Sec+A

Card Set Information

Author:
raschwe
ID:
267864
Filename:
Sec+A
Updated:
2014-03-25 14:48:43
Tags:
140331
Folders:

Description:
Review A
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user raschwe on FreezingBlue Flashcards. What would you like to do?


  1. Which of the following is the BEST approach to perform risk mitigation of user access control rights?

    A. Conduct surveys and rank the results.
    B. Implement periodic vulnerability scanning.
    C. Disable user accounts that have not been used within the last two weeks.
    D. Perform routine user permission reviews.
    D. Perform routine user permission reviews.
    (this multiple choice question has been scrambled)
  2. Which of the following devices is BEST suited for servers that need to store private keys?

    A. Hardware security module
    B. Hardened network firewall
    C. Solid state disk drive
    D. Hardened host firewall
    A. Hardware security module
    (this multiple choice question has been scrambled)
  3. All of the following are valid cryptographic hash functions EXCEPT:

    A. MD4.
    B. SHA-512.
    C. RIPEMD.
    D. RC4.
    D. RC4.
    (this multiple choice question has been scrambled)
  4. In regards to secure coding practices, why is input validation important?

    A. It mitigates buffer overflow attacks.
    B. It makes the code more readable.
    C. It provides an application configuration baseline.
    D. It meets gray box testing standards.
    A. It mitigates buffer overflow attacks.
    (this multiple choice question has been scrambled)
  5. Which of the following would be used when a higher level of security is desired for encryption key storage?

    A. LDAP
    B. TACACS+
    C. L2TP
    D. TPM
    D. TPM
    (this multiple choice question has been scrambled)
  6. A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?

    A. Application
    B. Security
    C. Firewall
    D. IDS
    B. Security
    (this multiple choice question has been scrambled)
  7. QUESTION 7Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?

    A. CRL
    B. Registration
    C. CA
    D. Recovery agent
    A. CRL
    (this multiple choice question has been scrambled)
  8. QUESTION 8Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?

    A. Mandatory access control
    B. Discretionary access control
    C. Smartcard
    D. Token
    C. Smartcard
    (this multiple choice question has been scrambled)
  9. Which of the following devices would MOST likely have a DMZ interface?

    A. Switch
    B. Firewall
    C. Proxy
    D. Load balancer
    B. Firewall
    (this multiple choice question has been scrambled)
  10. Which of the following application security testing techniques is implemented when an automated system generates random input data?

    A. Fuzzing
    B. Hardening
    C. XSRF
    D. Input validation
    A. Fuzzing
    (this multiple choice question has been scrambled)
  11. Which of the following can be used by a security administrator to successfully recover a user's forgottenpassword on a password protected file?

    A. Social engineering
    B. Password sniffing
    C. Cognitive password
    D. Brute force
    D. Brute force
    (this multiple choice question has been scrambled)
  12. A security administrator wants to check user password complexity. Which of the following is the BEST tool touse?

    A. Password logging
    B. Password history
    C. Password cracker
    D. Password hashing
    C. Password cracker
    (this multiple choice question has been scrambled)
  13. Certificates are used for: (Select TWO).

    A. Client authentication.
    B. WEP encryption.
    C. Access control lists.
    D. Code signing.
    E. Password hashing.
    • A. Client authentication.
    • E. Password hashing.
  14. Which of the following is a hardware based encryption device?

    A. TPM
    B. SLE
    C. EFS
    D. TrueCrypt
    A. TPM
    (this multiple choice question has been scrambled)
  15. Which of the following BEST describes a protective countermeasure for SQL injection?

    A. Eliminating cross-site scripting vulnerabilities
    B. Placing a firewall between the Internet and database servers
    C. Validating user input in web applications
    D. Installing an IDS to monitor network traffic
    C. Validating user input in web applications
    (this multiple choice question has been scrambled)
  16. Which of the following MOST interferes with network-based detection techniques?

    A. SSL
    B. Mime-encoding
    C. FTP
    D. Anonymous email accounts
    A. SSL
    (this multiple choice question has been scrambled)
  17. A certificate authority takes which of the following actions in PKI?

    A. Issues and signs all private keys
    B. Signs and verifies all infrastructure messages
    C. Issues and signs all root certificates
    D. Publishes key escrow lists to CRLs
    C. Issues and signs all root certificates
    (this multiple choice question has been scrambled)
  18. Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?

    A. Distributed dictionary attacks
    B. Shoulder surfing
    C. Brute force certificate cracking
    D. Malicious code on the local system
    D. Malicious code on the local system
    (this multiple choice question has been scrambled)
  19. Separation of duties is often implemented between developers and administrators in order to separate which of the following?

    A. More experienced employees from less experienced employees
    B. Changes to program code and the ability to deploy to production
    C. The network access layer from the application access layer
    D. Upper level management users from standard development employees
    B. Changes to program code and the ability to deploy to production
    (this multiple choice question has been scrambled)
  20. A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?

    A. The request needs to be approved through the change management process.
    B. The request needs to be sent to the incident management team.
    C. The request needs to be sent to the change management team.
    D. The request needs to be approved through the incident management process.
    A. The request needs to be approved through the change management process.
    (this multiple choice question has been scrambled)
  21. Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?

    A. Phishing
    B. Tailgating
    C. Pharming
    D. Vishing
    D. Vishing
    (this multiple choice question has been scrambled)
  22. A user in the company is in charge of various financial roles but needs to prepare for an upcoming audit. They use the same account to access each financial system. Which of the following security controls will MOST likely be implemented within the company?

    A. Account password enforcement
    B. Account lockout policy
    C. Separation of duties
    D. Password complexity enabled
    C. Separation of duties
    (this multiple choice question has been scrambled)
  23. A CRL is comprised of:

    A. Malicious IP addresses.
    B. Untrusted private keys.
    C. Public keys.
    D. Trusted CA's.
    C. Public keys.
    (this multiple choice question has been scrambled)
  24. Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

    A. Worm
    B. Adware
    C. Logic bomb
    D. Trojan
    D. Trojan
    (this multiple choice question has been scrambled)
  25. Which of the following may significantly reduce data loss if multiple drives fail at the same time?

    A. Virtualization
    B. RAID
    C. Load balancing
    D. Server clustering
    B. RAID
    (this multiple choice question has been scrambled)
  26. Which of the following should be considered to mitigate data theft when using CAT5 wiring?

    A. Environmental monitoring
    B. CCTV
    C. Multimode fiber
    D. EMI shielding
    D. EMI shielding
    (this multiple choice question has been scrambled)
  27. To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?

    A. Technical
    B. Operational
    C. Administrative
    D. Management
    A. Technical
    (this multiple choice question has been scrambled)
  28. Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?

    A. Create a voice VLAN.
    B. Set the switch ports to 802.1q mode.
    C. Create a DMZ.
    D. Connect the WAP to a different switch.
    A. Create a voice VLAN.
    (this multiple choice question has been scrambled)
  29. Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).

    A. 10.4.4.125
    B. 10.4.4.158
    C. 10.4.4.165
    D. 10.4.4.189
    E. 10.4.4.199
    • C. 10.4.4.165
    • D. 10.4.4.189
  30. Which of the following algorithms has well documented collisions? (Select TWO).

    A. AES
    B. MD5
    C. SHA
    D. SHA-256
    E. RSA
    • B. MD5
    • C. SHA
  31. Which of the following is BEST used as a secure replacement for TELNET?

    A. GPG
    B. SSH
    C. HMAC
    D. HTTPS
    B. SSH
    (this multiple choice question has been scrambled)
  32. An email client says a digital signature is invalid and the sender cannot be verified. The recipient is concerned with which of the following concepts?

    A. Availability
    B. Remediation
    C. Integrity
    D. Confidentiality
    C. Integrity
    (this multiple choice question has been scrambled)
  33. Which of the following is an effective way to ensure the BEST temperature for all equipment within a datacenter?

    A. Hot or cool aisle containment
    B. Raised floor implementation
    C. Fire suppression
    D. EMI shielding
    A. Hot or cool aisle containment
    (this multiple choice question has been scrambled)
  34. Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?

    A. RSA
    B. SSLv2
    C. SSHv1
    D. TLS
    D. TLS
    (this multiple choice question has been scrambled)
  35. Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk?

    A. Incident management
    B. Clean desk policy
    C. Change management
    D. Routine audits
    C. Change management
    (this multiple choice question has been scrambled)
  36. Which of the following is a difference between TFTP and FTP?

    A. TFTP utilizes TCP and FTP uses UDP.
    B. TFTP is more secure than FTP.
    C. TFTP utilizes UDP and FTP uses TCP.
    D. TFTP is slower than FTP.
    C. TFTP utilizes UDP and FTP uses TCP.
    (this multiple choice question has been scrambled)
  37. Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?

    A. Web application firewall
    B. Load balancer
    C. Protocol analyzer
    D. Spam filter
    C. Protocol analyzer
    (this multiple choice question has been scrambled)
  38. Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?

    A. Privilege escalation
    B. Whaling
    C. Spear phishing
    D. Impersonation
    B. Whaling
    (this multiple choice question has been scrambled)
  39. Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?

    A. Design reviews
    B. Vulnerability scan
    C. Baseline reporting
    D. Code review
    B. Vulnerability scan
    (this multiple choice question has been scrambled)
  40. Which of the following is an example of a false positive?

    A. A biometric iris scanner rejects an authorized user wearing a new contact lens.
    B. A user account is locked out after the user mistypes the password too many times.
    C. Anti-virus identifies a benign application as malware.
    D. The IDS does not identify a buffer overflow.
    C. Anti-virus identifies a benign application as malware.
    (this multiple choice question has been scrambled)
  41. Data execution prevention is a feature in most operating systems intended to protect against which type of attack?

    A. Header manipulation
    B. Buffer overflow
    C. Cross-site scripting
    D. SQL injection
    B. Buffer overflow
    (this multiple choice question has been scrambled)
  42. Use of group accounts should be minimized to ensure which of the following?

    A. Password security
    B. Individual accountability
    C. Baseline management
    D. Regular auditing
    B. Individual accountability
    (this multiple choice question has been scrambled)
  43. Privilege creep among long-term employees can be mitigated by which of the following procedures?

    A. Separation of duties
    B. Mandatory vacations
    C. Job function rotation
    D. User permission reviews
    D. User permission reviews
    (this multiple choice question has been scrambled)
  44. In which of the following scenarios is PKI LEAST hardened?

    A. All public keys are accessed by an unauthorized user.
    B. The recorded time offsets are developed with symmetric keys.
    C. The CRL is posted to a publicly accessible location.
    D. A malicious CA certificate is loaded on all the clients.
    D. A malicious CA certificate is loaded on all the clients.
    (this multiple choice question has been scrambled)
  45. Configuring the mode, encryption methods, and security associations are part of which of the following?

    A. IPSec
    B. 802.1x
    C. Full disk encryption
    D. PKI
    A. IPSec
    (this multiple choice question has been scrambled)
  46. Which of the following assessments would Pete, the security administrator, use to actively test that an application's security controls are in place?

    A. Vulnerability scan
    B. Penetration test
    C. Protocol analyzer
    D. Code review
    B. Penetration test
    (this multiple choice question has been scrambled)
  47. A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?

    A. Confidentiality
    B. Integrity
    C. Succession planning
    D. Availability
    D. Availability
    (this multiple choice question has been scrambled)
  48. In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager. Which of the following incident response procedures would he need to perform in order to begin the analysis? (Select TWO).

    A. Take hashes
    B. Begin the chain of custody paperwork
    C. Take screen shots
    D. Capture the system image
    E. Decompile suspicious files
    • A. Take hashes
    • D. Capture the system image
  49. Which of the following is used to certify intermediate authorities in a large PKI deployment?

    A. Recovery agent
    B. Key escrow
    C. Root user
    D. Root CA
    D. Root CA
    (this multiple choice question has been scrambled)
  50. Which of the following components MUST be trusted by all parties in PKI?

    A. Private key
    B. CA
    C. Key escrow
    D. Recovery key
    B. CA
    (this multiple choice question has been scrambled)
  51. Which of the following should Matt, a security administrator, include when encrypting smartphones? (SelectTWO).

    A. Steganography images
    B. Internal memory
    C. Master boot records
    D. Removable memory cards
    E. Public keys
    • B. Internal memory
    • C. Master boot records
  52. Which of the following is the below pseudo-code an example of?

    IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT

    A. Buffer overflow prevention
    B. Input validation
    C. CSRF prevention
    D. Cross-site scripting prevention
    B. Input validation
    (this multiple choice question has been scrambled)
  53. A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?

    A. TACACS+
    B. LDAP
    C. Kerberos
    D. RADIUS
    A. TACACS+
    (this multiple choice question has been scrambled)
  54. Which of the following can use RC4 for encryption? (Select TWO).

    A. CHAP
    B. SSL
    C. WEP
    D. AES
    E. 3DES
    • B. SSL
    • C. WEP
  55. Which of the following defines a business goal for system restoration and acceptable data loss?

    A. RPO
    B. Warm site
    C. MTBF
    D. MTTR
    A. RPO
    (this multiple choice question has been scrambled)
  56. If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trustsOrganization C. Which of the following PKI concepts is this describing?

    A. Public key trust
    B. Domain level trust
    C. Certificate authority trust
    D. Transitive trust
    D. Transitive trust
    (this multiple choice question has been scrambled)
  57. Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?

    A. Business impact analysis
    B. Continuity of operations
    C. Business continuity planning
    D. Succession planning
    D. Succession planning
    (this multiple choice question has been scrambled)
  58. Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?

    A. Trust model
    B. Certificate authority
    C. Key escrow
    D. Recovery agent
    D. Recovery agent
    (this multiple choice question has been scrambled)
  59. Placeholder
    Placeholder
  60. Which of the following is the MOST secure protocol to transfer files?

    A. TELNET
    B. FTP
    C. SSH
    D. FTPS
    D. FTPS
    (this multiple choice question has been scrambled)
  61. Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms?

    A. Signature based IDS
    B. Signature based IPS
    C. Application based IPS
    D. Anomaly based IDS
    D. Anomaly based IDS
    (this multiple choice question has been scrambled)
  62. A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?

    A. Session output pipe to /dev/null
    B. Command shell restrictions
    C. Restricted interface
    D. Warning banners
    D. Warning banners
    (this multiple choice question has been scrambled)
  63. Which of the following protocols is used to authenticate the client and server's digital certificate?

    A. PEAP
    B. ICMP
    C. TLS
    D. DNS
    C. TLS
    (this multiple choice question has been scrambled)
  64. Which of the following can be used to mitigate risk if a mobile device is lost?

    A. Cable lock
    B. Strong passwords
    C. Transport encryption
    D. Voice encryption
    B. Strong passwords
    (this multiple choice question has been scrambled)
  65. Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of dataloss?

    A. Clean desk policy
    B. Cloud computing
    C. Record time offset
    D. Routine log review
    A. Clean desk policy
    (this multiple choice question has been scrambled)
  66. Which of the following is an example of multifactor authentication?

    A. Username and password
    B. Password and PIN
    C. Fingerprint and retina scan
    D. Credit card and PIN
    D. Credit card and PIN
    (this multiple choice question has been scrambled)
  67. After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:

    `Please only use letters and numbers on these fields'

    Which of the following is this an example of?

    A. Improper input validation
    B. Proper error handling
    C. Proper input validation
    D. Improper error handling
    C. Proper input validation
    (this multiple choice question has been scrambled)
  68. Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE).

    A. Spam filter
    B. Load balancer
    C. Antivirus
    D. Proxies
    E. Firewall
    F. NIDS
    G. URL filtering
    • D. Proxies
    • E. Firewall
    • G. URL filtering
  69. Several bins are located throughout a building for secure disposal of sensitive information. Which of the following does this prevent?

    A. War chalking
    B. Tailgating
    C. Dumpster diving
    D. War driving
    C. Dumpster diving
    (this multiple choice question has been scrambled)
  70. Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?

    A. Management of interfaces
    B. Application security
    C. Initial baseline configuration
    D. Application design
    C. Initial baseline configuration
    (this multiple choice question has been scrambled)
  71. Sara, a company's security officer, often receives reports of unauthorized personnel having access codes tothe cipher locks of secure areas in the building. Sara should immediately implement which of the following?

    A. Physical security controls
    B. Security awareness training
    C. Acceptable Use Policy
    D. Technical controls
    B. Security awareness training
    (this multiple choice question has been scrambled)
  72. Mike, a network administrator, has been asked to passively monitor network traffic to the company's sales websites. Which of the following would be BEST suited for this task?

    A. HIDS
    B. Firewall
    C. NIPS
    D. Spam filter
    C. NIPS
    (this multiple choice question has been scrambled)
  73. Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company's live modem pool. Which of the following activities is MOST appropriate?

    A. War chalking
    B. Bluesnarfing
    C. War driving
    D. War dialing
    D. War dialing
    (this multiple choice question has been scrambled)
  74. Users at a company report that a popular news website keeps taking them to a web page with derogatory content. This is an example of which of the following?

    A. DNS poisoning
    B. Evil twin
    C. Vishing
    D. Session hijacking
    A. DNS poisoning
    (this multiple choice question has been scrambled)
  75. An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?

    A. Trust models
    B. CRL
    C. Recovery agents
    D. Non-repudiation
    D. Non-repudiation
    (this multiple choice question has been scrambled)
  76. Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server?

    A. NIDS
    B. HIDS
    C. NIPS
    D. HIPS
    D. HIPS
    (this multiple choice question has been scrambled)
  77. Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished?

    A. Create a virtual switch.
    B. Remove the network from the routing table.
    C. Create a VLAN without a default gateway.
    D. Commission a stand-alone switch.
    A. Create a virtual switch.
    (this multiple choice question has been scrambled)
  78. A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control?

    A. Role-based Access Control
    B. Implicit deny
    C. Mandatory Access Controls
    D. Least privilege
    C. Mandatory Access Controls
    (this multiple choice question has been scrambled)
  79. A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?

    A. 21
    B. 22
    C. 20
    D. 23
    A. 21
    (this multiple choice question has been scrambled)
  80. Which of the following could cause a browser to display the message below?

    "The security certificate presented by this website was issued for a different website's address."

    A. The website is using an expired self signed certificate.
    B. HTTPS://127.0.01 was used instead of HTTPS://localhost.
    C. The website is using a wildcard certificate issued for the company's domain.
    D. The website certificate was issued by a different CA than what the browser recognizes in its trusted CAs.
    B. HTTPS://127.0.01 was used instead of HTTPS://localhost.
    (this multiple choice question has been scrambled)
  81. A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following?

    A. Confidentiality
    B. Availability
    C. Integrity
    D. Fire suppression
    B. Availability
    (this multiple choice question has been scrambled)
  82. Which of the following pseudocodes can be used to handle program exceptions?

    A. If user's input exceeds buffer length, then truncate the input.
    B. If program module crashes, then restart program module.
    C. If program detects another instance of itself, then kill program instance.
    D. If user enters invalid input, then restart program.
    B. If program module crashes, then restart program module.
    (this multiple choice question has been scrambled)
  83. Which of the following technologies uses multiple devices to share work?

    A. VPN concentrator
    B. Load balancing
    C. Switching
    D. RAID
    B. Load balancing
    (this multiple choice question has been scrambled)
  84. Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?

    A. TFTP
    B. HTTPS
    C. TLS
    D. SFTP
    B. HTTPS
    (this multiple choice question has been scrambled)
  85. Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?

    A. Bluejacking
    B. Packet sniffing
    C. Man-in-the-middle
    D. Bluesnarfing
    A. Bluejacking
    (this multiple choice question has been scrambled)
  86. Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task? (Select TWO).

    A. Private hash
    B. Recovery agent
    C. Public key
    D. Key escrow
    E. CRL
    • B. Recovery agent
    • D. Key escrow
  87. Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?

    A. Forensic analysis
    B. Incident management
    C. Change management
    D. Server clustering
    C. Change management
    (this multiple choice question has been scrambled)
  88. Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?

    A. Clustering
    B. Virtualization
    C. Redundancy
    D. RAID
    A. Clustering
    (this multiple choice question has been scrambled)
  89. Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?

    A. Disconnect system from network
    B. Identify user habits
    C. Capture system image
    D. Interview witnesses
    C. Capture system image
    (this multiple choice question has been scrambled)
  90. Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point?

    A. Enabling the MAC filtering
    B. Implementing WPA2
    C. Disabling the SSID
    D. Placement of antenna
    D. Placement of antenna
    (this multiple choice question has been scrambled)
  91. Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?

    A. Adjust antenna placement
    B. Disable SSID
    C. Implement WPA
    D. Implement WEP
    C. Implement WPA
    (this multiple choice question has been scrambled)
  92. Which of the following is a management control?

    A. Logon banners
    B. SYN attack prevention
    C. Access Control List (ACL)
    D. Written security policy
    D. Written security policy
    (this multiple choice question has been scrambled)
  93. Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?

    A. Containment strategies
    B. Restoration and recovery strategies
    C. Deterrent strategies
    D. Detection strategies
    A. Containment strategies
    (this multiple choice question has been scrambled)
  94. In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using?

    A. Three factor
    B. Single factor
    C. Two factor
    D. Four factor
    B. Single factor
    (this multiple choice question has been scrambled)
  95. Using proximity card readers instead of the traditional key punch doors would help to mitigate:

    A. Shoulder surfing
    B. Dumpster diving
    C. Impersonation
    D. Tailgating
    A. Shoulder surfing
    (this multiple choice question has been scrambled)
  96. Which of the following application attacks is used to gain access to SEH?

    A. XML injection
    B. Buffer overflow
    C. Cookie stealing
    D. Directory traversal
    B. Buffer overflow
    (this multiple choice question has been scrambled)
  97. Which of the following is an authentication service that uses UDP as a transport medium?

    A. TACACS+
    B. LDAP
    C. RADIUS
    D. Kerberos
    C. RADIUS
    (this multiple choice question has been scrambled)
  98. Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).

    A. Tethering
    B. Screen lock PIN
    C. Remote wipe
    D. Email password
    E. GPS tracking
    F. Device encryption
    • C. Remote wipe
    • F. Device encryption
  99. Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gatherdata on new malware. Which of the following is being implemented by Jane's company?

    A. Honeynet
    B. Protocol analyzer
    C. Vulnerability scanner
    D. Port scanner
    A. Honeynet
    (this multiple choice question has been scrambled)
  100. Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company?

    A. Acceptable Use
    B. Least Privilege
    C. Privacy Policy
    D. Mandatory Vacations
    D. Mandatory Vacations
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview