multi test h

The flashcards below were created by user johnnystevens on FreezingBlue Flashcards.

  1. 701 Which of the following BEST allows a technician to mitigate the chances of a successful attack against the wireless network?

    A. Implement a biometric system and WEP
    B. Implement an authentication system and WPA
    C. Implement an identification system and WPA2
    D. Implement an authentication system and WEP
    B. Implement an authentication system and WPA
    (this multiple choice question has been scrambled)
  2. 702 A technician is reviewing the system logs for a firewall and is told that there is an implicit deny within the ACL. Which of the following is an example of an implicit deny?

    A. Items which are not specifically given access are denied by default
    B. Each item is denied by default because of the implicit deny
    C. An implicit deny statement denies all traffic from one network to another
    D. An ACL is a way to secure traffic from one network to another
    A. Items which are not specifically given access are denied by default
    (this multiple choice question has been scrambled)
  3. 703 Which of the following is the MOST likely reason that an attacker would use a DoS attack?

    A. The attacker wants to prevent authorized users from using a certain service
    B. The attacker is attempting to distract the company from the real underlining attack
    C. The attacker is working with inside entities to test the company?s firewall
    D. The attacker is working with outside entities to test the company?s coding practices
    A. The attacker wants to prevent authorized users from using a certain service
    (this multiple choice question has been scrambled)
  4. 704 Which of the following is a way to gather reconnaissance information from a printer resource?

    A. HTTP
    B. SNMP
    C. SMTP
    D. RADIUS
    B. SNMP
    (this multiple choice question has been scrambled)
  5. 705 A technician gets informed that there is a worm loose on the network. Which of the following should the technician review to discover the internal source of the worm?

    A. Performance logs
    B. Antivirus logs
    C. Access logs
    D. Maintenance logs
    B. Antivirus logs
    (this multiple choice question has been scrambled)
  6. 706 Which of the following BEST allows for the encryption of an entire hard drive?

    A. Public key infrastructure
    B. Symmetric algorithm
    C. Asymmetric algorithm
    D. Hashing function
    B. Symmetric algorithm
    (this multiple choice question has been scrambled)
  7. 707 Which of the following would a Faraday cage prevent usage of?

    A. Storage drive
    B. Uninterruptible Power Supply (UPS)
    C. Cell phone
    D. USB key
    C. Cell phone
    (this multiple choice question has been scrambled)
  8. 708 Which of the following will allow a technician to block certain HTTP traffic from company staff members?

    A. VLAN
    B. DMZ
    C. Content filter
    D. NIDS
    C. Content filter
    (this multiple choice question has been scrambled)
  9. 709 Which of the following is a security threat to a workstation that requires interaction from a staff member?

    A. Botnet
    B. Virus
    C. Logic bomb
    D. Worm
    B. Virus
    (this multiple choice question has been scrambled)
  10. 710 Which of the following will prevent a person from booting into removal storage media if the correct boot sequence is already set?

    A. BIOS password settings
    B. BIOS boot options
    C. BIOS power on settings
    D. USB key settings
    A. BIOS password settings
    (this multiple choice question has been scrambled)
  11. 711 Which of the following ports need to be open to allow a user to login remotely onto a workstation?

    A. 53
    B. 8080
    C. 3389
    D. 636
    C. 3389
    (this multiple choice question has been scrambled)
  12. 712 Which of the following, if intercepted, could allow an attacker to access a user?s email information?

    A. SMTP traffic
    B. Browser cookies
    C. Cell traffic
    D. Cross-site scripting
    B. Browser cookies
    (this multiple choice question has been scrambled)
  13. 713 Which of the following would allow a technician to minimize the risk associated with staff running port scanners on the network?

    A. Vulnerability scanners
    B. Group policy
    C. Network mappers
    D. Password crackers
    B. Group policy
    (this multiple choice question has been scrambled)
  14. 714 Which of the following is the MOST effective application to implement to identify malicious traffic on a server?

    A. Enterprise software firewall
    B. Antivirus software
    C. Personal software firewall
    D. HIDS software
    D. HIDS software
    (this multiple choice question has been scrambled)
  15. 715 Which of the following is the MOST appropriate type of software to apply on a workstation that needs to be protected from other locally accessible workstations?

    A. Antivirus software
    B. Personal software firewall
    C. HIDS
    D. Pop-up blocker software
    B. Personal software firewall
    (this multiple choice question has been scrambled)
  16. 716 Which of the following is a way for a technician to identify security changes on a workstation?

    A. Security templates
    B. Group policy management
    C. Service pack application
    D. Configuration baseline
    D. Configuration baseline
    (this multiple choice question has been scrambled)
  17. 717 Which of the following is a way to correct a single security issue on a workstation?

    A. Patch management
    B. A patch
    C. A service pack
    D. Configuration baseline
    B. A patch
    (this multiple choice question has been scrambled)
  18. 718 Which of the following protects a home user from the Internet?

    A. Antivirus application
    B. Anti-malware software
    C. HIDS
    D. Personal firewall
    D. Personal firewall
    (this multiple choice question has been scrambled)
  19. 719 Computer equipment has been stolen from a company?s office. To prevent future thefts from occurring and to safeguard the company?s trade secrets which of the following should be implemented?

    A. Hardware locks and door access systems
    B. Multifactor authentication
    C. Video surveillance and access logs
    D. ID badges and passwords
    A. Hardware locks and door access systems
    (this multiple choice question has been scrambled)
  20. 720 Which of the following is the primary purpose for a physical access log in a data center?

    A. Maintain a list of personnel who enter the facility
    B. Allow authorized personnel access to the data center
    C. Prevent unauthorized personnel access to the data center
    D. Maintain a list of personnel who exit the facility
    A. Maintain a list of personnel who enter the facility
    (this multiple choice question has been scrambled)
  21. 721 Which of the following biometric authentication devices also carries significant privacy implications due to personal health information that can be discovered during the authentication process?

    A. Iris scanner
    B. Facial recognition
    C. Fingerprint scanner
    D. Retina scanner
    D. Retina scanner
    (this multiple choice question has been scrambled)
  22. 722 An administrator has already implemented two-factor authentication and now wishes to install a third authentication factor. If the existing authentication system uses strong passwords and PKI tokens which of the following would provide a third factor?

    A. Six digit PINs
    B. Pass phrases
    C. Fingerprint scanner
    D. Elliptic curve
    C. Fingerprint scanner
    (this multiple choice question has been scrambled)
  23. 723 A biometric authentication system consists of all of the following components EXCEPT:

    A. credential store
    B. hardware token
    C. reader
    D. supplicant
    B. hardware token
    (this multiple choice question has been scrambled)
  24. 724 Which of the following is an example of remote authentication?

    A. A user on a metropolitan area network (MAN) accesses a host by entering a username and password pair while not connected to the LAN
    B. A user on a campus area network (CAN) connects to a server in another building and enters a username and password pair
    C. A user in one city logs onto a network by connecting to a domain server in another city
    D. A user in one building logs on to the network by entering a username and password into a host in the same building
    C. A user in one city logs onto a network by connecting to a domain server in another city
    (this multiple choice question has been scrambled)
  25. 725 Which of the following is a three-factor authentication system?

    A. Password, passphrase, PIN and iris scanner
    B. Username, password, token and iris scanner
    C. Username, PIN and fingerprint reader
    D. PIN, palm recognition scanner and passphrase
    B. Username, password, token and iris scanner
    (this multiple choice question has been scrambled)
  26. 726 Which of the following is an acceptable group in which to place end users?

    A. Backup operators
    B. Root
    C. Domain users
    D. Administrators
    C. Domain users
    (this multiple choice question has been scrambled)
  27. 727 According to industry best practices, administrators should institute a mandatory rotation of duties policy due to which of the following?

    A. Continuity of operations in the event of a spam outbreak
    B. Continuity of operations in the event of a virus outbreak
    C. Continuity of operations in the event of future growth of the network
    D. Continuity of operations in the event of absence or accident
    D. Continuity of operations in the event of absence or accident
    (this multiple choice question has been scrambled)
  28. 728 According to industry best practices, administrators should institute a mandatory rotation of duties policy due to which of the following?

    A. To detect malware
    B. To detect an inside threat
    C. To detect outside attackers
    D. To detect viruses
    B. To detect an inside threat
    (this multiple choice question has been scrambled)
  29. 729 Which of the following is considered the strongest encryption by use of mathematical evaluation techniques?

    A. ROT13
    B. 3DES
    C. DES
    D. AES
    D. AES
    (this multiple choice question has been scrambled)
  30. 730 Which of the following should be implemented when protecting personally identifiable information (PII) and sensitive information on IT equipment that can be easily stolen (E. g. USB drive, laptops)?

    A. Sensitive file encryption
    B. Confidentiality
    C. Whole disk encryption
    D. Dual-sided certificates
    C. Whole disk encryption
    (this multiple choice question has been scrambled)
  31. 731 Which of the following is the BEST wireless security practice that could be implemented to prevent unauthorized access?

    A. WPA with MAC filtering
    B. WPA2 with TKIP
    C. WPA2 with a strong pass-phrase
    D. Disabling of the SSID broadcast
    B. WPA2 with TKIP
    (this multiple choice question has been scrambled)
  32. 732 Which of the following can prevent malicious software applications from being introduced while browsing the Internet?

    A. Pop-up blockers
    B. Input validation
    C. Anti-spyware scanners
    D. Strong authentication
    A. Pop-up blockers
    (this multiple choice question has been scrambled)
  33. 733 Which of the following are reasons to implement virtualization technology? (Select TWO)

    A. To reduce recovery time in the event of application failure
    B. To decrease false positives on the NIDS
    C. To eliminate virtual redundancy
    D. To decrease access to security resources
    E. To provide a secure virtual environment for testing
    • A. To reduce recovery time in the event of application failure
    • E. To provide a secure virtual environment for testing
  34. 734 Network security administrators should implement which of the following to ensure system abuse by administrators does not go undetected in the logs?

    A. Acceptable use policy
    B. Implicit deny
    C. Least privilege
    D. Separation of duties
    D. Separation of duties
    (this multiple choice question has been scrambled)
  35. 735 After completing a risk assessment and penetration test against a network, a security administrator recommends the network owner take actions to prevent future security incidents. Which of the following describes this type of action?

    A. Risk avoidance
    B. Risk transference
    C. Risk acceptance
    D. Risk mitigation
    D. Risk mitigation
    (this multiple choice question has been scrambled)
  36. 736 Public key infrastructure uses which of the following combinations of cryptographic items?

    A. Public keys, symmetric keys and ECC-based keys
    B. Private keys, public keys and asymmetric cryptography
    C. One time keys, WEP and symmetric cryptography
    D. Private keys, public keys and ECC-based keys
    B. Private keys, public keys and asymmetric cryptography
    (this multiple choice question has been scrambled)
  37. 737 An administrator wants to implement a procedure to control inbound and outbound traffic on a network segment. Which of the following would achieve this goal?

    A. HIDS
    B. NIDS
    C. Proxy
    D. ACL
    D. ACL
    (this multiple choice question has been scrambled)
  38. 738 In PKI, the CA is responsible for which of the following?

    A. Maintaining the CRL
    B. Maintaining the cipher block chain
    C. Maintaining the browsers PKI store
    D. Maintaining all private keys
    A. Maintaining the CRL
    (this multiple choice question has been scrambled)
  39. 739 In PKI, which of the following entities is responsible for publishing the CRL?

    A. Recovery agent
    B. ACL
    C. User
    D. CA
    D. CA
    (this multiple choice question has been scrambled)
  40. 740 Which of the following is a security risk associated with USB drives?

    A. Small storage capacity and low visibility
    B. Large storage capacity and high visibility
    C. Easy to conceal and large storage capacity
    D. Easy to conceal and detect
    C. Easy to conceal and large storage capacity
    (this multiple choice question has been scrambled)
  41. 741 Which of the following is a security risk associated with introducing cellular telephones with mobile OS installed on a closed network?

