multi test d

  1. 301 Which of the following reduces the effectiveness of telephone social engineering?




    B. Awareness training
  2. 302 Which of the following will execute malicious code at a pre-specified time?




    D. Logic Bomb
  3. 303 All of the following are weaknesses of WEP EXCEPT:




    D. lack of integrity checking
  4. 304 Which of the following is LEAST likely to help reduce single points of failure?




    A. Mandatory vacations
  5. 305 Which of the following reduces the attack surface of an operating system?




    D. Disabling unused services
  6. 306 Which of the following is LEAST effective when hardening an operating system?




    B. Installing HIDS
  7. 307 Which of the following provides the MOST control when deploying patches?




    B. Patch management
  8. 308 If a technician wants to know when a computer application is accessing the network, which of the following logs should be reviewed?




    D. Host firewall log
  9. 309 All of the following are components of IPSec EXCEPT:




    B. temporal key interchange protocol
  10. 310 IPSec connection parameters are stored in which of the following?




    B. Security association database
  11. 311 Which of the following will provide a 128-bit hash?




    A. MD5
  12. 312 Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?




    A. Collision resistance
  13. 313 Which of the following should be included in a forensic toolkit?




    B. Digital camera
  14. 314 Which of the following BEST describes the form used while transferring evidence?




    B. Chain of custody
  15. 315 Which of the following is the primary incident response function of a first responder?




    A. To secure the scene and preserve evidence
  16. 316 Which of the following is the GREATEST problem with low humidity in a server room?




    B. Static electricity
  17. 317 Which of the following protocols is used to ensure secure transmissions on port 443?




    B. HTTPS
  18. 318 When should a technician perform disaster recovery testing?




    C. In accordance with the disaster recovery plan
  19. 319 Which of the following is the BEST backup method to restore the entire operating system and all related software?




    B. Disk Image
  20. 320 How many keys are utilized in symmetric cryptography?




    C. One
  21. 321 Which of the following terms is BEST associated with public key infrastructure (PKI)?




    D. Digital signatures
  22. 322 Which of the following is the LAST step to granting access to specific domain resources?




    B. Authorize the user
  23. 323 After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their next step?




    B. Elevate system privileges
  24. 324 Which of the following should the technician recommend as a way to logically separate various internal networks from each other?




    C. VLAN
  25. 325 An organization has requested the ability to monitor all network traffic as it traverses their network. Which of the following should a technician implement?




    A. Protocol analyzer
  26. 326 A large amount of viruses have been found on numerous domain workstations. Which of the following should the technician implement?




    A. Centralized antivirus
  27. 327 Which of the following is the MOST difficult security concern to detect when contractors enter a secured facility?




    D. Copying sensitive information with cellular phones
  28. 328 When are port scanners generally used on systems?




    A. At the beginning of a vulnerability assessment
  29. 329 The staff must be cross-trained in different functional areas so that fraud can be detected. Which of the following is this an example of?




    A. Job rotation
  30. 330 Human Resources has requested that staff members be moved to different parts of the country into new positions. Which of the following is this an example of?




    C. Job rotation
  31. 331 An administrator is worried about an attacker using a compromised user account to gain administrator access to a system. Which of the following is this an example of?




    B. Privilege escalation
  32. 332 Which of the following is used to deny authorized users access to services?




    A. Botnets
  33. 333 An administrator recommends implementing whitelisting, blacklisting, closing-open relays, and strong authentication techniques to a server administrator. Which of the following threats are being addressed?




    D. Spam
  34. 334 An administrator is asked to improve the physical security of a data center located inside the office building. The data center already maintains a physical access log and has a video surveillance system. Which of the following additional controls could be implemented?





    A. Mantrap
  35. 335 In regards to physical security, which of the following BEST describes an access control system which implements a non-trusted but secure zone immediately outside of the secure zone?




    C. Mantrap
  36. 336 A technician notices delays in mail delivery on the mail server. Which of the following tools could be used to determine the cause of the service degradation?




    C. Performance monitor
  37. 337 Penetration testing should only be used once which of the following items is in place?




    D. Written permission
  38. 338 An administrator recommends that management establish a trusted third party central repository to maintain all employees? private keys. Which of the following BEST describes the administrator?s recommendation?




    A. Key escrow
  39. 339 To combat transaction fraud, a bank has implemented a requirement that all bank customers enter a different, unique code to confirm every transaction. Which of the following is the MOST effective method to accomplish this?




    A. One-time password
  40. 340 All of the following should be identified within the penetration testing scope of work EXCEPT:




    B. a complete list of all network vulnerabilities
  41. 341 Which of the following is the MOST efficient way that an administrator can restrict network access to certain ports enterprise wide?




    B. ACL
  42. 342 An administrator is responsible for a server which has been attacked repeatedly in the past. The only recourse has been to reload the server from scratch. Which of the following techniques could be used to decrease the recovery time following an incident?




    B. Implement the server as a virtual server instance
  43. 343 Validating the users claimed identity is called which of the following?




    A. Authentication
  44. 344 Which of the following is planted on an infected system and deployed at a predetermined time?




    B. Logic bomb
  45. 345 Which of the following allows a user to float a domain registration for a maximum of five days?




    A. Kiting
  46. 346 According to company policy an administrator must logically keep the Human Resources department separated from the Accounting department. Which of the following would be the simplest way to accomplish this?




    D. VLAN
  47. 347 Which of the following is an attack which is launched from multiple zombie machines in attempt to bring down a service?




    C. DDoS
  48. 348 Which of the following will MOST likely allow an attacker to make a switch function like a hub?




    D. MAC flooding
  49. 349 Which of the following is commonly programmed into an application for ease of administration?




    B. Back door
  50. 350 Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?




    B. War chalking
  51. 351 Which of the following authentication models uses a KDC?




    A. Kerberos
  52. 352 Which of the following disaster recovery components is a location that is completely empty, but allows the infrastructure to be built if the live site goes down?




    D. Cold site
  53. 353 Which of the following should be done if an organization intends to prosecute an attacker once an attack has been completed?




    A. Apply proper forensic techniques
  54. 354 Which of the following documents specifies the uptime guarantee of a web server?




    D. Service level agreement
  55. 355 Which of the following authentication models uses a time stamp to prevent the risks associated with a replay attack?




    D. Kerberos
  56. 356 Which of the following protocols can be implemented as an alternative to the overhead of a VPN?




    A. SSL
  57. 357 Which of the following will set an account to lockout for 30 minutes after the maximum number attempts have failed?




    B. Account lockout duration
  58. 358 Which of the following logs would reveal activities related to an ACL?




    A. Firewall
  59. 359 Which of the following encryption algorithms has the largest overhead?




    B. 3DES
  60. 360 Which of the following hashing algorithms is the MOST secure?




    C. MD5
  61. 361 Which of the following would allow a technician to compile a visual view of an infrastructure?




    A. Network mapper
  62. 362 Which of the following creates separate logical networks?




    A. Subnetting
  63. 363 Which of the following is an area of the network infrastructure that allows a technician to place public facing systems into it without compromising the entire infrastructure?




    B. DMZ
  64. 364 Which of the following attacks commonly result in a buffer overflow?




    D. DoS
  65. 365 Which of the following type of attacks is TCP/IP hijacking?




    A. Man-in-the-middle
  66. 366 Which of the following ports does SNMP run on?




    C. 161
  67. 367 Which of the following is a collection of servers that is setup to attract hackers?




    C. Honeynet
  68. 368 Which of the following could be used to determine which flags are set in a TCP/IP handshake?




    C. Protocol analyzer
  69. 369 Which of the following would be the BEST choice to ensure only ports 25, 80 and 443 were open from outside of the network?




    D. Firewall
  70. 370 Which of the following media is LEAST susceptible to a tap being placed on the line?




    D. Fiber
  71. 371 Which of the following is responsible for establishing trust models?




    A. The certificate authority
  72. 372 Which of the following allows attackers to gain control over the web camera of a system?




    D. ActiveX component
  73. 373 Which of the following type of attacks sends out numerous MAC resolution requests to create a buffer overflow attack?




    C. ARP poisoning
  74. 374 Which of the following would a former employee MOST likely plant on a server that is not traceable?




    B. Logic bomb
  75. 375 Which of the following would be MOST effective in stopping phishing attempts?




    D. User training
  76. 376 Which of the following consists of markings outside a building that indicate the connection speed of a nearby unsecured wireless network?




    B. War chalking
  77. 377 Which of the following would be of MOST interest to someone that is dumpster diving?




    A. Business card of computer contractor
  78. 378 Which of the following could involve moving physical locations every two years to help mitigate security risks?




    B. Job rotation
  79. 379 Which of the following could be used to capture website GET requests?




    C. Protocol analyzer
  80. 380 Which of the following does the process of least privilege fall under?




    C. Confidentiality
  81. 381 Which of the following hashing algorithms is the LEAST secure?




    C. LANMAN
  82. 382 Which of the following is the MOST secure transmission algorithm?




    D. TKIP
  83. 383 Which of the following protocols is used for encryption between email servers?




    C. TLS
  84. 384 Which of the following scenarios would a penetration test BEST be used for?




    A. When providing a proof of concept demonstration for a vulnerability
  85. 385 Which of the following would be the easiest to use in detection of a DDoS attack?




    B. Performance monitor
  86. 386 Which of the following implements the strongest hashing algorithm?




    A. NTLMv2
  87. 387 Which of the following is BEST used to determine whether network utilization is abnormal?




    B. Performance baseline
  88. 388 Which of the following is the BEST solution to implement to reduce unsolicited email?




    C. Anti-spam
  89. 389 Identification is a critical component of the authentication process because it is:




    D. when the user is verified
  90. 390 Identity proofing occurs during which phase of identification and authentication?




    A. Identification
  91. 391 Which of the following BEST describes the practice of dumpster diving?




    A. Sorting through the garbage of an organization to obtain information used for a subsequent attack
  92. 392 Implementation of proper environmental controls should be considered by administrators when recommending facility security controls because of which of the following?




    C. Proper environmental controls help ensure availability of IT systems
  93. 393 An administrator is asked to recommend the most secure transmission media. Which of the following should be recommended?




    D. Fiber optic cable
  94. 394 An administrator is selecting a device to secure an internal network segment from traffic external to the segment. Which of the following devices could be selected to provide security to the network segment?




    B. NIPS
  95. 395 Which of the following devices should be deployed to protect a network against attacks launched from a business to business intranet? (Select TWO).





    • E. NIPS
    • D. Firewall
  96. 396 To prevent the use of previously issued PKI credentials which have expired or otherwise become invalid, administrators should always design programs to check which of the following?




    B. CRL
  97. 397 To prevent the use of stolen PKI certificates on web servers, which of the following should an administrator ensure is available to their web servers?




    A. CRL
  98. 398 Which of the following describes an implementation of PKI where a copy of a user?s private key is stored to provide third party access and to facilitate recovery operations?




    C. Key escrow
  99. 399 A security administrator has been asked to deploy a biometric authentication system in a corporation. Which of the following devices is the MOST reliable and has the lowest cross over error rate?





    C. Retina scanner
  100. 400 To increase the security of the network authentication process, an administrator decides to implement three-factor authentication. Which of the following authentication combinations is a three-factor system?




    C. A retina scanner, PKI enabled smart card and a six-digit PIN
Author
johnnystevens
ID
10950
Card Set
multi test d
Description
multiple choice upload test
Updated