______ is an IP-based storage networking standard for linking data storage facilities.
a. Internet Small Computer System Interface (iSCSI)
b. Internet...
An Internet Protocol version 6 (IPv6) address is _______ in length.
An Internet Protocol version 6 (IPv6) address is _______ in length.
a. 128 bits
b. 64 bytes
c. 32 bytes
d. 32 bits
Answer: ...
An Internet Protocol version 4 (IPv4) address is _______ in length.
An Internet Protocol version 4 (IPv4) address is _______ in length.
a. 64 bits
b. 64 bytes
c. 32 bytes
d. 32 bits
Answer: ...
In a(n) _______ attack, a malformed ICMP ping that exceeds the size of an IP packet is sent to the victim's computer potentially causing the host to crash.
In a(n) _______ attack, a malformed ICMP ping that exceeds the size of an IP packet is sent to the victim's computer potentially causing the host to...
In a(n) _______ attack, an Internet Control Message Protocol (ICMP) redirect packet is sent to the victim that asks the host to send its packets to another "router," which is actually a malicious device.
In a(n) _______ attack, an Internet Control Message Protocol (ICMP) redirect packet is sent to the victim that asks the host to send its packets to...
Communications between different IP devices on a network is handled by one of the core protocols of TCP/IP, namely, _______.
Communications between different IP devices on a network is handled by one of the core protocols of TCP/IP, namely, _______.
a. Internet Control...
Which statement describes a limitation of Secure Copy Protocol (SCP)?
Which statement describes a limitation of Secure Copy Protocol (SCP)?
a. SCP can only operate in the Windows environment.
b. SCP cannot encrypt commands.
c....
Which protocol is used for file transfers?
Which protocol is used for file transfers?
a. Internet Small Computer System Interface (iSCSI)
b. Network Basic Input/Output System (NetBIOS)
c. Secure...
Which protocol uses TLS and SSL to secure Hypertext Transport Protocol (HTTP) communications between a browser and a web server?
Which protocol uses TLS and SSL to secure Hypertext Transport Protocol (HTTP) communications between a browser and a web server?
a. FTP Secure (FTPS)
b....
A weakness of FTPS is that although the control port commands are encrypted, the data port (_______) may or may not be encrypted.
A weakness of FTPS is that although the control port commands are encrypted, the data port (_______) may or may not be encrypted.
a. port 20
b. port...
Which statement accurately describes a characteristic of FTP Secure (FTPS)?
Which statement accurately describes a characteristic of FTP Secure (FTPS)?
a. FTPS is an entire protocol itself.
b. FTPS is a combination of two...
TCP/IP uses its own four-layer architecture that includes _______ layers.
TCP/IP uses its own four-layer architecture that includes _______ layers.
a. Network Interface, Internet, Transport, and Application
b. Network Interface,...
What is the most common protocol used today for both local area networks (LANs) and the Internet?
What is the most common protocol used today for both local area networks (LANs) and the Internet?
a. Transmission Control Protocol/Internet Protocol...
Which common cryptographic transport algorithm was developed by Netscape in 1994 in response to the growing concern over Internet security?
Which common cryptographic transport algorithm was developed by Netscape in 1994 in response to the growing concern over Internet security?
a. Hypertext...
______ is a cryptographic transport algorithm.
______ is a cryptographic transport algorithm.
a. Secure Shell (SSH)
b. Data Encryption Standard (DES)
c. Advanced Encryption Standard (AES)
d. Transport...
A newer secure version of DNS known as _______ allows DNS information to be digitally signed so that an attacker cannot forge DNS information.
A newer secure version of DNS known as _______ allows DNS information to be digitally signed so that an attacker cannot forge DNS information.
a....
Which protocol is a TCP/IP protocol that resolves (maps) a symbolic name (www.cengage.com) with its corresponding IP address (69.32.133.11)?
Which protocol is a TCP/IP protocol that resolves (maps) a symbolic name (www.cengage.com) with its corresponding IP address (69.32.133.11)?
a. Internet...
