Term
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender? |
|
Definition
|
|
Term
Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server? |
|
Definition
|
|
Term
Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished? |
|
Definition
|
|
Term
A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control? |
|
Definition
Mandatory Access Controls |
|
|
Term
A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default? |
|
Definition
|
|
Term
Which of the following could cause a browser to display the message below? “The security certificate presented by this website was issued for a different website’s address.” |
|
Definition
HTTPS://127.0.01 was used instead of HTTPS://localhost. |
|
|
Term
A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following? |
|
Definition
|
|
Term
Which of the following pseudocodes can be used to handle program exceptions? |
|
Definition
If program module crashes, then restart program module. |
|
|
Term
Which of the following technologies uses multiple devices to share work? |
|
Definition
|
|
Term
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session? |
|
Definition
|
|
Term
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? |
|
Definition
|
|
Term
Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task? |
|
Definition
|
|
Term
Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems? |
|
Definition
|
|
Term
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program? |
|
Definition
|
|
Term
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools? |
|
Definition
|
|
Term
Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point? |
|
Definition
|
|
Term
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation? |
|
Definition
|
|
Term
Which of the following is a management control? |
|
Definition
|
|
Term
Which of the following security strategies allows a company to limit damage to internal systems and provides loss control? |
|
Definition
|
|
Term
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using? |
|
Definition
|
|
Term
Using proximity card readers instead of the traditional key punch doors would help to mitigate: |
|
Definition
|
|
Term
Which of the following application attacks is used to gain access to SEH? |
|
Definition
|
|
Term
Which of the following is an authentication service that uses UDP as a transport medium? |
|
Definition
|
|
Term
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? |
|
Definition
Remote wipe Device encryption |
|
|
Term
Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company? |
|
Definition
|
|