Which of the following pseudocodes can be used to handle program exceptions?
A. If program detects another instance of itself, then kill program instance.
B....
A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following?
A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following?
A. Availability
B. Integrity
C. Confidentiality
D....
Which of the following could cause a browser to display the message below? "The security certificate presented by this website was issued for a different website's address."
Which of the following could cause a browser to display the message below? "The security certificate presented by this website was issued for a different...
A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?
A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by...
Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees to have secure remote access to certain internal network services such as file servers?
Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees to have secure remote access to certain...
Matt, the security administrator, notices a large number of alerts on the NIDS. Upon further inspection, it is determined that no attack has really taken place. This is an example of a:
Matt, the security administrator, notices a large number of alerts on the NIDS. Upon further inspection, it is determined that no attack has really...
Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server?
Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a...
Which of the following protocols would be used to verify connectivity between two remote devices at the LOWEST level of the OSI model?
Which of the following protocols would be used to verify connectivity between two remote devices at the LOWEST level of the OSI model?
A. DNS
B....
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of...
Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company's live modem pool. Which of the following activities is MOST appropriate?
Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company's live modem pool. Which of the...
Mike, a network administrator, has been asked to passively monitor network traffic to the company's sales websites. Which of the following would be BEST suited for this task?
Mike, a network administrator, has been asked to passively monitor network traffic to the company's sales websites. Which of the following would be...
Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?
Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the...
Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?
Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the...
After Matt, a user enters his username and password at the login screen of a web enabled portal, the following appears on his screen:
After Matt, a user enters his username and password at the login screen of a web enabled portal, the following appears on his screen:
`Please only...
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?
A. Credit card and PIN
B. Username and password
C. Password and PIN
D. Fingerprint...
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
A. Record time offset
B....
Which of the following can be used to mitigate risk if a mobile device is lost?
Which of the following can be used to mitigate risk if a mobile device is lost?
A. Cable lock
B. Transport encryption
C. Voice encryption
D. Strong...
Which of the following protocols is used to authenticate the client and server's digital certificate?
Which of the following protocols is used to authenticate the client and server's digital certificate?
A. PEAP
B. DNS
C. TLS
D. ICMP
Answer:...
Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the following would provide the BEST level of protection?
Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the following would provide the BEST level of protection?
A....
Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?
Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?
A. Recovery agent
B. Certificate...
Which of the following controls should be used to verify a person in charge of payment processing is not colluding with anyone to pay fraudulent invoices?
Which of the following controls should be used to verify a person in charge of payment processing is not colluding with anyone to pay fraudulent invoices?
A....
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
A. Disabling SSID broadcast
B. MAC filtering
C. WPA2
D....
An ACL placed on which of the following ports would block IMAP traffic?
An ACL placed on which of the following ports would block IMAP traffic?
A. 110
B. 143
C. 389
D. 465
Answer: ...
Which of the following is an attack vector that can cause extensive physical damage to a datacenter without physical access?
Which of the following is an attack vector that can cause extensive physical damage to a datacenter without physical access?
A. CCTV system access
B....
Which of the following defines an organization goal for acceptable downtime during a disaster or other contingency?
Which of the following defines an organization goal for acceptable downtime during a disaster or other contingency?
A. MTBF
B. MTTR
C. RTO
D. RPO
Answer:...
Which of the following defines a business goal for system restoration and acceptable data loss?
Which of the following defines a business goal for system restoration and acceptable data loss?
A. MTTR
B. MTBF
C. RPO
D. Warm site
Answer:...
Which of the following can use RC4 for encryption? (Select TWO).
Which of the following can use RC4 for encryption? (Select TWO).
A. CHAP
B. SSL
C. WEP
D. AES
E. 3DES
Answer: B & C.
...
Which of the following can be used in code signing?
Which of the following can be used in code signing?
A. AES
B. RC4
C. GPG
D. CHAP
Answer: ...
An administrator wants to minimize the amount of time needed to perform backups during the week. It is also acceptable to the administrator for restoration to take an extended time frame. Which of the following strategies would the administrator MOST likely implement?
An administrator wants to minimize the amount of time needed to perform backups during the week. It is also acceptable to the administrator for restoration...
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to...
Why is it important for a penetration tester to have established an agreement with management as to which systems and processes are allowed to be tested?
Why is it important for a penetration tester to have established an agreement with management as to which systems and processes are allowed to be tested?
A....
Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT
Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT
A. Buffer overflow prevention
B. Input...
Elliptic curve cryptography: (Select TWO)
Elliptic curve cryptography: (Select TWO)
A. is used in both symmetric and asymmetric encryption.
B. is used mostly in symmetric encryption.
C....
When checking his webmail, Matt, a user, changes the URL's string of characters and is able to get into another user's inbox. This is an example of which of the following?
When checking his webmail, Matt, a user, changes the URL's string of characters and is able to get into another user's inbox. This is an example of...
Which of the following should Matt, a security administrator, include when encrypting smartphones? (Select TWO).
Which of the following should Matt, a security administrator, include when encrypting smartphones? (Select TWO).
A. Steganography images
B. Internal...
Which of the following components MUST be trusted by all parties in PKI?
Which of the following components MUST be trusted by all parties in PKI?
A. Key escrow
B. CA
C. Private key
D. Recovery key
Answer: ...
Which of the following is used to certify intermediate authorities in a large PKI deployment?
Which of the following is used to certify intermediate authorities in a large PKI deployment?
A. Root CA
B. Recovery agent
C. Root user
D. Key...
In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager. Which of the following incident response procedures would he need to perform in order to begin the analysis? (Select TWO).
In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager....
A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?
A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?
A....
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
A. Penetration test
B....
Which of the following assessments would Pete, the security administrator, use to actively test that an application's security controls are in place?
Which of the following assessments would Pete, the security administrator, use to actively test that an application's security controls are in place?
A....
Configuring the mode, encryption methods, and security associations are part of which of the following?
Configuring the mode, encryption methods, and security associations are part of which of the following?
A. IPSec
B. Full disk encryption
C. 802.1x
D....
In which of the following scenarios is PKI LEAST hardened?
In which of the following scenarios is PKI LEAST hardened?
A. The CRL is posted to a publicly accessible location.
B. The recorded time offsets are...
Privilege creep among long-term employees can be mitigated by which of the following procedures?
Privilege creep among long-term employees can be mitigated by which of the following procedures?
A. User permission reviews
B. Mandatory vacations
C....
Use of group accounts should be minimized to ensure which of the following?
Use of group accounts should be minimized to ensure which of the following?
A. Password security
B. Regular auditing
C. Baseline management
D....
A username provides which of the following?
A username provides which of the following?
A. Biometrics
B. Identification
C. Authorization
D. Authentication
Answer: ...
Which of the following access controls enforces permissions based on data labeling at specific levels?
Which of the following access controls enforces permissions based on data labeling at specific levels?
A. Mandatory access control
B. Separation...
Which of the following would MOST likely ensure that swap space on a hard disk is encrypted?
Which of the following would MOST likely ensure that swap space on a hard disk is encrypted?
A. Database encryption
B. Full disk encryption
C. Folder...
Which of the following provides the MOST protection against zero day attacks via email attachments?
Which of the following provides the MOST protection against zero day attacks via email attachments?
A. Anti-spam
B. Anti-virus
C. Host-based firewalls
D....
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?
A. XSS
B. SQL...
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC,...
A system administrator decides to use SNMPv3 on the network router in AuthPriv mode. Which of the following algorithm combinations would be valid?
A system administrator decides to use SNMPv3 on the network router in AuthPriv mode. Which of the following algorithm combinations would be valid?
A....
Which of the following is a difference between TFTP and FTP?
Which of the following is a difference between TFTP and FTP?
A. TFTP is slower than FTP.
B. TFTP is more secure than FTP.
C. TFTP utilizes TCP and...
To reduce an organization's risk exposure by verifying compliance with company policy, which of the following should be performed periodically?
To reduce an organization's risk exposure by verifying compliance with company policy, which of the following should be performed periodically?
A....
Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk?
Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST...
Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?
Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?
A. SSLv2
B....
Jane, the security administrator, needs to be able to test malicious code in an environment where it will not harm the rest of the network. Which of the following would allow Jane to perform this kind of testing?
Jane, the security administrator, needs to be able to test malicious code in an environment where it will not harm the rest of the network. Which of...
Which of the following algorithms has well documented collisions? (Select TWO).
Which of the following algorithms has well documented collisions? (Select TWO).
A. AES
B. MD5
C. SHA
D. SHA-256
E. RSA
Answer: B &...
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).
A. 10.4.4.125
B. 10.4.4.158
C....
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols....
To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?
To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which...
Which of the following may significantly reduce data loss if multiple drives fail at the same time?
Which of the following may significantly reduce data loss if multiple drives fail at the same time?
A. Virtualization
B. RAID
C. Load balancing
D....
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus...
An employee is granted access to only areas of a network folder needed to perform their job. Which of the following describes this form of access control?
An employee is granted access to only areas of a network folder needed to perform their job. Which of the following describes this form of access control?
A....
A user in the company is in charge of various financial roles but needs to prepare for an upcoming audit. They use the same account to access each financial system. Which of the following security controls will MOST likely be implemented within the company?
A user in the company is in charge of various financial roles but needs to prepare for an upcoming audit. They use the same account to access each financial...
The security administrator wants each user to individually decrypt a message but allow anybody to encrypt it. Which of the following MUST be implemented to allow this type of authorization?
The security administrator wants each user to individually decrypt a message but allow anybody to encrypt it. Which of the following MUST be implemented...
A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?
