to use resources on your network....
Which form of fire suppression functions best in an Alaskan fire of burning metals?
Which form of fire suppression functions best in an Alaskan fire of burning metals?
a. Dry-pipe sprinkler
b. Wet-pipe sprinkler
c. Carbon dioxide
d....
An asset is valued at $12,000, the threat exposure factor of a risk affecting that asset is 25%, and the annualized rate of occurrence is 50%. What is the SLE?
An asset is valued at $12,000, the threat exposure factor of a risk affecting that asset is 25%, and the annualized rate of occurrence is 50%. What...
An organization has an access control list implemented on the border router, but it appears that unauthorized traffic is still being accepted. Which of the following would the organization implement to improve the blocking of unauthorized traffic?
An organization has an access control list implemented on the border router, but it appears that unauthorized traffic is still being accepted. Which...
Several organizational users are experiencing network and Internet connectivity issues. Which of the following would be most helpful in troubleshooting where the connectivity problems might exist?
Several organizational users are experiencing network and Internet connectivity issues. Which of the following would be most helpful in troubleshooting...
Which of the following is the preferred type of encryption used in SaaS platforms?
Which of the following is the preferred type of encryption used in SaaS platforms?
a. Application level
b. Database level
c. Media level
d. HSM level
Answer:...
Which of the following is included in hardening a host operating system?
Which of the following is included in hardening a host operating system?
a. A policy for antivirus updates
b. A policy for remote wipe
c. An efficient...
TEMPEST deals with which of the following forms of environmental control?
TEMPEST deals with which of the following forms of environmental control?
a. HVAC
b. EMI shielding
c. Humidity
d. Cold-aisle
Answer: B
TEMPEST...
A situation in which a program or process attempts to store more data in a temporary data storage area than it was intended to hold is known as which of the following?
A situation in which a program or process attempts to store more data in a temporary data storage area than it was intended to hold is known as which...
Which of the following are steps that can be taken to harden FTP services?
Which of the following are steps that can be taken to harden FTP services?
a. Anonymous access to shared files of questionable or undesirable content...
Which statement concerning a network intrusion detection system (NIDS) is correct?
Which statement concerning a network intrusion detection system (NIDS) is correct?
a. A NIDS knows such information as the applications that are...
What feature distinguishes a network intrusion prevention system (NIPS) from a network intrusion detection system (NIDS)?
What feature distinguishes a network intrusion prevention system (NIPS) from a network intrusion detection system (NIDS)?
a. A NIPS has sensors that...
A more "intelligent" firewall is a(n) ______ firewall, sometimes called a next-generation firewall (NGFW).
A more "intelligent" firewall is a(n) ______ firewall, sometimes called a next-generation firewall (NGFW).
a. rule-based
b. application-aware
c....
A ____ is a special type of firewall that looks at the applications using HTTP.
A _______________ is a special type of firewall that looks at the applications using HTTP.
a. network intrusion detection system (NIDS)
b. network...
Using _______________, filters can assess if a webpage contains any malicious elements or exhibits any malicious behavior, and then flag questionable pages with a warning message.
Using _______________, filters can assess if a webpage contains any malicious elements or exhibits any malicious behavior, and then flag questionable...
Which type of Internet content filtering restricts unapproved websites from being displayed by searching for and matching keywords?
Which type of Internet content filtering restricts unapproved websites from being displayed by searching for and matching keywords?
a. Uniform resource...
Which option for installing a corporate spam filter is considered to be the most effective approach?
Which option for installing a corporate spam filter is considered to be the most effective approach?
a. Install the spam filter on the Domain Name...
A(n) _______________ captures packets to decode and analyzes their contents.
A(n) _______________ captures packets to decode and analyzes their contents.
a. protocol analyzer
b. load balancer
c. Internet content filter
d....
Which statement concerning heuristic monitoring is correct?
Which statement concerning heuristic monitoring is correct?
a. Heuristic monitoring operates by being adaptive and proactive.
b. Heuristic monitoring...
Which statement concerning anomaly-based monitoring is correct?
Which statement concerning anomaly-based monitoring is correct?
a. Anomaly-based monitoring is founded on experience based techniques.
b. Anomaly-based...
Which statement concerning signature-based monitoring is correct?
Which statement concerning signature-based monitoring is correct?
a. Signature-based monitoring is designed for detecting statistical anomalies.
b....
Which statement concerning behavior-based monitoring is correct?
Which statement concerning behavior-based monitoring is correct?
a. It is necessary to update signature files before monitoring can take place.
b....
VPN transmissions are achieved through communicating with _______________.
VPN transmissions are achieved through communicating with _______________.
a. network taps
b. endpoints
c. Internet content filters
d. proxy servers...
What term refers to a technology that enables authorized users to use an unsecured public network, such as the Internet, as if it were a secure private network?
What term refers to a technology that enables authorized users to use an unsecured public network, such as the Internet, as if it were a secure private...
A(n) _______________ can block malicious content in real time as it appears.
A(n) _______________ can block malicious content in real time as it appears.
a. uniform resource locator (URL) filter
b. virtual private network...
A(n) _______________ is a computer or an application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user.
A(n) _______________ is a computer or an application program that intercepts user requests from the internal secure network and then processes that...
Load balancing that is used for distributing HTTP requests received is sometimes called _______________.
Load balancing that is used for distributing HTTP requests received is sometimes called _______________.
a. content filtering
b. IP spraying
c. content...
A load balancer is typically located _______________ in a network configuration.
A load balancer is typically located _______________ in a network configuration.
a. in front of a server
b. in front of a router
c. between a router...
Which type of switch network monitoring is best suited for high-speed networks that have a large volume of traffic?
Which type of switch network monitoring is best suited for high-speed networks that have a large volume of traffic?
a. Network tapping
b. Port mirroring
c....
What is the role of a switch?
What is the role of a switch?
a. To inspect packets and either accept or deny entry
b. To forward packets across different network computer networks
c....
What is the role of a router?
What is the role of a router?
a. To inspect packets and either accept or deny entry
b. To forward packets across different computer networks
c. To...
What type of firewall systems are static in nature and cannot do anything other than what they have been expressly configured to do?
What type of firewall systems are static in nature and cannot do anything other than what they have been expressly configured to do?
a. Application-based
b....
When a modern firewall receives a packet, it tends to use a(n) _______________ method to determine the action to be taken.
When a modern firewall receives a packet, it tends to use a(n) _______________ method to determine the action to be taken.
a. rule-based
b. role-based
c....
Which type of firewall packet filtering looks at the incoming packet and permits or denies it based on the conditions that have been set by the administrator?
Which type of firewall packet filtering looks at the incoming packet and permits or denies it based on the conditions that have been set by the administrator?
a....
What is the primary role of a firewall?
What is the primary role of a firewall?
a. To forward packets across different network computer networks
b. To intercept user requests from the internal...
A new switch has been implemented in areas where there is very little physical access control. Which of the following would the organization implement as a method for additional checks to prevent unauthorized access?
A new switch has been implemented in areas where there is very little physical access control. Which of the following would the organization implement...
Which of the following statements are true when discussing physical security? (Select all correct answers.)
Which of the following statements are true when discussing physical security? (Select all correct answers.)
a. Physical security attempts to control...
Which one of the following defines APIs for devices such as smart cards that contain cryptographic information?
Which one of the following defines APIs for devices such as smart cards that contain cryptographic information?
a. PKCS #11
b. PKCS #13
c. PKCS #4
d....
Which is the best rule-based access control constraint to protect against unauthorized access when admins are off-duty?
Which is the best rule-based access control constraint to protect against unauthorized access when admins are off-duty?
a. Least privilege
b. Separation...
Which type of authorization provides no mechanism for unique logon identification?
Which type of authorization provides no mechanism for unique logon identification?
a. Anonymous
b. Kerberos
c. TACACS
d. TACACS+
Answer: A
During...
Which of the following is not true regarding expiration dates of certificates?
Which of the following is not true regarding expiration dates of certificates?
a. Certificates may be issued for a week.
b. Certificates are issued...
What is the first step in performing a basic forensic analysis?
What is the first step in performing a basic forensic analysis?
a. Ensure that the evidence is acceptable in a court of law
b. Identify the evidence
c....
You are implementing network access for several internal business units that work with sensitive information on a small organizational network. Which of the following would best mitigate risk associated with users improperly accessing other segments of the network without adding additional switches?
You are implementing network access for several internal business units that work with sensitive information on a small organizational network. Which...
An organization is partnering with another organization which requires shared systems. Which of the following documents would outline how the shared systems interface?
An organization is partnering with another organization which requires shared systems. Which of the following documents would outline how the shared...
Which form of cabling is least susceptible to EM interference?
Which form of cabling is least susceptible to EM interference?
a. STP
b. UTP
c. Coaxial
d. Fiber optic
Answer: D
Fiber-optic cabling is least...
An executive from ABC Corp receives an email from a vice president of XYZ Corp, which is a prestigious partner organization of ABC Corp. This email was formatted using XYZ's corporate logo, images, and text from their website (checked by the executive before opening the included form). After clicking the provided link, the executive was asked to verify his credentials for access to a confidential report about ABC Corp, but after he filled out the form, the executive received only a referral to XYZ's site. What type of attack was used in this scenario?
An executive from ABC Corp receives an email from a vice president of XYZ Corp, which is a prestigious partner organization of ABC Corp. This email...
Which of the following is most likely to use network segmentation as an alternate security method?
Which of the following is most likely to use network segmentation as an alternate security method?
a. SCADA systems
b. Mainframes
c. Android
d. Gaming...
Which of the following protocols supports DES, 3DES, RC2, and RSA2 encryption along with CHAP authentication, but was not widely adopted?
Which of the following protocols supports DES, 3DES, RC2, and RSA2 encryption along with CHAP authentication, but was not widely adopted?
a. S-HTTP
b....
It is suspected that some recent network compromises are originating from the use of RDP. Which of the following TCP port traffic should be monitored?
It is suspected that some recent network compromises are originating from the use of RDP. Which of the following TCP port traffic should be monitored?
a....
Which of the following are examples of protocol analyzers? (Check all correct answers.)
Which of the following are examples of protocol analyzers? (Check all correct answers.)
a. Metasploit
b. Wireshark
c. OVAL
d. Microsoft Message Analyzer...
Which of the following types of attacks can be done by either convincing the users to click on an HTML page the attacker has constructed or insert arbitrary HTML in a target website that the users visit?
Which of the following types of attacks can be done by either convincing the users to click on an HTML page the attacker has constructed or insert arbitrary...
Which of the following types of attacks is executed by placing malicious executable code on a website?
Which of the following types of attacks is executed by placing malicious executable code on a website?
a. Buffer overflow
b. Cross-site request forgery...
Which of the following is needed to establish effective security baselines for host systems? (Select two correct answers.)
Which of the following is needed to establish effective security baselines for host systems? (Select two correct answers.)
a. Cable locks
b. Mandatory...
Which of the following best describes the process of encrypting and decrypting data using an asymmetric encryption algorithm?
Which of the following best describes the process of encrypting and decrypting data using an asymmetric encryption algorithm?
a. Only the public...
Which of the following algorithms is not an example of a symmetric encryption algorithm?
Which of the following algorithms is not an example of a symmetric encryption algorithm?
a. Rijndael
b. Diffie-Hellman
c. RC6
d. AES
Answer:...
Which authorization protocol is generally compatible with TACACS?
Which authorization protocol is generally compatible with TACACS?
a. LDAP
b. RADIUS
c. TACACS+
d. XTACACS
Answer: D
The Extended Terminal Access...
There have been some sporadic connectivity issues on the network. Which of the following is the best choice to investigate these issues?
There have been some sporadic connectivity issues on the network. Which of the following is the best choice to investigate these issues?
a. Protocol...