_____ is an encrypted alternative to the Telnet protocol that is used to access remote computers.
_____ is an encrypted alternative to the Telnet protocol that is used to access remote computers.
a. Internet Control Message Protocol (ICMP)
b....
Which protocol is used to manage network equipment and is supported by most network equipment manufacturers?
Which protocol is used to manage network equipment and is supported by most network equipment manufacturers?
a. Simple Network Management Protocol...
What two encryption modes are supported by Internet Protocol Security (IPsec)?
What two encryption modes are supported by Internet Protocol Security (IPsec)?
a. Electronic code book (ECB) and cipher block chaining (CBC)
b. Kerberos...
______ is a protocol suite for securing Internet Protocol (IP) communications.
______ is a protocol suite for securing Internet Protocol (IP) communications.
a. Internet Small Computer System Interface (iSCSI)
b. Internet Control...
Another name for layered security is _______.
Another name for layered security is _______.
a. network separation
b. VPN tunneling
c. Unified threat management (UTM)
d. defense in depth
Answer:...
A _______ cloud is a cloud that is open only to specific organizations that have common concerns.
A _______ cloud is a cloud that is open only to specific organizations that have common concerns.
a. community
b. public
c. hybrid
d. private
Answer:...
A _______________ cloud is a combination of public and private clouds.
A _______________ cloud is a combination of public and private clouds.
a. community
b. hybrid
c. mixed
d. connected
Answer: ...
A _______________ cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.
A _______________ cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.
a....
A _______________ cloud offers the highest level of security and control.
A _______________ cloud offers the highest level of security and control.
a. public
b. community
c. private
d. hybrid
Answer: ...
Which cloud computing service model provides the customer the highest level of control?
Which cloud computing service model provides the customer the highest level of control?
a. Application as a Service (AaaS)
b. Software as a Service...
In the _______________ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure.
In the _______________ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure.
a....
Which cloud computing service model allows the consumer to install and run their own specialized applications on the cloud computing network without requiring the consumer to manage or configure any of the underlying cloud infrastructure?
Which cloud computing service model allows the consumer to install and run their own specialized applications on the cloud computing network without...
Which term refers to a pay-per-use computing model in which customers pay only for the online computing resources they need?
Which term refers to a pay-per-use computing model in which customers pay only for the online computing resources they need?
a. Host computing
b....
Which term refers to the expansion and contraction of random access memory (RAM) or hard drive space as needed?
Which term refers to the expansion and contraction of random access memory (RAM) or hard drive space as needed?
a. On-demand computing
b. Host computing
c....
In _______________ virtualization, an entire operating system environment is simulated.
In _______________ virtualization, an entire operating system environment is simulated.
a. host
b. network
c. application
d. cloud
Answer:...
Which term describes a means of managing and presenting computer resources by function without regard to their physical layout or location?
Which term describes a means of managing and presenting computer resources by function without regard to their physical layout or location?
a. Port...
The goal of _______________ is to prevent computers with suboptimal security from potentially infecting other computers through the network.
The goal of _______________ is to prevent computers with suboptimal security from potentially infecting other computers through the network.
a. network...
Which statement accurately describes IP telephony?
Which statement accurately describes IP telephony?
a. IP telephony requires an increase in infrastructure requirements.
b. IP telephony convergence...
Which term describes the concept of using a data based IP network to add digital voice clients and new voice applications onto the IP network?
Which term describes the concept of using a data based IP network to add digital voice clients and new voice applications onto the IP network?
a....
______ refers to any combination of hardware and software that enables remote users to access a local internal network.
______ refers to any combination of hardware and software that enables remote users to access a local internal network.
a. Virtual LAN (VLAN) management
b....
By using _______________, instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different TCP port number.
By using _______________, instead of giving each outgoing packet a different IP address, each packet is given the same IP address but a different TCP...
Which term describes a technique that allows private IP addresses to be used on the public Internet?
Which term describes a technique that allows private IP addresses to be used on the public Internet?
a. Network address translation (NAT)
b. Port...
