Term
Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability? |
|
Definition
|
|
Term
Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach? |
|
Definition
|
|
Term
Methods to test the responses of software and web applications to unusual or unexpected inputs is known as: |
|
Definition
|
|
Term
Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall? |
|
Definition
|
|
Term
Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent? |
|
Definition
|
|
Term
Which statement is TRUE about the operation of a packet sniffer? |
|
Definition
The Ethernet card must be placed in promiscuous mode. |
|
|
Term
Which of the following firewall rules only denies DNS zone transfers? |
|
Definition
|
|
Term
Which of the following BEST explains the use of an HSM within the company servers? |
|
Definition
Hardware encryption is faster than software encryption. |
|
|
Term
Which of the following technologies can store multi-tenant data with different security requirements? |
|
Definition
|
|
Term
Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company data. Where and how should Matt meet this requirement? |
|
Definition
Matt should implement DLP and encrypt the company database. |
|
|
Term
Which of the following types of encryption will help in protecting files on a PED? |
|
Definition
|
|
Term
Which of the following does full disk encryption prevent? |
|
Definition
|
|
Term
Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company’s password policy. Which of the following should Pete do NEXT? |
|
Definition
Tell the application development manager to code the application to adhere to the company’s password policy. |
|
|
Term
Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning? |
|
Definition
A recent security breach in which passwords were cracked. |
|
|
Term
Which of the following presents the STRONGEST access control? |
|
Definition
|
|
Term
Which of the following encompasses application patch management? |
|
Definition
|
|
Term
Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent? |
|
Definition
|
|
Term
Which of the following is the LEAST volatile when performing incident response procedures? |
|
Definition
|
|
Term
Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall application but does not have all the details. Jane needs to review the software before it is released to production. Which of the following reviews should Jane conduct? |
|
Definition
|
|
Term
The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following? |
|
Definition
Cognitive passwords attacks |
|
|
Term
Pete’s corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent? |
|
Definition
|
|
Term
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address? |
|
Definition
|
|
Term
Which of the following can be implemented with multiple bit strength? |
|
Definition
|
|
Term
Pete, the system administrator, has blocked users from accessing social media web sites. In addition to protecting company information from being accidentally leaked, which additional security benefit does this provide? |
|
Definition
Protection against malware introduced by banner ads |
|
|
Term
Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Pete’s BEST option? |
|
Definition
Use hardware already at an offsite location and configure it to be quickly utilized. |
|
|