Your organization is exploring data-loss prevention (DLP) solutions. The proposed solution is a software network solution that would be installed near the network perimeter to monitor for and flag policy violations. This solution is targeting which of the following data states?
Your organization is exploring data-loss prevention (DLP) solutions. The proposed solution is a software network solution that would be installed near...
Your organization is exploring data-loss prevention (DLP) solutions. The proposed solution is a software storage solution that monitors how confidential data is stored. This solution is targeting which of the following data states?
Your organization is exploring data-loss prevention (DLP) solutions. The proposed solution is a software storage solution that monitors how confidential...
Which of the following designates the amount of data loss that is sustainable and up to what point in time data recovery could happen before business is disrupted?
Which of the following designates the amount of data loss that is sustainable and up to what point in time data recovery could happen before business...
Which of the following is true of digital signatures? (Choose the two best answers.)
Which of the following is true of digital signatures? (Choose the two best answers.)
a. They are the same as a hash function.
b. They can be automatically...
What is the acronym for the de facto cryptographic message standards developed by RSA Laboratories?
What is the acronym for the de facto cryptographic message standards developed by RSA Laboratories?
a. PKIX
b. X.509
c. PKCS
d. Both A and C
Answer:...
To check the validity of a digital certificate, which one of the following would be used?
To check the validity of a digital certificate, which one of the following would be used?
a. Corporate security policy
b. Certificate policy
c. Certificate...
Which of the following is the type of algorithm used by MD5?
Which of the following is the type of algorithm used by MD5?
a. Block cipher algorithm
b. Hashing algorithm
c. Asymmetric encryption algorithm
d....
Which of the following is a hybrid cryptosystem?
Which of the following is a hybrid cryptosystem?
a. PAP
b. MD5
c. RSA
d. GPG
Answer: D
Privacy Guard (GnuPG or GPG) is a hybrid cryptosystem...
Which of the following is information that is unlikely to result in a high-level financial loss or serious damage to the organization but still should be protected?
Which of the following is information that is unlikely to result in a high-level financial loss or serious damage to the organization but still should...
Which of the following will help track changes to the environment when an organization needs to keep legacy machines?
Which of the following will help track changes to the environment when an organization needs to keep legacy machines?
a. Virtualization
b. Network...
Which category of authentication includes smart cards?
Which category of authentication includes smart cards?
a. Something you know
b. Something you have
c. Something you are
d. Something you do
e. Somewhere...
Which process involves verifying keys as being authentic?
Which process involves verifying keys as being authentic?
a. Authorization
b. Authentication
c. Access control
d. Verification
Answer: B
Authentication...
Which of the following uses a secure crypto-processor to authenticate hardware devices such as a PC or laptop?
Which of the following uses a secure crypto-processor to authenticate hardware devices such as a PC or laptop?
a. Public key infrastructure
b. Full...
Your organization is exploring endpoint data-loss prevention (DLP) solutions. This solution is targeting which of the following data states?
Your organization is exploring endpoint data-loss prevention (DLP) solutions. This solution is targeting which of the following data states?
a. In-transit
b....
An organization is looking to add a layer of security and maintain strict control over the apps employees are approved to use. Which of the following fulfills this requirement?
An organization is looking to add a layer of security and maintain strict control over the apps employees are approved to use. Which of the following...
Which of the following methods would be the most effective method to physically secure computers that are used in a lab environment that operates on a part-time basis?
Which of the following methods would be the most effective method to physically secure computers that are used in a lab environment that operates on...
Which of the following is an attack in which the end user executes unwanted actions on a web application while he is currently authenticated?
Which of the following is an attack in which the end user executes unwanted actions on a web application while he is currently authenticated?
a....
The organization is concerned about vulnerabilities in commercial off-the-shelf (COTS) software. Which of the following might be the only means of reviewing the security quality of the program?
The organization is concerned about vulnerabilities in commercial off-the-shelf (COTS) software. Which of the following might be the only means of reviewing...
Which of the following are not methods for minimizing a threat to a web server? (Choose the two best answers.)
Which of the following are not methods for minimizing a threat to a web server? (Choose the two best answers.)
a. Disable all nonweb services
b....
What is the name given to the activity that consists of collecting information that will be later used for monitoring and review purposes?
What is the name given to the activity that consists of collecting information that will be later used for monitoring and review purposes?
a. Logging
b....
Which of the following is a coordinated effort in which multiple machines attack a single victim or host with the intent to prevent legitimate service?
Which of the following is a coordinated effort in which multiple machines attack a single victim or host with the intent to prevent legitimate service?
a....
A user has downloaded trial software and subsequently downloads a key generator in order to unlock the trial software. The user's antivirus detection software now alerts the user that the system is infected. Which one of the following best describes the type of malware infecting the system?
A user has downloaded trial software and subsequently downloads a key generator in order to unlock the trial software. The user's antivirus detection...
Which rule of evidence within the United States involves Fourth Amendment protections?
Which rule of evidence within the United States involves Fourth Amendment protections?
a. Admissible
b. Complete
c. Reliable
d. Believable
Answer:...
Which of the following is not a principal concern for first responders to a hacking incident within a corporation operating in the United States?
Which of the following is not a principal concern for first responders to a hacking incident within a corporation operating in the United States?
a....
_______ describes the potential that a weakness in hardware, software, process, or people will be identified and taken advantage of.
_______ describes the potential that a weakness in hardware, software, process, or people will be identified and taken advantage of.
a. Vulnerability
b....
Which of the three principles of security is supported by an iris biometric system?
Which of the three principles of security is supported by an iris biometric system?
a. Confidentiality
b. Integrity
c. Availability
d. Vulnerability
Answer:...
When troubleshooting SSL, which two layers of the OSI model are of most value?
When troubleshooting SSL, which two layers of the OSI model are of most value?
a. Application layer and presentation layer
b. Presentation layer...
At which layer of the OSI model does the Internet Protocol Security protocol function?
At which layer of the OSI model does the Internet Protocol Security protocol function?
a. Network layer
b. Presentation layer
c. Session layer
d....
You have recently had security breaches in the network. You suspect they might be coming from a telecommuter's home network. Which of the following devices would you use to require a secure method for employees to access corporate resources while working from home?
You have recently had security breaches in the network. You suspect they might be coming from a telecommuter's home network. Which of the following...
You want to implement a technology solution for a small organization that can function as a single point of policy control and management for access to Internet content. Which of the following should you choose?
You want to implement a technology solution for a small organization that can function as a single point of policy control and management for access...
Which of the following is a network protocol that supports file transfers and is a combination of RCP and SSH?
Which of the following is a network protocol that supports file transfers and is a combination of RCP and SSH?
a. HTTPS
b. FTPS
c. SFTP
d. SCP
Answer:...
What is the recommended range of humidity level according to the ASHRAE?
What is the recommended range of humidity level according to the ASHRAE?
a. 10% to 20%
b. 30% to 40%
c. 40% to 55%
d. 55% to 65%
Answer: C
The...
Which of the following serves the purpose of trying to lure a malicious attacker into a system?
Which of the following serves the purpose of trying to lure a malicious attacker into a system?
a. Honeypot
b. Pot of gold
c. DMZ
d. Bear trap
Answer:...
Which of the following methods is the most effective way to physically secure laptops that are used in an environment such as an office?
Which of the following methods is the most effective way to physically secure laptops that are used in an environment such as an office?
a. Security...
If Sally wants to send a secure message to Mark using public key encryption but is not worried about sender verification, what does she need in addition to her original message text?
If Sally wants to send a secure message to Mark using public key encryption but is not worried about sender verification, what does she need in addition...
What is the name given to the system of digital certificates and certificate authorities used for public key cryptography over networks?
What is the name given to the system of digital certificates and certificate authorities used for public key cryptography over networks?
a. Protocol...
Subscribe to:
Posts (Atom)