Segmenting a network by separating devices into logical groups is known as creating a _______________.
Segmenting a network by separating devices into logical groups is known as creating a _______________.
a. cloud
b. virtual LAN (VLAN)
c. flood guard
d....
_______ switches reside at the top of the hierarchy and carry traffic between switches, while _______________ switches are connected directly to the devices on the network.
_______ switches reside at the top of the hierarchy and carry traffic between switches, while _______________ switches are connected directly to the...
Networks are usually segmented by using _______________ to divide the network into a hierarchy.
Networks are usually segmented by using _______________ to divide the network into a hierarchy.
a. hubs
b. routers
c. switches
d. proxies
Answer:...
With subnetting, rather than simply having networks and hosts, networks can effectively be divided into three parts: _______________.
With subnetting, rather than simply having networks and hosts, networks can effectively be divided into three parts: _______________.
a. network,...
Allowing an IP address to be split anywhere within its 32 bits is known as _______________.
Allowing an IP address to be split anywhere within its 32 bits is known as _______________.
a. splitting
b. spanning
c. subnetting
d. IP spraying...
A _____ functions as a separate network that rests outside the secure network perimeter.
A _____ functions as a separate network that rests outside the secure network perimeter.
a. gateway
b. segment
c. virtual private network (VPN)
d....
An integrated device that combines several security functions is called a(n) _______________ security product.
An integrated device that combines several security functions is called a(n) _______________ security product.
a. demilitarized zone (DMZ)
b. unified...
What item is considered to be the biggest obstacle to log management?
What item is considered to be the biggest obstacle to log management?
a. Offsite storage accessibility
b. Very large volume of data
c. Multiple devices...
A security _______________ log can provide details regarding requests for specific files on a system.
A security _______________ log can provide details regarding requests for specific files on a system.
a. event
b. administration
c. audit
d. access...
One way to provide network separation is to physically separate users by connecting them to different _______________.
One way to provide network separation is to physically separate users by connecting them to different _______________.
a. switches and routers
b....
_____________ in access control means that if a condition is not explicitly met, the request for access is rejected.
_____________ in access control means that if a condition is not explicitly met, the request for access is rejected.
a. Static allow
b. Explicit allow
c....
Loop protection uses the _______________ standard spanning-tree algorithm (STA).
Loop protection uses the _______________ standard spanning-tree algorithm (STA).
a. IEEE 801.2d
b. IEEE 802.3
c. IEEE 802.11n
d. IEEE 802.1d
Answer:...
One defense against DoS and DDoS SYN flood attacks is to use a flood guard. A flood guard is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack. _________ can be prevented with loop protection.
One defense against DoS and DDoS SYN flood attacks is to use a flood guard. A flood guard is a feature that controls a device's tolerance for unanswered...
A _______________ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a denial of service (DoS) attack.
A _______________ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a denial of service (DoS) attack.
a....
The IEEE 802.1x standard provides the highest degree of port security by implementing port-based _______________.
The IEEE 802.1x standard provides the highest degree of port security by implementing port-based _______________.
a. encryption
b. authentication
c....
Ports can be secured through disabling unused interfaces, using _______________, and through IEEE 802.1x.
Ports can be secured through disabling unused interfaces, using _______________, and through IEEE 802.1x.
a. media access control (MAC) limiting...
Which statement accurately describes an access control list characteristic?
Which statement accurately describes an access control list characteristic?
a. Access control lists are efficient.
b. Access control lists are...
Which statement represents a best practice for securing router configurations?
Which statement represents a best practice for securing router configurations?
a. Allow remote configuration for dynamic installation in case of...
What statement accurately describes a best practice for managing a virtual LAN (VLAN)?
What statement accurately describes a best practice for managing a virtual LAN (VLAN)?
a. Configure empty switch ports to connect to a used VLAN.
b....
Within a firewall rule, the _______________ describes the TCP/IP port number being used to send packets of data through.
Within a firewall rule, the _______________ describes the TCP/IP port number being used to send packets of data through.
a. source port
b. destination...
Each firewall rule is essentially a separate instruction with a(n) _______________ construction.
Each firewall rule is essentially a separate instruction with a(n) _______________ construction.
a. FOR-EACH
b. DO-UNTIL
c. IF-THEN
d. WHILE-DO
Answer:...
Which of the following is not an example of the principles of influence used in social engineering attacks?
Which of the following is not an example of the principles of influence used in social engineering attacks?
a. Authority
b. Intimidation
c. Scarcity...
Which of the following should you deploy within your PKI to provide a method for initially verifying a user's identity so that a certificate may be issued?
Which of the following should you deploy within your PKI to provide a method for initially verifying a user's identity so that a certificate may be...
Which of the three principles of security is supported by an offsite tape backup system?
Which of the three principles of security is supported by an offsite tape backup system?
a. Confidentiality
b. Integrity
c. Availability
d. Sanitization...
Which of the following describes a simple form of social engineering in which an unauthorized individual follows closely behind someone who has authorized physical access to an environment?
Which of the following describes a simple form of social engineering in which an unauthorized individual follows closely behind someone who has authorized...
What is the minimum number of drives necessary to provide a RAID 5 redundant with distributed parity disk array?
What is the minimum number of drives necessary to provide a RAID 5 redundant with distributed parity disk array?
a. 1
b. 2
c. 3
d. 5
Answer:...
Your organization has organized a trade show in the United States. With the goal of increasing revenue, you decide to operate a Wi-Fi hotspot for a fee. Which of the following are reasons your organization could use wireless jamming? (Select all correct answers.)
Your organization has organized a trade show in the United States. With the goal of increasing revenue, you decide to operate a Wi-Fi hotspot for a...
Which of the following is a cloud-based security solution mainly found in private data centers?
Which of the following is a cloud-based security solution mainly found in private data centers?
a. VPC
b. HSM
c. TPM
d. PKI
Answer:...
Which of the following provides government-grade security by implementing the AES encryption algorithm and 802.1X-based authentication?
Which of the following provides government-grade security by implementing the AES encryption algorithm and 802.1X-based authentication?
a. WPA2
b....
Which of the following statements best describes nonrepudiation?
Which of the following statements best describes nonrepudiation?
a. A set of mathematical rules used in encryption
b. A means of proving that a transaction...
Which of the following does not describe techniques for assessing threats and vulnerabilities?
Which of the following does not describe techniques for assessing threats and vulnerabilities?
a. Understanding attack surface
b. Baseline reporting
c....
Which of the following would best mitigate the risks associated with allowing organizational network access required by the terms of a joint project with a business partner?
Which of the following would best mitigate the risks associated with allowing organizational network access required by the terms of a joint project...
Which of the following would be implemented for secure communications when the organization is using an application that authenticates with Active Directory Domain Services (AD DS) through simple BIND?
Which of the following would be implemented for secure communications when the organization is using an application that authenticates with Active Directory...
Which one of the following controls are physical security measures? (Select all correct answers.)
Which one of the following controls are physical security measures? (Select all correct answers.)
a. Motion detector
b. Antivirus software
c. CCTV
d....
Buffer overflows, format string vulnerabilities, and utilization of shell-escape codes can be mitigated by which of the following practices?
Buffer overflows, format string vulnerabilities, and utilization of shell-escape codes can be mitigated by which of the following practices?
a. Fuzzing
b....
Which of the following are used to verify the status of a certificate? (Select two correct answers.)
Which of the following are used to verify the status of a certificate? (Select two correct answers.)
a. OCSP
b. CRL
c. OSPF
d. ACL
Answer:...
What is the last step in the access control process?
What is the last step in the access control process?
a. Identification
b. Authentication
c. Authorization
d. Access control
Answer:...
Which of the following is the best measure to prevent divulging sensitive information through dumpster diving? (Select two correct answers.)
Which of the following is the best measure to prevent divulging sensitive information through dumpster diving? (Select two correct answers.)
a. A...
Which form of media sanitization might be required for flash-based solid state drives to be considered fully sanitized?
Which form of media sanitization might be required for flash-based solid state drives to be considered fully sanitized?
a. Declassification
b. Degaussing
c....
Which of the following describes a type of algorithm where data is broken into several units of varying sizes (dependent on algorithm) and encryption is applied to those chunks of data?
Which of the following describes a type of algorithm where data is broken into several units of varying sizes (dependent on algorithm) and encryption...
In which of the following types of fuzzing are forged packets sent to the tested application and then replayed?
In which of the following types of fuzzing are forged packets sent to the tested application and then replayed?
a. Application fuzzing
b. Protocol...
When a certificate authority revokes a certificate, notice of the revocation is distributed via what?
When a certificate authority revokes a certificate, notice of the revocation is distributed via what?
a. Certificate revocation list
b. Certificate...
Which of the following would be used to detect unauthorized or unintentional access or escalation of privileges?
Which of the following would be used to detect unauthorized or unintentional access or escalation of privileges?
a. Change management
b. Incident...
Which of the following is the most effective method that can be used to prevent data from being accessed in the event the device is lost or stolen?
Which of the following is the most effective method that can be used to prevent data from being accessed in the event the device is lost or stolen?
a....
Which type of power variation includes short-term decreases in voltage levels?
Which type of power variation includes short-term decreases in voltage levels?
a. Spikes
b. Surges
c. Brownouts
d. Blackouts
Answer:...
You are conducting a penetration test on an application for a client. The client provides you with no details about the source code and development process. What type of test will you likely be conducting?
You are conducting a penetration test on an application for a client. The client provides you with no details about the source code and development...
Which of the following models is useful for individuals and businesses that want to have the right to access a certain application without having to purchase a full license?
Which of the following models is useful for individuals and businesses that want to have the right to access a certain application without having to...
Which one of the following is an indication that a system might contain spyware?
Which one of the following is an indication that a system might contain spyware?
a. The system is slow, especially when browsing the Internet.
b....
Which of the following provide a "sandboxed" system that can be used to investigate malware?
Which of the following provide a "sandboxed" system that can be used to investigate malware?
a. Virtualization
b. Network storage
c. Host software...
The new biometric authentication system has been identified as having a high FAR. What does this mean?
The new biometric authentication system has been identified as having a high FAR. What does this mean?
a. Authorized users are being allowed access.
b....
Which of the following is a non-proprietary protocol that provides authentication and authorization as well as accounting of access requests against a centralized service for authorization of access requests?
Which of the following is a non-proprietary protocol that provides authentication and authorization as well as accounting of access requests against...
Which of the following is a hardware solution typically attached to the circuit board of the system used for greater security protection for processes such as digital signing, mission-critical applications, and businesses where high security is required?
Which of the following is a hardware solution typically attached to the circuit board of the system used for greater security protection for processes...
Which of the following types of attacks is characterized by client-side vulnerabilities presented by ActiveX or JavaScript code running within the client's browser?
Which of the following types of attacks is characterized by client-side vulnerabilities presented by ActiveX or JavaScript code running within the client's...
Which of the following is not one of the vulnerabilities of LDAP authentication services?
Which of the following is not one of the vulnerabilities of LDAP authentication services?
a. Buffer overflow vulnerabilities can be used to enact...
Which password standard provides the best opportunity to detect and react to a high-speed, brute-force password attack?
Which password standard provides the best opportunity to detect and react to a high-speed, brute-force password attack?
a. Password length
b. Account...
Which form of access control relies on labels for access control management?
Which form of access control relies on labels for access control management?
a. MAC
b. DAC
c. Role-based (RBAC)
d. Rule-based (RBAC)
Answer:...
Which of the following is not focused on recovering after loss of function?
Which of the following is not focused on recovering after loss of function?
a. RTO
b. DRP
c. RPO
d. BCP
Answer: ...
Which of the following best describes the difference between phishing and whaling?
Which of the following best describes the difference between phishing and whaling?
a. They are the same.
b. Whaling makes use of the voice channel,...
