Term
Which of the following components MUST be trusted by all parties in PKI? |
|
Definition
|
|
Term
Which of the following should Matt, a security administrator, include when encrypting smartphones? |
|
Definition
Internal memory Removable memory cards |
|
|
Term
Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT |
|
Definition
|
|
Term
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted? |
|
Definition
|
|
Term
Which of the following can use RC4 for encryption? |
|
Definition
|
|
Term
Which of the following defines a business goal for system restoration and acceptable data loss? |
|
Definition
|
|
Term
If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C.Which of the following PKI concepts is this describing? |
|
Definition
|
|
Term
Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency? |
|
Definition
|
|
Term
Which of the following allows a company to maintain access to encrypted resources when employee turnover is high? |
|
Definition
|
|
Term
Which of the following devices will help prevent a laptop from being removed from a certain location? |
|
Definition
|
|
Term
Which of the following is the MOST secure protocol to transfer files? |
|
Definition
|
|
Term
Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms? |
|
Definition
|
|
Term
A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this? |
|
Definition
|
|
Term
Which of the following protocols is used to authenticate the client and server’s digital certificate? |
|
Definition
|
|
Term
Which of the following can be used to mitigate risk if a mobile device is lost? |
|
Definition
|
|
Term
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss? |
|
Definition
|
|
Term
Which of the following is an example of multifactor authentication? |
|
Definition
|
|
Term
After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen: `Please only use letters and numbers on these fields’ Which of the following is this an example of? |
|
Definition
|
|
Term
Which of the following should the security administrator implement to limit web traffic based on country of origin? |
|
Definition
Proxies Firewall URL filtering |
|
|
Term
Several bins are located throughout a building for secure disposal of sensitive information. Which of the following does this prevent? |
|
Definition
|
|
Term
Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected? |
|
Definition
Initial baseline configuration |
|
|
Term
Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following? |
|
Definition
Security awareness training |
|
|
Term
Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task? |
|
Definition
|
|
Term
Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate? |
|
Definition
|
|
Term
Users at a company report that a popular news website keeps taking them to a web page with derogatory content. This is an example of which of the following? |
|
Definition
|
|