Term
An organization does not have adequate resources to administrator its large infrastructure. A security administrator wishes to combine the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal? |
|
Definition
Unified Threat Management |
|
|
Term
Which of the following would allow the organization to divide a Class C IP address range into several ranges? |
|
Definition
|
|
Term
The security administrator is currently unaware of an incident that occurred a week ago. Which of the following will ensure the administrator is notified in a timely manner in the future? |
|
Definition
|
|
Term
An access point has been configured for AES encryption but a client is unable to connect to it. Which of the following should be configured on the client to fix this issue? |
|
Definition
|
|
Term
The system administrator is tasked with changing the administrator password across all 2000 computers in the organization. Which of the following should they system administrator implement to accomplish this task? |
|
Definition
|
|
Term
A network administrator wants to block both DNS requests and zone transfers coming from outside IP addresses. The company uses a firewall which implements an implicit allow and it currently configured with the following ACL applied to its external interface. -PERMIT TCP ANY ANY 80 -PERMIT TCP ANY ANY 443 Which of the following rules would accomplish this task? |
|
Definition
Change the firewall default settings so that it implements an implicit deny Add the following ACL at the bottom of the current ACLDENY IP ANY ANY 53 |
|
|
Term
Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway? |
|
Definition
|
|
Term
An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized while the computer is in use. which of the following can be implemented? |
|
Definition
|
|
Term
A company is looking to improve their security posture by addressing risks uncovered by a recent penetration test. Which of the following risks is MOST likely to affect the business on a day-to-day basis? |
|
Definition
Lack of antivirus software |
|
|
Term
Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential customer information in a recycle bin without shredding it first. This is MOST likely to increase the risk of loss from which of the following attacks? |
|
Definition
|
|
Term
A recently installed application update caused a vital application to crash during the middle of the workday. The application remained down until a previous version could be reinstalled on the server, and this resulted in a significant loss of data and revenue. Which of the following could BEST prevent this issue from occurring again? |
|
Definition
Application patch management |
|
|
Term
A security administrator wishes to increase the security of wireless network. Which of the following BEST addresses this concern? |
|
Definition
Change the encryption from TKIP-based to CCMP-based. |
|
|
Term
The system administrator has deployed updated security controls for the network to limit the risk of attack. The security manager is concerned that controls continue to function as intended to maintain appropriate security posture. which of the following risk mitigation strategies is MOST important to the security manager? |
|
Definition
|
|
Term
A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them the customer PC's. which of the following should the administrator use to test the patching processes quickly and often? |
|
Definition
Create a virtualized sandbox and utilize snapshots |
|
|
Term
An auditing team has found that passwords do not meet best business practices. Which of the following will MOST increase the security of the passwords? |
|
Definition
Password complexity Password length |
|
|
Term
A vulnerability scan is reporting that patches are missing on a server. After a review, it is determined that the application requiring a patch does not exist on the operating system. Which of the following describes this cause? |
|
Definition
|
|
Term
Company A submitted a bid on a contract to do work for Company B via email. Company B was insistent that the bid did not come from Company A. which of the following would have assured that the bid was submitted by Company A? |
|
Definition
|
|
Term
Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her office without supplying a username/password combination. Upon disconnecting from the wireless network, she attempted to connect her personal tablet computer to the same wireless network and could not connect. Which of the following is MOST likely the reason? |
|
Definition
The company wireless is using a MAC filter. |
|
|
Term
A network technician is on the phone with the system administration team. Power to the server room was lost and servers need to be restarted. The DNS services must be the first to be restarted. Several machines are powered off. Assuming each serve only provides one services, which of the following should be powered on FIST to establish DNS services? |
|
Definition
|
|
Term
A security administrator is reviewing the company's continuity plan. The plan specifies an RTO of six hours and RPO of two days. Which of the following is the plan describing? |
|
Definition
Systems should be restored within six hours with a minimum of two days worth of data. |
|
|
Term
A server dedicated to the storage and processing of sensitive information was compromised with a rootkit and sensitive data was exhfiltrated. Which of the following incident response procedures is best suited to restore the server? |
|
Definition
Wipe the storage, reinstall the OR from original media and restore the data from the last known good backup. |
|
|
Term
The incident response team has received the following email message. From: monitor@ext-company.com To: security@company.com Subject: Copyright infringement A copyright infringement alert was triggered by IP address 13.10.66.5 at 09: 50: 01 GMT. After reviewing the following web logs for IP 13.10.66.5, the team is unable to correlate and identify the incident. 09: 45: 33 13.10.66.5 http: //remote.site.com/login.asp?user=john 09: 50: 22 13.10.66.5 http: //remote.site.com/logout.asp?user=anne 10: 50: 01 13.10.66.5 http: //remote.site.com/access.asp?file=movie.mov 11: 02: 45 13.10.65.5 http: //remote.site.com/download.asp?movie.mov=ok Which of the following is the MOST likely reason why the incident response team is unable to identify and correlate the incident? |
|
Definition
Incident time offsets were not accounted for. |
|
|
Term
Which of the following describes a type of malware which is difficult to reverse engineer in a virtual lab? |
|
Definition
|
|
Term
After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the document is no longer encrypted. Which of the following can a security technician implement to ensure that documents stored on Joe’s desktop remain encrypted when moved to external media or other network based storage? |
|
Definition
|
|
Term
A security administrator must implement a system to allow clients to securely negotiate encryption keys with the company’s server over a public unencrypted communication channel. Which of the following implements the required secure key negotiation? |
|
Definition
|
|