multi test c

Card Set Information

Author:
johnnystevens
ID:
10949
Filename:
multi test c
Updated:
2010-03-17 12:46:40
Tags:
testing
Folders:

Description:
multiple choice upload test
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user johnnystevens on FreezingBlue Flashcards. What would you like to do?


  1. 201 A user does not understand why the domain password policy is so stringent. Which of the following BEST demonstrates the security basis for the password policy?

    A. Explain how easy it is for a hacker to crack weak passwords
    B. Refer the user to a strong password demonstrator
    C. Ask the user to review the corporate policies and procedures manual
    D. Show the user a domain overview, including a list of weak passwords
    A. Explain how easy it is for a hacker to crack weak passwords
    (this multiple choice question has been scrambled)
  2. 202 A company needs to have multiple servers running low CPU utilization applications. Which of the following is the MOST cost efficient method for accomplishing this?

    A. Install multiple high end servers, sharing a clustered network operating system
    B. Install a single low end server, running multiple virtual servers
    C. Install a single high end server, running multiple virtual servers
    D. Install multiple low end servers, each running a network operating system
    C. Install a single high end server, running multiple virtual servers
    (this multiple choice question has been scrambled)
  3. 203 A programmer creates an application to accept data from a website. A user places more information than the program expects in the input field resulting in the back end database placing the extra information into the database. Which of the following is this an example of?

    A. SQL injection
    B. Buffer overflow
    C. Java input error
    D. Cross-site scripting
    A. SQL injection
    (this multiple choice question has been scrambled)
  4. 204 Which of the following security threats is MOST commonly associated with a targeted distributed denial of service (DDoS)?

    A. Viruses
    B. Worms
    C. Botnets
    D. Trojans
    C. Botnets
    (this multiple choice question has been scrambled)
  5. 205 A developer added code to a financial system designed to transfer money to a foreign bank account on a specific time and date. The code would activate only if human resources processed the developers termination papers. The developer implemented which of the following security threats?

    A. Botnet
    B. Logic bomb
    C. Rootkit
    D. Privilege escalation
    B. Logic bomb
    (this multiple choice question has been scrambled)
  6. 206 A CEO is concerned about staff browsing inappropriate material on the Internet via HTTPS. It has been suggested that the company purchase a product which could decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. Which of the following type of attacks is similar to this product?

    A. Spoofing
    B. Man-in-the-middle
    C. Replay
    D. TCP/IP hijacking
    B. Man-in-the-middle
    (this multiple choice question has been scrambled)
  7. 207 After a system risk assessment was performed it was found that the cost to mitigate the risk was higher than the expected loss if the risk was actualized. In this instance, which of the following is the BEST course of action?

    A. Reject the risk
    B. Accept the risk
    C. Mitigate the risk
    D. Run a new risk assessment
    B. Accept the risk
    (this multiple choice question has been scrambled)
  8. 208 A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If determining the risk, which of the following is the annual loss expectancy (ALE)?

    A. $7,290
    B. $5,000
    C. $2,700
    D. $4,500
    A. $7,290
    (this multiple choice question has been scrambled)
  9. 209 A technician is deciding between implementing a HIDS on the database server or implementing a NIDS. Which of the following are reasons why a NIDS may be better to implement? (Select TWO).

    A. Many HIDS require frequent patches and updates
    B. Many HIDS are not able to detect network attacks
    C. Many HIDS have a negative impact on system performance
    D. Many HIDS only offer a low level of detection granularity
    E. Many HIDS are not good at detecting attacks on database servers
    • B. Many HIDS are not able to detect network attacks
    • C. Many HIDS have a negative impact on system performance
  10. 210 Which of the following scenarios is MOST likely to benefit from using a personal software firewall on a laptop?

    A. Remote access user connecting via SSL VPN
    B. Remote access user connecting via corporate dial-in server
    C. Office laptop connected to a home user?s network
    D. Office laptop connected to the enterprise LAN
    C. Office laptop connected to a home user?s network
    (this multiple choice question has been scrambled)
  11. 211 Virtualized applications, such as virtualized browsers, are capable of protecting the underlying operating system from which of the following?