A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration...
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?
A. Malicious code on the local system
B....
A certificate authority takes which of the following actions in PKI?
A certificate authority takes which of the following actions in PKI?
A. Signs and verifies all infrastructure messages
B. Issues and signs all private...
Which of the following BEST describes a common security concern for cloud computing?
Which of the following BEST describes a common security concern for cloud computing?
A. Data may be accessed by third parties who have compromised...
Which of the following BEST describes a protective countermeasure for SQL injection?
Which of the following BEST describes a protective countermeasure for SQL injection?
A. Eliminating cross-site scripting vulnerabilities
B. Installing...
Which of the following is a hardware based encryption device?
Which of the following is a hardware based encryption device?
A. EFS
B. TrueCrypt
C. TPM
D. SLE
Answer: ...
A security administrator wants to check user password complexity. Which of the following is the BEST tool to use?
A security administrator wants to check user password complexity. Which of the following is the BEST tool to use?
A. Password history
B. Password...
Which of the following can be used by a security administrator to successfully recover a user's forgotten password on a password protected file?
Which of the following can be used by a security administrator to successfully recover a user's forgotten password on a password protected file?
A....
Which of the following application security testing techniques is implemented when an automated system generates random input data?
Which of the following application security testing techniques is implemented when an automated system generates random input data?
A. Fuzzing
B....
A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway?
A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external...
Which of the following devices would MOST likely have a DMZ interface?
Which of the following devices would MOST likely have a DMZ interface?
A. Firewall
B. Switch
C. Load balancer
D. Proxy
Answer: ...
Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?
Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network....
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?
A. Registration
B. CA
C. CRL
D....
A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?
A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following...
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following would be used when a higher level of security is desired for encryption key storage?
A. TACACS+
B. L2TP
C. LDAP
D. TPM
Answer:...
Which of the following steps should follow the deployment of a patch?
Which of the following steps should follow the deployment of a patch?
A. Antivirus and anti-malware deployment
B. Audit and verification
C. Fuzzing...
In regards to secure coding practices, why is input validation important?
In regards to secure coding practices, why is input validation important?
A. It mitigates buffer overflow attacks.
B. It makes the code more readable.
C....
After verifying that the server and database are running, Jane, the administrator, is still unable to make a TCP connection to the database. Which of the following is the MOST likely cause for this?
After verifying that the server and database are running, Jane, the administrator, is still unable to make a TCP connection to the database. Which of...
A targeted email attack sent to Sara, the company's Chief Executive Officer (CEO), is known as which of the following?
A targeted email attack sent to Sara, the company's Chief Executive Officer (CEO), is known as which of the following?
A. Whaling
B. Bluesnarfing
C....
Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack?
Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack?
A. 802.1x
B. DHCP
C....
All of the following are valid cryptographic hash functions EXCEPT:
All of the following are valid cryptographic hash functions EXCEPT:
A. RIPEMD.
B. RC4.
C. SHA-512.
D. MD4.
Answer: ...
Which of the following devices is BEST suited for servers that need to store private keys?
Which of the following devices is BEST suited for servers that need to store private keys?
A. Hardware security module
B. Hardened network firewall
C....
In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO).
In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the...
A password history value of three means which of the following?
A password history value of three means which of the following?
A. Three different passwords are used before one can be reused.
B. A password cannot...
What is used along with an encryption algorithm (cipher) to encode and decode data?
What is used along with an encryption algorithm (cipher) to encode and decode data?
a. Ciphertext
b. Key
c. Cipher
d. Cleartext
Answer: ...
When using ______ cryptography, two people decide on a mutual key in a safe or secure way in order to exchange encrypted data with one another.
When using ______ cryptography, two people decide on a mutual key in a safe or secure way in order to exchange encrypted data with one another.
a....
Using symmetric key encryption alone, data is vulnerable to a man-in-the-middle attack.
Using symmetric key encryption alone, data is vulnerable to a man-in-the-middle attack.
True
False
Answer: Tr...
The length of an encryption key is important because:
The length of an encryption key is important because:
a. The length determines the maximum number of possible keys that an attacker will have to try...
The lowest level of attack or simplest attack for cracking an encryption key would be a dictionary attack, which is basically trying to crack a key by trial and error.
The lowest level of attack or simplest attack for cracking an encryption key would be a dictionary attack, which is basically trying to crack a key...
Which of the following is an example of a brute force attack?
Which of the following is an example of a brute force attack?
a. Using known facts about the person in an effort to guess the correct password/key
b....
Secure Sockets Layer or SSL, which uses a encryption algorithm, is the encryption technique that is used by Secure HTTP, thus enabling e-commerce.
Secure Sockets Layer or SSL, which uses a encryption algorithm, is the encryption technique that is used by Secure HTTP, thus enabling e-commerce.
a....
What is a public key?
What is a public key?
a. An encryption key that is made by a publicly available software utility
b. An encryption key that is accidentally exposed...
It is important to use reputable certificate authorities since:
It is important to use reputable certificate authorities since:
a. An attacker could trick a less-known certificate authority into giving them customer...
Which of the following is true?
Which of the following is true?
a. Keys that are longer than 8 bits require considerable processing time, making them unattractive for most applications
b....
Which of the following is true?
Which of the following is true?
a. Software encryption is much more secure than hardware encryption
b. Hardware encryption is more vulnerable to tampering...
What happens when signing a document with a digital signature?
What happens when signing a document with a digital signature?
a. A person's message is encrypted with a private key and then hashed to a message...
An encryption function takes ciphertext and a key as input and returns cleartext, provided the correct key is used.
An encryption function takes ciphertext and a key as input and returns cleartext, provided the correct key is used.
True
False
Answer: Fal...
Why must a private key not be stored with the data it has encrypted?
Why must a private key not be stored with the data it has encrypted?
a. The preferred place to store a private key is on the same system as the data...
The words sunny day are encrypted to produce the text wnta lia. Which of the following is considered to be the cleartext in this example?
The words sunny day are encrypted to produce the text wnta lia. Which of the following is considered to be the cleartext in this example?
a. Sunny...
A(n) ______ function takes data and a secret key as input and uses the secret key to scramble/encode the data, producing ciphertext that cannot be deciphered by anyone other than the appropriate parties.
A(n) ______ function takes data and a secret key as input and uses the secret key to scramble/encode the data, producing ciphertext that cannot be deciphered...
Certificate Authorities assure involved parties that the right people are sending or receiving the correct information by:
Certificate Authorities assure involved parties that the right people are sending or receiving the correct information by:
a. Distributing public...
What is a certificate authority (CA)?
What is a certificate authority (CA)?
a. An organization that offers free encryption and decryption services
b. An organization that offers free digital...
By acting as the creators and distributors of ______, certificate authorities use public key encryption to prevent man-in-the-middle attacks.
By acting as the creators and distributors of ______, certificate authorities use public key encryption to prevent man-in-the-middle attacks.
a....
A simple Caesar cipher uses a shift to encrypt while the XOR cipher needs a key to encrypt.
A simple Caesar cipher uses a shift to encrypt while the XOR cipher needs a key to encrypt.
True
False
Answer: Tru...
___ is the technical term for the encryption algorithm used to encrypt or decrypt a piece of data.
___ is the technical term for the encryption algorithm used to encrypt or decrypt a piece of data.
a. Key
b. Hash
c. Cipher
d. Cryptography
Answer:...
A hash function is:
A hash function is:
a. A one-way function that mathematically manipulates the input data to create an output value
b. A one-way function that uses...
Which of the following statements is true?
Which of the following statements is true?
a. Symmetric key encryption uses the same key while public key encryption uses two different keys for each...
A cracked encryption key is a key that:
A cracked encryption key is a key that:
a. Has been entered into the cipher or encryption system
b. Has been discovered by some method and is now...
The study of encrypting data so that confidentiality between two parties is maintained is known as:
The study of encrypting data so that confidentiality between two parties is maintained is known as:
a. Cipher processing
b. Hashing
c. Cryptography
d....
Which of the following could best help an attack to successfully occur on an encryption system?
Which of the following could best help an attack to successfully occur on an encryption system?
a. Public key encryption
b. A short encryption key...
Regarding cryptography, what is a private key?
Regarding cryptography, what is a private key?
a. An encryption key that is kept confidential and used to decrypt data that has been encrypted with...
When encrypting a storage device, which is the most secure place to store a key?
When encrypting a storage device, which is the most secure place to store a key?
a. On a separate (from the encrypted device) and secured storage...
Which of the following uses public key cryptography?
Which of the following uses public key cryptography?
• ROT 13
• XOR
• Secure Sockets Layer (SSL)
• Secure Protocol Layer
Answer: Secure Sockets...
In order to avoid using a certificate authority that is in alliance with an attacker, it is recommended that you:
In order to avoid using a certificate authority that is in alliance with an attacker, it is recommended that you:
• Avoid using certificate authorities
•...
A ______ key should be kept secure because it can be worth a lot of money since it can decrypt valuable data.
A ______ key should be kept secure because it can be worth a lot of money since it can decrypt valuable data.
• Private
• Short
• Public
• Simplex
Answer:...
How does symmetric key cryptography differ from public key cryptography?
How does symmetric key cryptography differ from public key cryptography?
• Symmetric key uses the same key for encryption and decryption
• Symmetric...
______ serve as third parties that can verify the true identity of a person during encrypted communications.
______ serve as third parties that can verify the true identity of a person during encrypted communications.
• Cipher Authorities
• Verification...
The ideal location to store a private key is:
The ideal location to store a private key is:
• On a stand-alone computer system that is not networked
• On the same network as the cipher
• It is...
By acting as the creators and distributors of digitally signed encryption keys, Certificate Authorities use public key encryption to:
By acting as the creators and distributors of digitally signed encryption keys, Certificate Authorities use public key encryption to:
• Prevent data...
What is a private key?
What is a private key?
• An encryption key that is accidentally exposed to the public
• An encryption key kept secret by the owner
• An encryption...
What is a digital signature?
What is a digital signature?
• A cryptographic value attached to data to certify the integrity of the data
• A certified public key used for public...
An output value produced by a mathematical function that utilizes the data input, especially in the use of creating digital signatures, is referred to as a:
An output value produced by a mathematical function that utilizes the data input, especially in the use of creating digital signatures, is referred...
If an attacker discovers another person's private encryption key, then they have successfully ________.
If an attacker discovers another person's private encryption key, then they have successfully ________.
• Ciphered the system
• Hashed the key
•...
Blowfish and data encryption standard or DES are examples of algorithms that use:
Blowfish and data encryption standard or DES are examples of algorithms that use:
• Multiple key encryption
• Symmetric key encryption
• Asymmetric...
When using ________ encryption, two people decide on a mutual encryption key in order to securely exchange data with one another.
When using ________ encryption, two people decide on a mutual encryption key in order to securely exchange data with one another.
• Private key
•...
In order to double the amount of time it would take an attacker to crack an encryption key, you could:
In order to double the amount of time it would take an attacker to crack an encryption key, you could:
• Add one bit to the length of the encryption...
With modern technology, an encryption key with a length of 128 bits would:
With modern technology, an encryption key with a length of 128 bits would:
• Take one year to crack
• Take an effectively infinite time to crack
•...
A ________ key is an encryption key made available to anyone wanting to transmit data to the key's creator.
A ________ key is an encryption key made available to anyone wanting to transmit data to the key's creator.
• Private
• Secure
• Public
• Master
Answer:...
A(n) ________ function takes ciphertext (data that has been encrypted) and a secret key as input and uses the secret key to decode the data back into the original, unaltered cleartext.
A(n) ________ function takes ciphertext (data that has been encrypted) and a secret key as input and uses the secret key to decode the data back into...
______ is the piece of data that is used to encrypt or decrypt a message or other blocks of data.
______ is the piece of data that is used to encrypt or decrypt a message or other blocks of data.
• Hash function
• Cipher
• Cleartext
• Key
Answer:...
The word hellow is encrypted into the text ydssm. Which of the following is considered the cyphertext in this example?
The word hellow is encrypted into the text ydssm. Which of the following is considered the cyphertext in this example?
• Ciphertext is not used in...
A(n) ___________ function basically works as a black box, where cleartext and a key go in, and ciphertext comes out.
A(n) ___________ function basically works as a black box, where cleartext and a key go in, and ciphertext comes out.
• Decryption
• Encryption
•...
Both the XOR (Exclusive OR) cipher and the ROT 13 Caesar Cipher are examples which use:
Both the XOR (Exclusive OR) cipher and the ROT 13 Caesar Cipher are examples which use:
• Double key encryption
• Public key encryption
• Single...
____ is the term that describes the study of encoding data so it is kept confidential between two parties.
____ is the term that describes the study of encoding data so it is kept confidential between two parties.
• Encryption
• Cryptography
• Cipher
•...
Which of the following is one definition of the word "cipher"?
Which of the following is one definition of the word "cipher"?
• Data that has been successfully encrypted AND decrypted
• The data that is output...
A ___________ analyzes data and produces a unique value based on that data. It is used in the creation of digital signatures.
A ___________ analyzes data and produces a unique value based on that data. It is used in the creation of digital signatures.
• Hash function
• Key
•...
Plaintext or cleartext is the term for:
Plaintext or cleartext is the term for:
• The algorithm used to encrypt or decrypt data or text
• The data or text that has been encrypted
• Data...
_____ is the term given to data or text that has been encoded.
_____ is the term given to data or text that has been encoded.
• Cleartext
• Key
• Codetext
• Ciphertext
Answer: Cipherte...
A hash function is:
A hash function is:
a. A one-way function that uses a cipher to produce a piece of data that helps to encrypt other data
b. A two-way function that,...
The encryption of storage devices is desired because:
The encryption of storage devices is desired because:
a. It is cheaper than encryption of a few specific files
b. The encryption performed by software...
The data or text that has been encrypted or encoded is referred to as:
The data or text that has been encrypted or encoded is referred to as:
a. Key
b. Hash function
c. Cleartext
d. Ciphertext
Answer: ...
Secure Sockets Layer, TLS and Pretty Good Privacy are examples of algorithms that use what type of encryption?
Secure Sockets Layer, TLS and Pretty Good Privacy are examples of algorithms that use what type of encryption?
a. Symmetric key encryption
b. Public...
What could happen if an attacker were to plant a virus on a system that encrypted data in software?
What could happen if an attacker were to plant a virus on a system that encrypted data in software?
a. The virus could interfere with the encryption...
Ideally, where should encryption keys be stored?
Ideally, where should encryption keys be stored?
a. On a physically separate system from the encrypted data
b. On the same system as the encrypted...
Which of the following are commonly used examples that implement symmetric key encryption?
Which of the following are commonly used examples that implement symmetric key encryption?
a. Digital signatures
b. Secure Socket Layer (SSL)
c....
How is public key cryptography different than symmetric key cryptography?
How is public key cryptography different than symmetric key cryptography?
a. Public key cryptography secures data so that it can travel over public...
Why is the length of an encryption key important?
Why is the length of an encryption key important?
a. Shorter keys are less secure, meaning the data can be decrypted by an attacker
b. Key length...
Regarding cryptography, a private key should be kept secure since:
Regarding cryptography, a private key should be kept secure since:
a. It can be used to access sensitive information AND it can be used to encrypt...
Cryptography is:
Cryptography is:
a. A mathematical function that utilizes the data input to produce a value based on that data
b. The process of converting cleartext...
A brute force attack works by:
A brute force attack works by:
a. Analyzing the encrypted data in an effort to deduce the correct password/key
b. Using a list of common words or...
What is the recommended minimum key length for most applications and ciphers?
What is the recommended minimum key length for most applications and ciphers?
a. 256 bits
b. 32 bits
c. 56 bits
d. 128 bits
Answer: ...
It is best for a private key to be stored on the same server as the data decryption software.
It is best for a private key to be stored on the same server as the data decryption software.
True
False
Answer: Fals...
How does a valid digital signature assure the recipient that the document has not been tampered with?
How does a valid digital signature assure the recipient that the document has not been tampered with?
a. The digital signature was encrypted using...
________ is the process of transforming cleartext into ciphertext.
________ is the process of transforming cleartext into ciphertext.
a. Decryption Incorrect
b. Cryptography
c. Cipher
d. Encryption
Answer:...
An encryption key that is used by anyone in order to encrypt a file and send it to the owner of the encryption key so that the owner may decode it is referred to as:
An encryption key that is used by anyone in order to encrypt a file and send it to the owner of the encryption key so that the owner may decode it is...
Symmetric key encryption requires keys to be distributed prior to communicating with the other party (i.e. the key is computed ahead of time, before initiating any communications).
Symmetric key encryption requires keys to be distributed prior to communicating with the other party (i.e. the key is computed ahead of time, before...
A simple Caesar cipher uses a shift to encrypt while the XOR cipher needs a key to encrypt.
A simple Caesar cipher uses a shift to encrypt while the XOR cipher needs a key to encrypt.
True
False
Answer: Tr...
The process of converting ciphertext to plaintext is known as:
The process of converting ciphertext to plaintext is known as:
a. Cryptography
b. Encryption
c. Decryption
d. Cipher processing
Answer: ...
Symmetric key encryption gets its name because:
Symmetric key encryption gets its name because:
a. Both parties must initiate the ciphering software in order to exchange data
b. The involved parties...
The encryption algorithm used to encrypt or decrypt a piece of data is referred to as a:
The encryption algorithm used to encrypt or decrypt a piece of data is referred to as a:
a. Cipher
b. Hash
c. Ciphertext
d. Key
Answer: ...
What happens when verifying a document with a digital signature?
What happens when verifying a document with a digital signature?
a. A message is decrypted with a corresponding public key to create a message digest,...
An encryption function takes cleartext and a key as input and returns ciphertext.
An encryption function takes cleartext and a key as input and returns ciphertext.
Answer: Tr...
What do digital signatures provide?
What do digital signatures provide?
a. Assurance that the stated author is the actual person that created the information
b. Security by ensuring...
What advantages are there to performing encryption in software, rather than hardware?
What advantages are there to performing encryption in software, rather than hardware?
a. No additional hardware is required
b. It can be done faster
c....
Two people can verify they are communicating with each other by using a ____________, which verifies each party's identity by being the distributor of public and private keys that both parties use. These keys are digitally signed so both parties can be assured they are communicating with each other.
Two people can verify they are communicating with each other by using a ____________, which verifies each party's identity by being the distributor...
When should a key or certificate be renewed?
When should a key or certificate be renewed?
a. Every year
b. Every quarter
c. Just before it expires
d. Just after it expires
Answer: ...
Which of the following is a description of a key-stretching technique?
Which of the following is a description of a key-stretching technique?
a. Salting input before hashing
b. Generating a random number, and then using...
From a private corporate perspective, which of the following is most secure?
From a private corporate perspective, which of the following is most secure?
a. Decentralized key management
b. Centralized key management
c. Individual...
When a subject or end user requests a certificate, they must provide which of the following items? (Choose all that apply.)
When a subject or end user requests a certificate, they must provide which of the following items? (Choose all that apply.)
a. Proof of identity
b....
Certificates have what single purpose?
Certificates have what single purpose?
a. Proving identity
b. Proving quality
c. Providing encryption security
d. Exchanging encryption keys
Answer:...
Digital signatures can be created using all but which of the following?
Digital signatures can be created using all but which of the following?
a. Asymmetric cryptography
b. Hashing
c. Key escrow
d. Symmetric cryptography...
The security service that protects the secrecy of data, information, or resources is known as what?
The security service that protects the secrecy of data, information, or resources is known as what?
a. Integrity
b. Authentication
c. Non-repudiation
d....
Diffie-Hellman is what type of cryptographic system?
Diffie-Hellman is what type of cryptographic system?
a. Asymmetric
b. Symmetric
c. Hashing
d. Certificate authority
Answer: ...
Which of the following symmetric-encryption algorithms offers the strength of 168-bit keys?
Which of the following symmetric-encryption algorithms offers the strength of 168-bit keys?
a. Data Encryption Standard
b. Triple DES
c. Advanced...
Which of the following is most directly associated with providing or supporting perfect forward secrecy?
Which of the following is most directly associated with providing or supporting perfect forward secrecy?
a. PBKDF2
b. ECDHE
c. HMAC
d. OCSP
Answer:...
Which of the following is an example of a Type 2 authentication factor?
Which of the following is an example of a Type 2 authentication factor?
a. Something you have, such as a smart card, an ATM card, a token device,...
Federation is a means to accomplish _____.
Federation is a means to accomplish _____.
a. Accountability logging
b. ACL verification
c. Single sign-on
d. Trusted OS hardening
Answer:...
Which of the following is not a benefit of single sign-on?
Which of the following is not a benefit of single sign-on?
a. The ability to browse multiple systems
b. Fewer usernames and passwords to memorize
c....
In a MAC environment, when a user has clearance for assets but is still unable to access those assets, what other security feature is in force?
In a MAC environment, when a user has clearance for assets but is still unable to access those assets, what other security feature is in force?
a....
LDAP operates over what TCP ports?
LDAP operates over what TCP ports?
a. 636 and 389
b. 110 and 25
c. 443 and 80
d. 20 and 21
Answer: ...
Which of the following technologies can be used to add an additional layer of protection between a directory services-based network and remote clients?
Which of the following technologies can be used to add an additional layer of protection between a directory services-based network and remote clients?
a....
Which is the strongest form of password?
Which is the strongest form of password?
a. More than eight characters
b. One-time use
c. Static
d. Different types of keyboard characters
Answer:...
Kerberos is used to perform what security service?
Kerberos is used to perform what security service?
a. Authentication protection
b. File encryption
c. Secure communications
d. Protected data transfer...
What mechanism is used to support the exchange of authentication and authorization details between systems, services, and devices?
What mechanism is used to support the exchange of authentication and authorization details between systems, services, and devices?
a. Biometric
b....
What method of access control is best suited for environments with a high rate of employee turnover?
What method of access control is best suited for environments with a high rate of employee turnover?
a. MAC
b DAC
c. RBAC
d. ACL
Answer:...
Which security stance will be most successful at preventing malicious software execution?
Which security stance will be most successful at preventing malicious software execution?
a. Deny by exception
b. Whitelisting
c. Allow by default
d....
In order to ensure that whole-drive encryption provides the best security possible, which of the following should not be performed?
In order to ensure that whole-drive encryption provides the best security possible, which of the following should not be performed?
a. Screen lock...
Which of the following is not true in regards to NoSQL?
Which of the following is not true in regards to NoSQL?
a. Can support SQL expressions
b. It is a relational database
c. Supports hierarchies or multilevel...
The most commonly overlooked aspect of mobile phone eavesdropping is related to _____.
The most commonly overlooked aspect of mobile phone eavesdropping is related to _____.
a. Wireless networking
b. Storage device encryption
c. Overhearing...
The most effective means to reduce the risk of losing the data on a mobile device, such as a notebook computer, is _____.
The most effective means to reduce the risk of losing the data on a mobile device, such as a notebook computer, is _____.
a. Encrypt the hard drive.
b....
What is a security risk of an embedded system that is not commonly found in a standard PC?
What is a security risk of an embedded system that is not commonly found in a standard PC?
a. Power loss
b. Access to the Internet
c. Control of a...
When a vendor releases a patch, which of the following is the most important?
When a vendor releases a patch, which of the following is the most important?
a. Installing the patch immediately
b. Setting up automatic patch installation
c....
What technology provides an organization with the best control over BYOD equipment?
What technology provides an organization with the best control over BYOD equipment?
a. Encrypted removable storage
b. Mobile device management
c....
Which of the following is not a way to prevent or protect against XSS?
Which of the following is not a way to prevent or protect against XSS?
a. Input validation
b. Defensive coding
c. Allowing script input
d. Escaping...
What technique or method can be employed by hackers and researchers to discover unknown flaws or errors in software?
What technique or method can be employed by hackers and researchers to discover unknown flaws or errors in software?
a. Dictionary attacks
b. Fuzzing
c....
What is a significant difference between vulnerability scanners and penetration testing?
What is a significant difference between vulnerability scanners and penetration testing?
a. One tests both the infrastructure and personnel.
b. One...
What is an asset?
What is an asset?
a. An item costing more than $10,000
b. Anything used in a work task
c. A threat to the security of an organization
d. An intangible...
What tool is used to lure or retain intruders in order to gather sufficient evidence without compromising the security of the private network?
What tool is used to lure or retain intruders in order to gather sufficient evidence without compromising the security of the private network?
a....
A security template can be used to perform all but which of the following tasks?
A security template can be used to perform all but which of the following tasks?
a. Capture the security configuration of a master system
b. Apply...
What type of virus is able to regenerate itself if a single element of its infection is not removed from a compromised system?
What type of virus is able to regenerate itself if a single element of its infection is not removed from a compromised system?
a. Polymorphic
b. Armored
c....
A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could be used to attempt to trace the identity of the users?
A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are....
If user awareness is overlooked, what attack is more likely to succeed?
If user awareness is overlooked, what attack is more likely to succeed?
a. Man-in-the-middle
b. Reverse hash matching
c. Physical intrusion
d. Social...
Which of the following is a denial-of-service attack that uses network packets that have been spoofed so that the source and destination address are that of the victim?
Which of the following is a denial-of-service attack that uses network packets that have been spoofed so that the source and destination address are...
A rootkit has been discovered on your mission-critical database server. What is the best step to take to return this system to production?
A rootkit has been discovered on your mission-critical database server. What is the best step to take to return this system to production?
a. Reconstitute...
What communications technique can a hacker use to identity the product that is running on an open port facing the Internet?
What communications technique can a hacker use to identity the product that is running on an open port facing the Internet?
a. Credentialed penetration...
Which of the following is a security control type that is not usually associated with or assigned to a security guard?
Which of the following is a security control type that is not usually associated with or assigned to a security guard?
a. Preventive
b. Detective
c....
You run a full backup every Monday. You also run a differential backup every other day of the week. You experience a drive failure on Friday. Which of the following restoration procedures should you use to restore data to the replacement drive?
You run a full backup every Monday. You also run a differential backup every other day of the week. You experience a drive failure on Friday. Which...
What is the proper humidity level or range for IT environments?
What is the proper humidity level or range for IT environments?
a. Below 40 percent
b. 40 percent to 60 percent
c. Above 60 percent
d. 20 percent...
An organization has a high-speed fiber Internet connection that it uses for most of its daily operations, as well as its offsite backup operations. This represents what security problem?
An organization has a high-speed fiber Internet connection that it uses for most of its daily operations, as well as its offsite backup operations....
What form of recovery site requires the least amount of downtime before mission-critical business operations can resume?
What form of recovery site requires the least amount of downtime before mission-critical business operations can resume?
a. Cold
b. Warm
c. Hot
d....
When is business continuity needed?
When is business continuity needed?
a. When new software is distributed
b. When business processes are interrupted
c. When a user steals company data
d....
When a user signs a(n) _____, it's a form of consent to the monitoring and auditing processes used by the organization.
When a user signs a(n) _____, it's a form of consent to the monitoring and auditing processes used by the organization.
a. Acceptable use policy
b....
Evidence is inadmissible in court if which of the following is violated or mismanaged?
Evidence is inadmissible in court if which of the following is violated or mismanaged?
a. Chain of custody
b. Service-level agreement
c. Privacy policy
d....
Which of the following is more formal than a handshake agreement but not a legal binding contract?
Which of the following is more formal than a handshake agreement but not a legal binding contract?
a. SLA
b. BIA
c. DLP
d. MOU
Answer: ...
Which of the following risk-assessment formulas represents the total potential loss a company may experience within a single year due to a specific risk to an asset?
Which of the following risk-assessment formulas represents the total potential loss a company may experience within a single year due to a specific...
What mechanism of wireless security is based on AES?
What mechanism of wireless security is based on AES?
a. TKIP
b. CCMP
c. LEAP
d. WEP
Answer: ...
What type of wireless antenna can be used to send or receive signals in any direction?
What type of wireless antenna can be used to send or receive signals in any direction?
a. Cantenna
b. Yagi
c. Rubber duck
d. Panel
Answer:...
A goal of NAC is which of the following?
A goal of NAC is which of the following?
a. Reduce social engineering threats
b. Map internal private addresses to external public addresses
c. Distribute...
Subscribe to:
Posts (Atom)