Quix16 - 125Q

Description

100 RedBlue Test Quiz on Quix16 - 125Q, created by Requiemdust Sheena on 02/07/2020.
Requiemdust Sheena
Quiz by Requiemdust Sheena, updated more than 1 year ago
Requiemdust Sheena
Created by Requiemdust Sheena over 4 years ago
463
1

Resource summary

Question 1

Question
James is building a disaster recovery plan for his organization and would like to determine the amount of acceptable data loss after an outage. What variable is James determining?
Answer
  • A. SLA
  • B. RTO
  • C. MTD
  • D. RPO

Question 2

Question
Fred needs to deploy a network device that can connect his network to other networks while controlling traffic on his network. What type of device is Fred’s best choice?
Answer
  • A. A switch
  • B. A bridge
  • C. A gateway
  • D. A router

Question 3

Question
Alex is preparing to solicit bids for a penetration test of his company’s network and systems. He wants to maximize the effectiveness of the testing rather than the realism of the test. What type of penetration test should he require in his bidding process?
Answer
  • A. Black box
  • B. Crystal box
  • C. Gray box
  • D. Zero box

Question 4

Question
Which one of the following is not a key process area for the Repeatable phase of the Software Capability Maturity Model (SWCMM)?
Answer
  • A. Software Project Planning
  • B. Software Quality Management
  • C. Software Project Tracking
  • D. Software Subcontract Management

Question 5

Question
Application banner information is typically recorded during what penetration testing phase?
Answer
  • A. Planning
  • B. Attack
  • C. Reporting
  • D. Discovery

Question 6

Question
What is the default subnet mask for a Class B network?
Answer
  • A. 255.0.0.0
  • B. 255.255.0.0
  • C. 255.254.0.0
  • D. 255.255.255.0

Question 7

Question
Jim has been asked to individually identify devices that users are bringing to work as part of a new BYOD policy. The devices will not be joined to a central management system like Active Directory, but he still needs to uniquely identify the systems. Which of the following options will provide Jim with the best means of reliably identifying each unique device?
Answer
  • A. Record the MAC address of each system.
  • B. Require users to fill out a form to register each system.
  • C. Scan each system using a port scanner.
  • D. Use device fingerprinting via a web-based registration system.

Question 8

Question
David works in an organization that uses a formal data governance program. He is consulting with an employee working on a project that created an entirely new class of data and wants to work with the appropriate individual to assign a classification level to that information. Who is responsible for the assignment of information to a classification level?
Answer
  • A. Data creator
  • B. Data owner
  • C. CISO
  • D. Data custodian

Question 9

Question
What type of inbound packet is characteristic of a ping flood attack?
Answer
  • A. ICMP echo request
  • B. ICMP echo reply
  • C. ICMP destination unreachable
  • D. ICMP route changed

Question 10

Question
Gabe is concerned about the security of passwords used as a cornerstone of his organization’s information security program. Which one of the following controls would provide the greatest improvement in Gabe’s ability to authenticate users?
Answer
  • A. More complex passwords
  • B. User education against social engineering
  • C. Multifactor authentication
  • D. Addition of security questions based on personal knowledge

Question 11

Question
The separation of network infrastructure from the control layer, combined with the ability to centrally program a network design in a vendor-neutral, standards-based implementation, is an example of what important concept?
Answer
  • A. MPLS, a way to replace long network addresses with shorter labels and support a wide range of protocols
  • B. FCoE, a converged protocol that allows common applications over Ethernet
  • C. SDN, a converged protocol that allows network virtualization
  • D. CDN, a converged protocol that makes common network designs accessible

Question 12

Question
Susan is preparing to decommission her organization’s archival DVDROMs that contain Top Secret data. How should she ensure that the data cannot be exposed?
Answer
  • A. Degauss
  • B. Zero wipe
  • C. Pulverize
  • D. Secure erase

Question 13

Question
What is the final stage of the Software Capability Maturity Model (SWCMM)?
Answer
  • A. Repeatable
  • B. Defined
  • C. Managed
  • D. Optimizing

Question 14

Question
Angie is configuring egress monitoring on her network to provide added security. Which one of the following packet types should Angie allow to leave the network headed for the Internet?
Answer
  • A. Packets with a source address from Angie’s public IP address block
  • B. Packets with a destination address from Angie’s public IP address block
  • C. Packets with a source address outside Angie’s address block
  • D. Packets with a source address from Angie’s private address block

Question 15

Question
Matt is conducting a penetration test against a Linux server and successfully gained access to an administrative account. He would now like to obtain the password hashes for use in a brute-force attack. Where is he likely to find the hashes, assuming the system is configured to modern security standards?
Answer
  • A. /etc/passwd
  • B. /etc/hash
  • C. /etc/secure
  • D. /etc/shadow

Question 16

Question
Theresa is implementing a new access control system and wants to ensure that developers do not have the ability to move code from development systems into the production environment. What information security principle is she most directly enforcing?
Answer
  • A. Separation of duties
  • B. Two-person control
  • C. Least privilege
  • D. Job rotation

Question 17

Question
Which one of the following tools may be used to achieve the goal of nonrepudiation?
Answer
  • A. Digital signature
  • B. Symmetric encryption
  • C. Firewall
  • D. IDS

Question 18

Question
In this diagram of the TCP three-way handshake, what should system A send to system B in step 3?
Answer
  • A. ACK
  • B. SYN
  • C. FIN
  • D. RST

Question 19

Question
What RADIUS alternative is commonly used for Cisco network gear and supports two-factor authentication?
Answer
  • A. RADIUS+
  • B. TACACS+
  • C. XTACACS
  • D. Kerberos

Question 20

Question
What two types of attacks are VoIP call managers and VoIP phones most likely to be susceptible to?
Answer
  • A. DoS and malware
  • B. Worms and Trojans
  • C. DoS and host OS attacks
  • D. Host OS attacks and buffer overflows

Question 21

Question
Vivian works for a chain of retail stores and would like to use a software product that restricts the software used on point-of-sale terminals to those packages on a preapproved list. What approach should Vivian use?
Answer
  • A. Antivirus
  • B. Heuristic
  • C. Whitelist
  • D. Blacklist

Question 22

Question
Hunter is the facilities manager for DataTech, a large data center management firm. He is evaluating the installation of a flood prevention system at one of DataTech’s facilities. The facility and contents are valued at $100 million. Installing the new flood prevention system would cost $10 million. Hunter consulted with flood experts and determined that the facility lies within a 200-year flood plain and that, if a flood occurred, it would likely cause $20 million in damage to the facility. Based on the information in this scenario, what is the exposure factor for the effect of a flood on DataTech’s data center?
Answer
  • A. 2%
  • B. 20%
  • C. 100%
  • D. 200%

Question 23

Question
Hunter is the facilities manager for DataTech, a large data center management firm. He is evaluating the installation of a flood prevention system at one of DataTech’s facilities. The facility and contents are valued at $100 million. Installing the new flood prevention system would cost $10 million. Hunter consulted with flood experts and determined that the facility lies within a 200-year flood plain and that, if a flood occurred, it would likely cause $20 million in damage to the facility. Based on the information in this scenario, what is the annualized rate of occurrence for a flood at DataTech’s data center?
Answer
  • A. 0.002
  • B. 0.005
  • C. 0.02
  • D. 0.05

Question 24

Question
Hunter is the facilities manager for DataTech, a large data center management firm. He is evaluating the installation of a flood prevention system at one of DataTech’s facilities. The facility and contents are valued at $100 million. Installing the new flood prevention system would cost $10 million. Hunter consulted with flood experts and determined that the facility lies within a 200-year flood plain and that, if a flood occurred, it would likely cause $20 million in damage to the facility. Based on the information in this scenario, what is the annualized loss expectancy for a flood at DataTech’s data center?
Answer
  • A. $40,000
  • B. $100,000
  • C. $400,000
  • D. $1,000,000

Question 25

Question
Which accounts are typically assessed during an account management assessment?
Answer
  • A. A random sample
  • B. Highly privileged accounts
  • C. Recently generated accounts
  • D. Accounts that have existed for long periods of time

Question 26

Question
Which one of the following tools might an attacker use to best identify vulnerabilities in a targeted system?
Answer
  • A. Nmap
  • B. Nessus
  • C. ipconfig
  • D. traceroute

Question 27

Question
What type of error occurs when a valid subject using a biometric authenticator is not authenticated?
Answer
  • A. A Type 1 error
  • B. A Type 2 error
  • C. A Type 3 error
  • D. A Type 4 error

Question 28

Question
Jackie is creating a database that contains the Customers table, shown here. She is designing a new table to contain Orders and plans to use the Company ID in that table to uniquely identify the customer associated with each order. What role does the Company ID field play in the Orders table?
Answer
  • A. Primary key
  • B. Foreign key
  • C. Candidate key
  • D. Referential key

Question 29

Question
What three types of interfaces are typically tested during software testing?
Answer
  • A. Network, physical, and application interfaces
  • B. APIs, UIs, and physical interfaces
  • C. Network interfaces, APIs, and UIs
  • D. Application, programmatic, and user interfaces

Question 30

Question
George is assisting a prosecutor with a case against a hacker who attempted to break into the computer systems at George’s company. He provides system logs to the prosecutor for use as evidence, but the prosecutor insists that George testify in court about how he gathered the logs. What rule of evidence requires George’s testimony?
Answer
  • A. Testimonial evidence rule
  • B. Parol evidence rule
  • C. Best evidence rule
  • D. Hearsay rule

Question 31

Question
Which of the following is not a valid use for key risk indicators?
Answer
  • A. Provide warnings before issues occur.
  • B. Provide real-time incident response information.
  • C. Provide historical views of past risks.
  • D. Provide insight into risk tolerance for the organization.

Question 32

Question
Which one of the following malware types uses built-in propagation mechanisms that exploit system vulnerabilities to spread?
Answer
  • A. Trojan horse
  • B. Worm
  • C. Logic bomb
  • D. Virus

Question 33

Question
Don’s company is considering the use of an object-based storage system where data is placed in a vendor-managed storage environment through the use of API calls. What type of cloud computing service is in use?
Answer
  • A. IaaS
  • B. PaaS
  • C. CaaS
  • D. SaaS

Question 34

Question
In what model of cloud computing do two or more organizations collaborate to build a shared cloud computing environment that is for their own use?
Answer
  • A. Public cloud
  • B. Private cloud
  • C. Community cloud
  • D. Shared cloud

Question 35

Question
Which one of the following is not a principle of the Agile approach to software development?
Answer
  • A. The most efficient method of conveying information is electronic.
  • B. Working software is the primary measure of progress.
  • C. Simplicity is essential.
  • D. Businesspeople and developers must work together daily.

Question 36

Question
Harry is concerned that accountants within his organization will use data diddling attacks to cover up fraudulent activity in accounts that they normally access. Which one of the following controls would best defend against this type of attack?
Answer
  • A. Encryption
  • B. Access controls
  • C. Integrity verification
  • D. Firewalls

Question 37

Question
What class of fire extinguisher is capable of fighting electrical fires?
Answer
  • A. Class A
  • B. Class B
  • C. Class C
  • D. Class D

Question 38

Question
What important factor differentiates Frame Relay from X.25?
Answer
  • A. Frame Relay supports multiple PVCs over a single WAN carrier connection.
  • B. Frame Relay is a cell switching technology instead of a packet switching technology like X.25.
  • C. Frame Relay does not provide a Committed Information Rate (CIR).
  • D. Frame Relay only requires a DTE on the provider side.

Question 39

Question
Using the following table and your knowledge of the auditing process As they prepare to migrate their data center to an infrastructure as a service (IaaS) provider, Susan’s company wants to understand the effectiveness of their new provider’s security, integrity, and availability controls. What SOC report would provide them with the most detail, including input from the auditor on the effectiveness of controls at the IaaS provider?
Answer
  • A. SOC 1.
  • B. SOC 2.
  • C. SOC 3.
  • D. None of the SOC reports are suited to this, and they should request another form of report.

Question 40

Question
Metrics like the attack vector, complexity, exploit maturity, and how much user interaction is required are all found in what scoring system?
Answer
  • A. CVE
  • B. CVSS
  • C. CNA
  • D. NVD

Question 41

Question
Using the following table and your knowledge of the auditing process Susan wants to ensure that the audit report that her organization requested includes input from an external auditor. What type of report should she request?
Answer
  • A. SOC 2, Type 1
  • B. SOC 3, Type 1
  • C. SOC 2, Type 2
  • D. SOC 3, Type 2

Question 42

Question
Using the following table and your knowledge of the auditing process When Susan requests a SOC 2 report, she receives a SAS 70 report. What issue should Susan raise?
Answer
  • A. SAS 70 does not include Type 2 reports, so control evaluation is only point in time.
  • B. SAS 70 has been replaced.
  • C. SAS 70 is a financial reporting standard and does not cover data centers.
  • D. SAS 70 only uses a 3-month period for testing.

Question 43

Question
What two logical network topologies can be physically implemented as a star topology?
Answer
  • A. A bus and a mesh.
  • B. A ring and a mesh.
  • C. A bus and a ring.
  • D. It is not possible to implement other topologies as a star.

Question 44

Question
Bell-LaPadula is an example of what type of access control model?
Answer
  • A. DAC
  • B. RBAC
  • C. MAC
  • D. ABAC

Question 45

Question
Martha is the information security officer for a small college and is responsible for safeguarding the privacy of student records. What law most directly applies to her situation?
Answer
  • A. HIPAA
  • B. HITECH
  • C. COPPA
  • D. FERPA

Question 46

Question
What US law mandates the protection of protected health information?
Answer
  • A. FERPA
  • B. SAFE Act
  • C. GLBA
  • D. HIPAA

Question 47

Question
Which one of the following techniques can an attacker use to exploit a TOC/TOU vulnerability?
Answer
  • A. File locking
  • B. Exception handling
  • C. Algorithmic complexity
  • D. Concurrency control

Question 48

Question
Susan is configuring her network devices to use syslog. What should she set to ensure that she is notified about issues but does not receive normal operational issue messages?
Answer
  • A. The facility code
  • B. The log priority
  • C. The security level
  • D. The severity level

Question 49

Question
What RAID level is also known as disk mirroring?
Answer
  • A. RAID 0
  • B. RAID 1
  • C. RAID 3
  • D. RAID 5

Question 50

Question
What type of firewall uses multiple proxy servers that filter traffic based on analysis of the protocols used for each service?
Answer
  • A. A static packet filtering firewall
  • B. An application-level gateway firewall
  • C. A circuit-level gateway firewall
  • D. A stateful inspection firewall

Question 51

Question
Surveys, interviews, and audits are all examples of ways to measure what important part of an organization’s security posture?
Answer
  • A. Code quality
  • B. Service vulnerabilities
  • C. Awareness
  • D. Attack surface

Question 52

Question
Tom is the general counsel for an Internet service provider, and he recently received notice of a lawsuit against the firm because of copyrighted content illegally transmitted over the provider’s circuits by a customer. What law protects Tom’s company in this case?
Answer
  • A. Computer Fraud and Abuse Act
  • B. Digital Millennium Copyright Act
  • C. Wiretap Act
  • D. Copyright Code

Question 53

Question
A Type 2 authentication factor that generates dynamic passwords based on a time- or algorithm-based system is what type of authenticator?
Answer
  • A. A PIV
  • B. A smart card
  • C. A token
  • D. A CAC

Question 54

Question
Fred’s new employer has hired him for a position with access to their trade secrets and confidential internal data. What legal tool should they use to help protect their data if he chooses to leave to work at a competitor?
Answer
  • A. A stop-loss order
  • B. An NDA
  • C. An AUP
  • D. Encryption

Question 55

Question
Which one of the following computing models allows the execution of multiple processes on a single processor by having the operating system switch between them without requiring modification to the applications?
Answer
  • A. Multitasking
  • B. Multiprocessing
  • C. Multiprogramming
  • D. Multithreading

Question 56

Question
How many possible keys exist when using a cryptographic algorithm that has an 8-bit binary encryption key?
Answer
  • A. 16
  • B. 128
  • C. 256
  • D. 512

Question 57

Question
What activity is being performed when you apply security controls based on the specific needs of the IT system that they will be applied to?
Answer
  • A. Standardizing
  • B. Baselining
  • C. Scoping
  • D. Tailoring

Question 58

Question
During what phase of the electronic discovery process does an organization perform a rough cut of the information gathered to discard irrelevant information?
Answer
  • A. Preservation
  • B. Identification
  • C. Collection
  • D. Processing

Question 59

Question
Ben’s job is to ensure that data is labeled with the appropriate sensitivity label. Since Ben works for the US government, he has to apply the labels Unclassified, Confidential, Secret, and Top Secret to systems and media. If Ben is asked to label a system that handles Secret, Confidential, and Unclassified information, how should he label it?
Answer
  • A. Mixed classification
  • B. Confidential
  • C. Top Secret
  • D. Secret

Question 60

Question
Susan has discovered that the smart card-based locks used to keep the facility she works at secure are not effective because staff members are propping the doors open. She places signs on the doors reminding staff that leaving the door open creates a security issue, and she adds alarms that will sound if the doors are left open for more than five minutes. What type of controls has she put into place?
Answer
  • A. Physical
  • B. Administrative
  • C. Compensation
  • D. Recovery

Question 61

Question
Ben is concerned about password cracking attacks against his system. He would like to implement controls that prevent an attacker who has obtained those hashes from easily cracking them. What two controls would best meet this objective?
Answer
  • A. Longer passwords and salting
  • B. Over-the-wire encryption and use of SHA1 instead of MD5
  • C. Salting and use of MD5
  • D. Using shadow passwords and salting

Question 62

Question
Amanda is considering the implementation of a database recovery mechanism recommended by a consultant. In the recommended approach, an automated process will move records of transactions from the primary site to a backup site on an hourly basis. What type of database recovery technique is the consultant describing?
Answer
  • A. Electronic vaulting
  • B. Transaction logging
  • C. Remote mirroring
  • D. Remote journaling

Question 63

Question
Which group is best suited to evaluate and report on the effectiveness of administrative controls an organization has put in place to a third party?
Answer
  • A. Internal auditors
  • B. Penetration testers
  • C. External auditors
  • D. Employees who design, implement, and monitor the controls

Question 64

Question
A process on a system needs access to a file that is currently in use by another process. What state will the process scheduler place this process in until the file becomes available?
Answer
  • A. Running
  • B. Ready
  • C. Waiting
  • D. Stopped

Question 65

Question
Renee is using encryption to safeguard sensitive business secrets when in transit over the Internet. What risk metric is she attempting to lower?
Answer
  • A. Likelihood
  • B. RTO
  • C. MTO
  • D. Impact

Question 66

Question
As part of hiring a new employee, Kathleen’s identity management team creates a new user object and ensures that the user object is available in the directories and systems where it is needed. What is this process called?
Answer
  • A. Registration
  • B. Provisioning
  • C. Population
  • D. Authenticator loading

Question 67

Question
Ricky would like to access a remote file server through a VPN connection. He begins this process by connecting to the VPN and attempting to log in. Applying the subject/object model to this request, what is the subject of Ricky’s login attempt?
Answer
  • A. Ricky
  • B. VPN
  • C. Remote file server
  • D. Files contained on the remote server

Question 68

Question
Alice is designing a cryptosystem for use by six users and would like to use a symmetric encryption algorithm. She wants any two users to be able to communicate with each other without worrying about eavesdropping by a third user. How many symmetric encryption keys will she need to generate?
Answer
  • A. 6
  • B. 12
  • C. 15
  • D. 30

Question 69

Question
Which one of the following intellectual property protection mechanisms has the shortest duration?
Answer
  • A. Copyright
  • B. Patent
  • C. Trademark
  • D. Trade secret

Question 70

Question
Which of the following is not a code review process?
Answer
  • A. Email pass-around
  • B. Over the shoulder
  • C. Pair programming
  • D. IDE forcing

Question 71

Question
Gordon is developing a business continuity plan for a manufacturing company’s IT operations. The company is located in North Dakota and currently evaluating the risk of earthquake. They choose to pursue a risk acceptance strategy. Which one of the following actions is consistent with that strategy?
Answer
  • A. Purchasing earthquake insurance
  • B. Relocating the data center to a safer area
  • C. Documenting the decision-making process
  • D. Reengineering the facility to withstand the shock of an earthquake

Question 72

Question
Carol would like to implement a control that protects her organization from the momentary loss of power to the data center. Which control is most appropriate for her needs?
Answer
  • A. Redundant servers
  • B. RAID
  • C. UPS
  • D. Generator

Question 73

Question
Ben has encountered problems with users in his organization reusing passwords, despite a requirement that they change passwords every 30 days. What type of password setting should Ben employ to help prevent this issue?
Answer
  • A. Longer minimum age
  • B. Increased password complexity
  • C. Implement password history
  • D. Implement password length requirements

Question 74

Question
Chris is conducting a risk assessment for his organization and has determined the amount of damage that a single flood could be expected to cause to his facilities. What metric has Chris identified?
Answer
  • A. ALE
  • B. SLE
  • C. ARO
  • D. AV

Question 75

Question
The removal of a hard drive from a PC before it is retired and sold as surplus is an example of what type of action?
Answer
  • A. Purging
  • B. Sanitization
  • C. Degaussing
  • D. Destruction

Question 76

Question
During which phase of the incident response process would an organization determine whether it is required to notify law enforcement officials or other regulators of the incident?
Answer
  • A. Detection
  • B. Recovery
  • C. Remediation
  • D. Reporting

Question 77

Question
What OASIS standard markup language is used to generate provisioning requests both within organizations and with third parties?
Answer
  • A. SAML
  • B. SPML
  • C. XACML
  • D. SOA

Question 78

Question
Michelle is in charge of her organization’s mobile device management efforts and handles lost and stolen devices. Which of the following recommendations will provide the most assurance to her organization that data will not be lost if a device is stolen?
Answer
  • A. Mandatory passcodes and application management
  • B. Full device encryption and mandatory passcodes
  • C. Remote wipe and GPS tracking
  • D. Enabling GPS tracking and full device encryption

Question 79

Question
Susan’s SMTP server does not authenticate senders before accepting and relaying email. What is this security configuration issue known as?
Answer
  • A. An email gateway
  • B. An SMTP relay
  • C. An X.400-compliant gateway
  • D. An open relay

Question 80

Question
The large business that Jack works for has been using noncentralized logging for years. They have recently started to implement centralized logging, however, and as they reviewed logs, they discovered a breach that appeared to have involved a malicious insider. When the breach was discovered and the logs were reviewed, it was discovered that the attacker had purged the logs on the system that they compromised. How can this be prevented in the future?
Answer
  • A. Encrypt local logs
  • B. Require administrative access to change logs
  • C. Enable log rotation
  • D. Send logs to a bastion host

Question 81

Question
The large business that Jack works for has been using noncentralized logging for years. They have recently started to implement centralized logging, however, and as they reviewed logs, they discovered a breach that appeared to have involved a malicious insider. How can Jack detect issues like this using his organization’s new centralized logging?
Answer
  • A. Deploy and use an IDS
  • B. Send logs to a central logging server
  • C. Deploy and use a SIEM
  • D. Use syslog

Question 82

Question
The large business that Jack works for has been using noncentralized logging for years. They have recently started to implement centralized logging, however, and as they reviewed logs, they discovered a breach that appeared to have involved a malicious insider. How can Jack best ensure accountability for actions taken on systems in his environment?
Answer
  • A. Log review and require digital signatures for each log.
  • B. Require authentication for all actions taken and capture logs centrally.
  • C. Log the use of administrative credentials and encrypt log data in transit.
  • D. Require authorization and capture logs centrally.

Question 83

Question
Ed’s organization has 5 IP addresses allocated to them by their ISP but needs to connect over 100 computers and network devices to the Internet. What technology can he use to connect his entire network via the limited set of IP addresses he can use?
Answer
  • A. IPsec
  • B. PAT
  • C. SDN
  • D. IPX

Question 84

Question
What type of attack would the following precautions help prevent? - Requesting proof of identity - Requiring callback authorizations on voice-only requests - Not changing passwords via voice communications
Answer
  • A. DoS attacks
  • B. Worms
  • C. Social engineering
  • D. Shoulder surfing

Question 85

Question
Fred’s organization needs to use a non-IP protocol on their VPN. Which of the common VPN protocols should he select to natively handle non-IP protocols?
Answer
  • A. PPTP
  • B. L2F
  • C. L2TP
  • D. IPsec

Question 86

Question
Residual data is another term for what type of data left after attempts have been made to erase it?
Answer
  • A. Leftover data
  • B. MBR
  • C. Bitrot
  • D. Remnant data

Question 87

Question
Fred finds a packet that his protocol analyzer shows with both PSH and URG set. What type of packet is he looking at, and what do the flags mean?
Answer
  • A. A UDP packet; PSH and URG are used to indicate that the data should be sent at high speed
  • B. A TCP packet; PSH and URG are used to clear the buffer and indicate that the data is urgent
  • C. A TCP packet; PSH and URG are used to preset the header and indicate that the speed of the network is unregulated
  • D. A UDP packet; PSH and URG are used to indicate that the UDP buffer should be cleared and that the data is urgent

Question 88

Question
Which one of the following disaster recovery test types involves the actual activation of the disaster recovery facility?
Answer
  • A. Simulation test
  • B. Tabletop exercise
  • C. Parallel test
  • D. Checklist review

Question 89

Question
What access control system lets owners decide who has access to the objects they own?
Answer
  • A. Role-based access control
  • B. Task-based access control
  • C. Discretionary access control
  • D. Rule-based access control

Question 90

Question
Using a trusted channel and link encryption are both ways to prevent what type of access control attack?
Answer
  • A. Brute force
  • B. Spoofed login screens
  • C. Man-in-the-middle attacks
  • D. Dictionary attacks

Question 91

Question
Which one of the following is not one of the canons of the (ISC)2 Code of Ethics?
Answer
  • A. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  • B. Act honorably, honestly, justly, responsibly, and legally.
  • C. Provide diligent and competent service to principals.
  • D. Maintain competent records of all investigations and assessments.

Question 92

Question
Which one of the following components should be included in an organization’s emergency response guidelines?
Answer
  • A. Immediate response procedures
  • B. Long-term business continuity protocols
  • C. Activation procedures for the organization’s cold sites
  • D. Contact information for ordering equipment

Question 93

Question
Ben is working on integrating a federated identity management system and needs to exchange authentication and authorization information for browser-based single sign-on. What technology is his best option?
Answer
  • A. HTML
  • B. XACML
  • C. SAML
  • D. SPML

Question 94

Question
What is the minimum interval at which an organization should conduct business continuity plan refresher training for those with specific business continuity roles?
Answer
  • A. Weekly
  • B. Monthly
  • C. Semiannually
  • D. Annually

Question 95

Question
What is the minimum number of cryptographic keys necessary to achieve strong security when using the 3DES algorithm?
Answer
  • A. 1
  • B. 2
  • C. 3
  • D. 4

Question 96

Question
What approach to technology management integrates the three components of technology management shown in this illustration?
Answer
  • A. Agile
  • B. Lean
  • C. DevOps
  • D. ITIL

Question 97

Question
Lauren wants to monitor her LDAP servers to identify what types of queries are causing problems. What type of monitoring should she use if she wants to be able to use the production servers and actual traffic for her testing?
Answer
  • A. Active
  • B. Real-time
  • C. Passive
  • D. Replay

Question 98

Question
Steve is developing an input validation routine that will protect the database supporting a web application from SQL injection attack. Where should Steve place the input validation code?
Answer
  • A. JavaScript embedded in the web pages
  • B. Backend code on the web server
  • C. Stored procedure on the database
  • D. Code on the user’s web browser

Question 99

Question
Linda is selecting a disaster recovery facility for her organization, and she wishes to retain independence from other organizations as much as possible. She would like to choose a facility that balances cost and recovery time, allowing activation in about one week after a disaster is declared. What type of facility should she choose?
Answer
  • A. Cold site
  • B. Warm site
  • C. Mutual assistance agreement
  • D. Hot site

Question 100

Question
Ben is selecting an encryption algorithm for use in an organization with 10,000 employees. He must facilitate communication between any two employees within the organization. Which one of the following algorithms would allow him to meet this goal with the least time dedicated to key management?
Answer
  • A. RSA
  • B. IDEA
  • C. 3DES
  • D. Skipjack

Question 101

Question
Grace is considering the use of new identification cards in her organization that will be used for physical access control. She comes across the sample card shown here and is unsure of the technology it uses. What type of card is this?
Answer
  • A. Smart card
  • B. Phase-two card
  • C. Proximity card
  • D. Magnetic stripe card

Question 102

Question
What type of log file is shown in this figure?
Answer
  • A. Application
  • B. Web server
  • C. System
  • D. Firewall

Question 103

Question
Which one of the following activities transforms a zero-day vulnerability into a less dangerous attack vector?
Answer
  • A. Discovery of the vulnerability
  • B. Implementation of transport-layer encryption
  • C. Reconfiguration of a firewall
  • D. Release of a security patch

Question 104

Question
Which one of the following is an example of a hardening provision that might strengthen an organization’s existing physical facilities and avoid implementation of a business continuity plan?
Answer
  • A. Patching a leaky roof
  • B. Reviewing and updating firewall access control lists
  • C. Upgrading operating systems
  • D. Deploying a network intrusion detection system

Question 105

Question
Susan wants to monitor traffic between systems in a VMWare environment. What solution would be her best option to monitor that traffic?
Answer
  • A. Use a traditional hardware-based IPS.
  • B. Install Wireshark on each virtual system.
  • C. Set up a virtual span port and capture data using a VM IDS.
  • D. Use netcat to capture all traffic sent between VMs.

Question 106

Question
Matthew and Richard are friends located in different physical locations who would like to begin communicating with each other using cryptography to protect the confidentiality of their communications. They exchange digital certificates to begin this process and plan to use an asymmetric encryption algorithm for the secure exchange of email messages. When Matthew sends Richard a message, what key should he use to encrypt the message?
Answer
  • A. Matthew’s public key
  • B. Matthew’s private key
  • C. Richard’s public key
  • D. Richard’s private key

Question 107

Question
Matthew and Richard are friends located in different physical locations who would like to begin communicating with each other using cryptography to protect the confidentiality of their communications. They exchange digital certificates to begin this process and plan to use an asymmetric encryption algorithm for the secure exchange of email messages. When Richard receives the message from Matthew, what key should he use to decrypt the message?
Answer
  • A. Matthew’s public key
  • B. Matthew’s private key
  • C. Richard’s public key
  • D. Richard’s private key

Question 108

Question
Matthew and Richard are friends located in different physical locations who would like to begin communicating with each other using cryptography to protect the confidentiality of their communications. They exchange digital certificates to begin this process and plan to use an asymmetric encryption algorithm for the secure exchange of email messages. Matthew would like to enhance the security of his communication by adding a digital signature to the message. What goal of cryptography are digital signatures intended to enforce?
Answer
  • A. Secrecy
  • B. Availability
  • C. Confidentiality
  • D. Nonrepudiation

Question 109

Question
Matthew and Richard are friends located in different physical locations who would like to begin communicating with each other using cryptography to protect the confidentiality of their communications. They exchange digital certificates to begin this process and plan to use an asymmetric encryption algorithm for the secure exchange of email messages. When Matthew goes to add the digital signature to the message, what encryption key does he use to create the digital signature?
Answer
  • A. Matthew’s public key
  • B. Matthew’s private key
  • C. Richard’s public key
  • D. Richard’s private key

Question 110

Question
When Jim logs into a system, his password is compared to a hashed value stored in a database. What is this process?
Answer
  • A. Identification
  • B. Hashing
  • C. Tokenization
  • D. Authentication

Question 111

Question
What is the primary advantage of decentralized access control?
Answer
  • A. It provides better redundancy.
  • B. It provides control of access to people closer to the resources.
  • C. It is less expensive.
  • D. It provides more granular control of access.

Question 112

Question
Which of the following types of controls does not describe a mantrap?
Answer
  • A. Deterrent
  • B. Preventive
  • C. Compensating
  • D. Physical

Question 113

Question
Sally’s organization needs to be able to prove that certain staff members sent emails, and she wants to adopt a technology that will provide that capability without changing their existing email system. What is the technical term for the capability Sally needs to implement as the owner of the email system, and what tool could she use to do it?
Answer
  • A. Integrity; IMAP
  • B. Repudiation; encryption
  • C. Nonrepudiation; digital signatures
  • D. Authentication; DKIM

Question 114

Question
Which one of the following background checks is not normally performed during normal pre-hire activities?
Answer
  • A. Credit check
  • B. Reference verification
  • C. Criminal records check
  • D. Medical records check

Question 115

Question
Margot is investigating suspicious activity on her network and uses a protocol analyzer to sniff inbound and outbound traffic. She notices an unusual packet that has identical source and destination IP addresses. What type of attack uses this packet type?
Answer
  • A. Fraggle
  • B. Smurf
  • C. Land
  • D. Teardrop

Question 116

Question
Which of the following vulnerabilities might be discovered during a penetration test of a web-based application?
Answer
  • A. Cross-site scripting
  • B. Cross-site request forgery
  • C. SQL injection
  • D. All of the above

Question 117

Question
In the OSI model, when a packet changes from a datastream to a segment or a datagram, what layer has it traversed?
Answer
  • A. The Transport layer
  • B. The Application layer
  • C. The Data Link layer
  • D. The Physical layer

Question 118

Question
Tommy handles access control requests for his organization. A user approaches him and explains that he needs access to the human resources database in order to complete a headcount analysis requested by the CFO. What has the user demonstrated successfully to Tommy?
Answer
  • A. Clearance
  • B. Separation of duties
  • C. Need to know
  • D. Isolation

Question 119

Question
During which phase of the incident response process would administrators design new security controls intended to prevent a recurrence of the incident?
Answer
  • A. Reporting
  • B. Recovery
  • C. Remediation
  • D. Lessons Learned

Question 120

Question
Kathleen wants to set up a service to provide information about her organization’s users and services using a central, open, vendorneutral, standards-based system that can be easily queried. Which of the following technologies is her best choice?
Answer
  • A. RADIUS
  • B. LDAP
  • C. Kerberos
  • D. Active Directory

Question 121

Question
Bethany received an email from one of her colleagues with an unusual attachment named smime.p7s. She does not recognize the attachment and is unsure what to do. What is the most likely scenario?
Answer
  • A. This is an encrypted email message.
  • B. This is a phishing attack.
  • C. This is embedded malware.
  • D. This is a spoofing attack.

Question 122

Question
What type of firewall is capable of inspecting traffic at layer 7 and performing protocol-specific analysis for malicious traffic?
Answer
  • A. Application firewall
  • B. Stateful inspection firewall
  • C. Packet filtering firewall
  • D. Bastion host

Question 123

Question
Alice would like to add another object to a security model and grant herself rights to that object. Which one of the rules in the Take-Grant protection model would allow her to complete this operation?
Answer
  • A. Take rule
  • B. Grant rule
  • C. Create rule
  • D. Remove rule

Question 124

Question
What type of assessment methods are associated with mechanisms and activities based on the recommendations of NIST SP800-53A, the Guide for Assessing Security Controls in Federal Information Systems?
Answer
  • A. Examine and interview
  • B. Test and assess
  • C. Test and interview
  • D. Examine and test

Question 125

Question
Colin is reviewing a system that has been assigned the EAL7 evaluation assurance level under the Common Criteria. What is the highest level of assurance that he may have about the system?
Answer
  • A. It has been functionally tested.
  • B. It has been methodically tested and checked.
  • C. It has been methodically designed, tested, and reviewed.
  • D. It has been formally verified, designed, and tested.
Show full summary Hide full summary

Similar

Jekyll and Hyde
elliesussex
Relationships Poetry Key Themes
Matthew T
Atomic Structure
Chuleeporn Thanomsilp
Life in Germany
Ben C
Mapas mentales con ExamTime
julii.perci
AP Psychology Practice Exam
Jacob Simmons
Frankenstein Key Quotes
michelle.lau
APUSH End-of-Year Cram Exam: Set 1
Nathaniel Rodriguez
Types of Learning Environment
Brandon Tuyuc
10 Ways to Improve Your Productivity
Rebecca Tarpey
Power and Conflict Poetry
Charlotte Woodward