SECnew1 Flashcards

1
Q

Actively monitoring data streams in search of malicious code or behavior is an example of:

A

content inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffic on the network. Which of the following is the MOST likely cause?

A

NIPS is blocking activities from those specific websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?

A

Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following can a security administrator implement to help identify smurf attacks?

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer? (Select TWO).

A

MAC filtering & Disabled SSID broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following functions is MOST likely performed by a web security gateway?

A

Content filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following devices is often used to cache and filter content?

A

Proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO).

A

Firewall & VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?

A

VPN Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following should be installed to prevent employees from receiving unsolicited emails?

A

Spam Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following should a security administrator implement to prevent users from disrupting network connectivity, if a user connects both ends of a network cable to different switch ports?

A

Loop protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?

A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following BEST describes the proper method and reason to implement port security?

A

Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following would need to be configured correctly to allow remote access to the network?

A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

By default, which of the following stops network traffic when the traffic is not identified in the firewall ruleset?

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss, but the insider’s lawyer insists the laptop cannot be identified. Which of the following would BEST be used to identify the specific computer used by the insider?

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Applying detailed instructions to manage the flow of network traffic at the edge of the network,including allowing or denying traffic based on port, protocol, address, or direction is an implementation of which of the following?

A

Firewall rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the default rule found in a corporate firewall’s access control list?

A

Deny all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is BEST used to prevent ARP poisoning attacks across a network?

A

VLAN segregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A small company needs to invest in a new expensive database. The company’s budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional personnel and minimize the footprint in their current datacenter?

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is MOST likely to be the last rule contained on any firewall?

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following cloud computing concepts is BEST described as providing an easy-to- configure OS and on-demand computing for customers?

A

Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

MAC filtering is a form of which of the following?

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Reviewing an access control list on a firewall reveals a Drop All statement at the end of the rules. Which of the following describes this form of access control?

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?

A

Virtual servers have the same information security requirements as physical servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Webmail is classified under which of the following cloud-based technologies?

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A security engineer is troubleshooting a server in the DMZ, which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?

A

The server is missing the default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following may cause a user, connected to a NAC-enabled network, to not be prompted for credentials?

A

The user’s PC is missing the authentication agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following would be implemented to allow access to services while segmenting access to the internal network

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following is a security control that is lost when using cloud computing?

A

Physical control of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following uses TCP port 22 by default?

A

SSH, SCP, and SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following allows a security administrator to set device traps?

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following protocols would be the MOST secure method to transfer files from a host machine?

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following port numbers is used for SCP, by default?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is the MOST secure method of utilizing FTP?

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following protocols can be implemented to monitor network devices?

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following protocols would an administrator MOST likely use to monitor the parameters of network devices?

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives no reply; however, the technician is able to telnet to that router. Which of the following is the MOST likely cause of the security administrator being unable to ping the router?

A

The remote router has ICMP blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purpose?

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

In which of the following locations would a forensic analyst look to find a hooked process?

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following file transfer protocols is an extension of SSH?

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likely occurring?

A

The development team is transferring data to test systems using SFTP and SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?

A

1433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

If a security administrator wants to TELNET into a router to make configuration changes, which of the following ports would need to be open by default?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal?

A

Block port 23 on the network firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following are the default ports for HTTP and HTTPS protocols? (Select TWO

A

80 & 445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

In an 802.11 n network, which of the following provides the MOST secure method of both encryption and authorization?

A

WPA Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Isolation mode on an AP provides which of the following functionality types?

A

Segmentation of each wireless user from other wireless users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following is the BEST choice for encryption on a wireless network?

A

WPA2-PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A user reports that their 802.11 n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last month. Which of the following is MOST likely causing the disconnections?

A

The new access point was mis-configured and is interfering with another nearby access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?

A

Power levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following protocols requires the use of a CA based authentication process?

A

PEAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

When configuring multiple computers for RDP on the same wireless router, it may be necessary to do which of the following?

A

Forward to different RDP listening ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?

A

Decrease the power levels on the WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which of the following will provide the HIGHEST level of wireless network security?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following facilitates computing for heavily utilized systems and networks?

A

Provider cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Risk can be managed in the following ways EXCEPT

A

elimination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

A company that purchases insurance to reduce risk is an example of which of the following?

A

Risk transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which of the following is a best practice to identify fraud from an employee in a sensitive position

A

Mandatory vacations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?

A

Mandatory vacations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Instead of giving a security administrator full administrative rights on the network, the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job description. Which of the following describes this form of access control

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?

A

Privacy policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?

A

Change Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Due to sensitive data concerns, a security administrator has enacted a policy preventing the use of flash drives. Additionally, which of the following can the administrator implement to reduce the risk of data leakage?

A

Enact a policy banning users from bringing in personal music devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Performing routine security audits is a form of which of the following controls?

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which of the following is MOST commonly a part of routine system audits?

A

User rights and permissions reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following is a method to prevent ad-hoc configuration mistakes?

A

Implement a change management strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?

A

User rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A security administrator finished taking a forensic image of a computer’s memory. Which of the following should the administrator do to ensure image integrity?

A

Run the image through SHA254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following BEST explains the security benefit of a standardized server image?

A

Mandated security configurations have been made to the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which of the following describes when forensic hashing should occur on a drive?

A

Before and after the imaging process and then hash the forensic image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following assists in identifying if a system was properly handled during transport?

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the following describes the purpose of chain of custody as applied to forensic image retention?

A

To provide documentation as to who has handled the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?

A

Clean desk policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?

A

Phishing techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which of the following is a reason to perform user awareness and training?

A

To minimize the organizational risk posed by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Used in conjunction, which of the following are P11? (Select TWO).

A

Birthday & Full name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

On-going annual awareness security training should be coupled with:

A

signing of a user agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which of the following risks may result from improper use of social networking and P2P software?

A

Information disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which of the following is the MAIN reason to require data labeling?

A

To ensure that staff understands what data they are handling and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

DRPs should contain which of the following?

A

Hierarchical list of critical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?

A

Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

A security firm has been engaged to assess a software application. A production-like test environment, login details, production documentation and source code have been provided. Which of the following types of testing is being described?

A

White box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?

A

Hot and cold aisles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which of the following environmental variables reduces the potential for static discharges?

A

Humidity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which of the following should be considered when trying to prevent somebody from capturing network traffic?

A

EMI shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

With which of the following is RAID MOST concerned?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which of the following reduces the likelihood of a single point of failure when a server fails?

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which of the following is the BEST way to secure data for the purpose of retention?

A

Off-site backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability? (Select TWO).

A

Hardware RAID 5 & Spftware RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A security administrator is in charge of a datacenter, a hot site and a cold site. Due to a recent disaster, the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensure is in place for a cold site?

A

Location that meets power and connectivity requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

In order to ensure high availability of all critical servers, backups of the main datacenter are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in the case of a disaster?

A

Having the offsite location of tapes also be the hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which of the following concepts ensures that the data is only viewable to authorized users?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the datacenter. Which of the following are being addressed? (Select TWO).

A

Confidentiality & Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

A user downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

While browsing the Internet, an administrator notices their browser behaves erratically, appears to download something, and then crashes. Upon restarting the PC, the administrator notices performance is extremely slow and there are hundreds of outbound connections to various websites. Which of the following BEST describes what has occurred?

A

The PC has become part of a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Which of the following malware types is an antivirus scanner MOST unlikely to discover? (Select TWO).

A

Pharming & Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Which of the following is the primary difference between a virus and a worm?

A

A worm is self-replicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control server. If the computer is powered off, which of the following data types will be unavailable for later investigation?

A

Memory, network processes, and system processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

A system administrator could have a user level account and an administrator account to prevent:

A

escalation of privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

When examining HTTP server logs the security administrator notices that the company’s online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which of the following threats corresponds with an attacker targeting specific employees of a company?

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank’s privacy policy, security policy and requests that the user clearly state their name, birthday and enter the banking details to validate the user’s identity. Which of the following BEST describes this type of attack?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Which of the following is a technique designed to obtain information from a specific person?

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Which of the following is another name for a malicious attacker?

A

Black hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Which of the following logical controls does a flood guard protect against?

A

SYN attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?

A

Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

A targeted email attack sent to the company’s Chief Executive Officer (CEO) is known as which of the following?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

The security administrator implemented privacy screens, password protected screen savers, and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate? (Select TWO).

A

Dumpster diving & Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Which of the following security threats does shredding mitigate?

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Which of the following attacks would password masking help mitigate?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Which of the following is specific to a buffer overflow attack?

A

Initial vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Which of the following wireless attacks uses a counterfeit base station with the same SSID name as a nearby intended wireless network?

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Data can potentially be stolen from a disk encrypted, screen-lock protected, smartphone by which of the following?

A

Bluesnarfing

129
Q

Which of the following is an unauthorized wireless router that allows access to a secure network?

A

Rouge access point

130
Q

A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?

A

Rouge access points

131
Q

Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?

A

War driving

132
Q

A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?

A

Evil twin

133
Q

A programmer allocates 16 bytes for a string variable, but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?

A

Buffer overflow

134
Q

Which of the following MUST a programmer implement to prevent cross-site scripting?

A

Validate input to remove hypertext

135
Q

Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?

A

Cross-site scriping

136
Q

During the analysis of malicious code, a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?

A

Buffer overflow

137
Q

Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?

A

Cross-site scriping

138
Q

A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?

A

Add input balidation to forms

139
Q

An application log shows that the text “test; rm -rf /etc/passwd” was entered into an HTML form. Which of the following describes the type of attack that was attempted?

A

Command injection

140
Q

Which of the following is MOST relevant to a buffer overflow attack

A

NOOP instructions

141
Q

The detection of a NOOP sled is an indication of which of the following attacks?

A

Buffer overflow

142
Q

Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?

A

IDS

143
Q

Which of the following should be enabled to ensure only certain wireless clients can access the network?

A

MAC filtering

144
Q

Which of the following BEST describes an intrusion prevention system?

A

A system that stops an attack in progress

145
Q

Which of the following is a best practice when securing a switch from physical access?

A

Disable unused ports

146
Q

Which of the following can prevent an unauthorized employee from entering a datacenter? (Select TWO).

A

Security guard & Proximity reader

147
Q

Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?

A

System A fails open. System B fails closed.

148
Q

Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?

A

Mantraps

149
Q

A visitor plugs their laptop into the network and receives a warning about their antivirus being out- of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is the MOST likely cause?

A

The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop

150
Q

Which of the following is a detective security control?

A

CCTV

151
Q

Which of the following identifies some of the running services on a system?

A

Determine open ports

152
Q

A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?

A

Account disablement

153
Q

A company needs to be able to prevent entry, at all times, to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security, which of the following should be implemented?

A

Mantrap

154
Q

Which of the following would provide the MOST reliable proof that a datacenter was accessed at a certain time of day?

A

Video surveillance

155
Q

Which of the following should be performed on a computer to protect the operating system from malicious software? (Select TWO).

A

Disable unused services & Update HIPS signatures

156
Q

A new enterprise solution is currently being evaluated due to its potential to increase the company’s profit margins. The security administrator has been asked to review its security implications. While evaluating the product, various vulnerability scans were performed. It was determined that the product is not a threat but has the potential to introduce additional vulnerabilities. Which of the following assessment types should the security administrator also take into consideration while evaluating this product?

A

Risk Assessment

157
Q

Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?

A

Organize data based on severity and asset value

158
Q

Which of the following is used when performing a quantitative risk analysis?

A

Assett value

159
Q

Which of the following describes a passive attempt to identify weaknesses?

A

Vulnerability scanning

160
Q

An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application’s security posture?

A

Baseline reporing

161
Q

An administrator identifies a security issue on the corporate web server, but does not attempt to exploit it. Which of the following describes what the administrator has done

A

Vulnerability scanning

162
Q

The server log shows 25 SSH login sessions per hour. However, it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?

A

Baseline reporing

163
Q

Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems, the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to identify the issue?

A

Vulnerability scanning

164
Q

Which of the following is used when performing a qualitative risk analysis?

A

Judgement

165
Q

Upper management decides which risk to mitigate based on cost. This is an example of:

A

quantitative risk assessment

166
Q

A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?

A

Vulnerability scanner

167
Q

Which of the following is a management control type?

A

Vulnerability scanning

168
Q

Which of the following devices would allow a technician to view IP headers on a data packet?

A

Protocol analyzer

169
Q

Which of the following penetration testing types is performed by security professionals with limited inside knowledge of the network?

A

gray box

170
Q

Which of the following is a reason to perform a penetration test?

A

To determine the impact of a threat against the enterprise

171
Q

Penetration testing should only be used during controlled conditions with express consent of the system owner because:

A

penetration testing actively tests security controls and can cause system instability.

172
Q

Which of the following security practices should occur initially in software development?

A

Secure code review

173
Q

A penetration test shows that almost all database servers were able to be compromised through a default database user account with the default password. Which of the following is MOST likely missing from the operational procedures?

A

Application hardening

174
Q

Which of the following is an example of verifying new software changes on a test system?

A

Patch management

175
Q

Which of the following allows an attacker to identify vulnerabilities within a closed source software application?

A

Fuzzing

176
Q

Which of the following would an administrator do to ensure that an application is secure and all unnecessary services are disabled?

A

Application hardening

177
Q

A security administrator ensures that certain characters and commands entered on a web server are not interpreted as legitimate data and not passed on to backend servers. This is an example of which of the following?

A

Input validation

178
Q

A business-critical application will be installed on an Internet facing server. Which of the following is the BEST security control that should be performed in conjunction with updating the application to the MOST current version?

A

Vendor-provided hardening documentation should be reviewed and applied

179
Q

Which of the following has a programmer MOST likely failed to consider if a user entering improper input is able to crash a program?

A

Error handling

180
Q

Which of the following is the MOST efficient way to combat operating system vulnerabilities?

A

Patch management

181
Q

Which of the following is a hardening step of an application during the SDLC?

A

Secure coding concepts

182
Q

Which of the following is the BEST way to mitigate data loss if a portable device is compromised?

A

Full Disk Encryption

183
Q

Which of the following should be performed if a smartphone is lost to ensure no data can be retrieved from it?

A

Remote Wipe

184
Q

Several classified mobile devices have been stolen. Which of the following would BEST reduce the data leakage threat?

A

remotely sanitize the devices

185
Q

Which of the following should be used to help prevent device theft of unused assets?

A

Locking cabinet

186
Q

Which of the following devices would be installed on a single computer to prevent intrusion?

A

Host-based firewall

187
Q

A security administrator has been receiving support tickets for unwanted windows appearing on user’s workstations. Which of the following can the administrator implement to help prevent this from happening?

A

Pop-up-blockers

188
Q

Which of the following would an administrator apply to mobile devices to BEST ensure the confidentiality of data?

A

Device Encryption

189
Q

Which of the following is a security vulnerability that can be disabled for mobile device users?

A

GPS tracking

190
Q

Which of the following software should a security administrator implement if several users are stating that they are receiving unwanted email containing advertisements?

A

Anti-spam

191
Q

An employee stores their list of passwords in a spreadsheet on their local desktop hard drive. Which of the following encryption types would protect this information from disclosure if lost or stolen?

A

Mobile device

192
Q

A company has remote workers with laptops that house sensitive data. Which of the following can be implemented to recover the laptops if they are lost?

A

GPS tracking

193
Q

When decommissioning old hard drives, which of the following is the FIRST thing a security engineer should do?

A

Perform bit level erasure or overwrite

194
Q

Which of the following devices provides storage for RSA or asymmetric keys and may assist in user authentication? (Select TWO).

A

Trusted platform module & Hardware Security Module

195
Q

Which of the following is true about hardware encryption? (Select TWO).

A

It is faster than software encryption & It is available on computers using TPM

196
Q

Which of the following BEST describes the function of TPM?

A

Hardware chip that stores encryption keys

197
Q

Which of the following is MOST likely to result in data loss?

A

Developers copying data from production to the test environments via a USB stick

198
Q

A security administrator is implementing a solution that can integrate with an existing server and provide encryption capabilities. Which of the following would meet this requirement

A

HSM

199
Q

Which of the following are the BEST reasons to use an HSM? (Select TWO).

A

Generate Keys & Store Keys

200
Q

A company needs to reduce the risk of employees emailing confidential data outside of the company. Which of the following describes an applicable security control to mitigate this threat?

A

Install a network-based DLP device

201
Q

Which of the following can cause hardware based drive encryption to see slower deployment

A

A lack of management software

202
Q

Which of the following is the MOST secure way of storing keys or digital certificates used for decryption/ encryption of SSL sessions?

A

HSM

203
Q

Which of the following is a removable device that may be used to encrypt in a high availability clustered environment

A

HSM

204
Q

A security administrator is implementing a solution that encrypts an employee’s newly purchased laptop but does not require the company to purchase additional hardware or software. Which of the following could be used to meet this requirement?

A

TPM

205
Q

During incident response, which of the following procedures would identify evidence tampering by outside entities?

A

Hard drive hashing

206
Q

Which of the following protocols only encrypts password packets from client to server?

A

RADIUS

207
Q

Which of the following methods of access, authentication, and authorization is the MOST secure by default?

A

Kerberos

208
Q

Which of the following uses tickets to identify users to the network?

A

Kerberos

209
Q

A purpose of LDAP authentication services is:

A

a single point of user management.

210
Q

When granting access, which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?

A

RADIUS

211
Q

A security administrator is setting up a corporate wireless network using WPA2 with CCMP but does not want to use PSK for authentication. Which of the following could be used to support 802.1 x authentication?

A

RADIUS

212
Q

Which of the following authentication services would be used to authenticate users trying to access a network device?

A

TACACS+

213
Q

Which of the following requires special handling and explicit policies for data retention and data distribution?

A

Personally identifiable information

214
Q

Centrally authenticating multiple systems and applications against a federated user database is an example of:

A

single sign-on

215
Q

A Human Resource manager is assigning access to users in their specific department performing the same job function. This is an example of:

A

role-based access control

216
Q

The security administrator often observes that an employee who entered the datacenter does not match the owner of the PIN that was entered into the keypad. Which of the following would BEST prevent this situation?

A

Biometrics

217
Q

Which of the following allows a user to have a one-time password

A

Tokens

218
Q

Which of the following is a technical control?

A

Least privilege implementation

219
Q

A security administrator wants to prevent users in sales from accessing their servers after 6:00 pm., and prevent them from accessing accounting’s network at all times. Which of the following should the administrator implement to accomplish these goals? (Select TWO).

A

Separation of duties & Time of day restrictions

220
Q

A thumbprint scanner is used to test which of the following aspects of human authentication?

A

Something a user is

221
Q

A security administrator with full administrative rights on the network is forced to change roles on a quarterly basis with another security administrator. Which of the following describes this form of access control?

A

Job rotation

222
Q

In order to access the network, an employee must swipe their finger on a device. Which of the following describes this form of authentication?

A

Biometrics

223
Q

A proximity card reader is used to test which of the following aspects of human authentication?

A

Something a user has

224
Q

Which of the following would be considered multifactor authentication

A

Pin number and a smart card

225
Q

Which of the following is a form of photo identification used to gain access into a secure location

A

CAC

226
Q

Which of the following is a trusted OS implementation used to prevent malicious or suspicious code from executing on Linux and UNIX platforms?

A

SELinux

227
Q

Which of the following is an example of allowing a user to perform a self-service password reset?

A

Password Recovery

228
Q

Which of the following is an example of requiring users to have a password of 16 characters or more?

A

Password length requirements

229
Q

A security administrator is asked to email an employee their password. Which of the following account policies MUST be set to ensure the employee changes their password promptly?

A

Password expiration

230
Q

Employees are required to come up with a passphrase of at least 15 characters to access the corporate network. Which of the following account policies does this exemplify?

A

Password length

231
Q

An administrator has implemented a policy that passwords expire after 60 days and cannot match their last six previously used passwords. Users are bypassing this policy by immediately changing their passwords six times and then back to the original password. Which of the following can the administrator MOST easily employ to prevent this unsecure practice, with the least administrative effort?

A

Create a policy that passwords cannot be changed more than once a day

232
Q

Which of the following MUST be implemented in conjunction with password history, to prevent a user from re?using the same password?

A

Minimum age time

233
Q

Which of the following represents the complexity of a password policy which enforces lower case password using letters from ‘a’ through ‘z’ where ‘n’ is the password length?

A

26n

234
Q

Which of the following BEST describes the process of key escrow

A

Maintains a secured copy of a user’s private key for the sole purpose of recovering the key if it is lost

235
Q

Which of the following is the primary purpose of using a digital signature? (Select TWO).

A

Integrity & Non-repudiation

236
Q

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses:

A

the same key on each end of the transmission medium

237
Q

Which of the following methods BEST describes the use of hiding data within other files?

A

Steganography

238
Q

When a user first moves into their residence, the user receives a key that unlocks and locks their front door. This key is only given to them but may be shared with others they trust. Which of the following cryptography concepts is illustrated in the example above?

A

Symmetric key sharing

239
Q

Which of the following cryptography types provides the same level of security but uses smaller key sizes and less computational resources than logarithms which are calculated against a finite field?

A

Elliptical curve

240
Q

The BEST way to protect the confidentiality of sensitive data entered in a database table is to use

A

hashing

241
Q

WEP is seen as an unsecure protocol based on its improper use of which of the following?

A

RC4

242
Q

Which of the following is used in conjunction with PEAP to provide mutual authentication between peers?

A

MSCHAPv2

243
Q

Which of the following is seen as non-secure based on its ability to only store seven uppercase characters of data making it susceptible to brute force attacks?

A

LAN MAN

244
Q

Which of the following access control technologies provides a rolling password for one-time use?

A

RSA tokens

245
Q

A security administrator has discovered through a password auditing software that most passwords can be discovered by cracking the first seven characters and then cracking the second part of the password. Which of the following is in use by the company?

A

LAN MAN

246
Q

NTLM is an improved and substantially backwards compatible replacement for which of the following

A

passwd

247
Q

Which of the following does a TPM allow for?

A

Full Disk Encryption

248
Q

The company encryption policy requires all encryption algorithms used on the corporate network to have a key length of 128-bits. Which of the following algorithms would adhere to company policy?

A

AES

249
Q

The security administrator wants to ensure messages traveling between point A and point B are encrypted and authenticated. Which of the following accomplishes this task?

A

RSA

250
Q

Which of the following elements of PKI are found in a browser’s trusted root CA?

A

Public key

251
Q

Where are revoked certificates stored?

A

CRL

252
Q

Which of the following asymmetric encryption keys is used to encrypt data to ensure only the intended recipient can decrypt the ciphertext?

A

Public

253
Q

Which of the following must a security administrator do when the private key of a web server has been compromised by an intruder?

A

Submit the public key to the CRL

254
Q

Which of the following PKI implementation element is responsible for verifying the authenticity of certificate contents?

A

CA

255
Q

If a user wishes to receive a file encrypted with PGP, the user must FIRST supply the:

A

Public key

256
Q

A certificate that has been compromised should be published to which of the following?

A

CRL

257
Q

The security administrator is tasked with authenticating users to access an encrypted database. Authentication takes place using PKI and the encryption of the database uses a separate cryptographic process to decrease latency. Which of the following would describe the use of encryption in this situation?

A

Public key encryption to authenticate users and private keys to encrypt the database

258
Q

When a certificate issuer is not recognized by a web browser, which of the following is the MOST common reason?

A

Self-signed certificate

259
Q

Public keys are used for which of the following?

A

Decrypting the hash of an electronic signature

260
Q

Which of the following is a requirement when implementing PKI if data loss is unacceptable?

A

Key escrow

261
Q

Which of the following is true about PKI? (Select TWO).

A

When encrypting a message with the public key, only the private key can decrypt it. AND When encrypting a message with the private key, only the public key can decrypt it

262
Q

The recovery agent is used to recover the

A

private key

263
Q

Which of the following is true about the CRL?

A

it should be kept public

264
Q

A file has been encrypted with an employee’s private key. When the employee leaves the company, their account is deleted. Which of the following are the MOST likely outcomes? (Select TWO).

A

B. Use the recovery agent to decrypt the file AND D. The data is not recoverable

265
Q

Which of the following is the BEST filtering device capable of stateful packet inspection?

A

Firewall

266
Q

An employee’s workstation is connected to the corporate LAN. Due to content filtering restrictions, the employee attaches a 3G Internet dongle to get to websites that are blocked by the corporate gateway. Which of the following BEST describes a security implication of this practice?

A

Network bridging must be avoided otherwise it may join two networks of different classifications

267
Q

Which of the following is the BEST approach to perform risk mitigation of user access control rights?

A

Perform routine user permission reviews

268
Q

In a disaster recovery situation, operations are to be moved to an alternate site. Computers and network connectivity are already present; however, production backups are several days out-of- date. Which of the following site types is being described?

A

Warm site

269
Q

All of the following are valid cryptographic hash functions EXCEPT:

A

RC4

270
Q

Which of the following PKI components identifies certificates that can no longer be trusted?

A

CRL

271
Q

Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack?

A

802.1x

272
Q

A digital signature provides which of the following security functions for an email message?

A

Non-repudiation

273
Q

By default, CCMP will use which of the following to encrypt wireless transmissions?

A

AES

274
Q

A programmer cannot change the production system directly and must have code changes reviewed and approved by the production system manager. Which of the following describes this control type?

A

separation of duties

275
Q

ARP poison routing attacks are an example of which of the following?

A

Man-in-the-middle

276
Q

A company hires a security firm to assess the security of the company’s network. The company does not provide the firm with any internal knowledge or documentation of the network. Which of the following should the security firm perform?

A

Black box

277
Q

Steganography is a form of which of the following?

A

Security through obscurity

278
Q

In a public key infrastructure, a trusted third party is also known as which of the following?

A

Certificate authority

279
Q

Which of the following relies on creating additional traffic to congest networks? (Select TWO).

A

Smurf attack & DDoS

280
Q

Which of the following threats are specifically targeted at high profile individuals?

A

Whaling

281
Q

Which of the following devices is MOST commonly vulnerable to bluesnarfing?

A

Mobile device

282
Q

Which of the following application attacks typically involves entering a string of characters and bypassing input validation to display additional information?

A

SQL injection

283
Q

Which of the following features should be enabled on perimeter doors to ensure that unauthorized access cannot be gained in the event of a power outage?

A

Fail closed

284
Q

Which of the following is the BEST tool to use when analyzing incoming network traffic?

A

Sniffer

285
Q

Which of the following MOST likely has its access controlled by TACACS+? (Select TWO).

A

Router & Switch

286
Q

Providing elastic computing resources that give a client access to more resources, allowing for distribution of large jobs across a flexible number of machines, or allowing for distributed storage of information are all hallmarks of which technology?

A

Cloud computing

287
Q

Which of the following network security techniques can be easily circumvented by using a network sniffer?

A

Implementing MAC filtering on WAPs

288
Q

Which of the following authentication services can be used to provide router commands to enforce policies

A

TACACS+

289
Q

Which of the following ports is used for telnet by default

A

23

290
Q

Which of the following BEST describes a malicious application that attaches itself to other files

A

Virus

291
Q

When an attack using a publicly unknown vulnerability compromises a system, it is considered to be which of the following?

A

Zero day attack

292
Q

A professor at a university is given two keys. One key unlocks a classroom door and the other locks it. The key used to lock the door is available to all other faculty. The key used to unlock the door is only given to the professor. Which of the following cryptography concepts is illustrated in the example above?

A

Asymmetric key sharing

293
Q

Which of the following are often used to encrypt HTTP traffic? (Select TWO).

A

SSL & TLS

294
Q

Which of the following attacks targets high profile individuals?

A

Whaling

295
Q

A penetration tester is collecting a large amount of wireless traffic to perform an IV attack. Which of the following can be gained by doing this?

A

WEP key

296
Q

Which of the following allows users in offsite locations to connect securely to a corporate office?

A

VPN

297
Q

On a website, which of the following protocols facilitates security for data in transit?

A

SSL

298
Q

Which of the following security controls is the BEST mitigation method to address mobile device data theft? (Select TWO).

A

Remote wipe & Device encryption

299
Q

Which of the following BEST describes the purpose of fuzzing?

A

To discover buffer overflow vulnerabilities

300
Q

There are several users for a particular Human Resources database that contains P11. Which of the following principles should be applied to the users in regards to privacy of information?

A

Least privilege

301
Q

Which of the following would be a reason to implement DAC as an access control model?

A

The owner of the data should decide who has access

302
Q

A security administrator needs to install a new switch for a conference room where two different groups will be having separate meetings. Each of the groups uses different subnets and need to have their traffic separated. Which of the following would be the SIMPLEST solution?

A

Create two VLANs on the switch

303
Q

Which of the following would need to be added to a network device’s configuration in order to keep track of the device’s various parameters and to monitor status?

A

SNMP string

304
Q

A user reports the ability to access the Internet but the inability to access a certain secure website. The web browser reports the site needs to be viewed under a secure connection. Which of the following is the MOST likely cause? (Select TWO).

A

The site is not using URL redirection & The user is not using HTTPS

305
Q

Which of the following is a control that is gained by using cloud computing?

A

High Availablity of the data

306
Q

Which of the following is the BEST way to implement data leakage prevention? (Select TWO).

A

Installing DLP software on all computers along with the use of policy and procedures. AND Installing DLP software on all perimeter appliances and incorporating new policies and procedures.

307
Q

A tape library containing a database with sensitive information is lost in transit to the backup location. Which of the following will prevent this media from disclosing sensitive information? (Select TWO).

A

Full disk encryption & Database encryption

308
Q

A security administrator ensures that rights on a web server are not sufficient to allow outside users to run JavaScript commands. This is an example of which of the following?

A

Cross-site scripting prevention

309
Q

Which of the following creates a publicly accessible network and isolates the internal private network from the Internet?

A

DMZ

310
Q

A security administrator is encrypting all smartphones connected to the corporate network. Which of the following could be used to meet this requirement?

A

Mobile device encryption

311
Q

Using both a username and a password is an example of:

A

single factor authentication

312
Q

Which of the following password policies are designed to increase the offline password attack time? (Select TWO).

A

Password complexity & Password length

313
Q

GPU processing power is a mitigating factor for which of the following security concerns?

A

Password complexity

314
Q

Which of the following can the security administrator implement to BEST prevent laptop device theft?

A

Cable locks

315
Q

The pharmacy has paper forms ready to use if the computer systems are unavailable. Which of the following has been addressed?

A

Continuity of operations

316
Q

Which of the following causes an issue when acquiring an image that occurs when a server hard drive is forensically examined?

A

Servers often use RAID

317
Q

Which of the following provides the BEST metric for determining the effectiveness of a Continuity of Operations Plan or Disaster Recovery Plan?

A

Mean time to restore

318
Q

Which of the following is the correct formula for calculating mean time to restore (MTTR)?

A

MTTR = (time of restore) # (time of fail)

319
Q

The corporate NIDS keeps track of how each program acts and will alert the security administrator if it starts acting in a suspicious manner. Which of the following describes how the NIDS is functioning?

A

Behavior based