    A. New vector to introduce VoIP to the network
    B. War-driving DDoS attacks against the network
    C. New vector to introduce viruses and malware to the network
    D. War-dialing DoS attacks against the network
    C. New vector to introduce viruses and malware to the network
    (this multiple choice question has been scrambled)
  42. 742 The availability of portable external storage such as USB hard drives has increased which of the following threats to networks?

    A. Introduction of rogue wireless access points
    B. Introduction of material on to the network
    C. Removal of sensitive and PII data
    D. Increased loss business data
    C. Removal of sensitive and PII data
    (this multiple choice question has been scrambled)
  43. 743
    An administrator finds a device attached between the USB port on a host and the attached USB keyboard. The administrator has also noticed large documents being transmitted from the host to a host on an external network. The device is MOST likely which of the following?

    A. USB external hub
    B. In-line network analyzer
    C. External USB drive
    D. In-line keystroke logger
    D. In-line keystroke logger
    (this multiple choice question has been scrambled)
  44. 744 A user is receiving an error which they have not seen before when opening an application. Which of the following is MOST likely the cause of the problem?

    A. The HIDS baseline has been updated
    B. The NIDS baseline has been updated
    C. A signature update was completed on the NIPS
    D. A patch was pushed out
    D. A patch was pushed out
    (this multiple choice question has been scrambled)
  45. 745 Which of the following is used to encrypt email and create digital signatures?

    A. LDAP
    B. S/MIME
    C. RSA
    D. HTTPS
    B. S/MIME
    (this multiple choice question has been scrambled)
  46. 746 Which of the following can be used to encrypt FTP or telnet credentials over the wire?

    A. HTTPS
    B. S/MIME
    C. SSH
    D. SHTTP
    C. SSH
    (this multiple choice question has been scrambled)
  47. 747 Which of the following is a vulnerability assessment tool?

    A. John the Ripper
    B. AirSnort
    C. Cain & Abel
    D. Nessus
    D. Nessus
    (this multiple choice question has been scrambled)
  48. 748 Which of the following is a vulnerability scanner?

    A. Microsoft Baseline Security Analyzer
    B. Cain & Abel
    C. John the Ripper
    D. AirSnort
    A. Microsoft Baseline Security Analyzer
    (this multiple choice question has been scrambled)
  49. 749 Which of the following is a password cracking tool?

    A. AirSnort
    B. Wireshark
    C. Nessus
    D. John the Ripper
    D. John the Ripper
    (this multiple choice question has been scrambled)
  50. 750 Which of the following is a protocol analyzer?

    A. Cain & Abel
    B. John the Ripper
    C. Nessus
    D. WireShark
    D. WireShark
    (this multiple choice question has been scrambled)
  51. 751 Which of the following is a system setup to distract potential attackers?

    A. Honeypot
    B. Firewall
    C. DMZ
    D. VLAN
    A. Honeypot
    (this multiple choice question has been scrambled)
  52. 752 Changing roles every couple of months as a security mitigation technique is an example of which of the following?

    A. Least privilege
    B. Job rotation
    C. Mandatory vacations
    D. Separation of duties
    B. Job rotation
    (this multiple choice question has been scrambled)
  53. 753 Which of the following should be checked if an email server is forwarding emails for another domain?

    A. DNS zone transfers
    B. Cookies
    C. SMTP open relay
    D. ActiveX controls
    C. SMTP open relay
    (this multiple choice question has been scrambled)
  54. 754 Which of the following will allow the running of a system integrity verifier on only a single host?

    A. VLAN
    B. HIDS
    C. NIPS
    D. NIDS
    B. HIDS
    (this multiple choice question has been scrambled)
  55. 755 Which of the following has the ability to find a rootkit?

    A. Malware scanner
    B. Email scanner
    C. Adware scanner
    D. Anti-spam scanner
    A. Malware scanner
    (this multiple choice question has been scrambled)
  56. 756 Which of the following will be prevented by setting a BIOS password?

    A. Changing the system boot order
    B. Replacing a video card on a machine
    C. A machine becoming infected with a virus
    D. A machine becoming infected with a botnet
    A. Changing the system boot order
    (this multiple choice question has been scrambled)
  57. 757 Which of the following is a security limitation of virtualization technology?

    A. Patch management becomes more time consuming
    B. A compromise of one instance will immediately compromise all instances
    C. It increases false positives on the NIDS
    D. If an attack occurs, it could potentially disrupt multiple servers
    D. If an attack occurs, it could potentially disrupt multiple servers
    (this multiple choice question has been scrambled)
  58. 758 Which of the following must be used to setup a DMZ?

    A. NIDS
    B. Honeypot
    C. Router
    D. Proxy
    C. Router
    (this multiple choice question has been scrambled)
  59. 759 Which of the following would be used to push out additional security hotfixes?

    A. Configuration baseline
    B. Cookies
    C. Local security policy
    D. Patch management
    D. Patch management
    (this multiple choice question has been scrambled)
  60. 760 Which of the following would be used to allow a server to shut itself down normally upon a loss of power?

    A. Backup generator
    B. Redundant power supply
    C. Uninterruptible Power Supply (UPS)
    D. Redundant ISP
    C. Uninterruptible Power Supply (UPS)
    (this multiple choice question has been scrambled)
  61. 761 Which of the following is the BEST security measure to use when implementing access control?

    A. Time of day restrictions
    B. Password complexity requirements
    C. Changing default passwords
    D. Disabling SSID broadcast
    B. Password complexity requirements
    (this multiple choice question has been scrambled)
  62. 762 Applying a service pack could affect the baseline of which of the following?

    A. Signature-based NIPS
    B. Heuristic-based NIDS
    C. Honeynet
    D. Signature-based NIDS
    B. Heuristic-based NIDS
    (this multiple choice question has been scrambled)
  63. 763 Which of the following is the strongest encryption form that can be used in all countries?

    A. WEP
    B. TKIP
    C. WPA2
    D. WPA
    A. WEP
    (this multiple choice question has been scrambled)
  64. 764 When would it be appropriate to use time of day restrictions on an account?

    A. As an added security measure if employees work set schedules
    B. In order to ensure false positives are not received during baseline testing
    C. To ensure the DMZ is not overloaded during server maintenance
    D. To eliminate attack attempts of the network during peak hours
    A. As an added security measure if employees work set schedules
    (this multiple choice question has been scrambled)
  65. 765 Which of the following could be used to restore a private key in the event of a CA server crashing?

    A. Trust model verification
    B. Recovery agent
    C. CRL
    D. Key escrow
    B. Recovery agent
    (this multiple choice question has been scrambled)
  66. 766 Which of the following is a possible security risk associated with USB devices?

    A. Domain kiting
    B. Input validation
    C. Bluesnarfing
    D. Cross-site scripting
    C. Bluesnarfing
    (this multiple choice question has been scrambled)
  67. 767 Which of the following is MOST effective in preventing adware?

    A. Firewall
    B. HIDS
    C. Pop-up blocker
    D. Antivirus
    C. Pop-up blocker
    (this multiple choice question has been scrambled)
  68. 768 Which of the following is the MOST important when implementing heuristic-based NIPS?

    A. Perform comprehensive heuristic-based analysis on the system
    B. Enable automatic updates to the heuristic database
    C. Ensure the network is secure when baseline is established
    D. The brand of NIPS that is being used
    C. Ensure the network is secure when baseline is established
    (this multiple choice question has been scrambled)
  69. 769 Which of the following attacks enabling logging for DNS aids?

    A. Botnet attacks
    B. Virus infections
    C. SQL injection
    D. Local hosts file corruption
    A. Botnet attacks
    (this multiple choice question has been scrambled)
Author:
johnnystevens
ID:
10954
Card Set:
multi test h
Updated:
2010-03-17 17:02:14
Tags:
testing
Folders:

Description:
multiple choice upload test
Show Answers: