Frage 1
Frage
Which of the following BEST describes both change and incident management?
Antworten
-
Incident management is not a valid term in IT, however change management is
-
Change management is not a valid term in IT, however incident management is
-
Incident management and change management are interchangeable terms meaning the same thing
-
Incident management is for unexpected consequences, change management is for planned work
Frage 2
Frage
Which of the following account policy controls requires a user to enter a 15 character alpha-numerical password?
Antworten
-
Disablement
-
Length
-
Expiration
-
Password complexity
Frage 3
Frage
Which of the following information types would be considered personally identifiable information?
Frage 4
Frage
Which of the following is the benefit of single file versus full disk encryption?
Antworten
-
Encryption is preserved in full disk encryption when a file is copied from one media to another
-
Encryption is preserved in single file encryption when a file is copied from one media to another
-
Single file encryption provides better security when decrypting single files than full disk encryption when properly implemented and used
-
Full disk encryption provides better security when decrypting single files than single file encryption when properly implemented and used
Frage 5
Frage
Which of the following is another name for a CAC?
Frage 6
Frage
Which of the following systems offers Trusted OS capabilities by default?
Antworten
-
Windows Vista
-
Windows 7
-
SE Linux
-
Backtrack
Frage 7
Frage
Which of the following describes a common operational problem when using patch management software that results in a false sense of security?
Antworten
-
Conflicts with vulnerability scans impede patch effectiveness
-
Distributed updates may fail to apply or may not be active until a reboot
-
Vendor patches are released too frequently consuming excessive network bandwidth
-
It is resource intensive to test all patches
Frage 8
Frage
Which of the following is BEST identified as an attacker who has or is about to use a Logic bomb?
Antworten
-
Grey hat
-
Malicious insider
-
White hat
-
Black box
Frage 9
Frage
Which of the following is the BEST choice in regards to training staff members on dealing with PII?
Antworten
-
PII requires public access but must be flagged as confidential
-
PII data breaches are always the result of negligent staff and punishable by law
-
PII must be handled properly in order to minimize security breaches and mishandling
-
PII must be stored in an encrypted fashion and only printed on shared printers
Frage 10
Frage
Which of the following processes are used to avoid employee exhaustion and implement a system of checks and balances?
Antworten
-
Job rotation
-
Incident response
-
Least privilege
-
On-going security
Frage 11
Frage
When designing secure LDAP compliant applications, null passwords should NOT be allowed because:
Antworten
-
null password can be changed by all users on a network
-
a null password is a successful anonymous bind
-
null passwords can only be changed by the administrator
-
LDAP passwords are one-way encrypted
Frage 12
Frage
A security administrator visits a remote data center dressed as a delivery person. Which of the following is MOST likely being conducted?
Antworten
-
Social engineering
-
Remote access
-
Vulnerability scan
-
Trojan horse
Frage 13
Frage
Mobile devices used in the enterprise should be administered using:
Antworten
-
encrypted networks and system logging
-
full disk encryption and central password management
-
vendor provided software update systems
-
centrally managed update services and access controls
Frage 14
Frage
The Chief Information Officer (CIO) wants to implement widespread network and hardware changes within the organization. The CIO has adopted an aggressive deployment schedule and does not want to bother with documentation, because it will slow down the deployment. Which of the following are the risks associated with not documenting the changes?
Antworten
-
Undocumented networks might not be protected and can be used to support insider attacks
-
Documenting a network hinders production because it is time consuming and ties up critical resources
-
Documented networks provide a visual representation of the network for an attacker to exploit
-
Undocumented networks ensure the confidentiality and secrecy of the network topology
Frage 15
Frage
Which of the following could mitigate shoulder surfing?
Antworten
-
Privacy screens
-
Hashing
-
Man traps
-
Screen locks
Frage 16
Frage
Which of the following passwords is the MOST complex?
Antworten
-
5@rAru99
-
CarL8241g
-
j1l!1b5
-
l@ur0
Frage 17
Frage
Which of the following is being utilized when the BIOS and operating system’s responsibility is platform integrity?
Antworten
-
SSL
-
USB encryption
-
Data loss prevention
-
TPM
Frage 18
Frage
Which of the following BEST describes a Buffer Overflow attack that allows access to a remote system?
Antworten
-
The attacker attempts to have the receiving server run a payload using programming commonly found on web servers
-
The attacker overwhelms a system or application, causing it to crash and bring the server down to cause an outage
-
The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information
-
The attacker overwhelms a system or application, causing it to crash, and then redirects the memory address to read from a location holding the payload
Frage 19
Frage
A company fails to monitor and maintain the HVAC system in the datacenter. Which of the following is the MOST likely to affect availability of systems?
Antworten
-
Employee productivity in a hot datacenter
-
Premature failure of components
-
Decreased number of systems in the datacenter
-
Increased utility costs
Frage 20
Frage
Which of the following protocols is defined in RFC 1157 as utilizing UDP ports 161 and 162?
Frage 21
Frage
Which of the following is LEAST likely to have a legitimate business purpose?
Antworten
-
Metasploit
-
Vulnerability scanner
-
Steganography
-
Port scanner
Frage 22
Frage
Which of the following does full disk encryption on a laptop computer NOT protect against?
Frage 23
Frage
Which of the following passwords exemplifies the STRONGEST complexity?
Antworten
-
Passw0rd
-
P@ssw0rd
-
Passwrd
-
passwordpassword
Frage 24
Frage
Which following port ranges would give a technician the MOST comprehensive port scan of a server?
Antworten
-
1024-15000
-
0-99999
-
0-65535
-
0-1024
Frage 25
Frage
Which of the following attacks steals contacts from a mobile device?
Antworten
-
Bluesnarfing
-
Smurf attack
-
Session hijacking
-
Bluejacking
Frage 26
Frage
Which of the following attacks sends unwanted messages to a mobile device?
Antworten
-
Session hijacking
-
Smurf attack
-
Bluejacking
-
Bluesnarfing
Frage 27
Frage
A smurf attack relies on which protocol to perform a Denial of Service?
Frage 28
Frage
Which of the following allows for multiple operating systems to run on a single piece of hardware?
Antworten
-
Virtualization
-
Port security
-
Remote access
-
DMZ
Frage 29
Frage
A user name is an example of which of the following?
Antworten
-
Identification
-
Authentication
-
Authorization
-
Access
Frage 30
Frage
The CRL contains a list of:
Antworten
-
private keys
-
public keys
-
root certificates
-
valid certificates
Frage 31
Frage
Which of the following fall into the category of physical security measures? (Select all that apply)
Antworten
-
Honeypot
-
Mantrap
-
Vulnerability scanner
-
Hardware lock
Frage 32
Frage
Software that performs unwanted and harmful actions in disguise of a legitimate and useful program is also referred to as:
Antworten
-
Adware
-
Logic bomb
-
Spyware
-
Trojan horse
Frage 33
Frage
The term Trusted OS refers to an operating system:
Antworten
-
Admitted to a network through NAC
-
That has been authenticated on the network
-
Implementing patch management
-
With enhanced security features
Frage 34
Frage
Which of the following would be fastest in validating a digital certificate?
Frage 35
Frage
HTTPS runs on TCP port:
Frage 36
Frage
Paper shredder would help in preventing what kind of threats? (Select all that apply)
Antworten
-
Tailgating
-
Dumpster diving
-
Social engineering
-
Zero-day attack
Frage 37
Frage
Penetration test with the prior knowledge on how the system that is to be tested works is also known as:
Antworten
-
Black box
-
White box
-
Sandbox
-
White hat
Frage 38
Frage
What type of protocols ensure the privacy of a VPN connection?
Antworten
-
OSPF
-
Tunneling
-
Telnet
-
IPv6
Frage 39
Frage
Zero-day attack exploits:
Antworten
-
Vulnerability that is present in already released software but unknown to the software developer
-
Patched software coding errors
-
Well known vulnerabilities
-
New accounts
Frage 40
Frage
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is also referred to as:
Frage 41
Frage
What is tailgating?
Antworten
-
Gaining unauthorized access to restricted areas by following another person
-
Looking over someone's shoulder in order to get information
-
Manipulating a user into disclosing confidential information
-
Scanning for unsecured wireless networks while driving in a car
Frage 42
Frage
Which of the following are symmetric-key algorithms? (Select all that apply)
Antworten
-
Diffie-Hellman
-
3DES
-
DES
-
RSA
-
AES
Frage 43
Frage
TCP port 22 is used by default by: (Select all that apply)
Frage 44
Frage
A maximum acceptable period of time within which a system must be restored after failure is also known as:
Antworten
-
Recovery Time Objective (RTO)
-
Maximum Tolerable Period of Disruption (MTPOD)
-
Meantime Between Failures (MTBF)
-
Meantime To Restore (MTTR)
Frage 45
Frage
Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that apply)
Frage 46
Frage
A policy outlining ways of collecting and managing personal data is also known as:
Antworten
-
Data loss prevention
-
Acceptable use policy
-
Audit policy
-
Privacy policy
Frage 47
Frage
Which of the following solutions is used for controlling temperature and humidity?
Antworten
-
EMI shielding
-
HVAC
-
UART
-
Faraday cage
Frage 48
Frage
Sticky note with a password kept on sight in the user's cubicle would be a violation of which of the following policies?
Antworten
-
User account policy
-
Clean desk policy
-
Data labeling policy
-
Password complexity
Frage 49
Frage
TCP port 23 is used by:
Frage 50
Frage
A chronological record outlining persons in possession of an evidence is also referred to as:
Frage 51
Frage
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that individual?
Frage 52
Frage
Which of the following terms refers to a rogue access point?
Antworten
-
Trojan horse
-
Backdoor
-
Evil twin
-
Worm
Frage 53
Frage
A group of computers running malicious software under control of a hacker is also referred to as:
Antworten
-
Ethernet
-
Intranet
-
Botnet
-
Subnet
Frage 54
Frage
Which IPsec mode provides whole packet encryption?
Antworten
-
Host-to-host
-
Payload
-
Transport
-
Tunnel
Frage 55
Frage
Security measures that can be applied to mobile devices include: (Select all that apply)
Antworten
-
Load balancing
-
Remote sanitation
-
Encryption and passwords
-
Voice encryption
-
Quality of Service (QoS)
Frage 56
Frage
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
Antworten
-
Conduct surveys and rank the results.
-
Perform routine user permission reviews.
-
Implement periodic vulnerability scanning.
-
Disable user accounts that have not been used within the last two weeks.
Frage 57
Frage
Which of the following devices is BEST suited for servers that need to store private keys?
Frage 58
Frage
All of the following are valid cryptographic hash functions EXCEPT:
Antworten
-
RIPEMD.
-
RC4.
-
SHA-512.
-
MD4.
Frage 59
Frage
In regards to secure coding practices, why is input validation important?
Antworten
-
It mitigates buffer overflow attacks.
-
It makes the code more readable.
-
It provides an application configuration baseline.
-
It meets gray box testing standards.
Frage 60
Frage
Which of the following would be used when a higher level of security is desired for encryption key storage?
Frage 61
Frage
A security administrator needs to determine which system a particular user is trying to login to at
various times of the day. Which of the following log types would the administrator check?
Antworten
-
Firewall
-
Application
-
IDS
-
Security
Frage 62
Frage
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?
Antworten
-
Registration
-
CA
-
CRL
-
Recovery agent
Frage 63
Frage
Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?
Frage 64
Frage
Which of the following devices would MOST likely have a DMZ interface?
Antworten
-
Firewall
-
Switch
-
Load balancer
-
Proxy
Frage 65
Frage
Which of the following application security testing techniques is implemented when an automated system generates random input data?
Antworten
-
Fuzzing
-
XSRF
-
Hardening
-
Input validation
Frage 66
Frage
Which of the following can be used by a security administrator to successfully recover a user’s forgotten password on a password protected file?
Antworten
-
Cognitive password
-
Password sniffing
-
Brute force
-
Social engineering
Frage 67
Frage
A security administrator wants to check user password complexity. Which of the following is the
BEST tool to use?
Antworten
-
Password history
-
Password logging
-
Password cracker
-
Password hashing
Frage 68
Frage
Certificates are used for: (Select TWO).
Antworten
-
Client authentication.
-
WEP encryption.
-
Access control lists.
-
Code signing.
-
Password hashing.
Frage 69
Frage
Which of the following is a hardware based encryption device?
Frage 70
Frage
Which of the following BEST describes a protective countermeasure for SQL injection?
Antworten
-
Eliminating cross-site scripting vulnerabilities
-
Installing an IDS to monitor network traffic
-
Validating user input in web applications
-
Placing a firewall between the Internet and database servers
Frage 71
Frage
Which of the following MOST interferes with network-based detection techniques?
Antworten
-
Mime-encoding
-
SSL
-
FTP
-
Anonymous email accounts
Frage 72
Frage
A certificate authority takes which of the following actions in PKI?
Antworten
-
Signs and verifies all infrastructure messages
-
Issues and signs all private keys
-
Publishes key escrow lists to CRLs
-
Issues and signs all root certificates
Frage 73
Frage
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the
following attacks?
Antworten
-
Malicious code on the local system
-
Shoulder surfing
-
Brute force certificate cracking
-
Distributed dictionary attacks
Frage 74
Frage
Separation of duties is often implemented between developers and administrators in order to separate which of the following?
Antworten
-
More experienced employees from less experienced employees
-
Changes to program code and the ability to deploy to production
-
Upper level management users from standard development employees
-
The network access layer from the application access layer
Frage 75
Frage
A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?
Antworten
-
The request needs to be sent to the incident management team.
-
The request needs to be approved through the incident management process.
-
The request needs to be approved through the change management process.
-
The request needs to be sent to the change management team.