maxwell3254
Test por , creado hace más de 1 año

SEC PLUS

210
6
0
maxwell3254
Creado por maxwell3254 hace más de 9 años
Cerrar

401

Pregunta 1 de 118

1

A distributed denial of service attack can BEST be described as:

Selecciona una o más de las siguientes respuestas posibles:

  • invalid characters being entered into a field in a database application

  • users attempting to input random or invalid data into fields within a web browser application

  • multiple computers attacking a single target in an organized attempt to deplete its resources

  • multiple attackers attempting to gain elevated privileges on a target system

Explicación

Pregunta 2 de 118

1

Joe analyzed the following log and determined the security team should implement which of the following as a mitigation method against further attempts?
Host 192.168.1.123 [00: 00: 01]Successful Login: 015 192.168.1.123 : local [00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124 [00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124 [00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124 [00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124

Selecciona una o más de las siguientes respuestas posibles:

  • Reporting

  • IDS

  • Monitor system logs

  • Hardening

Explicación

Pregunta 3 de 118

1

A computer supply company is located in a building with three wireless networks. The system security team implemented a quarterly security scan and saw the following. SSID State Channel Level Computer AreUs1 connected 1 70dbm Computer AreUs2 connected 5 80dbm Computer AreUs3 connected 3 75dbm Computer AreUs4 connected 6 95dbm
Which of the following is this an example of?

Selecciona una o más de las siguientes respuestas posibles:

  • Rogue access point

  • Near field communication

  • Jamming

  • Packet sniffing

Explicación

Pregunta 4 de 118

1

A systems administrator has implemented PKI on a classified government network. In the event that a disconnect occurs from the primary CA, which of the following should be accessible locally from every site to ensure users with bad certificates cannot gain access to the network?

Selecciona una o más de las siguientes respuestas posibles:

  • A CRL

  • Make the RA available

  • A verification authority

  • A redundant CA

Explicación

Pregunta 5 de 118

1

While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make sure that only devices authorized to access the network would be permitted to login and utilize resources. Which of the following should the administrator implement to ensure this happens?

Selecciona una o más de las siguientes respuestas posibles:

  • Log Analysis

  • VLAN Management

  • Network separation

  • 802.1x

Explicación

Pregunta 6 de 118

1

A vulnerability assessment indicates that a router can be accessed from default port 80 and default port 22. Which of the following should be executed on the router to prevent access via these ports? (Select TWO)

Selecciona una o más de las siguientes respuestas posibles:

  • FTP service should be disabled

  • HTTPS service should be disabled

  • SSH service should be disabled

  • HTTP service should disabled

  • Telnet service should be disabled

Explicación

Pregunta 7 de 118

1

Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be accessed using the same password. The company's network device security policy mandates that at least one virtual terminal have a different password than the other virtual terminals. Which of the following sets of commands would meet this requirement?

Selecciona una o más de las siguientes respuestas posibles:

  • line vty 0 6 P@s5W0Rd password line vty 7 Qwer++!Y password

  • line console 0 password password line vty 0 4 password P@s5W0Rd

  • line vty 0 3 password Qwer++!Y line vty 4 password P@s5W0Rd

  • line vty 0 3 password Qwer++!Y line console 0 password P@s5W0Rd

Explicación

Pregunta 8 de 118

1

Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a competitor. Joe had already been working for two hours before leaving the premises. A security technician was asked to prepare a report of files that had changed since last night's integrity scan. Which of the following could the technician use to prepare the report? (Select TWO)

Selecciona una o más de las siguientes respuestas posibles:

  • PGP

  • MD5

  • ECC

  • AES

  • Blowfish

  • HMAC

Explicación

Pregunta 9 de 118

1

Ann has read and write access to an employee database, while Joe has only read access. Ann is leaving for a conference. Which of the following types of authorization could be utilized to trigger write access for Joe when Ann is absent?

Selecciona una o más de las siguientes respuestas posibles:

  • Mandatory access control

  • Role-based access control

  • Discretionary access control

  • Rule-based access control

Explicación

Pregunta 10 de 118

1

Human Resources suspects an employee is accessing the employee salary database. The administrator is asked to find out who it is. In order to complete this task, which of the following is a security control that should be in place?

Selecciona una o más de las siguientes respuestas posibles:

  • Shared accounts should be prohibited

  • Account lockout should be enabled

  • Privileges should be assigned to groups rather than individuals

  • Time of day restrictions should be in use

Explicación

Pregunta 11 de 118

1

An administrator finds that non-production servers are being frequently compromised, production servers are rebooting at unplanned times and kernel versions are several releases behind the version with all current security fixes. Which of the following should the administrator implement?

Selecciona una o más de las siguientes respuestas posibles:

  • Snapshots

  • Sandboxing

  • Patch management

  • Intrusion detection system

Explicación

Pregunta 12 de 118

1

An auditor's report discovered several accounts with no activity for over 60 days. The accounts were later identified as contractors' accounts who would be returning in three months and would need to resume the activities. Which of the following would mitigate and secure the auditors finding?

Selecciona una o más de las siguientes respuestas posibles:

  • Disable unnecessary contractor accounts and inform the auditor of the update

  • Reset contractor accounts and inform the auditor of the update

  • Inform the auditor that the accounts belong to the contractors

  • Delete contractor accounts and inform the auditor of the update

Explicación

Pregunta 13 de 118

1

Ann, the security administrator, wishes to implement multifactor security. Which of the following should be implemented in order to compliment password usage and smart cards?

Selecciona una o más de las siguientes respuestas posibles:

  • Hard tokens

  • Fingerprint readers

  • Swipe badge readers

  • Passphrases

Explicación

Pregunta 14 de 118

1

Customers' credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future?

Selecciona una o más de las siguientes respuestas posibles:

  • Application firewalls

  • Manual updates

  • Firmware version control

  • Encrypted TCP wrappers

Explicación

Pregunta 15 de 118

1

A new intern was assigned to the system engineering department, which consists of the system architect and system software developer's teams. These two teams have separate privileges. The intern requires privileges to view the system architectural drawings and comment on some software development projects. Which of the following methods should the system administrator implement?

Selecciona una o más de las siguientes respuestas posibles:

  • Group based privileges

  • Generic account prohibition

  • User access review

  • Credential management

Explicación

Pregunta 16 de 118

1

One of the system administrators at a company is assigned to maintain a secure computer lab. The administrator has rights to configure machines, install software, and perform user account maintenance. However, the administrator cannot add new computers to the domain, because that requires authorization from the Information Assurance Officer. This is an example of which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Mandatory access

  • Rule-based access control

  • Least privilege

  • Job rotation

Explicación

Pregunta 17 de 118

1

A small business needs to incorporate fault tolerance into their infrastructure to increase data availability. Which of the following options would be the BEST solution at a minimal cost?

Selecciona una o más de las siguientes respuestas posibles:

  • Clustering

  • Mirrored server

  • RAID

  • Tape backup

Explicación

Pregunta 18 de 118

1

A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server that is used by several employees. Which of the following is the BEST approach for implementation of the new application on the virtual server?

Selecciona una o más de las siguientes respuestas posibles:

  • Take a snapshot of the virtual server after installing the new application and store the snapshot in a secure location

  • Generate a baseline report detailing all installed applications on the virtualized server after installing the new application

  • Take a snapshot of the virtual server before installing the new application and store the snapshot in a secure location

  • Create an exact copy of the virtual server and store the copy on an external hard drive after installing the new application

Explicación

Pregunta 19 de 118

1

Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign the file?

Selecciona una o más de las siguientes respuestas posibles:

  • Joe's public key

  • Joe's private key

  • Ann's public key

  • Ann's private key

Explicación

Pregunta 20 de 118

1

Which of the following protocols is used to validate whether trust is in place and accurate by returning responses of either "good", "unknown", or "revoked"?

Selecciona una o más de las siguientes respuestas posibles:

  • CRL

  • PKI

  • OCSP

  • RA

Explicación

Pregunta 21 de 118

1

During a recent investigation, an auditor discovered that an engineer's compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. The SCADA systems cannot be modified without vendor approval which requires months of testing. Which of the following is MOST likely to protect the SCADA systems from misuse?

Selecciona una o más de las siguientes respuestas posibles:

  • Update anti-virus definitions on SCADA systems

  • Audit accounts on the SCADA systems

  • Install a firewall on the SCADA network

  • Deploy NIPS at the edge of the SCADA network

Explicación

Pregunta 22 de 118

1

A security administrator must implement a network authentication solution which will ensure encryption of user credentials when users enter their username and password to authenticate to the network. Which of the following should the administrator implement?

Selecciona una o más de las siguientes respuestas posibles:

  • WPA2 over EAP-TTLS

  • WPA-PSK

  • WPA2 with WPS

  • WEP over EAP-PEAP

Explicación

Pregunta 23 de 118

1

Several employees have been printing files that include personally identifiable information of customers. Auditors have raised concerns about the destruction of these hard copies after they are created, and management has decided the best way to address this concern is by preventing these files from being printed. Which of the following would be the BEST control to implement?

Selecciona una o más de las siguientes respuestas posibles:

  • File encryption

  • Printer hardening

  • Clean desk policies

  • Data loss prevention

Explicación

Pregunta 24 de 118

1

The company's sales team plans to work late to provide the Chief Executive Officer (CEO) with a special report of sales before the quarter ends. After working for several hours, the team finds they cannot save or print the reports. Which of the following controls is preventing them from completing their work?

Selecciona una o más de las siguientes respuestas posibles:

  • Discretionary access control

  • Role-based access control

  • Time of Day access control

  • Mandatory access control

Explicación

Pregunta 25 de 118

1

A security engineer is asked by the company's development team to recommend the most secure method for password storage. Which of the following provide the BEST protection against brute forcing stored passwords? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • PBKDF2

  • MD5

  • SHA2

  • Bcrypt

  • AES

  • CHAP

Explicación

Pregunta 26 de 118

1

After entering the following information into a SOHO wireless router, a mobile device's user reports being unable to connect to the network:
PERMIT 0A: D1: FA. B1: 03: 37
DENY 01: 33: 7F: AB: 10: AB
Which of the following is preventing the device from connecting?

Selecciona una o más de las siguientes respuestas posibles:

  • WPA2-PSK requires a supplicant on the mobile device

  • Hardware address filtering is blocking the device

  • TCP/IP Port filtering has been implemented on the SOHO router

  • IP address filtering has disabled the device from connecting

Explicación

Pregunta 27 de 118

1

The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity. Which of the following would be MOST effective for preventing this behavior?

Selecciona una o más de las siguientes respuestas posibles:

  • Acceptable use policies

  • Host-based firewalls

  • Content inspection

  • Application whitelisting

Explicación

Pregunta 28 de 118

1

When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength?

Selecciona una o más de las siguientes respuestas posibles:

  • SHA

  • AES

  • DES

  • RSA

Explicación

Pregunta 29 de 118

1

A company has decided to move large data sets to a cloud provider in order to limit the costs of new infrastructure. Some of the data is sensitive and the Chief Information Officer wants to make sure both parties have a clear understanding of the controls needed to protect the data. Which of the following types of interoperability agreement is this?

Selecciona una o más de las siguientes respuestas posibles:

  • ISA

  • MOU

  • SLA

  • BPA

Explicación

Pregunta 30 de 118

1

Which of the following solutions provides the most flexibility when testing new security controls prior to implementation?

Selecciona una o más de las siguientes respuestas posibles:

  • Trusted OS

  • Host software baselining

  • OS hardening

  • Virtualization

Explicación

Pregunta 31 de 118

1

Which of the following authentication services requires the use of a ticket-granting ticket (TGT) server in order to complete the authentication process?

Selecciona una o más de las siguientes respuestas posibles:

  • TACACS+

  • Secure LDAP

  • RADIUS

  • Kerberos

Explicación

Pregunta 32 de 118

1

Which of the following is a hardware based encryption device?

Selecciona una o más de las siguientes respuestas posibles:

  • EFS

  • TrueCrypt

  • TPM

  • SLE

Explicación

Pregunta 33 de 118

1

Which of the following BEST describes a protective countermeasure for SQL injection?

Selecciona una o más de las siguientes respuestas posibles:

  • Eliminating cross-site scripting vulnerabilities

  • Installing an IDS to monitor network traffic

  • Validating user input in web applications

  • Placing a firewall between the Internet and database servers

Explicación

Pregunta 34 de 118

1

Which of the following MOST interferes with network-based detection techniques?

Selecciona una o más de las siguientes respuestas posibles:

  • Mime-encoding

  • SSL

  • FTP

  • Anonymous email accounts

Explicación

Pregunta 35 de 118

1

A certificate authority takes which of the following actions in PKI?

Selecciona una o más de las siguientes respuestas posibles:

  • Signs and verifies all infrastructure messages

  • Issues and signs all private keys

  • Publishes key escrow lists to CRLs

  • Issues and signs all root certificates

Explicación

Pregunta 36 de 118

1

Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?

Selecciona una o más de las siguientes respuestas posibles:

  • Malicious code on the local system

  • Shoulder surfing

  • Brute force certificate cracking

  • Distributed dictionary attacks

Explicación

Pregunta 37 de 118

1

Separation of duties is often implemented between developers and administrators in order to separate which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • More experienced employees from less experienced employees

  • Changes to program code and the ability to deploy to production

  • Upper level management users from standard development employees

  • The network access layer from the application access layer

Explicación

Pregunta 38 de 118

1

A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?

Selecciona una o más de las siguientes respuestas posibles:

  • The request needs to be sent to the incident management team

  • The request needs to be approved through the incident management process

  • The request needs to be approved through the change management process

  • The request needs to be sent to the change management team

Explicación

Pregunta 39 de 118

1

Jane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?

Selecciona una o más de las siguientes respuestas posibles:

  • Phishing

  • Tailgating

  • Pharming

  • Vishing

Explicación

Pregunta 40 de 118

1

A user in the company is in charge of various financial roles but needs to prepare for an upcoming audit. They use the same account to access each financial system. Which of the following security controls will MOST likely be implemented within the company?

Selecciona una o más de las siguientes respuestas posibles:

  • Account lockout policy

  • Account password enforcement

  • Password complexity enabled

  • Separation of duties

Explicación

Pregunta 41 de 118

1

A CRL is comprised of

Selecciona una o más de las siguientes respuestas posibles:

  • Malicious IP addresses

  • Trusted CA's

  • Untrusted private keys

  • Public keys

Explicación

Pregunta 42 de 118

1

Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

Selecciona una o más de las siguientes respuestas posibles:

  • Logic bomb

  • Worm

  • Trojan

  • Adware

Explicación

Pregunta 43 de 118

1

Which of the following may significantly reduce data loss if multiple drives fail at the same time?

Selecciona una o más de las siguientes respuestas posibles:

  • Virtualization

  • RAID

  • Load balancing

  • Server clustering

Explicación

Pregunta 44 de 118

1

Which of the following should be considered to mitigate data theft when using CAT5 wiring?

Selecciona una o más de las siguientes respuestas posibles:

  • CCTV

  • Environmental monitoring

  • Multimode fiber

  • EMI shielding

Explicación

Pregunta 45 de 118

1

To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?

Selecciona una o más de las siguientes respuestas posibles:

  • Management

  • Administrative

  • Technical

  • Operational

Explicación

Pregunta 46 de 118

1

Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?

Selecciona una o más de las siguientes respuestas posibles:

  • Connect the WAP to a different switch.

  • Create a voice VLAN.

  • Create a DMZ.

  • Set the switch ports to 802.1q mode.

Explicación

Pregunta 47 de 118

1

Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • 10.4.4.125

  • 10.4.4.158

  • 10.4.4.165

  • 10.4.4.189

  • 10.4.4.199

Explicación

Pregunta 48 de 118

1

Which of the following algorithms has well documented collisions? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • AES

  • MD5

  • SHA

  • SHA-256

  • RSA

Explicación

Pregunta 49 de 118

1

Which of the following is BEST used as a secure replacement for TELNET?

Selecciona una o más de las siguientes respuestas posibles:

  • HTTPS

  • HMAC

  • GPG

  • SSH

Explicación

Pregunta 50 de 118

1

An email client says a digital signature is invalid and the sender cannot be verified. The recipient is concerned with which of the following concepts?

Selecciona una o más de las siguientes respuestas posibles:

  • Integrity

  • Availability

  • Confidentiality

  • Remediation

Explicación

Pregunta 51 de 118

1

Which of the following is an effective way to ensure the BEST temperature for all equipment within a datacenter?

Selecciona una o más de las siguientes respuestas posibles:

  • Fire suppression

  • Raised floor implementation

  • EMI shielding

  • Hot or cool aisle containment

Explicación

Pregunta 52 de 118

1

Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?

Selecciona una o más de las siguientes respuestas posibles:

  • SSLv2

  • SSHv1

  • RSA

  • TLS

Explicación

Pregunta 53 de 118

1

Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk?

Selecciona una o más de las siguientes respuestas posibles:

  • Incident management

  • Clean desk policy

  • Routine audits

  • Change management

Explicación

Pregunta 54 de 118

1

Which of the following is a difference between TFTP and FTP?

Selecciona una o más de las siguientes respuestas posibles:

  • TFTP is slower than FTP

  • TFTP is more secure than FTP

  • TFTP utilizes TCP and FTP uses UDP

  • TFTP utilizes UDP and FTP uses TCP

Explicación

Pregunta 55 de 118

1

Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?

Selecciona una o más de las siguientes respuestas posibles:

  • Spam filter

  • Protocol analyzer

  • Web application firewall

  • Load balancer

Explicación

Pregunta 56 de 118

1

Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?

Selecciona una o más de las siguientes respuestas posibles:

  • Whaling

  • Impersonation

  • Privilege escalation

  • Spear phishing

Explicación

Pregunta 57 de 118

1

Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?

Selecciona una o más de las siguientes respuestas posibles:

  • Design reviews

  • Baseline reporting

  • Vulnerability scan

  • Code review

Explicación

Pregunta 58 de 118

1

Which of the following is an example of a false positive?

Selecciona una o más de las siguientes respuestas posibles:

  • Anti-virus identifies a benign application as malware

  • A biometric iris scanner rejects an authorized user wearing a new contact lens

  • A user account is locked out after the user mistypes the password too many times

  • The IDS does not identify a buffer overflow

Explicación

Pregunta 59 de 118

1

Data execution prevention is a feature in most operating systems intended to protect against which type of attack?

Selecciona una o más de las siguientes respuestas posibles:

  • Cross-site scripting

  • Buffer overflow

  • Header manipulation

  • SQL injection

Explicación

Pregunta 60 de 118

1

Use of group accounts should be minimized to ensure which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Password security

  • Regular auditing

  • Baseline management

  • Individual accountability

Explicación

Pregunta 61 de 118

1

Privilege creep among long-term employees can be mitigated by which of the following procedures?

Selecciona una o más de las siguientes respuestas posibles:

  • User permission reviews

  • Mandatory vacations

  • Separation of duties

  • Job function rotation

Explicación

Pregunta 62 de 118

1

In which of the following scenarios is PKI LEAST hardened?

Selecciona una o más de las siguientes respuestas posibles:

  • The CRL is posted to a publicly accessible location

  • The recorded time offsets are developed with symmetric keys

  • A malicious CA certificate is loaded on all the clients

  • All public keys are accessed by an unauthorized user

Explicación

Pregunta 63 de 118

1

Configuring the mode, encryption methods, and security associations are part of which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • IPSec

  • Full disk encryption

  • 802.1x

  • PKI

Explicación

Pregunta 64 de 118

1

Which of the following assessments would Pete, the security administrator, use to actively test that an application's security controls are in place?

Selecciona una o más de las siguientes respuestas posibles:

  • Code review

  • Penetration test

  • Protocol analyzer

  • Vulnerability scan

Explicación

Pregunta 65 de 118

1

A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?

Selecciona una o más de las siguientes respuestas posibles:

  • Confidentiality

  • Availability

  • Succession planning

  • Integrity

Explicación

Pregunta 66 de 118

1

In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager. Which of the following incident response procedures would he need to perform in order to begin the analysis? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • Take hashes

  • Begin the chain of custody paperwork

  • Take screen shots

  • Capture the system image

  • Decompile suspicious files

Explicación

Pregunta 67 de 118

1

Which of the following is used to certify intermediate authorities in a large PKI deployment?

Selecciona una o más de las siguientes respuestas posibles:

  • Root CA

  • Recovery agent

  • Root user

  • Key escrow

Explicación

Pregunta 68 de 118

1

Which of the following components MUST be trusted by all parties in PKI?

Selecciona una o más de las siguientes respuestas posibles:

  • Key escrow

  • CA

  • Private key

  • Recovery key

Explicación

Pregunta 69 de 118

1

Which of the following should Matt, a security administrator, include when encrypting smartphones? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • Steganography images

  • Internal memory

  • Master boot records

  • Removable memory cards

  • Public keys

Explicación

Pregunta 70 de 118

1

Which of the following is the below pseudo-code an example of?
IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT

Selecciona una o más de las siguientes respuestas posibles:

  • Buffer overflow prevention

  • Input validation

  • CSRF prevention

  • Cross-site scripting prevention

Explicación

Pregunta 71 de 118

1

A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?

Selecciona una o más de las siguientes respuestas posibles:

  • RADIUS

  • TACACS+

  • Kerberos

  • LDAP

Explicación

Pregunta 72 de 118

1

Which of the following can use RC4 for encryption? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • CHAP

  • SSL

  • WEP

  • AES

  • 3DES

Explicación

Pregunta 73 de 118

1

Which of the following defines a business goal for system restoration and acceptable data loss?

Selecciona una o más de las siguientes respuestas posibles:

  • MTTR

  • MTBF

  • RPO

  • Warn site

Explicación

Pregunta 74 de 118

1

If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing?

Selecciona una o más de las siguientes respuestas posibles:

  • Transitive trust

  • Public key trust

  • Certificate authority trust

  • Domain level trust

Explicación

Pregunta 75 de 118

1

Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?

Selecciona una o más de las siguientes respuestas posibles:

  • Business continuity planning

  • Continuity of operations

  • Business impact analysis

  • Succession planning

Explicación

Pregunta 76 de 118

1

Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?

Selecciona una o más de las siguientes respuestas posibles:

  • Recovery agent

  • Certificate authority

  • Trust model

  • Key escrow

Explicación

Pregunta 77 de 118

1

Which of the following devices will help prevent a laptop from being removed from a certain location?

Selecciona una o más de las siguientes respuestas posibles:

  • Device encryption

  • Cable locks

  • GPS tracking

  • Remote data wipes

Explicación

Pregunta 78 de 118

1

Which of the following is the MOST secure protocol to transfer files?

Selecciona una o más de las siguientes respuestas posibles:

  • FTP

  • FTPS

  • SSH

  • TELNET

Explicación

Pregunta 79 de 118

1

Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms?

Selecciona una o más de las siguientes respuestas posibles:

  • Signature based IPS

  • Signature based IDS

  • Application based IPS

  • Anomaly based IDS

Explicación

Pregunta 80 de 118

1

A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?

Selecciona una o más de las siguientes respuestas posibles:

  • Command shell restrictions

  • Restricted interface

  • Warning banners

  • Session output pipe to /dev/null

Explicación

Pregunta 81 de 118

1

Which of the following protocols is used to authenticate the client and server's digital certificate?

Selecciona una o más de las siguientes respuestas posibles:

  • PEAP

  • DNS

  • TLS

  • ICMP

Explicación

Pregunta 82 de 118

1

Which of the following can be used to mitigate risk if a mobile device is lost?

Selecciona una o más de las siguientes respuestas posibles:

  • Cable lock

  • Transport encryption

  • Voice encryption

  • Strong passwords

Explicación

Pregunta 83 de 118

1

Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?

Selecciona una o más de las siguientes respuestas posibles:

  • Record time offset

  • Clean desk policy

  • Cloud computing

  • Routine log review

Explicación

Pregunta 84 de 118

1

Which of the following is an example of multifactor authentication?

Selecciona una o más de las siguientes respuestas posibles:

  • Credit card and PIN

  • Username and password

  • Password and PIN

  • Fingerprint and retina scan

Explicación

Pregunta 85 de 118

1

After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:
`Please only use letters and numbers on these fields'
Which of the following is this an example of?

Selecciona una o más de las siguientes respuestas posibles:

  • Proper error handling

  • Proper input validation

  • Improper input validation

  • Improper error handling

Explicación

Pregunta 86 de 118

1

Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE)

Selecciona una o más de las siguientes respuestas posibles:

  • Spam filter

  • Load balancer

  • Antivirus

  • Proxies

  • Firewall

  • NIDS

  • URL filtering

Explicación

Pregunta 87 de 118

1

Several bins are located throughout a building for secure disposal of sensitive information. Which of the following does this prevent?

Selecciona una o más de las siguientes respuestas posibles:

  • Dumpster diving

  • War driving

  • Tailgating

  • War chalking

Explicación

Pregunta 88 de 118

1

Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?

Selecciona una o más de las siguientes respuestas posibles:

  • Application design

  • Application security

  • Initial baseline configuration

  • Management of interfaces

Explicación

Pregunta 89 de 118

1

Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Acceptable Use Policy

  • Physical security controls

  • Technical controls

  • Security awareness training

Explicación

Pregunta 90 de 118

1

Mike, a network administrator, has been asked to passively monitor network traffic to the company's sales websites. Which of the following would be BEST suited for this task?

Selecciona una o más de las siguientes respuestas posibles:

  • HIDS

  • Firewall

  • NIPS

  • Spam filter

Explicación

Pregunta 91 de 118

1

Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company's live modem pool. Which of the following activities is MOST appropriate?

Selecciona una o más de las siguientes respuestas posibles:

  • War dialing

  • War chalking

  • War driving

  • Bluesnarfing

Explicación

Pregunta 92 de 118

1

Users at a company report that a popular news website keeps taking them to a web page with derogatory content. This is an example of which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Evil twin

  • DNS poisoning

  • Vishing

  • Session hijacking

Explicación

Pregunta 93 de 118

1

An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?

Selecciona una o más de las siguientes respuestas posibles:

  • CRL

  • Non-repudiation

  • Trust models

  • Recovery agents

Explicación

Pregunta 94 de 118

1

Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server?

Selecciona una o más de las siguientes respuestas posibles:

  • HIPS

  • NIDS

  • HIDS

  • NIPS

Explicación

Pregunta 95 de 118

1

Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished?

Selecciona una o más de las siguientes respuestas posibles:

  • Create a VLAN without a default gateway

  • Remove the network from the routing table

  • Create a virtual switch

  • Commission a stand-alone switch

Explicación

Pregunta 96 de 118

1

A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control?

Selecciona una o más de las siguientes respuestas posibles:

  • Implicit deny

  • Role-based Access Control

  • Mandatory Access Controls

  • Least privilege

Explicación

Pregunta 97 de 118

1

A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?

Selecciona una o más de las siguientes respuestas posibles:

  • 20

  • 21

  • 22

  • 23

Explicación

Pregunta 98 de 118

1

Which of the following could cause a browser to display the message below?
"The security certificate presented by this website was issued for a different website's address."

Selecciona una o más de las siguientes respuestas posibles:

  • The website certificate was issued by a different CA than what the browser recognizes in its trusted CAs

  • The website is using a wildcard certificate issued for the company's domain

  • HTTPS://127.0.01 was used instead of HTTPS://localhost

  • The website is using an expired self signed certificate

Explicación

Pregunta 99 de 118

1

A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Availability

  • Integrity

  • Confidentiality

  • Fire suppression

Explicación

Pregunta 100 de 118

1

Which of the following pseudocodes can be used to handle program exceptions?

Selecciona una o más de las siguientes respuestas posibles:

  • If program detects another instance of itself, then kill program instance

  • If user enters invalid input, then restart program

  • If program module crashes, then restart program module

  • If user's input exceeds buffer length, then truncate the input

Explicación

Pregunta 101 de 118

1

Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?

Selecciona una o más de las siguientes respuestas posibles:

  • Hashing

  • Stream ciphers

  • Steganography

  • Block ciphers

Explicación

Pregunta 102 de 118

1

Which of the following encrypts data a single bit at a time?

Selecciona una o más de las siguientes respuestas posibles:

  • Stream cipher

  • Steganography

  • 3DES

  • Hashing

Explicación

Pregunta 103 de 118

1

Which of the following is used to verify data integrity?

Selecciona una o más de las siguientes respuestas posibles:

  • SHA

  • 3DES

  • AES

  • RSA

Explicación

Pregunta 104 de 118

1

By default, which of the following uses TCP port 22? (Select THREE).

Selecciona una o más de las siguientes respuestas posibles:

  • FTPS

  • STELNET

  • TLS

  • SCP

  • SSL

  • HTTPS

  • SSH

  • SFTP

Explicación

Pregunta 105 de 118

1

Access mechanisms to data on encrypted USB hard drives must be implemented correctly otherwise.

Selecciona una o más de las siguientes respuestas posibles:

  • user accounts may be inadvertently locked out

  • data on the USB drive could be corrupted

  • data on the hard drive will be vulnerable to log analysis

  • the security controls on the USB drive can be bypassed

Explicación

Pregunta 106 de 118

1

Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO's office with various connected cables from the office. Which of the following describes the type of attack that was occurring?

Selecciona una o más de las siguientes respuestas posibles:

  • Spear phishing

  • Packet sniffing

  • Impersonation

  • MAC flooding

Explicación

Pregunta 107 de 118

1

A security administrator is segregating all web-facing server traffic from the internal network and restricting it to a single interface on a firewall. Which of the following BEST describes this new network?

Selecciona una o más de las siguientes respuestas posibles:

  • VLAN

  • Subnet

  • VPN

  • DMZ

Explicación

Pregunta 108 de 118

1

Which of the following was based on a previous X.500 specification and allows either unencrypted authentication or encrypted authentication through the use of TLS?

Selecciona una o más de las siguientes respuestas posibles:

  • Kerberos

  • TACACS+

  • RADIUS

  • LDAP

Explicación

Pregunta 109 de 118

1

The Quality Assurance team is testing a new third party developed application. The Quality team does not have any experience with the application. Which of the following is the team performing?

Selecciona una o más de las siguientes respuestas posibles:

  • Grey box testing

  • Black box testing

  • Penetration testing

  • White box testing

Explicación

Pregunta 110 de 118

1

Which of the following has a storage root key?

Selecciona una o más de las siguientes respuestas posibles:

  • HSM

  • EFS

  • TPM

  • TKIP

Explicación

Pregunta 111 de 118

1

A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability. Which of the following BEST describes this exploit?

Selecciona una o más de las siguientes respuestas posibles:

  • Malicious insider threat

  • Zero-day

  • Client-side attack

  • Malicious add-on

Explicación

Pregunta 112 de 118

1

A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Peer to Peer

  • Mobile devices

  • Social networking

  • Personally owned devices

Explicación

Pregunta 113 de 118

1

A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates. Which of the following processes could MOST effectively mitigate these risks?

Selecciona una o más de las siguientes respuestas posibles:

  • Application hardening

  • Application change management

  • Application patch management

  • Application firewall review

Explicación

Pregunta 114 de 118

1

A software developer is responsible for writing the code on an accounting application. Another software developer is responsible for developing code on a system in human resources. Once a year they have to switch roles for several weeks. Which of the following practices is being implemented?

Selecciona una o más de las siguientes respuestas posibles:

  • Mandatory vacations

  • Job rotation

  • Least privilege

  • Separation of duties

Explicación

Pregunta 115 de 118

1

A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?

Selecciona una o más de las siguientes respuestas posibles:

  • IPsec

  • SFTP

  • BGP

  • PPTP

Explicación

Pregunta 116 de 118

1

Which of the following implementation steps would be appropriate for a public wireless hot- spot?

Selecciona una o más de las siguientes respuestas posibles:

  • Reduce power level

  • Disable SSID broadcast

  • Open system authentication

  • MAC filter

Explicación

Pregunta 117 de 118

1

Which of the following is a step in deploying a WPA2-Enterprise wireless network?

Selecciona una o más de las siguientes respuestas posibles:

  • Install a token on the authentication server

  • Install a DHCP server on the authentication server

  • Install an encryption key on the authentication server

  • Install a digital certificate on the authentication server

Explicación

Pregunta 118 de 118

1

Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?

Selecciona una o más de las siguientes respuestas posibles:

  • 802.1x

  • Data encryption

  • Password strength

  • BGP

Explicación