Term
| An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender? |
|
Definition
|
|
Term
| Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server? |
|
Definition
|
|
Term
| Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished? |
|
Definition
|
|
Term
| A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control? |
|
Definition
| Mandatory Access Controls |
|
|
Term
| A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default? |
|
Definition
|
|
Term
Which of the following could cause a browser to display the message below? “The security certificate presented by this website was issued for a different website’s address.” |
|
Definition
| HTTPS://127.0.01 was used instead of HTTPS://localhost. |
|
|
Term
| A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following? |
|
Definition
|
|
Term
| Which of the following pseudocodes can be used to handle program exceptions? |
|
Definition
| If program module crashes, then restart program module. |
|
|
Term
| Which of the following technologies uses multiple devices to share work? |
|
Definition
|
|
Term
| Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session? |
|
Definition
|
|
Term
| Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? |
|
Definition
|
|
Term
| Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task? |
|
Definition
|
|
Term
| Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems? |
|
Definition
|
|
Term
| Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program? |
|
Definition
|
|
Term
| Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools? |
|
Definition
|
|
Term
| Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point? |
|
Definition
|
|
Term
| Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation? |
|
Definition
|
|
Term
| Which of the following is a management control? |
|
Definition
|
|
Term
| Which of the following security strategies allows a company to limit damage to internal systems and provides loss control? |
|
Definition
|
|
Term
| In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using? |
|
Definition
|
|
Term
| Using proximity card readers instead of the traditional key punch doors would help to mitigate: |
|
Definition
|
|
Term
| Which of the following application attacks is used to gain access to SEH? |
|
Definition
|
|
Term
| Which of the following is an authentication service that uses UDP as a transport medium? |
|
Definition
|
|
Term
| Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? |
|
Definition
Remote wipe Device encryption |
|
|
Term
| Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company? |
|
Definition
|
|