Which of the following best describes a host-based intrusion detection system (HIDS)?
Which of the following best describes a host-based intrusion detection system (HIDS)?
a. Examines the information exchanged between machines
b. Collects...
Which of the following services/protocols operate on port 22?
Which of the following services/protocols operate on port 22?
a. DNS
b. HTTPS
c. SSH
d. RDP
Answer: ...
Which of the following algorithms is now known as the Advanced Encryption Standard (AES)?
Which of the following algorithms is now known as the Advanced Encryption Standard (AES)?
a. Rijndael
b. 3DES
c. RC6
d. Twofish
Answer:...
Which of the following is the length of time a device or product is expected to last in operation?
Which of the following is the length of time a device or product is expected to last in operation?
a. RTO
b. MTBF
c. RPO
d. MTTF
Answer:...
Which of the following is commonly used in the banking sector to secure numerous large bulk transactions?
Which of the following is commonly used in the banking sector to secure numerous large bulk transactions?
a. Full disk encryption
b. HSM
c. TPM
d....
Which utility allows the identification of all devices conducting network traffic both to and from a network segment?
Which utility allows the identification of all devices conducting network traffic both to and from a network segment?
a. Port scanner
b. Vulnerability...
Which of the following is widely used as a controlled access measure in businesses that offer free Wi-Fi hotspots to Internet users such as hotels and restaurants?
Which of the following is widely used as a controlled access measure in businesses that offer free Wi-Fi hotspots to Internet users such as hotels and...
Which of the following statements is true about SSL?
Which of the following statements is true about SSL?
a. SSL provides security for both the connection and the data after it is received.
b. SSL only...
What is the minimal level of alternative site that includes live networking?
What is the minimal level of alternative site that includes live networking?
a. Cold
b. Warm
c. Hot
d. Remote
Answer: ...
If an asset is valued at 100,000, the threat exposure factor of a risk affecting that asset is 25%, and the annualized rate of occurrence is 20%, what is the ALE?
If an asset is valued at 100,000, the threat exposure factor of a risk affecting that asset is 25%, and the annualized rate of occurrence is 20%, what...
Which type of biometric authentication system is not subject to false rejection due to illness or minor injury?
Which type of biometric authentication system is not subject to false rejection due to illness or minor injury?
a. Fingerprint
b. Voiceprint
c. Facial...
Which of the following is the most useful when you're dealing with machines that are being taken on the road by traveling executives, sales managers, or insurance agents?
Which of the following is the most useful when you're dealing with machines that are being taken on the road by traveling executives, sales managers,...
You are setting up a switched network in which each department requires a logical separation. Which of the following meets these requirements?
You are setting up a switched network in which each department requires a logical separation. Which of the following meets these requirements?
a....
A certificate authority discovers it has issued a digital certificate to the wrong person. What needs to be completed?
A certificate authority discovers it has issued a digital certificate to the wrong person. What needs to be completed?
a. Certificate practice statement...
Which of the following is a method that can be used to prevent data from being accessed in the event the device is lost or stolen?
Which of the following is a method that can be used to prevent data from being accessed in the event the device is lost or stolen?
a. GPS tracking
b....
Which of the following provides the output for an example of banner grabbing?
Which of the following provides the output for an example of banner grabbing?
a. http://www.example.com/index.htm
b. This is a government computer...
Which of the following should be implemented if the organization wants to monitor unauthorized transfers of confidential information?
Which of the following should be implemented if the organization wants to monitor unauthorized transfers of confidential information?
a. Content...
Which of the following is not a common quality of quantitative risk analysis?
Which of the following is not a common quality of quantitative risk analysis?
a. Difficult for management to understand
b. Less precise
c. Labor intensive
d....
What is a potential concern to weaker encryption algorithms as time goes on? (Select the best answer.)
What is a potential concern to weaker encryption algorithms as time goes on? (Select the best answer.)
a. Performance of the algorithm worsens over...
Which of the following types of cloud computing is designed to meet industry-specific needs such as healthcare, public sector, or energy?
Which of the following types of cloud computing is designed to meet industry-specific needs such as healthcare, public sector, or energy?
a. Public
b....
Which of the following are types of updates applied to systems? (Select all correct answers.)
Which of the following are types of updates applied to systems? (Select all correct answers.)
a. Hotfix
b. Service packs
c. Patches
d. Coldfix
Answer:...
A CA with multiple subordinate CAs would use which of the following PKI trust models?
A CA with multiple subordinate CAs would use which of the following PKI trust models?
a. Cross-certified
b. Hierarchical
c. Bridge
d. Linked
Answer:...
You are setting up an FTP server that needs to be accessed by both the employees and external contractors. What type of architecture should you implement?
You are setting up an FTP server that needs to be accessed by both the employees and external contractors. What type of architecture should you implement?
a....
Which of the following are advantages of honeypots and honeynets? (Select all correct answers.)
Which of the following are advantages of honeypots and honeynets? (Select all correct answers.)
a. Attackers are diverted to systems that they cannot...
Which of the following is a term describing the process of registering an asset and provisioning the asset so it can be used to access the corporate network?
Which of the following is a term describing the process of registering an asset and provisioning the asset so it can be used to access the corporate...
Which of the following is not a certificate trust model for the arranging of certificate authorities?
Which of the following is not a certificate trust model for the arranging of certificate authorities?
a. Bridge CA architecture
b. Sub-CA architecture
c....
Which one of the following best identifies the system of digital certificates and certification authorities used in public key technology?
Which one of the following best identifies the system of digital certificates and certification authorities used in public key technology?
a. Certificate...
Which of the following is true of Pretty Good Privacy (PGP)? (Select the two best answers.)
Which of the following is true of Pretty Good Privacy (PGP)? (Select the two best answers.)
a. It uses a web of trust.
b. It uses a hierarchical...
What type of algorithm is SHA-1?
What type of algorithm is SHA-1?
a. Asymmetric encryption algorithm
b. Digital signature
c. Hashing algorithm
d. Certificate authority
Answer:...
Your organization provides a secure web portal. You discover another portal that mimics your organization's portal look and feel. This portal has a similar URL but is different by one letter. Which of the following are most likely true? (Select two correct answers.)
Your organization provides a secure web portal. You discover another portal that mimics your organization's portal look and feel. This portal has a...
Which is the best access control constraint to protect against accidental unauthorized access?
Which is the best access control constraint to protect against accidental unauthorized access?
a. Implicit denial
b. Least privilege
c. Separation...
Which category of authentication includes your ATM card?
Which category of authentication includes your ATM card?
a. Something you are
b. Something you do
c. Somewhere you are
d. Something you have
Answer:...
If Bob wants to send a secure message to Val using public key encryption without sender validation, what does Val need?
If Bob wants to send a secure message to Val using public key encryption without sender validation, what does Val need?
a. Bob's private key
b. Bob's...
Which of the following is the most useful when you're dealing with data that is stored in a shared cloud environment?
Which of the following is the most useful when you're dealing with data that is stored in a shared cloud environment?
a. Full disk encryption
b. File-level...
Which of the following is the formal process of assessing risk involved in discarding particular information?
Which of the following is the formal process of assessing risk involved in discarding particular information?
a. Sanitization
b. Declassification
c....
An organization is looking for a basic mobile solution which will be used to prevent unauthorized access to users' phones. Which of the following fulfills this requirement?
An organization is looking for a basic mobile solution which will be used to prevent unauthorized access to users' phones. Which of the following fulfills...
Which of the following applications should be used to properly protect a host from malware? (Select two correct answers.)
Which of the following applications should be used to properly protect a host from malware? (Select two correct answers.)
a. Antispam software
b....
In which of the following phases should code security first be implemented?
In which of the following phases should code security first be implemented?
a. Testing
b. Review
c. Implementation
d. Design
Answer:...
An organization has had a rash of malware infections. Which of the following can help mitigate the number of successful attacks?
An organization has had a rash of malware infections. Which of the following can help mitigate the number of successful attacks?
a. Application baselining
b....
An organization has agreed to collaborate on a business project with another organization. Which of the following documents would outline the terms and details of an agreement between parties, including each party's requirements and responsibilities?
An organization has agreed to collaborate on a business project with another organization. Which of the following documents would outline the terms...
Which of the following best describes why a requesting device might believe that incoming ARP replies are from the correct devices?
Which of the following best describes why a requesting device might believe that incoming ARP replies are from the correct devices?
a. ARP requires...
A man-in-the-middle attack takes advantage of which of the following?
A man-in-the-middle attack takes advantage of which of the following?
a. TCP handshake
b. UDP handshake
c. Juggernaut
d. All of the above
Answer:...
What aspect of disaster recovery planning details training requirements for managers, administrators, and users?
What aspect of disaster recovery planning details training requirements for managers, administrators, and users?
a. Impact and risk assessment
b....
Which element of business continuity planning (BCP) is most concerned with hot-site/cold-site planning?
Which element of business continuity planning (BCP) is most concerned with hot-site/cold-site planning?
a. Network connectivity
b. Facilities
c. Clustering
d....
A video surveillance system is a form of which type of access control?
A video surveillance system is a form of which type of access control?
a. Quantitative
b. Management
c. Technical
d. Physical
Answer:...
Which risk management response is being implemented when a company decides to close a little-used legacy web application identified as vulnerable to SQL Injection?
Which risk management response is being implemented when a company decides to close a little-used legacy web application identified as vulnerable to...
Which of the following makes it difficult for an eavesdropper to spot patterns and contains a message integrity method to ensure that messages have not been tampered with?
Which of the following makes it difficult for an eavesdropper to spot patterns and contains a message integrity method to ensure that messages have...
You manage a network on which there are mixed vendor devices and are required to implement a strong authentication solution for wireless communications. Which of the following would best meet your requirements?
You manage a network on which there are mixed vendor devices and are required to implement a strong authentication solution for wireless communications....
Which of the following is considered best practice when formulating minimum standards for developing password policies?
Which of the following is considered best practice when formulating minimum standards for developing password policies?
a. Password length set to...
Which of the following methods of cloud computing enables the client to literally outsource everything that would normally be in a typical IT department?
Which of the following methods of cloud computing enables the client to literally outsource everything that would normally be in a typical IT department?
a....
Due to organizational requirements strong encryption cannot be used. Which of the following is the most basic form of encryption that can be used on 802.11-based wireless networks to provide privacy of data sent between a wireless client and its access point?
Due to organizational requirements strong encryption cannot be used. Which of the following is the most basic form of encryption that can be used on...
Which risk reduction policy does not aid in identifying internal fraud?
Which risk reduction policy does not aid in identifying internal fraud?
a. Mandatory vacations
b. Least privilege
c. Separation of duties
d. Job rotation...
If an organization takes a full backup every Sunday morning and a daily differential backup each morning, what is the fewest number of backups that must be restored following a disaster on Friday?
If an organization takes a full backup every Sunday morning and a daily differential backup each morning, what is the fewest number of backups that...
Bluejacking and bluesnarfing make use of which wireless technology?
Bluejacking and bluesnarfing make use of which wireless technology?
a. Wi-Fi
b. Bluetooth
c. Blu-Fi
d. All of the above
Answer: ...
Which one of the following is a holding area between two entry points that gives security personnel time to view a person before allowing him into the internal building?
Which one of the following is a holding area between two entry points that gives security personnel time to view a person before allowing him into the...
Which of the following is a security concern when implementing NoSQL databases?
Which of the following is a security concern when implementing NoSQL databases?
a. NoSQL databases do not provide any authentication mechanisms.
b....
Which of the following methods can be used to locate a device in the event it is lost or stolen?
Which of the following methods can be used to locate a device in the event it is lost or stolen?
a. GPS tracking
b. Voice encryption
c. Remote wipe
d....
Subscribe to:
Posts (Atom)