    A. Man-in-the-middle attacks
    B. DDoS attacks against the underlying OS
    C. Malware installation from suspects Internet sites
    D. Phishing and spam attacks
    C. Malware installation from suspects Internet sites
    (this multiple choice question has been scrambled)
  12. 212 A flat or simple role-based access control (RBAC) embodies which of the following principles?

    A. Roles applied to groups, users assigned to groups and users acquire permissions by being a member of the group
    B. Users assigned to roles, permissions are assigned to roles and users acquire permissions by being a member of the role
    C. Users assigned to roles, permissions are assigned to groups, controls applied to groups and permissions acquired by controls
    D. Users assigned permissions, roles assigned to groups and users acquire additional permissions by being a member of a group
    B. Users assigned to roles, permissions are assigned to roles and users acquire permissions by being a member of the role
    (this multiple choice question has been scrambled)
  13. 213 A number of unauthorized staff has been entering the data center by piggybacking authorized staff. The CIO has mandated that this behavior stops. Which of the following is the BEST technology to install at the data center to prevent piggybacking?

    A. Token access
    B. Mantrap
    C. Security badges
    D. Hardware locks
    B. Mantrap
    (this multiple choice question has been scrambled)
  14. 214 Which of the following is a security threat that hides its processes and files from being easily detected?

    A. Worm
    B. Rootkit
    C. Trojan
    D. Adware
    B. Rootkit
    (this multiple choice question has been scrambled)
  15. 215 Security templates are used for which of the following purposes? (Select TWO).

    A. To ensure that email is encrypted by users of PGP
    B. To ensure that PKI will work properly within the company?s trust model
    C. To ensure that performance is standardized across all servers
    D. To ensure that all servers start from a common security configuration
    E. To ensure that servers are in compliance with the corporate security policy
    • D. To ensure that all servers start from a common security configuration
    • E. To ensure that servers are in compliance with the corporate security policy
  16. 216 Frequent signature updates are required by which of the following security applications? (Select TWO).

    A. Antivirus
    B. PGP
    C. Firewall
    D. PKI
    E. IDS
    • A. Antivirus
    • E. IDS
  17. 217 When choosing an antivirus product, which of the following are the MOST important security considerations? (Select TWO).

    A. The frequency of signature updates
    B. The ability to scan encrypted files
    C. The availability of application programming interface
    D. The number of emails that can be scanned
    E. The number of viruses the software can detect
    • A. The frequency of signature updates
    • E. The number of viruses the software can detect
  18. 218 Three generally accepted activities of patch management are: determining which patches are needed, applying the patches and which of the following?

    A. Updating the firewall configuration to include the patches
    B. Running a NIDS report to list the remaining vulnerabilities
    C. Backing up the patch file executables to a network share
    D. Auditing for the successful application of the patches
    D. Auditing for the successful application of the patches
    (this multiple choice question has been scrambled)
  19. 219 In which of the following situations would it be appropriate to install a hotfix?

    A. A patch is available, but has not yet been tested in a production environment
    B. A patch in a service pack fixes the issue, but too many extra patches are included
    C. A patch is too large to be distributed via a remote deployment tool
    D. A patch is not available and workarounds do not correct the problem
    D. A patch is not available and workarounds do not correct the problem
    (this multiple choice question has been scrambled)
  20. 220 Social engineering, password cracking and vulnerability exploitation are examples of which of the following?

    A. Vulnerability assessment
    B. Fingerprinting
    C. Penetration testing
    D. Fuzzing
    C. Penetration testing
    (this multiple choice question has been scrambled)
  21. 221 If an administrator does not have a NIDS examining network traffic, which of the following could be used to identify an active attack?

    A. Penetration testing tool
    B. Protocol analyzer
    C. Vulnerability scanner
    D. Network mapper
    B. Protocol analyzer
    (this multiple choice question has been scrambled)
  22. 222 Configuration baselines should be taken at which of the following stages in the deployment of a new system?

    A. Before initial configuration
    B. After a user logs in
    C. After initial configuration
    D. Before loading the OS
    C. After initial configuration
    (this multiple choice question has been scrambled)
  23. 223 Which of the following practices should be implemented to harden workstations and servers?

    A. Install only needed software
    B. Report all security incidents
    C. Log on only as the administrator
    D. Check the logs regularly
    A. Install only needed software
    (this multiple choice question has been scrambled)
  24. 224 Which of the following is a mechanism that prevents electromagnetic emanations from being captured?

    A. Install a repeater
    B. Uninterruptible power supply (UPS)
    C. Faraday cage
    D. Disable SSID broadcast
    C. Faraday cage
    (this multiple choice question has been scrambled)
  25. 225 Which of the following describes the difference between a secure cipher and a secure hash?

    A. A cipher produces the same size output for any input size, a hash does not
    B. A hash produces a variable output for any input size, a cipher does not
    C. A cipher can be reversed, a hash cannot
    D. A hash can be reversed, a cipher cannot
    C. A cipher can be reversed, a hash cannot
    (this multiple choice question has been scrambled)
  26. 226 Which of the following physical threats is prevented with mantraps?

    A. Dumpster diving
    B. Shoulder surfing
    C. Social engineering
    D. Piggybacking
    D. Piggybacking
    (this multiple choice question has been scrambled)
  27. 227 Which of the following BEST describes the differences between SHA-1 and MD5?

    A. SHA-1 produces few collisions than MD5
    B. SHA-1 produces fixed length message digests
    C. MD5 produces few collisions than SHA-1
    D. MD5 produces variable length message digests
    A. SHA-1 produces few collisions than MD5
    (this multiple choice question has been scrambled)
  28. 228 Which of the following BEST applies in the secure disposal of computers?

    A. Computer media must be sanitized
    B. Default passwords must be changed once
    C. Computers must be configured for automated patch management
    D. Computers must be tested against known TCP/IP vulnerabilities
    A. Computer media must be sanitized
    (this multiple choice question has been scrambled)
  29. 229 Which of the following BEST describes the differences between RADIUS and TACACS?

    A. RADIUS is a remote access authentication service
    B. RADIUS separates authentication, authorization and auditing capabilities
    C. TACACS is a remote access authentication service
    D. TACACS separates authentication, authorization and auditing capabilities
    D. TACACS separates authentication, authorization and auditing capabilities
    (this multiple choice question has been scrambled)
  30. 230 Which of the following BEST describes the differences between RADIUS and TACACS?

    A. RADIUS is a remote access authentication service
    B. TACACS is a remote access authentication service
    C. TACACS encrypts client-server negotiation dialog
    D. RADIUS encrypts client-server negotiation dialog
    C. TACACS encrypts client-server negotiation dialog
    (this multiple choice question has been scrambled)
  31. 231 Which of the following authentication mechanisms performs better in a secure environment?

    A. RADIUS because it is a remote access authentication service
    B. TACACS because it is a remote access authentication service
    C. TACACS because it encrypts client-server negotiation dialogs
    D. RADIUS because it encrypts client-server passwords
    C. TACACS because it encrypts client-server negotiation dialogs
    (this multiple choice question has been scrambled)
  32. 232 To evaluate the security compliance of a group of servers against best practices, which of the following BEST applies?

    A. Conduct a penetration test
    B. Run a vulnerability assessment tool
    C. Get a patch management report
    D. Install a protocol analyzer
    B. Run a vulnerability assessment tool
    (this multiple choice question has been scrambled)
  33. 233 Which of the following is a problem MOST often associated with UTP cable?

    A. Fuzzing
    B. Refraction
    C. Vampire tap
    D. Crosstalk
    D. Crosstalk
    (this multiple choice question has been scrambled)
  34. 234 An administrator notices on the monthly firewall log that many of the internal PCs are sending packets on a routine basis to a single external PC. Which of the following BEST describes what is occurring?

    A. The remote PC has a zombie slave application running and the local PCs have a zombie master application running
    B. The remote PC has a spam slave application running and the local PCs have a spam master application running
    C. The remote PC has a spam master application running and the local PCs have a spam slave application running
    D. The remote PC has a zombie master application running and the local PCs have a zombie slave application running
    D. The remote PC has a zombie master application running and the local PCs have a zombie slave application running
    (this multiple choice question has been scrambled)
  35. 235 An administrator notices that a PC is sending an unusual amount of email at odd times of the day. Which of the following should the administrator check for FIRST?

    A. A S/MIME buffer overflow
    B. A SMTP open relay
    C. DNS poisoning
    D. A POP3 protocol exception
    B. A SMTP open relay
    (this multiple choice question has been scrambled)
  36. 236 Which of the following would a password cracker help an administrator to find?

    A. Locked passwords
    B. Backdoor passwords
    C. Expired passwords
    D. Weak passwords
    D. Weak passwords
    (this multiple choice question has been scrambled)
  37. 237 Which of the following is setup within a router?

    A. ARP
    B. DMZ
    C. DDoS
    D. OVAL
    B. DMZ
    (this multiple choice question has been scrambled)
  38. 238 Which of the following would BEST allow for fast, highly secure encryption of a USB flash drive?

    A. 3DES
    B. AES256
    C. SHA-1
    D. MD5
    B. AES256
    (this multiple choice question has been scrambled)
  39. 239 When is the correct time to discuss the appropriate use of electronic devices with a new employee?

    A. At time of first correspondence
    B. At time of first system login
    C. At time of departure
    D. At time of hire
    D. At time of hire
    (this multiple choice question has been scrambled)
  40. 240 Which of the following could BEST assist in the recovery of a crashed hard drive?

    A. Drive sanitization
    B. Damage and loss control
    C. Forensics software
    D. Drive optimization
    C. Forensics software
    (this multiple choice question has been scrambled)
  41. 241 Which of the following facilitates the creation of an unencrypted tunnel between two devices?

    A. AES
    B. PPTP
    C. L2TP
    D. HTTPS
    C. L2TP
    (this multiple choice question has been scrambled)
  42. 242 Which of the following allows for a secure connection to be made through a web browser?

    A. SSL
    B. SSH
    C. L2TP
    D. HTTP
    A. SSL
    (this multiple choice question has been scrambled)
  43. 243 Which of the following is the BEST order in which crucial equipment should draw power?

    A. Uninterruptible Power Supply (UPS) battery, UPS line conditioner, backup generator
    B. Backup generator, UPS battery, UPS line conditioner
    C. UPS line conditioner, UPS battery, and backup generator
    D. Backup generator, UPS line conditioner, UPS battery
    C. UPS line conditioner, UPS battery, and backup generator
    (this multiple choice question has been scrambled)
  44. 244 Which of the following would require a pre-sharing of information before a home user could attach to a neighbors wireless adapter?

    A. SSID broadcasting enabled
    B. Encryption disabled
    C. Anonymous connections enabled
    D. SSID broadcasting disabled
    D. SSID broadcasting disabled
    (this multiple choice question has been scrambled)
  45. 245 Which of the following would BEST allow an administrator to quickly find a rogue server on the network?

    A. A network mapper
    B. Review security access logs
    C. A protocol analyzer
    D. Review DNS logs
    A. A network mapper
    (this multiple choice question has been scrambled)
  46. 246 Which of the following would BEST allow an administrator to quickly find a PC with a blank database administrator password?

    A. Rainbow tables
    B. Protocol analyzer
    C. Vulnerability scanner
    D. Security access logs
    C. Vulnerability scanner
    (this multiple choice question has been scrambled)
  47. 247 An administrator is backing up all server data nightly to a local NAS device. Which of the following additional steps should the administrator take for protection from disaster in the case the primary site is permanently lost?

    A. Backup all data at a preset interval to tape and store those tapes at a sister site in another city
    B. Backup all data at a preset interval to tape and store those tapes at a sister site across the street
    C. Backup all data at a preset interval to removable disk and store the disk in a safety deposit box at the administrator?s home
    D. Backup all data at a preset interval to removable disk and store the disk in a fireproof safe in the buildings basement
    A. Backup all data at a preset interval to tape and store those tapes at a sister site in another city
    (this multiple choice question has been scrambled)
  48. 248 Which of the following is the MOST intrusive on a network?

    A. Port scanners
    B. Protocol analyzers
    C. Vulnerability testing
    D. Penetration testing
    D. Penetration testing
    (this multiple choice question has been scrambled)
  49. 249 A single sign-on requires which of the following?

    A. One-factor authentication
    B. A unified trust model
    C. A trust model between workstations
    D. Multifactor authentication
    B. A unified trust model
    (this multiple choice question has been scrambled)
  50. 250 All of the following are where backup tapes should be kept EXCEPT:

    A. near a power line
    B. near a shared LCD screen
    C. near a fiber optic cable entrance
    D. near a high end server
    A. near a power line
    (this multiple choice question has been scrambled)
  51. 251 All of the following require periodic updates to stay accurate EXCEPT:

    A. rootkit detection applications
    B. signature based HIDS
    C. pop-up blocker applications
    D. antivirus applications
    C. pop-up blocker applications
    (this multiple choice question has been scrambled)
  52. 252 Which of the following is the quickest method to create a secure test server for a programmer?

    A. Install a network operating system on new equipment
    B. Install a network operating system on existing equipment
    C. Create a virtual server on existing equipment
    D. Create a virtual server on new equipment
    C. Create a virtual server on existing equipment
    (this multiple choice question has been scrambled)
  53. 253 Which of the following is a collection of fixes for an application or operating system that has been tested by the vendor?

    A. A hotfix
    B. A patch
    C. A service pack
    D. A security template
    C. A service pack
    (this multiple choice question has been scrambled)
  54. 254 Which of the following usually applies specifically to a web browser?

    A. Personal software firewall
    B. Antivirus
    C. Pop-up blocker
    D. Anti-spyware
    C. Pop-up blocker
    (this multiple choice question has been scrambled)
  55. 255 Pre-shared keys apply to which of the following?

    A. CA
    B. Digital signature
    C. PGP
    D. TPM
    C. PGP
    (this multiple choice question has been scrambled)
  56. 256 Which of the following is a risk associated with a virtual server?

    A. If the physical server crashes, all of the physical servers nearby go offline immediately
    B. If a virtual server crashes, all of the physical servers go offline immediately
    C. If the physical server crashes, all of the local virtual servers go offline immediately
    D. If a virtual server crashes, all of the virtual servers go offline immediately
    C. If the physical server crashes, all of the local virtual servers go offline immediately
    (this multiple choice question has been scrambled)
  57. 257 Which of the following exploits is only triggered by a specific date or time key?

    A. Trojan
    B. Worm
    C. Botnet
    D. Logic bomb
    D. Logic bomb
    (this multiple choice question has been scrambled)
  58. 258 Threats to a network could include: (Select TWO)

    A. penetration testing
    B. network audits
    C. disgruntled employees
    D. dial-up access
    E. disabled user accounts
    • C. disgruntled employees
    • D. dial-up access
  59. 259 An antivirus server keeps flagging an approved application that the marketing department has installed on their local computers as a threat. This is an example of:

    A. true negative
    B. false negative
    C. false positive
    D. true positive
    C. false positive
    (this multiple choice question has been scrambled)
  60. 260 A vendor releases an application update to a recent service pack that addresses problems being experienced by some end users. This update would be considered a:

    A. hotfix
    B. service pack rollup
    C. patch
    D. service pack
    A. hotfix
    (this multiple choice question has been scrambled)
  61. 261 A technician is working on an end users desktop which has been having performance issues. The technician notices there seems to be a lot of activity on the NIC. A good tool to quickly check the current network connections of the desktop would be:

    A. netstat
    B. ipconfig /all
    C. netops
    D. lanman
    A. netstat
    (this multiple choice question has been scrambled)
  62. 262 A company has an issue with field users logging into VPN to connect to the mail server, and leaving their computers connected while in public places. The administrator needs to prevent both unauthorized access to the company email and data, and limit the impact on the VPN server. Which of the following BEST achieves this goal?

    A. Use group policy to lock computers after five minutes of inactivity, and limit VPN connections to one hour
    B. Set VPN to disconnect after five minutes of inactivity
    C. Provide web mail access to all users
    D. Use registry settings to lock computers after five minutes of inactivity, and limit VPN connections to two hours
    A. Use group policy to lock computers after five minutes of inactivity, and limit VPN connections to one hour
    (this multiple choice question has been scrambled)
  63. 263 The service provided by message authentication code (MAC) hash is:

    A. data recovery
    B. integrity
    C. fault tolerance
    D. key recovery
    B. integrity
    (this multiple choice question has been scrambled)
  64. 264 An administrator is running a network monitoring application that looks for behaviors on the network outside the standard baseline that has been established. This is typical of a(n):

    A. protocol analyzer
    B. signature-based tool
    C. honeynet
    D. anomaly-based tool
    D. anomaly-based tool
    (this multiple choice question has been scrambled)
  65. 265 Some examples of hardening techniques include all of the following EXCEPT:

    A. network-based patch management
    B. disabling all non-required services
    C. applying security templates
    D. running weekly spyware applications
    D. running weekly spyware applications
    (this multiple choice question has been scrambled)
  66. 266 An administrator wants to block users from accessing a few inappropriate websites as soon as possible. The existing firewall allows blocking by IP address. To achieve this goal the administrator will need to:

    A. upgrade to a URL based filter to achieve the desired result
    B. upgrade to a DNS based filter to achieve the desired result
    C. use the company AUP to achieve the desired result
    D. upgrade to a text based filter to achieve the desired result
    A. upgrade to a URL based filter to achieve the desired result
    (this multiple choice question has been scrambled)
  67. 267 A CRL contains a list of which of the following type of keys?

    A. Both public and private keys
    B. Steganographic keys
    C. Public keys
    D. Private keys
    A. Both public and private keys
    (this multiple choice question has been scrambled)
  68. 268 A user logs into their network with a smart card. Which of the following keys is used?

    A. Public key
    B. Private key
    C. Shared key
    D. Cipher key
    B. Private key
    (this multiple choice question has been scrambled)
  69. 269 An administrator wants to ensure that when an employee leaves the company permanently, that the company will have access to their private keys. Which of the following will accomplish this?

    A. Immediately delete the account
    B. Store them in a CRL
    C. Obtain the employees hardware token
    D. Store the keys in escrow
    D. Store the keys in escrow
    (this multiple choice question has been scrambled)
  70. 270 When a server and workstation communicate via SSL, which of the following keys are being used? (Select TWO)

    A. Public key
    B. Cipher key
    C. Session key
    D. Recovery key
    E. Keylogger
    • A. Public key
    • C. Session key
  71. 271 A user is going to dispose of some old hard drives. Which of the following should the user do to the drives before disposing of them?

    A. Use a certified wipe program to erase data
    B. Run anti-spyware on the drives
    C. Reformat the hard drives once
    D. Install antivirus on the drives
    A. Use a certified wipe program to erase data
    (this multiple choice question has been scrambled)
  72. 272 A user wants to implement very tight security controls for technicians that seek to enter the user?s datacenter. Which of the following solutions offers the BEST security controls?

    A. Combination locks and key locks
    B. Smartcard and proximity readers
    C. Magnetic lock and pin
    D. Biometric reader and smartcard
    D. Biometric reader and smartcard
    (this multiple choice question has been scrambled)
  73. 273 Which of the following concepts, requires users and system processes to be assigned minimum levels of permission to carry out the assigned task?

    A. Need-to-know
    B. Job role
    C. Least privilege
    D. User authentication
    C. Least privilege
    (this multiple choice question has been scrambled)
  74. 274 When using discretionary access control (DAC), who determines access and what privileges they have?

    A. System
    B. User
    C. Help desk
    D. Owner
    D. Owner
    (this multiple choice question has been scrambled)
  75. 275 Which of the following is a security benefit of mandatory vacations?

    A. Reducing stress
    B. Least privilege
    C. Detecting fraud
    D. Separation of duties
    C. Detecting fraud
    (this multiple choice question has been scrambled)
  76. 276 The data custodian in an organization is responsible for:

    A. classification of the data
    B. completeness of the data
    C. accuracy of the data
    D. recoverability of the data
    D. recoverability of the data
    (this multiple choice question has been scrambled)
  77. 277 Which of the following organizational documentation describes how tasks or job functions should be conducted?

    A. Policy
    B. Guideline
    C. Standards
    D. Procedures
    D. Procedures
    (this multiple choice question has been scrambled)
  78. 278 Which of the following organizational documentation provides high level objectives that change infrequently?

    A. Policy
    B. Standards
    C. Procedures
    D. Guideline
    A. Policy
    (this multiple choice question has been scrambled)
  79. 279 Which of the following sites can be online the QUICKEST and does not require data restoration from backup media to ensure the production data is as current as possible?

    A. Hot site
    B. Warm site
    C. Mobile site
    D. Mirrored site
    D. Mirrored site
    (this multiple choice question has been scrambled)
  80. 280 Which of the following are MOST likely to be analyzed by Internet filter appliances/servers? (Select THREE).

    A. Certificates
    B. Keys
    C. TLSs
    D. URLs
    E. Content
    F. CRLs
    • A. Certificates
    • D. URLs
    • E. Content
  81. 281 The primary function of risk management in an organization is to reduce risk to a level:

    A. where the ARO equals the SLE
    B. where the ALE is lower than the SLE
    C. the organization will accept
    D. the organization will mitigate
    C. the organization will accept
    (this multiple choice question has been scrambled)
  82. 282 Which of the following BEST describes risk analysis?

    A. Monitoring and acceptance
    B. Mitigation and repudiation
    C. Evaluation and assessment
    D. Assessment and eradication
    C. Evaluation and assessment
    (this multiple choice question has been scrambled)
  83. 283 A financial institution performed a risk assessment on the DLT backup system used to store customer account details. The main risk highlighted was the long-term retention of electronically stored data. Which of the following is the MOST likely reason for the risk being raised?

    A. Application systems and technical staff
    B. Retention of data on the media
    C. Compatibility and retention of data on the media
    D. Compatibility of media and application systems
    D. Compatibility of media and application systems
    (this multiple choice question has been scrambled)
  84. 284 Which of the following hashing techniques is commonly disabled to make password cracking more difficult?

    A. Kerberos
    B. NTLM
    C. AES
    D. OVAL
    B. NTLM
    (this multiple choice question has been scrambled)
  85. 285 An organization has recently implemented a work from home program. Employees need to connect securely from home to the corporate network. Which of the following encryption technologies might BEST accomplish this?

    A. IPSec
    B. PPPoE
    C. L2TP
    D. PPTP
    A. IPSec
    (this multiple choice question has been scrambled)
  86. 286 The use of a physical token, PIN and a password during authentication is an example of which of the following?

    A. Kerberos authentication
    B. Three-factor authentication
    C. Two-factor authentication
    D. EAP authentication
    C. Two-factor authentication
    (this multiple choice question has been scrambled)
  87. 287 Port 3535 is typically blocked for outbound traffic on a company?s LAN. An end-user has recently purchased a legitimate business program that needs to make outbound calls using this port. Which of the following steps should a technician take to allow this? (Select TWO)

    A. Open the port on the company?s proxy server
    B. Open the port on the company?s firewall
    C. Change the user?s subnet mask
    D. Open the port on the user?s personal software firewall
    E. Open the port on the VLAN
    • B. Open the port on the company?s firewall
    • D. Open the port on the user?s personal software firewall
  88. 288 Which of the following describes software that is often written solely for a specific customer?s application?

    A. Hotfix
    B. Service pack
    C. Patch
    D. Rootkit
    A. Hotfix
    (this multiple choice question has been scrambled)
  89. 289 A security manager believes that too many services are running on a mission critical database server. Which of the following tools might a security analyst use to determine services that are running on the server, without logging into the machine?

    A. NIDS
    B. Port scanner
    C. OVAL
    D. Protocol analyzer
    B. Port scanner
    (this multiple choice question has been scrambled)
  90. 290 A manufacturing corporation has decided to send a highly sensitive message to one of their suppliers. The message is concealed inside a JPEG image of a beach resort. Which of the following is this an example of?

    A. Steganography
    B. Cryptography
    C. Hashing
    D. Digital signature
    A. Steganography
    (this multiple choice question has been scrambled)
  91. 291 Which of the following encryption methods is often used along with L2TP?

    A. IPSec
    B. SSH
    C. S/MIME
    D. 3DES
    A. IPSec
    (this multiple choice question has been scrambled)
  92. 292 An administrator is assigned to monitor servers in a data center. A web server connected to the Internet suddenly experiences a large spike in CPU activity. Which of the following is the MOST likely cause?

    A. DoS
    B. Trojan
    C. Privilege escalation
    D. Spyware
    A. DoS
    (this multiple choice question has been scrambled)
  93. 293 Which of the following methods will help to identify when unauthorized access has occurred?

    A. Implement two-factor authentication
    B. Implement session termination mechanism
    C. Implement session lock mechanism
    D. Implement previous logon notification
    D. Implement previous logon notification
    (this multiple choice question has been scrambled)
  94. 294 Ensuring administrators have both a regular user account and a privileged user account is an example of applying which security principle?

    A. Need-to-know
    B. Least privilege
    C. Mandatory Access Control (MAC)
    D. Discretionary Access Control (DAC)
    B. Least privilege
    (this multiple choice question has been scrambled)
  95. 295 All of the following are steps in the incident response process EXCEPT:

    A. containment
    B. recovery
    C. repudiation
    D. eradication
    C. repudiation
    (this multiple choice question has been scrambled)
  96. 296 Which of the following is an example of two-factor authentication for an information system?

    A. Photo ID and PIN
    B. ATM card and PIN
    C. Username and password
    D. Retina and fingerprint scanner
    B. ATM card and PIN
    (this multiple choice question has been scrambled)
  97. 297 Which of the following describes a spanned switch port in the context of IDS traffic analysis?

    A. An association of a set of source ports with a single destination port
    B. An association of a set of destination ports with an IDS sensor
    C. An association of a set of source ports with multiple destination ports and an IDS sensor
    D. An association of a set of destination ports with a single source port
    A. An association of a set of source ports with a single destination port
    (this multiple choice question has been scrambled)
  98. 298 A technician is performing an assessment on a router and discovers packet filtering is employed. Which of the following describes a security concern with stateless packet filtering?

    A. State connections are retained by the router
    B. Loose routing cannot determine the exact path a packet must follow
    C. Router performance is reduced
    D. Packet payload is not checked
    D. Packet payload is not checked
    (this multiple choice question has been scrambled)
  99. 299 Which of the following describes the process of comparing cryptographic hash functions of system executables, configuration files, and log files?

    A. Host based intrusion detection
    B. Network based intrusion detection
    C. File integrity auditing
    D. Stateful packet filtering
    C. File integrity auditing
    (this multiple choice question has been scrambled)
  100. 300 Which of the following is a cryptographic representation of non-repudiation?

    A. Certificate authority
    B. Internet key exchange
    C. Digital signature
    D. Symmetric key
    C. Digital signature
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview