Security 4 Flashcards

1
Q

A company hosts a web server that requires entropy in encryption initialization and authentication. To meet this goal, the company would like to select a block cipher
mode of operation that allows an arbitrary length IV and supports authenticated encryption. Which of the following would meet these objectives?

A.
CFB

B.
GCM

C.
ECB

D.
CBC

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company wishes to prevent unauthorized employee access to the data center. Which of the following is the MOST secure way to meet this goal?

A.
Use Motion detectors to signal security whenever anyone entered the center

B.
Mount CCTV cameras inside the center to monitor people as they enter

C.
Install mantraps at every entrance to the data center in conjunction with their badges

D.
Place biometric readers at the entrances to verify employees’ identity

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A risk assessment team is concerned about hosting data with a cloud service provider (CSP) which of the following findings would justify this concern?

A.
The CPS utilizes encryption for data at rest and in motion

B.
The CSP takes into account multinational privacy concerns

C.
The financial review indicates the company is a startup

D.
SLA state service tickets will be resolved in less than 15 minutes

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An administrator is implementing a new management system for the machinery on the company’s production line. One requirement is that the system only be
accessible while within the production facility. Which of the following will be the MOST effective solution in limiting access based on this requirement?

A.
Access control list

B.
Firewall policy

C.
Air Gap

D.
MAC filter

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To mitigate the risk of intrusion, an IT Manager is concerned with using secure versions of protocols and services whenever possible. In addition, the security
technician is required to monitor the types of traffic being generated. Which of the following tools is the technician MOST likely to use?

A.
Port scanner

B.
Network analyzer

C.
IPS

D.
Audit Logs

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A server crashes at 6 pm. Senior management has determined that data must be restored within two hours of a server crash. Additionally, a loss of more than one
hour worth of data is detrimental to the company’s financial well-being. Which of the following is the RTO?

A.
7pm

B.
8pm

C.
9pm

D.
10pm

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The IT department has been tasked with reducing the risk of sensitive information being shared with unauthorized entities from computers it is saved on, without
impeding the ability of the employees to access the internet. Implementing which of the following would be the best way to accomplish this objective?

A.
Host-based firewalls

B.
DLP

C.
URL filtering

D.
Pop-up blockers

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A system administrator is conducting baseline audit and determines that a web server is missing several critical updates. Which of the following actions should the
administrator perform first to correct the issue?

A.
Open a service ticket according to the patch management plan

B.
Disconnect the network interface and use the administrative management console to perform the updates

C.
Perform a backup of the server and install the require patches

D.
Disable the services for the web server but leave the server alone pending patch updates

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Company transfers millions of files a day between their servers. A programmer for the company has created a program that indexes and verifies the integrity of
each file as it is replicated between servers. The programmer would like to use the fastest algorithm to ensure integrity. Which of the following should the
programmer use?

A.
SHA1

B.
RIPEMD

C.
DSA

D.
MD5

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following attacks initiates a connection by sending specially crafted packets in which multiple TCP flags are set to 1?

A.
Replay

B.
Smurf

C.
Xmas

D.
Fraggle

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A classroom utilizes workstations running virtualization software for a maximum of one virtual machine per working station. The network settings on the virtual
machines are set to bridged. Which of the following describes how the switch in the classroom should be configured to allow for the virtual machines and host
workstation to connect to network resources?

A.
The maximum-mac settings of the ports should be set to zero

B.
The maximum-mac settings of the ports should be set to one

C.
The maximum-mac settings of the ports should be set to two

D.
The maximum mac settings of the ports should be set to three

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Joe, a security analyst, is attempting to determine if a new server meets the security requirements of his organization. As a step in this process, he attempts to
identify a lack of security controls and to identify common misconfigurations on the server. Which of the following is Joe attempting to complete?

A.
Black hat testing

B.
Vulnerability scanning

C.
Black box testing

D.
Penetration testing

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company is rolling out a new e-commerce website. The security analyst wants to reduce the risk of the new website being comprised by confirming that system
patches are up to date, application hot fixes are current, and unneeded ports and services have been disabled. To do this, the security analyst will perform a:

A.
Vulnerability assessment

B.
White box test

C.
Penetration test

D.
Peer review

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly