Section 2.0 Security Flashcards
A healthcare company wants a security engineer to secure access to its critical internal resources and data with more than just a username and password. What access control measure would the security engineer suggest the company implement to provide an extra layer of security?
YOU WERE SURE AND CORRECT
Multifactor authentication
A new data security technician is learning many foundational principles of logical security controls concerning critical data. The technician notices a lot of effort and conversations from colleagues with clients around the concept of least privilege. What is the goal when it pertains to implementing least privilege?
YOU WERE SURE AND CORRECT
Grant users the minimum possible rights necessary to perform the job.
A senior-level government agency wants to implement multifactor authentication. However, they specifically do not want any user’s mobile device to be a part of the solution as it could compromise them. What authentication method would be a possible solution?
THE CORRECT ANSWER
Hard token
A small company has just set up a Windows domain environment and would like to add functionality for their users to save personal work-related documents on a designated file server to protect files from being lost on their PCs. What solution would allow this functionality?
YOU WERE SURE AND CORRECT
Home folders
A group of employees has voiced concerns about not feeling safe when walking to and from their cars in the parking lot. Since the building is not in a safe neighborhood, they feel like someone could easily hide and attack people during certain shift changes. What could the company implement to help these employees feel safer? (Select all that apply.)
Security guards
Lighting
Video cameras
This type of alarm system utilizes either microwave radio reflection or passive infrared to trigger an alert threshold.
YOU WERE SURE AND CORRECT
Motion sensor
A manufacturing plant plans to have cash payments for products sent to their facility for processing. To provide a proper physical security entrance into the area where personnel will handle the cash, a security vendor may suggest what particular automated solution best ensures that only one employee can enter and exit this area at a time?
YOU WERE SURE AND CORRECT
Access control vestibule
After switching a medium-sized office to a Windows domain, a systems administrator has had trouble getting buy-in from users when it comes to saving documents in redundant network shares. Users are adamant that they want to work out of the local Documents folder of their profile. What can the administrator implement to accomplish the goal of getting data to reside on network shares?
YOU WERE SURE AND CORRECT
Folder redirection
A security engineer is designing a multifactor solution for certain approved users to access highly-sensitive information on the company’s intranet. The engineer will require a soft token code provided by what medium to the user? (Select all that apply.)
Short message service
Voice call
A security vendor contracts with a banking firm to provide access control to highly secured areas. The banking firm wants to grant access via biometric data. What would be suitable to use in this case? (Select all that apply.)
Retina scanner
Fingerprint reader
Palmprint scanner
The security team at a company wants to limit access to certain office areas to prevent theft and improve safety for employees. They would like to utilize door locks with badge readers and software that centrally manages access yet is still accessible with a physical key in case of emergencies or system outages. What objects could the company use in conjunction with the badge readers to grant access? (Select all that apply.)
Smart cards
Key fobs
An organization has asked a network engineer why a particular wireless access point is not allowing users to authenticate to the company’s network. Users can connect to other access points without issue. The engineer finds that the problem access point can find and connect to the Remote Authentication Dial-in User Service (RADIUS) server, but they do not trust each other. What is most likely NOT configured on the access point?
YOU WERE SURE AND CORRECT
Shared secret
A medium-sized office has a growing number of employees whom all need access to the wireless network. Each employee has an individual Windows domain account and wireless network access account. What protocol or service could the office implement to allow users to use one account, granting them access to the wireless network and the domain?
THE CORRECT ANSWER
Kerberos
Which protocol allows access points to use Remote Authentication Dial-in User Service (RADIUS), or Terminal Access Controller Access Control System Plus (TACACS+), and Extensible Authentication Protocol (EAP) to tunnel credentials and tokens that allow a domain user to connect via a wireless client to authenticate to a Windows domain controller and use single sign-on authorization?
THE CORRECT ANSWER
Kerberos
A senior network engineer wants to provide the organization’s staff with a convenient yet secure method for authenticating and administrating all the company Cisco routers, switches, and access points. What Authentication, Authorization, and Accounting (AAA) protocol would provide the best solution for this?
YOU WERE SURE AND CORRECT
TACACS+
A managed services technician works with a customer to properly secure the home office Wi-Fi network. The customer states that they use Wi-Fi Protected Access with Temporal Key Integrity Protocol to secure wireless network traffic. However, the technician advises against this solution, as a malicious actor can easily find the encryption key. What would provide for stronger encryption with AES and CCMP for securing Wi-Fi traffic?
THE CORRECT ANSWER
WPA2
Network engineers are talking at a conference, reminiscing about legacy Wi-Fi security standards. Unfortunately, they could not remember the cipher that replaced Rivest Cipher 4 (RC4) at the advent of WPA2. What cipher are they attempting to remember?
YOU WERE SURE AND CORRECT
AES
A security engineer is attending a training session based on newer network security best practices. However, regarding Wi-Fi protected access (WPA), they learn that WPA3 replaced WPA2 with its accompanying encryption standard stack. With WPA3, what other cipher/protocol stack replaced them?
THE CORRECT ANSWER
AES GCMP
A new local coffee shop would like to provide customers with free Wi-Fi access. In addition, they would like to provide a secured wireless connection without using a pre-shared passphrase. Which type of protected access should the coffee shop use to meet these requirements?
THE CORRECT ANSWER
WPA3
A growing company has just recently implemented a Windows domain and is building out its Active Directory structure. They have asked a network services company if they can manage access to their wireless network using permissions in the new domain. A network engineer tells them this is certainly achievable using this particular protocol.
THE CORRECT ANSWER
EAP
A network engineer wants to implement a strong EAP-TLS method using multifactor authentication in an enterprise environment. The engineer must configure the Remote Authentication Dial-in User Service (RADIUS) server and the wireless supplicant with which of the following components? (Select all that apply.)
Digital certificate
Encryption key pair
A user thinks there may be a virus on their computer, calls into an IT help desk, and states that when browsing certain websites, the browser gives a scary warning about the site possibly being unsafe. What could cause a browser certificate warning? (Select all that apply.)
A certificate is self-signed.
There is a server name mismatch in the certificate.
A certificate has expired.
A customer brings a PC into a local computer repair shop believing it may have a virus. After some investigation into the problems, the technician deems that there are so many viruses and malware on the system that there really is only one appropriate avenue to take to give the customer the security of knowing the PC is free and clear of the viruses and malware. What remediation will the technician perform?
THE CORRECT ANSWER
Perform OS reinstallation.
A managed service provider company has adopted CompTIA’s seven-step best practice procedure for malware removal. A technician is about to attempt to remove a malware infection according to these best practices. Which step will the technician take in the overall process of removal? (Select all that apply.)
Disable System Restore.
Educate the end user.