301 Which of the following reduces the effectiveness of telephone social engineering?
B. Awareness training
302 Which of the following will execute malicious code at a pre-specified time?
D. Logic Bomb
303 All of the following are weaknesses of WEP EXCEPT:
D. lack of integrity checking
304 Which of the following is LEAST likely to help reduce single points of failure?
A. Mandatory vacations
305 Which of the following reduces the attack surface of an operating system?
D. Disabling unused services
306 Which of the following is LEAST effective when hardening an operating system?
B. Installing HIDS
307 Which of the following provides the MOST control when deploying patches?
B. Patch management
308 If a technician wants to know when a computer application is accessing the network, which of the following logs should be reviewed?
D. Host firewall log
309 All of the following are components of IPSec EXCEPT:
B. temporal key interchange protocol
310 IPSec connection parameters are stored in which of the following?
B. Security association database
311 Which of the following will provide a 128-bit hash?
A. MD5
312 Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?
A. Collision resistance
313 Which of the following should be included in a forensic toolkit?
B. Digital camera
314 Which of the following BEST describes the form used while transferring evidence?
B. Chain of custody
315 Which of the following is the primary incident response function of a first responder?
A. To secure the scene and preserve evidence
316 Which of the following is the GREATEST problem with low humidity in a server room?
B. Static electricity
317 Which of the following protocols is used to ensure secure transmissions on port 443?
B. HTTPS
318 When should a technician perform disaster recovery testing?
C. In accordance with the disaster recovery plan
319 Which of the following is the BEST backup method to restore the entire operating system and all related software?
B. Disk Image
320 How many keys are utilized in symmetric cryptography?
C. One
321 Which of the following terms is BEST associated with public key infrastructure (PKI)?
D. Digital signatures
322 Which of the following is the LAST step to granting access to specific domain resources?
B. Authorize the user
323 After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their next step?
B. Elevate system privileges
324 Which of the following should the technician recommend as a way to logically separate various internal networks from each other?
C. VLAN
325 An organization has requested the ability to monitor all network traffic as it traverses their network. Which of the following should a technician implement?
A. Protocol analyzer
326 A large amount of viruses have been found on numerous domain workstations. Which of the following should the technician implement?
A. Centralized antivirus
327 Which of the following is the MOST difficult security concern to detect when contractors enter a secured facility?
D. Copying sensitive information with cellular phones
328 When are port scanners generally used on systems?
A. At the beginning of a vulnerability assessment
329 The staff must be cross-trained in different functional areas so that fraud can be detected. Which of the following is this an example of?
A. Job rotation
330 Human Resources has requested that staff members be moved to different parts of the country into new positions. Which of the following is this an example of?
C. Job rotation
331 An administrator is worried about an attacker using a compromised user account to gain administrator access to a system. Which of the following is this an example of?
B. Privilege escalation
332 Which of the following is used to deny authorized users access to services?
A. Botnets
333 An administrator recommends implementing whitelisting, blacklisting, closing-open relays, and strong authentication techniques to a server administrator. Which of the following threats are being addressed?
D. Spam
334 An administrator is asked to improve the physical security of a data center located inside the office building. The data center already maintains a physical access log and has a video surveillance system. Which of the following additional controls could be implemented?
A. Mantrap
335 In regards to physical security, which of the following BEST describes an access control system which implements a non-trusted but secure zone immediately outside of the secure zone?
C. Mantrap
336 A technician notices delays in mail delivery on the mail server. Which of the following tools could be used to determine the cause of the service degradation?
C. Performance monitor
337 Penetration testing should only be used once which of the following items is in place?
D. Written permission
338 An administrator recommends that management establish a trusted third party central repository to maintain all employees? private keys. Which of the following BEST describes the administrator?s recommendation?
A. Key escrow
339 To combat transaction fraud, a bank has implemented a requirement that all bank customers enter a different, unique code to confirm every transaction. Which of the following is the MOST effective method to accomplish this?
A. One-time password
340 All of the following should be identified within the penetration testing scope of work EXCEPT:
B. a complete list of all network vulnerabilities
341 Which of the following is the MOST efficient way that an administrator can restrict network access to certain ports enterprise wide?
B. ACL
342 An administrator is responsible for a server which has been attacked repeatedly in the past. The only recourse has been to reload the server from scratch. Which of the following techniques could be used to decrease the recovery time following an incident?
B. Implement the server as a virtual server instance
343 Validating the users claimed identity is called which of the following?
A. Authentication
344 Which of the following is planted on an infected system and deployed at a predetermined time?
B. Logic bomb
345 Which of the following allows a user to float a domain registration for a maximum of five days?
A. Kiting
346 According to company policy an administrator must logically keep the Human Resources department separated from the Accounting department. Which of the following would be the simplest way to accomplish this?
D. VLAN
347 Which of the following is an attack which is launched from multiple zombie machines in attempt to bring down a service?
C. DDoS
348 Which of the following will MOST likely allow an attacker to make a switch function like a hub?
D. MAC flooding
349 Which of the following is commonly programmed into an application for ease of administration?
B. Back door
350 Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?
B. War chalking
351 Which of the following authentication models uses a KDC?
A. Kerberos
352 Which of the following disaster recovery components is a location that is completely empty, but allows the infrastructure to be built if the live site goes down?
D. Cold site
353 Which of the following should be done if an organization intends to prosecute an attacker once an attack has been completed?
A. Apply proper forensic techniques
354 Which of the following documents specifies the uptime guarantee of a web server?
D. Service level agreement
355 Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?
D. Kerberos
356 Which of the following protocols can be implemented as an alternative to the overhead of a VPN?
A. SSL
357 Which of the following will set an account to lockout for 30 minutes after the maximum number attempts have failed?
B. Account lockout duration
358 Which of the following logs would reveal activities related to an ACL?
A. Firewall
359 Which of the following encryption algorithms has the largest overhead?
B. 3DES
360 Which of the following hashing algorithms is the MOST secure?
C. MD5
361 Which of the following would allow a technician to compile a visual view of an infrastructure?
A. Network mapper
362 Which of the following creates separate logical networks?
A. Subnetting
363 Which of the following is an area of the network infrastructure that allows a technician to place public facing systems into it without compromising the entire infrastructure?
B. DMZ
364 Which of the following attacks commonly result in a buffer overflow?
D. DoS
365 Which of the following type of attacks is TCP/IP hijacking?
A. Man-in-the-middle
366 Which of the following ports does SNMP run on?
C. 161
367 Which of the following is a collection of servers that is setup to attract hackers?
C. Honeynet
368 Which of the following could be used to determine which flags are set in a TCP/IP handshake?
C. Protocol analyzer
369 Which of the following would be the BEST choice to ensure only ports 25, 80 and 443 were open from outside of the network?
D. Firewall
370 Which of the following media is LEAST susceptible to a tap being placed on the line?
D. Fiber
371 Which of the following is responsible for establishing trust models?
A. The certificate authority
372 Which of the following allows attackers to gain control over the web camera of a system?
D. ActiveX component
373 Which of the following type of attacks sends out numerous MAC resolution requests to create a buffer overflow attack?
C. ARP poisoning
374 Which of the following would a former employee MOST likely plant on a server that is not traceable?
B. Logic bomb
375 Which of the following would be MOST effective in stopping phishing attempts?
D. User training
376 Which of the following consists of markings outside a building that indicate the connection speed of a nearby unsecured wireless network?
B. War chalking
377 Which of the following would be of MOST interest to someone that is dumpster diving?
A. Business card of computer contractor
378 Which of the following could involve moving physical locations every two years to help mitigate security risks?
B. Job rotation
379 Which of the following could be used to capture website GET requests?
C. Protocol analyzer
380 Which of the following does the process of least privilege fall under?
C. Confidentiality
381 Which of the following hashing algorithms is the LEAST secure?
C. LANMAN
382 Which of the following is the MOST secure transmission algorithm?
D. TKIP
383 Which of the following protocols is used for encryption between email servers?
C. TLS
384 Which of the following scenarios would a penetration test BEST be used for?
A. When providing a proof of concept demonstration for a vulnerability
385 Which of the following would be the easiest to use in detection of a DDoS attack?
B. Performance monitor
386 Which of the following implements the strongest hashing algorithm?
A. NTLMv2
387 Which of the following is BEST used to determine whether network utilization is abnormal?
B. Performance baseline
388 Which of the following is the BEST solution to implement to reduce unsolicited email?
C. Anti-spam
389 Identification is a critical component of the authentication process because it is:
D. when the user is verified
390 Identity proofing occurs during which phase of identification and authentication?
A. Identification
391 Which of the following BEST describes the practice of dumpster diving?
A. Sorting through the garbage of an organization to obtain information used for a subsequent attack
392 Implementation of proper environmental controls should be considered by administrators when recommending facility security controls because of which of the following?
C. Proper environmental controls help ensure availability of IT systems
393 An administrator is asked to recommend the most secure transmission media. Which of the following should be recommended?
D. Fiber optic cable
394 An administrator is selecting a device to secure an internal network segment from traffic external to the segment. Which of the following devices could be selected to provide security to the network segment?
B. NIPS
395 Which of the following devices should be deployed to protect a network against attacks launched from a business to business intranet? (Select TWO).
E. NIPS
D. Firewall
396 To prevent the use of previously issued PKI credentials which have expired or otherwise become invalid, administrators should always design programs to check which of the following?
B. CRL
397 To prevent the use of stolen PKI certificates on web servers, which of the following should an administrator ensure is available to their web servers?
A. CRL
398 Which of the following describes an implementation of PKI where a copy of a user?s private key is stored to provide third party access and to facilitate recovery operations?
C. Key escrow
399 A security administrator has been asked to deploy a biometric authentication system in a corporation. Which of the following devices is the MOST reliable and has the lowest cross over error rate?
C. Retina scanner
400 To increase the security of the network authentication process, an administrator decides to implement three-factor authentication. Which of the following authentication combinations is a three-factor system?
C. A retina scanner, PKI enabled smart card and a six-digit PIN