Term
A security administrator wants to implement a more secure way to login to a VPN in addition to a username and password. Which of the following is the MOST secure way to log in to a VPN? A. Implementing an ACL B. Setting up a PKI
C. Implementing a single sign on process D. Setting up two VPNs |
|
Definition
|
|
Term
Which of the following audit types would a security administrator perform on the network to ensure each workstation is standardized?
A. Group policy
B. Domain wide password policy
C. Storage and retention policy
D. User access and rights
|
|
Definition
|
|
Term
Which of the following standards encodes in 64-bit sections, 56 of which are the encryption key?
A. SHA B. AES C. DES D. Blowfish |
|
Definition
C. DES encrypts and decrypts data in 64-bit blocks, using a 64-bit key, although the effective key strength is only 56 bits. The least significant (right-most) bit in each byte is a parity bit, and should be set so that there are always an odd number of 1s in every byte. These parity bits are ignored, so only the seven most significant bits of each byte are used, resulting in a key length of 56 bits. |
|
|
Term
Why is an ad-hoc network a security risk?
A. An ad-hoc network allows access to another computer at the same level of the logged in user, compromising information.
B. An ad-hoc network allows access to the nearest access point which may allow a direct connection to another computer.
C. An ad-hoc network allows access to the nearest access point which may give elevated rights to the connecting user. |
|
Definition
|
|
Term
Which of the following is used to both deploy and reapply baseline security configurations?
A. Performance baseline B. Security agent C. Security template D. Configuration baseline |
|
Definition
|
|
Term
Which of the following is BEST suited to detect local operating system compromises? A. Personal firewall B. HIDS C. Anti-spam D. System log |
|
Definition
|
|
Term
Which of the following is a benefit of network access control (NAC)?
A. A user is able to distribute connections to the network for load balancing using a centralized list of approved devices. B. A user is able to distribute connections to the network using cached credentials on a local machine. C. A user is able to control connections to the network using a centralized list of approved devices. D. A user is able to control connections to the network using cached credentials on a local |
|
Definition
C. A user is able to control connections to the network using a centralized list of approved devices. |
|
|