multi test 1

  1. 1 All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:




    B. L2TP
  2. 2 Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?




    D. Steganography
  3. 3 Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?




    A. TCP/IP hijacking
  4. 4 How should a company test the integrity of its backup data?




    B. By restoring part of the backup
  5. 5 Which of following can BEST be used to determine the topology of a network and discover unknown devices?




    D. Network mapper
  6. 6 When should a technician perform penetration testing?




    B. When the technician has permission from the owner of the network
  7. 7 An administrator has implemented a new SMTP service on a server. A public IP address translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the server?s public IP address is now reported in a spam real-time block list. Which of the following is wrong with the server?




    C. SMTP open relaying is enabled
  8. 8 Which of the following is MOST efficient for encrypting large amounts of data?




    C. Symmetric key algorithms
  9. 9 Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?




    D. War driving
  10. 10 Which of the following BEST describes ARP?




    C. Discovering the MAC address of a device from the IP address
  11. 11 Which of the following would be BEST to use to apply corporate security settings to a device?




    C. A security template
  12. 12 A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If the anti-malware software is purchased, which of the following is the expected net savings?




    A. $2,290
  13. 13 Which of the following is the main objective of steganography?




    C. Hide information
  14. 14 Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?




    B. DH-ECC
  15. 15 Which of the following improves security in a wireless system?




    A. MAC filtering
  16. 16 A user wants to implement secure LDAP on the network. Which of the following port numbers secure LDAP use by default?




    D. 636
  17. 17 On which of the following is a security technician MOST likely to find usernames?




    A. Application logs
  18. 18 How many keys are utilized with asymmetric cryptography?




    D. Two
  19. 19 During a risk assessment it is discovered that only one system administrator is assigned several tasks critical to continuity of operations. It is recommended to cross train other system administrators to perform these tasks and mitigate which of the following risks?




    A. Single point of failure
  20. 20 Which of the following network filtering devices will rely on signature updates to be effective?




    B. NIDS
  21. 21 Which of the following is a single server that is setup in the DMZ or outer perimeter in order to distract attackers?




    C. Honeypot
  22. 22 Which of the following encryption algorithms is decrypted in the LEAST amount of time?




    B. AES
  23. 23 An administrator is trying to secure a network from threats originating outside the network. Which of the following devices provides protection for the DMZ from attacks launched from the Internet?




    D. Firewall
  24. 24 Which of the following is a way to manage operating system updates?




    A. Change management
  25. 25 Which of the following is a list of discrete entries that are known to be benign?




    B. Whitelist
  26. 26 Which of the following increases the collision resistance of a hash?




    D. Salt
  27. 27 A programmer has decided to alter the server variable in the coding of an authentication function for a proprietary sales application. Before implementing the new routine on the production application server, which of the following processes should be followed?




    A. Change management
  28. 28 When deploying 50 new workstations on the network, which of following should be completed FIRST?




    B. Apply the baseline configuration
  29. 29 Which of the following should be implemented to have all workstations and servers isolated in their own broadcast domains?




    C. VLANs
  30. 30 End users are complaining about receiving a lot of email from online vendors and pharmacies. Which of the following is this an example of?




    D. Spam
  31. 31 Which of the following BEST describes a private key in regards to asymmetric encryption?




    A. The key owner has exclusive access to the private key.
  32. 32 Which of the following logs might reveal the IP address and MAC address of a rogue device within the local network?




    C. DHCP logs
  33. 33 Which of the following is commonly used in a distributed denial of service (DDOS) attack?




    D. Botnet
  34. 34 Which of the following practices is MOST relevant to protecting against operating system security flaws?




    C. Patch management
  35. 35 Which of the following is a best practice for coding applications in a secure manner?




    D. Input validation
  36. 36 Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?




    C. Virtualization
  37. 37 Which of the following network tools would provide the information on what an attacker is doing to compromise a system?




    B. Honeypot
  38. 38 Assigning proper security permissions to files and folders is the primary method of mitigating which of the following?




    B. Trojan
  39. 39 Which of the following logical access controls would be MOST appropriate to use when creating an account for a temporary worker?




    D. Account expiration
  40. 40 Which of the following may be an indication of a possible system compromise?




    C. A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline.
  41. 41 An administrator suspects that files are being copied to a remote location during off hours. The file server does not have logging enabled. Which of the following logs would be the BEST place to look for information?




    C. Firewall logs
  42. 42 Which of the following access control methods gives the owner control over providing permissions?




    D. Discretionary Access Control (DAC)
  43. 43 Which of the following access control methods grants permissions based on the users position in the company?




    C. Role-Based Access Control (RBAC)
  44. 44 Which of the following access control methods includes switching work assignments at preset intervals?




    B. Job rotation
  45. 45 Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?




    A. Kerberos
  46. 46 Which of the following would an attacker use to footprint a system?




    A. Port scanner
  47. 47 Which of the following ensures a user cannot deny having sent a message?




    C. Non-repudiation
  48. 48 Which of the following allows an attacker to embed a rootkit into a picture?




    A. Steganography
  49. 49 Which of the following is a publication of inactivated user certificates?




    B. Certificate revocation list
  50. 50 Which of the following is a method of encrypting email?




    A. S/MIME
Author
Anonymous
ID
10781
Card Set
multi test 1
Description
multi load test 1
Updated