maxwell3254
Test por , creado hace más de 1 año

study

74
7
1
maxwell3254
Creado por maxwell3254 hace más de 9 años
Cerrar

401 (con't)

Pregunta 1 de 110

1

Which of the following technologies uses multiple devices to share work?

Selecciona una o más de las siguientes respuestas posibles:

  • Switching

  • Load balancing

  • RAID

  • VPN concentrator

Explicación

Pregunta 2 de 110

1

Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?

Selecciona una o más de las siguientes respuestas posibles:

  • SFTP

  • HTTPS

  • TFTP

  • TLS

Explicación

Pregunta 3 de 110

1

Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?

Selecciona una o más de las siguientes respuestas posibles:

  • Man-in-the-middle

  • Bluejacking

  • Bluesnarfing

  • Packet sniffing

Explicación

Pregunta 4 de 110

1

Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • Private hash

  • Recovery agent

  • Public key

  • Key escrow

  • CRL

Explicación

Pregunta 5 de 110

1

Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?

Selecciona una o más de las siguientes respuestas posibles:

  • Incident management

  • Server clustering

  • Change management

  • Forensic analysis

Explicación

Pregunta 6 de 110

1

Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?

Selecciona una o más de las siguientes respuestas posibles:

  • RAID

  • Clustering

  • Redundancy

  • Virtualization

Explicación

Pregunta 7 de 110

1

Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?

Selecciona una o más de las siguientes respuestas posibles:

  • Identify user habits

  • Disconnect system from network

  • Capture system image

  • Interview witnesses

Explicación

Pregunta 8 de 110

1

Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point?

Selecciona una o más de las siguientes respuestas posibles:

  • Placement of antenna

  • Disabling the SSID

  • Implementing WPA2

  • Enabling the MAC filtering

Explicación

Pregunta 9 de 110

1

Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?

Selecciona una o más de las siguientes respuestas posibles:

  • Implement WPA

  • Disable SSID

  • Adjust antenna placement

  • Implement WEP

Explicación

Pregunta 10 de 110

1

Which of the following is a management control?

Selecciona una o más de las siguientes respuestas posibles:

  • Logon banners

  • Written security policy

  • SYN attack prevention

  • Access Control List (ACL)

Explicación

Pregunta 11 de 110

1

Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?

Selecciona una o más de las siguientes respuestas posibles:

  • Restoration and recovery strategies

  • Deterrent strategies

  • Containment strategies

  • Detection strategies

Explicación

Pregunta 12 de 110

1

In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using?

Selecciona una o más de las siguientes respuestas posibles:

  • Three factor

  • Single factor

  • Two factor

  • Four factor

Explicación

Pregunta 13 de 110

1

Using proximity card readers instead of the traditional key punch doors would help to mitigate:

Selecciona una o más de las siguientes respuestas posibles:

  • Impersonation

  • Tailgating

  • Dumpster diving

  • Shoulder surfing

Explicación

Pregunta 14 de 110

1

Which of the following application attacks is used to gain access to SEH?

Selecciona una o más de las siguientes respuestas posibles:

  • Cookie stealing

  • Buffer overflow

  • Directory traversal

  • XML injection

Explicación

Pregunta 15 de 110

1

Which of the following is an authentication service that uses UDP as a transport medium?

Selecciona una o más de las siguientes respuestas posibles:

  • TACACS+

  • LDAP

  • Kerberos

  • RADIUS

Explicación

Pregunta 16 de 110

1

Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO)

Selecciona una o más de las siguientes respuestas posibles:

  • Tethering

  • Screen lock PIN

  • Remote wipe

  • Email password

  • GPS tracking

  • Device encryption

Explicación

Pregunta 17 de 110

1

Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane's company?

Selecciona una o más de las siguientes respuestas posibles:

  • Vulnerability scanner

  • Honeynet

  • Protocol analyzer

  • Port scanner

Explicación

Pregunta 18 de 110

1

Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company?

Selecciona una o más de las siguientes respuestas posibles:

  • Privacy Policy

  • Least Privilege

  • Acceptable Use

  • Mandatory Vacations

Explicación

Pregunta 19 de 110

1

Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?

Selecciona una o más de las siguientes respuestas posibles:

  • Network based firewall

  • Anti-spam software

  • Host based firewall

  • Anti-spyware software

Explicación

Pregunta 20 de 110

1

Which of the following protocols allows for secure transfer of files? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • ICMP

  • SNMP

  • SFTP

  • SCP

  • TFTP

Explicación

Pregunta 21 de 110

1

Which of the following passwords is the LEAST complex?

Selecciona una o más de las siguientes respuestas posibles:

  • MyTrain!45

  • Mytr@in!!

  • MyTr@in12

  • MyTr@in#8

Explicación

Pregunta 22 de 110

1

During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).

Selecciona una o más de las siguientes respuestas posibles:

  • 21

  • 22

  • 23

  • 69

  • 3389

  • SSH

  • Terminal services

  • Rlogin

  • Rsynce

  • Telnet

Explicación

Pregunta 23 de 110

1

Which of the following is an application security coding problem?

Selecciona una o más de las siguientes respuestas posibles:

  • Error and exception handling

  • Patch management

  • Application hardening

  • Application fuzzing

Explicación

Pregunta 24 de 110

1

An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement?

Selecciona una o más de las siguientes respuestas posibles:

  • Implement IIS hardening by restricting service accounts

  • Implement database hardening by applying vendor guidelines

  • Implement perimeter firewall rules to restrict access

  • Implement OS hardening by applying GPOs

Explicación

Pregunta 25 de 110

1

Which of the following is the MOST specific plan for various problems that can arise within a system?

Selecciona una o más de las siguientes respuestas posibles:

  • Business Continuity Plan

  • Continuity of Operation Plan

  • Disaster Recovery Plan

  • IT Contingency Plan

Explicación

Pregunta 26 de 110

1

Which of the following BEST describes the weakness in WEP encryption?

Selecciona una o más de las siguientes respuestas posibles:

  • The initialization vector of WEP uses a crack-able RC4 encryption algorithm. Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived.

  • The WEP key is stored in plain text and split in portions across 224 packets of random data. Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key.

  • The WEP key has a weak MD4 hashing algorithm used. A simple rainbow table can be used to generate key possibilities due to MD4 collisions.

  • The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.

Explicación

Pregunta 27 de 110

1

Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. Which of the following should Sara do to address the risk?

Selecciona una o más de las siguientes respuestas posibles:

  • Accept the risk saving $10,000

  • Ignore the risk saving $5,000

  • Mitigate the risk saving $10,000

  • Transfer the risk saving $5,000

Explicación

Pregunta 28 de 110

1

Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?

Selecciona una o más de las siguientes respuestas posibles:

  • DIAMETER

  • RADIUS

  • TACACS+

  • Kerberos

Explicación

Pregunta 29 de 110

1

Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?

Selecciona una o más de las siguientes respuestas posibles:

  • Input validation

  • Network intrusion detection system

  • Anomaly-based HIDS

  • Peer review

Explicación

Pregunta 30 de 110

1

Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?

Selecciona una o más de las siguientes respuestas posibles:

  • Sign in and sign out logs

  • Mantrap

  • Video surveillance

  • HVAC

Explicación

Pregunta 31 de 110

1

Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss to assist in an FM-200 deployment?

Selecciona una o más de las siguientes respuestas posibles:

  • Water base sprinkler system

  • Electrical

  • HVAC

  • Video surveillance

Explicación

Pregunta 32 de 110

1

Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure?

Selecciona una o más de las siguientes respuestas posibles:

  • Hardware load balancing

  • RAID

  • A cold site

  • A host standby

Explicación

Pregunta 33 de 110

1

Which of the following fire suppression systems is MOST likely used in a datacenter?

Selecciona una o más de las siguientes respuestas posibles:

  • FM-200

  • Dry-pipe

  • Wet-pipe

  • Vacuum

Explicación

Pregunta 34 de 110

1

A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?

Selecciona una o más de las siguientes respuestas posibles:

  • LDAP

  • RADIUS

  • Kerberos

  • XTACACS

Explicación

Pregunta 35 de 110

1

While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks?

Selecciona una o más de las siguientes respuestas posibles:

  • Cross-site scripting

  • Buffer overflow

  • Header manipulation

  • Directory traversal

Explicación

Pregunta 36 de 110

1

Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?

Selecciona una o más de las siguientes respuestas posibles:

  • Vulnerability assessment

  • Black box testing

  • White box testing

  • Penetration testing

Explicación

Pregunta 37 de 110

1

A security technician is working with the network firewall team to implement access controls at the company's demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond?

Selecciona una o más de las siguientes respuestas posibles:

  • Rule based access control

  • Role based access control

  • Discretionary access control

  • Mandatory access control

Explicación

Pregunta 38 de 110

1

Jane, a security administrator, has been tasked with explaining authentication services to the company's management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company's environment?

Selecciona una o más de las siguientes respuestas posibles:

  • Kerberos

  • Least privilege

  • TACACS+

  • LDAP

Explicación

Pregunta 39 de 110

1

Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this goal?

Selecciona una o más de las siguientes respuestas posibles:

  • A host-based intrusion prevention system

  • A host-based firewall

  • Antivirus update system

  • A network-based intrusion detection system

Explicación

Pregunta 40 de 110

1

Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?

Selecciona una o más de las siguientes respuestas posibles:

  • Firewall

  • Switch

  • URL content filter

  • Spam filter

Explicación

Pregunta 41 de 110

1

Pete, the system administrator, wishes to monitor and limit users' access to external websites. Which of the following would BEST address this?

Selecciona una o más de las siguientes respuestas posibles:

  • Block all traffic on port 80

  • Implement NIDS

  • Use server load balancers

  • Install a proxy server

Explicación

Pregunta 42 de 110

1

Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?

Selecciona una o más de las siguientes respuestas posibles:

  • PAT

  • NAP

  • DNAT

  • NAC

Explicación

Pregunta 43 de 110

1

Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability?

Selecciona una o más de las siguientes respuestas posibles:

  • Twofish

  • Diffie-Hellman

  • ECC

  • RSA

Explicación

Pregunta 44 de 110

1

Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach?

Selecciona una o más de las siguientes respuestas posibles:

  • $1,500

  • $3,750

  • $15,000

  • $75,000

Explicación

Pregunta 45 de 110

1

Methods to test the responses of software and web applications to unusual or unexpected inputs is known as:

Selecciona una o más de las siguientes respuestas posibles:

  • Brute force

  • HTML encoding

  • Web crawling

  • Fuzzing

Explicación

Pregunta 46 de 110

1

Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?

Selecciona una o más de las siguientes respuestas posibles:

  • TCP 23

  • UDP 69

  • TCP 22

  • TCP 21

Explicación

Pregunta 47 de 110

1

Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent?

Selecciona una o más de las siguientes respuestas posibles:

  • Warm site

  • Load balancing

  • Clustering

  • RAID

Explicación

Pregunta 48 de 110

1

Which statement is TRUE about the operation of a packet sniffer?

Selecciona una o más de las siguientes respuestas posibles:

  • It can only have one interface on a management network

  • They are required for firewall operation and stateful inspection

  • The Ethernet card must be placed in promiscuous mode

  • It must be placed on a single virtual LAN interface

Explicación

Pregunta 49 de 110

1

Which of the following firewall rules only denies DNS zone transfers?

Selecciona una o más de las siguientes respuestas posibles:

  • deny udp any any port 53

  • deny ip any any

  • deny tcp any any port 53

  • deny all dns packets

Explicación

Pregunta 50 de 110

1

Which of the following BEST explains the use of an HSM within the company servers?

Selecciona una o más de las siguientes respuestas posibles:

  • Thumb drives present a significant threat which is mitigated by HSM

  • Software encryption can perform multiple functions required by HSM

  • Data loss by removable media can be prevented with DLP

  • Hardware encryption is faster than software encryption

Explicación

Pregunta 51 de 110

1

Which of the following technologies can store multi-tenant data with different security requirements?

Selecciona una o más de las siguientes respuestas posibles:

  • Data loss prevention

  • Trusted platform module

  • Hard drive encryption

  • Cloud computing

Explicación

Pregunta 52 de 110

1

Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company data. Where and how should Matt meet this requirement?

Selecciona una o más de las siguientes respuestas posibles:

  • Matt should implement access control lists and turn on EFS

  • Matt should implement DLP and encrypt the company database

  • Matt should install Truecrypt and encrypt the company server

  • Matt should install TPMs and encrypt the company database

Explicación

Pregunta 53 de 110

1

Which of the following types of encryption will help in protecting files on a PED?

Selecciona una o más de las siguientes respuestas posibles:

  • Mobile device encryption

  • Transport layer encryption

  • Encrypted hidden container

  • Database encryption

Explicación

Pregunta 54 de 110

1

Which of the following does full disk encryption prevent?

Selecciona una o más de las siguientes respuestas posibles:

  • Client side attacks

  • Clear text access

  • Database theft

  • Network-based attacks

Explicación

Pregunta 55 de 110

1

Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company's password policy. Which of the following should Pete do NEXT?

Selecciona una o más de las siguientes respuestas posibles:

  • Contact the Chief Information Officer and ask them to change the company password policy so that the application is made compliant

  • Tell the application development manager to code the application to adhere to the company's password policy

  • Ask the application development manager to submit a risk acceptance memo so that the issue can be documented

  • Inform the Chief Information Officer of non-adherence to the security policy so that the developers can be reprimanded

Explicación

Pregunta 56 de 110

1

Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning?

Selecciona una o más de las siguientes respuestas posibles:

  • A recent security breach in which passwords were cracked

  • Implementation of configuration management processes

  • Enforcement of password complexity requirements

  • Implementation of account lockout procedures

Explicación

Pregunta 57 de 110

1

Which of the following presents the STRONGEST access control?

Selecciona una o más de las siguientes respuestas posibles:

  • MAC

  • TACACS

  • DAC

  • RBAC

Explicación

Pregunta 58 de 110

1

Which of the following encompasses application patch management?

Selecciona una o más de las siguientes respuestas posibles:

  • Configuration management

  • Policy management

  • Cross-site request forgery

  • Fuzzing

Explicación

Pregunta 59 de 110

1

Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent?

Selecciona una o más de las siguientes respuestas posibles:

  • Buffer overflow

  • Pop-up blockers

  • Cross-site scripting

  • Fuzzing

Explicación

Pregunta 60 de 110

1

Which of the following is the LEAST volatile when performing incident response procedures?

Selecciona una o más de las siguientes respuestas posibles:

  • Registers

  • RAID cache

  • RAM

  • Hard drive

Explicación

Pregunta 61 de 110

1

Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall application but does not have all the details. Jane needs to review the software before it is released to production. Which of the following reviews should Jane conduct?

Selecciona una o más de las siguientes respuestas posibles:

  • Gray Box Testing

  • Black Box Testing

  • Business Impact Analysis

  • White Box Testing

Explicación

Pregunta 62 de 110

1

The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following?

Selecciona una o más de las siguientes respuestas posibles:

  • Rainbow tables attacks

  • Brute force attacks

  • Birthday attacks

  • Cognitive passwords attacks

Explicación

Pregunta 63 de 110

1

Pete's corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent?

Selecciona una o más de las siguientes respuestas posibles:

  • Collusion

  • Impersonation

  • Pharming

  • Transitive Access

Explicación

Pregunta 64 de 110

1

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?

Selecciona una o más de las siguientes respuestas posibles:

  • Interference

  • Man-in-the-middle

  • ARP poisoning

  • Rogue access point

Explicación

Pregunta 65 de 110

1

Which of the following can be implemented with multiple bit strength?

Selecciona una o más de las siguientes respuestas posibles:

  • AES

  • DES

  • SHA-1

  • MD5

Explicación

Pregunta 66 de 110

1

Pete, the system administrator, has blocked users from accessing social media web sites. In addition to protecting company information from being accidentally leaked, which additional security benefit does this provide?

Selecciona una o más de las siguientes respuestas posibles:

  • No competition with the company's official social presence

  • Protection against malware introduced by banner ads

  • Increased user productivity based upon fewer distractions

  • Elimination of risks caused by unauthorized P2P file sharing

Explicación

Pregunta 67 de 110

1

Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Pete's BEST option?

Selecciona una o más de las siguientes respuestas posibles:

  • Use hardware already at an offsite location and configure it to be quickly utilized

  • Move the servers and data to another part of the company's main campus from the server room

  • Retain data back-ups on the main campus and establish redundant servers in a virtual environment

  • Move the data back-ups to the offsite location, but retain the hardware on the main campus for redundancy

Explicación

Pregunta 68 de 110

1

A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?

Selecciona una o más de las siguientes respuestas posibles:

  • Block cipher

  • Stream cipher

  • CRC

  • Hashing algorithm

Explicación

Pregunta 69 de 110

1

Which of the following is the BEST approach to perform risk mitigation of user access control rights?

Selecciona una o más de las siguientes respuestas posibles:

  • Conduct surveys and rank the results

  • Perform routine user permission reviews

  • Implement periodic vulnerability scanning

  • Disable user accounts that have not been used within the last two weeks

Explicación

Pregunta 70 de 110

1

Which of the following devices is BEST suited for servers that need to store private keys?

Selecciona una o más de las siguientes respuestas posibles:

  • Hardware security module

  • Hardened network firewall

  • Solid state disk drive

  • Hardened host firewall

Explicación

Pregunta 71 de 110

1

All of the following are valid cryptographic hash functions EXCEPT:

Selecciona una o más de las siguientes respuestas posibles:

  • RIPEMD

  • RC4

  • SHA-512

  • MD4

Explicación

Pregunta 72 de 110

1

In regards to secure coding practices, why is input validation important?

Selecciona una o más de las siguientes respuestas posibles:

  • It mitigates buffer overflow attacks

  • It makes the code more readable

  • It provides an application configuration baseline

  • It meets gray box testing standards

Explicación

Pregunta 73 de 110

1

Which of the following would be used when a higher level of security is desired for encryption key storage?

Selecciona una o más de las siguientes respuestas posibles:

  • TACACS+

  • L2TP

  • LDAP

  • TPM

Explicación

Pregunta 74 de 110

1

A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?

Selecciona una o más de las siguientes respuestas posibles:

  • Firewall

  • Application

  • IDS

  • Security

Explicación

Pregunta 75 de 110

1

Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?

Selecciona una o más de las siguientes respuestas posibles:

  • Smartcard

  • Token

  • Discretionary access control

  • Mandatory access control

Explicación

Pregunta 76 de 110

1

Which of the following devices would MOST likely have a DMZ interface?

Selecciona una o más de las siguientes respuestas posibles:

  • Firewall

  • Switch

  • Load balancer

  • Proxy

Explicación

Pregunta 77 de 110

1

Which of the following application security testing techniques is implemented when an automated system generates random input data?

Selecciona una o más de las siguientes respuestas posibles:

  • Fuzzing

  • XSRF

  • Hardening

  • Input validation

Explicación

Pregunta 78 de 110

1

Which of the following can be used by a security administrator to successfully recover a user's forgotten password on a password protected file?

Selecciona una o más de las siguientes respuestas posibles:

  • Cognitive password

  • Password sniffing

  • Brute force

  • Social engineering

Explicación

Pregunta 79 de 110

1

A security administrator wants to check user password complexity. Which of the following is the BEST tool to use?

Selecciona una o más de las siguientes respuestas posibles:

  • Password history

  • Password logging

  • Password cracker

  • Password hashing

Explicación

Pregunta 80 de 110

1

Certificates are used for: (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • Client authentication

  • WEP encryption

  • Access control lists

  • Code signing

  • Password hashing

Explicación

Pregunta 81 de 110

1

An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?

Selecciona una o más de las siguientes respuestas posibles:

  • TCP/IP

  • SSL

  • SCP

  • SSH

Explicación

Pregunta 82 de 110

1

A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company. Which of the following would fulfill the CISO's requirements?

Selecciona una o más de las siguientes respuestas posibles:

  • Username and password

  • Retina scan and fingerprint scan

  • USB token and PIN

  • Proximity badge and token

Explicación

Pregunta 83 de 110

1

Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended?

Selecciona una o más de las siguientes respuestas posibles:

  • Screen lock

  • Voice encryption

  • GPS tracking

  • Device encryption

Explicación

Pregunta 84 de 110

1

Which of the following would a security administrator implement in order to identify a problem between two systems that are not communicating properly?

Selecciona una o más de las siguientes respuestas posibles:

  • Protocol analyzer

  • Baseline report

  • Risk assessment

  • Vulnerability scan

Explicación

Pregunta 85 de 110

1

Which of the following can result in significant administrative overhead from incorrect reporting?

Selecciona una o más de las siguientes respuestas posibles:

  • Job rotation

  • Acceptable usage policies

  • False positives

  • Mandatory vacations

Explicación

Pregunta 86 de 110

1

A security administrator wants to perform routine tests on the network during working hours when certain applications are being accessed by the most people. Which of the following would allow the security administrator to test the lack of security controls for those applications with the least impact to the system?

Selecciona una o más de las siguientes respuestas posibles:

  • Penetration test

  • Vulnerability scan

  • Load testing

  • Port scanner

Explicación

Pregunta 87 de 110

1

Which of the following risk concepts requires an organization to determine the number of failures per year?

Selecciona una o más de las siguientes respuestas posibles:

  • SLE

  • ALE

  • MTBF

  • Quantitative analysis

Explicación

Pregunta 88 de 110

1

Three of the primary security control types that can be implemented are:

Selecciona una o más de las siguientes respuestas posibles:

  • supervisory, subordinate, and peer

  • personal, procedural, and legal

  • operational, technical, and management

  • mandatory, discretionary, and permanent

Explicación

Pregunta 89 de 110

1

The helpdesk reports increased calls from clients reporting spikes in malware infections on their systems. Which of the following phases of incident response is MOST appropriate as a FIRST response?

Selecciona una o más de las siguientes respuestas posibles:

  • Recovery

  • Follow-up

  • Validation

  • Identification

Explicación

Pregunta 90 de 110

1

A company is trying to implement physical deterrent controls to improve the overall security posture of their data center. Which of the following BEST meets their goal?

Selecciona una o más de las siguientes respuestas posibles:

  • Visitor logs

  • Firewall

  • Hardware locks

  • Environmental monitoring

Explicación

Pregunta 91 de 110

1

A company's employees were victims of a spear phishing campaign impersonating the CEO. The company would now like to implement a solution to improve the overall security posture by assuring their employees that email originated from the CEO. Which of the following controls could they implement to BEST meet this goal?

Selecciona una o más de las siguientes respuestas posibles:

  • Spam filter

  • Digital signatures

  • Antivirus software

  • Digital certificates

Explicación

Pregunta 92 de 110

1

A security technician is attempting to improve the overall security posture of an internal mail server. Which of the following actions would BEST accomplish this goal?

Selecciona una o más de las siguientes respuestas posibles:

  • Monitoring event logs daily

  • Disabling unnecessary services

  • Deploying a content filter on the network

  • Deploy an IDS on the network

Explicación

Pregunta 93 de 110

1

A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen?

Selecciona una o más de las siguientes respuestas posibles:

  • Application control

  • Remote wiping

  • GPS

  • Screen-locks

Explicación

Pregunta 94 de 110

1

Which of the following is the primary security concern when deploying a mobile device on a network?

Selecciona una o más de las siguientes respuestas posibles:

  • Strong authentication

  • Interoperability

  • Data security

  • Cloud storage technique

Explicación

Pregunta 95 de 110

1

Which of the following technical controls is BEST used to define which applications a user can install and run on a company issued mobile device?

Selecciona una o más de las siguientes respuestas posibles:

  • Authentication

  • Blacklisting

  • Whitelisting

  • Acceptable use policy

Explicación

Pregunta 96 de 110

1

After a company has standardized to a single operating system, not all servers are immune to a well-known OS vulnerability. Which of the following solutions would mitigate this issue?

Selecciona una o más de las siguientes respuestas posibles:

  • Host based firewall

  • Initial baseline configurations

  • Discretionary access control

  • Patch management system

Explicación

Pregunta 97 de 110

1

A security administrator discovers an image file that has several plain text documents hidden in the file. Which of the following security goals is met by camouflaging data inside of other files?

Selecciona una o más de las siguientes respuestas posibles:

  • Integrity

  • Confidentiality

  • Steganography

  • Availability

Explicación

Pregunta 98 de 110

1

A company determines a need for additional protection from rogue devices plugging into physical ports around the building. Which of the following provides the highest degree of protection from unauthorized wired network access?

Selecciona una o más de las siguientes respuestas posibles:

  • Intrusion Prevention Systems

  • MAC filtering

  • Flood guards

  • 802.1x

Explicación

Pregunta 99 de 110

1

A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server's drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO? (Select TWO)

Selecciona una o más de las siguientes respuestas posibles:

  • Disk hashing procedures

  • Full disk encryption

  • Data retention policies

  • Disk wiping procedures

  • Removable media encryption

Explicación

Pregunta 100 de 110

1

During the analysis of a PCAP file, a security analyst noticed several communications with a remote server on port 53. Which of the following protocol types is observed in this traffic?

Selecciona una o más de las siguientes respuestas posibles:

  • FTP

  • DNS

  • Email

  • NetBIOS

Explicación

Pregunta 101 de 110

1

A compromised workstation utilized in a Distributed Denial of Service (DDOS) attack has been removed from the network and an image of the hard drive has been created. However, the system administrator stated that the system was left unattended for several hours before the image was created. In the event of a court case, which of the following is likely to be an issue with this incident?

Selecciona una o más de las siguientes respuestas posibles:

  • Eye Witness

  • Data Analysis of the hard drive

  • Chain of custody

  • Expert Witness

Explicación

Pregunta 102 de 110

1

During which of the following phases of the Incident Response process should a security administrator define and implement general defense against malware?

Selecciona una o más de las siguientes respuestas posibles:

  • Lessons Learned

  • Preparation

  • Eradication

  • Identification

Explicación

Pregunta 103 de 110

1

Due to hardware limitation, a technician must implement a wireless encryption algorithm that uses the RC4 protocol. Which of the following is a wireless encryption solution that the technician should implement while ensuring the STRONGEST level of security?

Selecciona una o más de las siguientes respuestas posibles:

  • WPA2-AES

  • 802.11ac

  • WPA-TKIP

  • WEP

Explicación

Pregunta 104 de 110

1

Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify that the email came from Joe and decrypt it? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • The CA's public key

  • Ann's public key

  • Joe's private key

  • Ann's private key

  • The CA's private key

  • Joe's public key

Explicación

Pregunta 105 de 110

1

Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify the validity's of Joe's certificate? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • The CA's public key

  • Joe's private key

  • Ann's public key

  • The CA's private key

  • Joe's public key

  • Ann's private key

Explicación

Pregunta 106 de 110

1

A technician wants to implement a dual factor authentication system that will enable the organization to authorize access to sensitive systems on a need-to-know basis. Which of the following should be implemented during the authorization stage?

Selecciona una o más de las siguientes respuestas posibles:

  • Biometrics

  • Mandatory access control

  • Single sign-on

  • Role-based access control

Explicación

Pregunta 107 de 110

1

A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file was found on an underused server and appears to contain a zero-day exploit. Which of the following can the researcher do to determine if the file is malicious in nature?

Selecciona una o más de las siguientes respuestas posibles:

  • TCP/IP socket design review

  • Executable code review

  • OS Baseline comparison

  • Software architecture review

Explicación

Pregunta 108 de 110

1

A recent spike in virus detections has been attributed to end-users visiting www.compnay.com. The business has an established relationship with an organization using the URL of www.company.com but not with the site that has been causing the infections. Which of the following would BEST describe this type of attack?

Selecciona una o más de las siguientes respuestas posibles:

  • Typo squatting

  • Session hijacking

  • Cross-site scripting

  • Spear phishing

Explicación

Pregunta 109 de 110

1

A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration. Which of the following should be implemented to secure the devices without risking availability?

Selecciona una o más de las siguientes respuestas posibles:

  • Host-based firewall

  • IDS

  • IPS

  • Honeypot

Explicación

Pregunta 110 de 110

1

An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire?

Selecciona una o más de las siguientes respuestas posibles:

  • Install a proxy server between the users' computers and the switch to filter inbound network traffic.

  • Block commonly used ports and forward them to higher and unused port numbers.

  • Configure the switch to allow only traffic from computers based upon their physical address.

  • Install host-based intrusion detection software to monitor incoming DHCP Discover requests.

Explicación