IT CertificationsComprehensive Study Set

Comptia Security Guide To Network Security Fundamentals

315 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Chapter 1

ANSWER

Introduction to Network Security

QUESTION 2

Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered?

ANSWER

a. Security administrator b. Security technician c. Security officer d. Security manager

QUESTION 3

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?

ANSWER

a. Large number of vulnerabilities b. End-of-life systems c. Lack of vendor support d. Misconfigurations

QUESTION 4

Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT covered?

ANSWER

a. Default configurations b. Weak configurations c. Vulnerable business processes d. Misconfigurations

QUESTION 5

What is a race condition?

ANSWER

a. When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers. b. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences. c. When an attack finishes its operation before antivirus can complete its work. d. When a software update is distributed prior to a vulnerability being discovered.

QUESTION 6

Which the following is NOT a reason why it is difficult to defend against today's attackers?

ANSWER

a. Delay in security updating b. Greater sophistication of defense tools c. Increased speed of attacks d. Simplicity of attack tools

QUESTION 7

Which of the following is NOT true regarding security?

ANSWER

a. Security is a goal. b. Security includes the necessary steps to protect from harm. c. Security is a process. d. Security is a war that must be won at all costs.

QUESTION 8

Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use?

ANSWER

a. "Security and convenience are not related." b. "Convenience always outweighs security." c. "Security and convenience are inversely proportional." d. "Whenever security and convenience intersect, security always wins."

QUESTION 9

Which of the following ensures that only authorized parties can view protected information?

ANSWER

a. Authorization b. Confidentiality c. Availability d. Integrity

QUESTION 10

Which of the following is NOT a successive layer in which information security is achieved?

ANSWER

a. Products b. People c. Procedures d. Purposes

QUESTION 11

Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____.

ANSWER

a. on electronic digital devices and limited analog devices that can connect via the Internet or through a local area network. b. through a long-term process that results in ultimate security. c. using both open-sourced as well as supplier-sourced hardware and software that interacts appropriately with limited resources. d. through products, people, and procedures on the devices that store, manipulate, and transmit the information.

QUESTION 12

Which of the following is an enterprise critical asset?

ANSWER

a. System software b. Information c. Outsourced computing services d. Servers, routers, and power supplies

QUESTION 13

Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?

ANSWER

a. Extinguish risk b. Transfer risk c. Mitigate risk d. Avoid risk

QUESTION 14

Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information?

ANSWER

a. Sarbanes-Oxley Act (Sarbox) b. Financial and Personal Services Disclosure Act c. Health Insurance Portability and Accountability Act (HIPAA) d. Gramm-Leach-Bliley Act (GLBA)

QUESTION 15

Why do cyberterrorists target power plants, air traffic control centers, and water systems?

ANSWER

a. These targets are government-regulated and any successful attack would be considered a major victory. b. These targets have notoriously weak security and are easy to penetrate. c. They can cause significant disruption by destroying only a few targets. d. The targets are privately owned and cannot afford high levels of security.

QUESTION 16

Which tool is most commonly associated with nation state threat actors?

ANSWER

a. Closed-Source Resistant and Recurrent Malware (CSRRM) b. Advanced Persistent Threat (APT) c. Unlimited Harvest and Secure Attack (UHSA) d. Network Spider and Worm Threat (NSAWT)

QUESTION 17

An organization that practices purchasing products from different vendors is demonstrating which security principle?

ANSWER

a. Obscurity b. Diversity c. Limiting d. Layering

QUESTION 18

What is an objective of state-sponsored attackers?

ANSWER

a. To right a perceived wrong b. To amass fortune over of fame c. To spy on citizens d. To sell vulnerabilities to the highest bidder

QUESTION 19

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use?

ANSWER

a. Obscurity b. Layering c. Diversity d. Limiting

QUESTION 20

What are industry-standard frameworks and reference architectures that are required by external agencies known as?

ANSWER

a. Compulsory b. Mandatory c. Required d. Regulatory

QUESTION 21

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?

ANSWER

a. Cyberterrorists b. Competitors c. Brokers d. Resource managers

QUESTION 22

Chapter 2

ANSWER

Malware and Social Engineering Attacks

QUESTION 23

Which of the following is NOT a primary trait of malware?

ANSWER

a. Diffusion b. Circulation c. Infection d. Concealment

QUESTION 24

Which type of malware requires a user to transport it from one computer to another?

ANSWER

a. Worm b. Rootkit c. Adware d. Virus

QUESTION 25

Which of the mutation completely changes a virus from its original form by rewriting its own code whenever it is executed?

ANSWER

a. Betamorphic b. Oligomorphic c. Polymorphic d. Metamorphic

QUESTION 26

Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free program to receive weather reports, but the program had also installed malware on the computer that gave the threat actor unrestricted access to the computer. What type of malware had been downloaded?

ANSWER

a. Virus b. Ransonware c. RAT d. Trojan

QUESTION 27

Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this?

ANSWER

a. Persistent virusware b. Trojanware c. Blocking ransonware d. Lockoutware

QUESTION 28

Astrid's computer screen suddenly days that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer?

ANSWER

a. Bitcoin malware b. Crypto-malware c. Blocking virus d. Networked worm

QUESTION 29

What is the name of the threat actor's computer that gives instructions to an infected computer?

ANSWER

a. Command and control (C&C) server b. Resource server c. Regulating Net Server (RNS) d. Monitoring and Infecting (M&I) server

QUESTION 30

Which of these could NOT be defined as a logic bomb?

ANSWER

a. If the company's stock price drops below $100, then credit Juni's account with 10 additional years of retirement credit. b. Erase all data if Matilda's name is removed from the list of employees. c. Reformat the hard drive three months after Sigrid left the company. d. Send spam email to Moa's inbox on Tuesday.

QUESTION 31

Which of the following is NOT correct about a rootkit?

ANSWER

a. A rootkit is able to hide its presence of the presence of other malware. b. A rootkit accesses "lower layers" of the operating system. c. A rootkit is always the payload of the Trojan. d. The risk of a rootkit is less today than previously. d. The risk of a rootkit is less today than previously.

QUESTION 32

Which of these is a general term used for describing software that gathers information without the user's consent?

ANSWER

a. Gatherware b. Adware c. Spyware d. Scrapeware

QUESTION 33

Which statement regarding a keylogger is NOT true?

ANSWER

a. Keyloggers can be used to capture passwords, credit card numbers, or personal information. b. Software keyloggers are generally easy to detect. c. Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port. d. Software keyloggers can be designed to send captured information automatically back to the attacker through the internet.

QUESTION 34

A watering hole attack is directed against __________.

ANSWER

a. wealthy individuals b. a smaller group of specific users c. all users of a large corporation d. attackers who send spam

QUESTION 35

__________ sends phishing message only to wealthy individuals.

ANSWER

a. Whaling b. Spear phishing c. Target phishing d. Microing

QUESTION 36

Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use Lykke?

ANSWER

a. Familiarity b. Scarcity c. Intimidation d. Consensus

QUESTION 37

Hedda pretends to be the help desk manager and called Steve to trick him into giving her his password. What social engineering attach has Hedda performed?

ANSWER

a. Aliasing b. Duplicity c. Impersonation d. Luring

QUESTION 38

How can an attacker use a hoax?

ANSWER

a. a hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. b. By sending out a hoax, an attacker can convince a user to read his email more often. c. A user who receives multiple hoaxes count contact his supervisor for help. d. Hoaxes are not used by attackers today.

QUESTION 39

Which of these items retrieved through dumpster diving would NOT provide useful information?

ANSWER

a. Calendars b. Organizational charts c. Memos d. Books

QUESTION 40

__________ is following an authorized person through a secure door.

ANSWER

a. Tagging b. Tailgating c. Backpacking c. Caboosing

QUESTION 41

Each of these is a reason why adware is scorned EXCEPT __________.

ANSWER

a. it displays objectionable content b. it displays the attacker's programming skills c. it can interfere with a user's productivity d. it can cause a computer to crash or slow down

QUESTION 42

What is term used for a threat actor who controls multiple bots in a botnet?

ANSWER

a. Bot herder b. Zombie shepherd c. Rogue IRC d. Cyber-root

QUESTION 43

Chapter 3

ANSWER

Basic Cryptography

QUESTION 44

The Hashed Message Authentication code (HMAC) __________.

ANSWER

a. encrypts only the message b. encrypts only the key c. encrypts the key and the message d. encrypts the DHE key only

QUESTION 45

What is the latest version of the Secure Hash Algorithm?

ANSWER

a. SHA-2 b. SHA-3 c. SHA-4 d. SHA-5

QUESTION 46

Alexel was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?

ANSWER

a. AES b. XANDA13 c. ROT13 d. Alphabetic

QUESTION 47

Abram was asked to explain to one of his coworkers the XOR cipher. he showed his coworkers and example of adding two bits, 1 and 1. What is the result of this sum?

ANSWER

a. 2 b. 1 c. 0 d. 16

QUESTION 48

Which of the following key exchanges uses the same keys each time?

ANSWER

a. Diffe-Hellman-RSA (DHRSA) b. Diffe-Hellman Ephemeral (DHE) c. Diffe-Hellman (DH) d. Ellipic-Curve Diffe-Hellman (ECDH)

QUESTION 49

Public key systems that are different for each session are called __________.

ANSWER

a. Public Key Exchange (PKE) b. perfect forward secrecy c. Elliptic Curve Diffe-Hellman (ECDH) d. Diffe-Hellman (DH)

QUESTION 50

What is data called that is to be encrypted by imputing it into a cryptographic algorithm?

ANSWER

a. Opentext b. Plaintext c. Cleartext d. Ciphertext

QUESTION 51

Which of these is NOT a basic security protection for information that cryptography can provide/

ANSWER

a. Authenticity b. Risk Loss c. Integrity d. Ciphertext

QUESTION 52

Which areas of a file CANNOT be used by steganography to hide data?

ANSWER

a. In areas that contain the content data itself b. In the file header fields that describes the file c. In data that is used to describe the content or structure of the actual data d. In the directory structure of the file system

QUESTION 53

Proving that a user sent an email message is known as ___________.

ANSWER

a. Non-repudiation b. Repudiation c. Integrity d. Availability

QUESTION 54

A(n) __________ is not decrypted but is only used for comparison purposes.

ANSWER

a. Key b. Stream c. Digest d. Algorithm

QUESTION 55

Which of these is NOT a characteristic of a secure hash algorithm?

ANSWER

a. Collision should be rare. b. A message cannot be produced from a predefined hash. c. The results of a hash function should not be reversed. d. The hash should always be the same fixed size.

QUESTION 56

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?

ANSWER

a. Diffusion b. Confusion c. Integrity d. Chaos

QUESTION 57

Which of the these is the strongest symmetric cryptographic algorithm?

ANSWER

a. Data Encryption Standard b. Triple Data Encryption Standard c. Advanced Encryption Standard d. RC1

QUESTION 58

If Bob wants to send a secure message to Alice using a asymmetric algorithm, which key does he use to encrypt the message?

ANSWER

a. Alice's private key b. Bob's public key c. Alice's public key d. Bob's private key

QUESTION 59

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?

ANSWER

a. Verify the sender b. Prove the integrity of the message c. Verify the receiver d. Enforce nonrepudiation

QUESTION 60

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose?

ANSWER

a. SHA-2 b. ME-312 c. BTC-2 d. RSA

QUESTION 61

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why sis he say that?

ANSWER

a. It is an unproven approach and has never been tested. b. It would be too closely to have one isolated server by itself. c. It would be essential impossible to keep its location a secret from everyone. d. It depends too heavily upon non-repudiation in order for it to succeed.

QUESTION 62

What is a characteristic of the Trusted Platform Module (TPM)?

ANSWER

a. It provides cryptographic services in hardware instead of software b. It allows the user to boot a corrupted disk and repair it. c. It is available only on Windows computers running BitLocker. d. It includes a pseudorandom number generator (PRNG).

QUESTION 63

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

ANSWER

a. Trusted Platform Module (TPM) b. Hardware Security Module (HSM) c. Self-encrypting hard disk drives (SED) d. Encrypted hardware-based USB devices

QUESTION 64

Chapter 4

ANSWER

Advanced Cryptography and PKI

QUESTION 65

Which of the following is NOT a method for strengthening a key?

ANSWER

a. Randomness b. Cryptoperiod c. Length d. Variability

QUESTION 66

Which of the following clock ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted?

ANSWER

a. Electronic Code Book (ECB) b. Galois/Counter (GCM) c. Counter (CTR) d. Cipher Block Chaining (CBC)

QUESTION 67

What entity calls in crypto modules to perform cryptographic tasks?

ANSWER

a. Certificate Authority (CA) b. OCSP Chain c. Intermediate CA d. Cypto service provider

QUESTION 68

__________ are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.

ANSWER

a. Encrypted signatures b. Session keys c. Digital certificates d. Digital digests

QUESTION 69

Which of these is considered the strongest cryptographic transport protocol?

ANSWER

a. TLS v1.2 b. TLS v1.0 c. SSL v2.0 d. SSL v2.0

QUESTION 70

The strongest technology that would assure Alice that Bob is the sender of the message is a(n) __________.

ANSWER

a. digital signature b. encrypted signature c. digest d. digest certificate

QUESTION 71

A digital certificate associates __________.

ANSWER

a. a user's public key with his private key b. the user's identity with his public key c. a user's private key with the public key d. a private key with a digital signature

QUESTION 72

Digital certificates can be used for each of these EXCEPT __________.

ANSWER

a. to verify the authenticity of the Registration Authorizer. b. to encrypt channels to provide secure communication between clients and servers c. to verify the identity of clients and servers on the Web d. to encrypt messages for secure email communication

QUESTION 73

An entity that issues digital certificates is a __________.

ANSWER

a. certificate signatory (CS) b. digital signer (DN) c. certificate authority (CA) d. signature authority (SA)

QUESTION 74

A centralized directory of digital certificates is called a(n) ___________.

ANSWER

a. Digital Signature Permitted Authorization (DSPA) b. Digital Signature Approval List (DSAP) c. Certificate Repository (CR) d. Authorized Digital Signature (ADS)

QUESTION 75

__________ performs a real-time lookup of a digital certificate's status.

ANSWER

a. Certificate Revocation List (CRL) b. Real-Time CA Verification (RTCAV) c. Online Certificate Status Protocol (OCSP) d. CA Registry Database (CARD)

QUESTION 76

__________ is a protocol for securely accessing a remote computer.

ANSWER

a. Transport Layer Security (TLS) b. Secure Shell (SSH) c. Secure Sockets layer (SSL) d. Secure Hypertext Transport Protocol (SHTTP)

QUESTION 77

What is a value that can be used to ensure that hashed plaintext will not consistently result in the same digest?

ANSWER

a. Algorithm b. Initialization vector (IV) c. Nonce d. Salt

QUESTION 78

Which digital certificate displays the name of the entity behind the website?

ANSWER

a. Online Certificate Status Certificate b. Extended Validation (EV) Certificate c. Session Certificate d. X.509 Certificate

QUESTION 79

Which trust model has multiple CAs, one of which acts as a facilitator?

ANSWER

a. Bridge b. Hierarchical c. Distributed d. Web

QUESTION 80

Which statement is NOT true regarding hierarchical trust models?

ANSWER

a. It is designed for use on a large scale. b. The root signals all digital certificate authorities with a signal key. c. It assigns a single hierarchy with one master CA. d. The master CA is called the root.

QUESTION 81

Public key infrastructure (PKI) __________.

ANSWER

a. generates public/private keys automatically b. creates private key cryptography c. is the management of digital certificates d. requires the use of an RA instead of a CA

QUESTION 82

A(n) __________ is a published set of rules that govern the operation pf a PKI.

ANSWER

a. signature resource guide (SRG) b. enforcement certificate (EF) c. certificate practice statement (CPS) d. certificate policy (CP)

QUESTION 83

Which of these is NOT part of the certificate life cycle?

ANSWER

a. WXpiration b. Revocation c. Authorization d. Creation

QUESTION 84

__________ refers to a situation in which keys are managed by a third party, such as a trusted CA.

ANSWER

a. Key authorization b. Key escrow c. Remote key administration d. Trusted key authority

QUESTION 85

Chapter 5

ANSWER

Networking and Server Attacks

QUESTION 86

Which attacks intercepts communication between a web browser and the underlying computer?

ANSWER

a. Man-in-the-middle (MITM) b. Man-in-the-browser (MITB) c. Replay d. ARP poisoning

QUESTION 87

Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect?

ANSWER

a. Web server buffer and host DNS server b. Reply referrer and domain buffer b. Web browser and browser add-on d. Host table and external DNS server

QUESTION 88

Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about?

ANSWER

a. Privilege escalation b. Session replay c. Scaling exploit d. Amplification

QUESTION 89

Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser?

ANSWER

a. Extensions b. Scripts c. Plug-ins d. Add-ons

QUESTION 90

An attacker who manipulates the maximum size of an integer type would be performing what kind of attack?

ANSWER

a. integer overflow b. buffer overflow c. number overflow d. heap overflow

QUESTION 91

What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another?

ANSWER

a. privilege escalation b. cross-site attack c. horizontal access attack d. transverse attack

QUESTION 92

Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks?

ANSWER

a. The complex nature of TCP/IP allows for too many ping sweeps to be blocked. b. Web application attacks use web browsers that cannot be controlled on a local computer. c. Network security devices cannot prevent attacks from web resources. d. Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

QUESTION 93

What is the difference between a DoS and a DDoS attack?

ANSWER

a. DoS attacks are faster than DDoS attacks b. DoS attacks use fewer computers than DDoS attacks c. DoS attacks do not use DNS servers as DDoS attacks do d. DoS attacks user more memory than a DDoS attack

QUESTION 94

John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing?

ANSWER

a. SQL b. XSS c. XSRF d. DDoS DNS

QUESTION 95

Which attack uses the user's web browser settings to impersonate that user?

ANSWER

a. XDD b. XSRF c. Domain hijacking d. Session hijacking

QUESTION 96

What is the basis of an SQL injection attack?

ANSWER

a. to expose SQL code so that it can be examined b. to have the SQL server attack client web browsers c. to insert SQL statements through unfiltered user input d. to link SQL servers into a botnet

QUESTION 97

Which action cannot be performed through a successful SQL injection attack?

ANSWER

a. discover the names of different fields in a table b. reformat the web application server's hard drive c. display a list of customer telephone numbers d. erase a database table

QUESTION 98

Attackers who register domain names that are similar to legitimate domain names are performing _____.

ANSWER

a. Address resolution b. HTTP manipulation c. HTML squatting d. URL hijacking

QUESTION 99

What type of attack involves manipulating third-party ad networks?

ANSWER

a. Session advertising b. Malvertising c. Clickjacking d. Directory traversal

QUESTION 100

Why are extensions, plug-ins, and add-ons considered to be security risks?

ANSWER

a. They are written in Java, which is a weak language. b. They have introduced vulnerabilities in browsers. c. They use bitcode. d. They cannot be uninstalled.

QUESTION 101

What is a session token?

ANSWER

a. XML code used in an XML injection attack b. a random string assigned by a web server c. another name for a third-party cookie d. a unique identifier that includes the user's email address

QUESTION 102

Which of these is not a DoS attack?

ANSWER

a. SYN flood b. DNS amplification c. smurf attack d. push flood

QUESTION 103

What type of attack intercepts legitimate communication and forges a fictitious response to the sender?

ANSWER

a. SIDS b. interceptor c. MITM d. SQL intrusion

QUESTION 104

A replay attack _____.

ANSWER

a. can be prevented by patching the web browser b. is considered to be a type of DoS attack c. makes a copy of the transmission for use at a later time d. replays the attack over and over to flood the server

QUESTION 105

DNS poisoning _____.

ANSWER

a. floods a DNS server with requests until it can no longer respond b. is rarely found today due to the use of host tables c. substitutes DNS addresses so that the computer is automatically redirected to another device d. is the same as ARP poisoning

QUESTION 106

Chapter 6

ANSWER

Network Security Devices , Design, and Technology

QUESTION 107

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?

ANSWER

a. router b. hub c. virtual private network d. SIEM device

QUESTION 108

Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization's secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?

ANSWER

a. A bridge will block packets between two different types of networks. b. A bridge cannot be used on any Internet connection. c. A bridge would block packets from reaching the Internet. d. A bridge could permit access to the secure wired network from the unsecured wireless network.

QUESTION 109

Which of these would NOT be a filtering mechanism found in a firewall ACL rule?

ANSWER

a. Source address b. Direction c. Date d. Protocol

QUESTION 110

Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?

ANSWER

a. Internet content filter b. Application-based firewall c. Reverse proxy d. Web security gateway

QUESTION 111

Which function does an Internet content filter NOT perform?

ANSWER

a. Intrusion detection b. URL filtering c. Malware inspection d. Content inspection

QUESTION 112

How does network address translation (NAT) improve security?

ANSWER

a. It filters based on protocol. b. It discards unsolicited packets. c. It masks the IP address of the NAT device. d. NATs do not improve security.

QUESTION 113

Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?

ANSWER

a. Once the MAC address table is full the switch functions like a network hub. b. A MAC flooding attack with filter to the local host computer's MAC-to-IP address tables and prevent these hosts from reaching the network. c. In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic. d. A MAC flooding attack will prevent load balances from identifying the correct VIP of the servers.

QUESTION 114

Which of the following devices is easiest for an attacker to take advantage of in order to capture and analyze packets?

ANSWER

a. Router b. Hub c. Switch d. Load Balancer

QUESTION 115

Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian?

ANSWER

a. Ignore the new MAC addresses while allowing normal traffic from the single pre-approved MAC address b. Cause the device to enter a fail-open mode. c. Record new MAC addresses up to a specific limit d. Block the port entirely

QUESTION 116

Which statement regarding a demilitarized zone (DMZ) is NOT true?

ANSWER

a. It can be configured to have one or two firewalls. b. It typically includes an email or web server. c. It provides an extra degree of security. d. It contains servers that are used only by internal network users.

QUESTION 117

Which statement about network address translation (NAT) is true?

ANSWER

a. It substitutes MAC addresses for IP addresses. b. It can be stateful or stateless. c. It can be found only on core routers. d. It removes private addresses when the packet leaves the network.

QUESTION 118

Which of these is NOT used in scheduling a load balancer?

ANSWER

a. The IP address of the destination packet b. Data within the application message itself c. Round-robin d. Affinity

QUESTION 119

In which of the following configurations are all the load balancers always active?

ANSWER

a. Active-active b. Active-passive c. Passive-active-passive d. Active-load-passive-load

QUESTION 120

Which device intercepts internal user requests and then processes those requests on behalf of the users?

ANSWER

a. Forward proxy server b. Reverse proxy server c. Host detection server d. Intrusion prevention device

QUESTION 121

Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose?

ANSWER

a. Split tunnel b. Full tunnel c. Narrow tunnel d. Wide tunnel

QUESTION 122

Which device watches for attacks and sounds an alert only when one occurs?

ANSWER

a. Firewall b. Network intrusion detection system (NIDS) c. Network intrusion prevention system (NIPS) d. Proxy intrusion device

QUESTION 123

Which of the following is a multipurpose security device?

ANSWER

a. Hardware security module b. Unified Threat Management (UTM) c. Media gateway d. Intrusion Detection/Prevention (ID/P)

QUESTION 124

Which of the following CANNOT be used to hide information about the internal network?

ANSWER

a. Network address translation (NAT) b. Protocol analyzer c. Subnetter d. Proxy server

QUESTION 125

What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?

ANSWER

a. A NIDS provides more valuable information about attacks. b. There is no difference; a NIDS and a NIPS are equal. c. A NIPS can take actions more quickly to combat an attack. d. A NIPS is much slower because it uses protocol analysis.

QUESTION 126

Which is the most secure type of firewall?

ANSWER

a. Stateless packet filtering b. Stateful packet filtering c. Network intrusion detection system replay d. Reverse proxy analysis

QUESTION 127

Chapter 7

ANSWER

Administering a Secure Network

QUESTION 128

Which of the following TCP/IP protocols do not relate to security?

ANSWER

a. IP b. SNMP c. HTTPS d. FTP

QUESTION 129

Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?

ANSWER

a. It is fully supported in BIND9. b. It adds additional resource records. c. It adds message header information. d. It can prevent a DNS transfer attack.

QUESTION 130

What is the recommended secure protocol for voice and video applications?

ANSWER

a. Secure Real-time Transport Protocol (SRTP) b. Hypertext Transport Protocol Secure (HTTPS) c. Network Time Protocol (NTP) d. Secure/Multipurpose Internet Mail Extensions (S/MIME)

QUESTION 131

Which type of log can provide details regarding requests for specific files on a system?

ANSWER

a. Audit log b. Event log c. Access log d. SysFile log

QUESTION 132

Which type of device log contains the most beneficial security data?

ANSWER

a. Firewall log b. Email log c. Switch log d. Router log

QUESTION 133

Which type of cloud is offered to specific organizations that have common concerns?

ANSWER

a. Public cloud b. Hybrid cloud c. Private cloud d. Community cloud

QUESTION 134

Which of these is NOT correct about an SSL accelerator?

ANSWER

a. It can be a separate hardware card that inserts into a web server. b. It can be a separate hardware module. c. It should reside between the user's device and the web servers. d. It can only handle the SSL protocol.

QUESTION 135

Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?

ANSWER

a. Network tap b. Port mirroring c. Aggregation switch d. Correlation engine

QUESTION 136

Which version of Simple Network Management Protocol (SNMP) is considered the most secure?

ANSWER

a. SNMPv2 b. SNMPv3 c. SNMPv4 d.SNMPv5

QUESTION 137

Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?

ANSWER

a. DNS replay b. DNS masking c. DNS poisoning d. DNS forwarding

QUESTION 138

Which of these is the most secure protocol for transferring files?

ANSWER

a. FTPS b. SFTP c. TCP d. FTP

QUESTION 139

Which of the following can be used to prevent a buffer overflow attack?

ANSWER

a. DEP b. FIM c. VPN d. DNS

QUESTION 140

Which of the following is NOT a service model in cloud computing?

ANSWER

a. Software as a Service (SaaS) b. Hardware as a Service (HaaS) c. Platform as a Service (PaaS) d. Infrastructure as a Service (IaaS)

QUESTION 141

Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?

ANSWER

a. Suspicious outbound connections b. IP addresses that are being rejected and dropped c. Successful logins d. IP addresses that are being rejected and dropped

QUESTION 142

Which type of hypervisor does not run on an underlying operating system?

ANSWER

a. Type I b. Type II c. Type III d. Type IV

QUESTION 143

Which application stores the user's desktop inside a virtual machine that resides on a server and is accessible from multiple locations?

ANSWER

a. Application cell b. Container c. VDE d. VDI

QUESTION 144

Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?

ANSWER

a. Virtual services b. Off-premises c. On-premises d. Hosted services

QUESTION 145

DNSSEC adds additional and message header information, which can be used to verify that the requested data has not been altered in transmission.

ANSWER

a. resource records b. field flags c. hash sequences d. zone transfers

QUESTION 146

What functions of a switch does a software defined network separate?

ANSWER

a. Host and virtual b. Control plane and physical plane c. RAM and hard drive d. Network level and resource level

QUESTION 147

Which of the following is NOT a security concern of virtualized environments?

ANSWER

a. Virtual machines must be protected from both the outside world and from other virtual machines on the same physical computer. b. Physical security appliances are not always designed to protect virtual systems. c. Virtual servers are less expensive than their physical counterparts. d. Live migration can immediately move one virtualized server to another hypervisor.

QUESTION 148

Chapter 8

ANSWER

Wireless Network Security

QUESTION 149

Which technology is predominately used for contactless payment systems?

ANSWER

a. Near field communication (NFC) b. Wireless local area network (WLAN) c. Bluetooth d. Radio Frequency ID (RFID)

QUESTION 150

Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?

ANSWER

a. Bluesnarfing b. Bluejacking c. Bluecreeping d. Bluestealing

QUESTION 151

What is a difference between NFC and RFID?

ANSWER

a. NFC is based on wireless technology while RFID is not. b. RFID is faster than NFC. c. RFID is designed for paper-based tags while NFC is not. d. NFC devices cannot pair as quickly as RFID devices.

QUESTION 152

Which of these technologies is NOT found in a wireless router?

ANSWER

a. Access point b. Router c. Dynamic host configuration protocol (DHCP) server d. Firewall

QUESTION 153

Why is a rogue AP a security vulnerability?

ANSWER

a. It uses the weaker IEEE 80211i protocol. b. It conflicts with other network firewalls and can cause them to become disabled. c. It allows an attacker to bypass network security configurations. d. It requires the use of vulnerable wireless probes on all mobile devices.

QUESTION 154

Which of these is NOT a risk when a home wireless router is not securely configured?

ANSWER

a. Only a small percentage of the total traffic can be encrypted. b. An attacker can steal data from any folder with file sharing enabled. c. User names, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker. d. Malware can be injected into a computer connected to the WLAN.

QUESTION 155

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?

ANSWER

a. Push-button method b. PIN method c. Piconet method d. NFC method

QUESTION 156

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered?

ANSWER

a. Captive portal b. Web-based portal c. Rogue portal d. Authenticated portal

QUESTION 157

Which of the following is NOT a wireless peripheral protection option?

ANSWER

a. Update or replacing any vulnerable device b. Switch to a more fully tested Bluetooth model c. Install a network sensor to detect an attack d. Substitute a wired device

QUESTION 158

The primary design of a(n) _____ is to capture the transmissions from legitimate users.

ANSWER

a. rogue access point b. WEP c. evil twin d. Bluetooth grabber

QUESTION 159

Which of these is a vulnerability of MAC address filtering?

ANSWER

a. APs use IP addresses instead of MACs. b. The user must enter the MAC. c. MAC addresses are initially exchanged unencrypted. d. Not all operating systems support MACs.

QUESTION 160

Which of these is NOT a limitation of turning off the SSID broadcast from an AP?

ANSWER

a. Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another. b. Some versions of operating systems favor a network that broadcasts an SSID over one that does not. c. Users can more easily roam from one WLAN to another. d. The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.

QUESTION 161

What is the primary weakness of wired equivalent privacy (WEP)?

ANSWER

a. It functions only on specific brands of APs. b. Its usage creates a detectable pattern. c. It slows down a WLAN from 104 Mbpsto 16 Mbps. d. Initialization vectors (IVs) are difficult for users to manage.

QUESTION 162

WPA replaces WEP with _____.

ANSWER

a. WPA2 b. Temporal Key Integrity Protocol (TKIP) c. cyclic redundancy check (CRC) d. Message Integrity Check (MIC)

QUESTION 163

Adabella was asked by her supervisor to adjust the frequency spectrum settings on a new AP. She brought up the configuration page and looked through the different options. Which of the following frequency spectrum settings would she NOT be able to adjust?

ANSWER

a. Frequency band b. Channel selection c. RFID spectrum d. Channel width

QUESTION 164

A wireless LAN controller (WLC) was recently installed, and now Kelsey needs to purchase several new APs to be managed by it. Which type of AP should he purchase?

ANSWER

a. Controller AP b. Standalone AP c. Fat AP d. Any type of AP can be managed by a WLC.

QUESTION 165

AES-CCMP is the encryption protocol standard used in _____ .

ANSWER

a. WPA b. WPA2 c. IEEE 802.11 d. NFC

QUESTION 166

Elijah was asked by a student intern to explain the Extensible Authentication Protocol (EAP). What would be the best explanation of EAP?

ANSWER

a. It is the transport protocol used in TCP/IP for authentication. b. It is a framework for transporting authentication protocols. c. It is a subset of WPA2. d. It is a technology used by IEEE 802.11 for encryption.

QUESTION 167

Minh has been asked to recommend an EAP for a system that uses both passwords and tokens with TLS. Which should she recommend?

ANSWER

a. EAP-TLS b. EAP-TTLS c. EAP-SSL d. EAP-FAST

QUESTION 168

Which of these is NOT a type of wireless AP probe?

ANSWER

a. Wireless device probe b. WNIC probe c. Dedicated probe d. AP probe

QUESTION 169

Chapter 9

ANSWER

Client and Application Security

QUESTION 170

Which of the following is NOT a reason why supply chain infections are considered especially dangerous?

ANSWER

a. If the malware is planted in the ROM firmware of the device this can make it difficult or sometimes even impossible to clean an infected device. b. Users are receiving infected devices at the point of purchase and are completely unaware that a brand new device may be infected. c. It is virtually impossible to closely monitor every step in the supply chain. d. Supply chains take advantage of the trusted "chain of trust" concept.

QUESTION 171

Which type of operating system runs on a firewall, router, or switch?

ANSWER

a. Server OS b. Network OS c. Device OS d. Resource OS

QUESTION 172

Which of the following is NOT designed to prevent individuals from entering sensitive areas but instead is intended to direct traffic flow?

ANSWER

a. Barricade b. Fencing c. Roller barrier d. Type V controls

QUESTION 173

Which of the following is NOT a motion detection method?

ANSWER

a. Magnetism b. Radio frequency c. Moisture d. Infrared

QUESTION 174

Which type of residential lock is most often used for keeping out intruders?

ANSWER

a. Encrypted key lock b. Keyed entry lock c. Privacy lock d. Passage lock

QUESTION 175

A lock that extends a solid metal bar into the door frame for extra security is the _____.

ANSWER

a. triple bar lock b. deadman's lock c. full bar lock d. deadbolt lock

QUESTION 176

Which statement about a mantrap is true?

ANSWER

a. It is illegal in the United States. b. It monitors and controls two interlocking doors to a room. c. It is a special keyed lock. d. It requires the use of a cipher lock.

QUESTION 177

Which of the following is NOT a typical OS security configuration?

ANSWER

a. Employing least functionality b. Restricting patch management c. Disabling default accounts/passwords d. Disabling unnecessary ports and services

QUESTION 178

Which of the following can be used to secure a laptop or mobile device?

ANSWER

a. Mobile connector b. Cable lock c. Mobile chain d. Security tab

QUESTION 179

Which of the following is NOT a characteristic of an alarmed carrier PDS?

ANSWER

a. Requires periodic visual inspections b. Uses continuous monitoring c. Carrier can be hidden above the ceiling d. Eliminates the need to seal connections

QUESTION 180

Which of the following is NOT a memory vulnerability?

ANSWER

a. DLL injection b. Pointer deference c. Buffer overflow d. Variable overflow

QUESTION 181

Which stage is a "quality assurance" test that verifies the code functions as intended?

ANSWER

a. Production stage b. Testing stage c. Staging stage d. Development stage

QUESTION 182

Which model uses a sequential design process?

ANSWER

a. Waterfall model b. Rigid model c. Agile model d. Secure model

QUESTION 183

What allows for a single configuration to be set and then deployed to many or all users?

ANSWER

a. Snap-In Replication (SIR) b. Active Directory c. Group Policy d. Command Configuration

QUESTION 184

Which of the following is a cumulative package of all patches?

ANSWER

a. Rollup b. Service pack c. Patch d. Hotfix

QUESTION 185

Which of the following is NOT an advantage to an automated patch update service?

ANSWER

a. Administrators can approve or decline updates for client systems, force updates to install by a specific date, and obtain reports on what updates each computer needs. b. Downloading patches from a local server instead of using the vendor's online update service can save bandwidth and time because each computer does not have to connect to an external server. c. Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service. d. Specific types of updates that the organization does not test, such as hotfixes, can be automatically installed whenever they become available.

QUESTION 186

How can an SDIO card be made secure?

ANSWER

a. Using the security mechanisms on a standard Wi-Fi network. b. Turning on patch updates to the SDIO card. c. Requiring a username before accessing the SDIO card. d. SDIO cards are natively secure and no security settings are needed.

QUESTION 187

How does heuristic detection detect a virus?

ANSWER

a. A virtualized environment is created and the code is executed in it. b. A string of bytes from the virus is compared against the suspected file. c. The bytes of a virus are placed in different "piles" and then used to create a profile. d. The virus signature file is placed in a suspended chamber before streaming to the CPU.

QUESTION 188

Which of these is a list of approved email senders?

ANSWER

a. Blacklist b. Whitelist c. Bluelist d. Yellowlist

QUESTION 189

Which of the following types of testing uses unexpected or invalid inputs?

ANSWER

a. Stress testing b. Dynamic analysis c. Static analysis d. Runtime testing

QUESTION 190

Chapter 10

ANSWER

Mobile and Embedded Device Security

QUESTION 191

Which technology is NOT a core feature of a mobile device?

ANSWER

a. Physical keyboard b. Small form factor c. Local non-removable data storage d. Data synchronization capabilities

QUESTION 192

Agape was asked to make a recommendation regarding short-range wireless technologies to be supported in a new conference room that was being renovated. Which of the following would she NOT consider due to its slow speed and its low deployment levels today?

ANSWER

a. ANT b. Bluetooth c. Infrared d. NFC

QUESTION 193

Calista is designing the specifications for new laptop computers to be purchased by her company. She is comparing the different types and sizes of USB connections found on the devices. Which type USB connection would she NOT find on a laptop? `

ANSWER

a. Type D b. Mini c. Micro d. Standard

QUESTION 194

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?

ANSWER

a. BYOD b. COPE c. CYOD d. Corporate-owned

QUESTION 195

Pakpao has been asked to provide research regarding a new company initiative to add Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Pakpao NOT list in his report as a factor in the frequency of Android firmware OTA updates?

ANSWER

a. Both OEMs and wireless carriers are hesitant to distribute Google updates because it limits their ability to differentiate themselves from competitors if all versions of Android start to look the same through updates. b. Because many of the OEMs had modified Android, they are reluctant to distribute updates that could potentially conflict with their changes. c. Wireless carriers are reluctant to provide firmware OTA updates because of the bandwidth it consumes on their wireless networks. d. Because OEMs and wireless carriers want to sell as many devices as possible, they have no financial incentive to update mobile devices that users would then continue to use indefinitely.

QUESTION 196

What is the process of identifying the geographical location of a mobile device?

ANSWER

a. Geotracking b. Geolocation c. geoID d. Geomonitoring

QUESTION 197

Which of these is NOT a risk of connecting a mobile device to a public network?

ANSWER

a. Public networks are beyond the control of the employee's organization. b. Replay attacks can occur on public networks. c. Public networks may be susceptible to man-in-the-middle attacks. d. Public networks are faster than local networks and can spread malware more quickly to mobile devices.

QUESTION 198

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo's opinion regarding its security. What would Paavo tell him about USB OTG security?

ANSWER

a. USB OTG uses strong security and the executive should have no concerns. b. Subnotebooks do not support USB OTG. c. An unsecured mobile device could infect other tethered mobile devices or the corporate network. d. Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

QUESTION 199

A friend of Ukrit told him that he has just downloaded and installed an app that allows him to circumvent the built-in limitations on his Apple iOS smartphone. What is this called?

ANSWER

a. Rooting b. Sideloading c. Jailbreaking d. Ducking

QUESTION 200

Which of the following technologies provides for pictures, video, or audio to be included in text messages?

ANSWER

a. MMS b. QR c. SMS d. ANT

QUESTION 201

What prevents a mobile device from being used until the user enters the correct passcode?

ANSWER

a. Swipe identifier (SW-ID) b. Screen lock c. Screen timeout d. Touch swipe

QUESTION 202

Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. Which configuration setting is enabled on Gaetan's mobile device?

ANSWER

a. Reset to factory settings b. Extend lockout period c. Enable high security d. :Lock device

QUESTION 203

What does containerization do?

ANSWER

a. It splits operating system functions only on specific brands of mobile devices. b. It places all keys in a special vault. c. It slows down a mobile device to half speed. d. It separates personal data from corporate data.

QUESTION 204

What allows a device to be managed remotely?

ANSWER

a. Mobile device management (MDM) b. Mobile application management (MAM) c. Mobile resource management (MRM) d. Mobile wrapper management (MWM)

QUESTION 205

Which of these is NOT a security feature for locating a lost or stolen mobile device?

ANSWER

a. Remote lockout b. Last known good configuration c. Alarm d. Thief picture

QUESTION 206

What enforces the location in which an app can function by tracking the location of the mobile device?

ANSWER

a. Location resource management b. Geofencing c. GPS tagging d. Graphical Management Tracking (GMT)

QUESTION 207

Which of these is considered the strongest type of passcode to use on a mobile device?

ANSWER

a. Password b. PIN c. Fingerprint swipe d. Draw connecting dots pattern

QUESTION 208

Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regarding a serious malware incident. What technology will she use?

ANSWER

a. MCM b. COPE c. MAM d. Push notification services

QUESTION 209

Which tool manages the distribution and control of apps?

ANSWER

a. MAM b. MDM c. MCM d. MFM

QUESTION 210

Which type of OS is typically found on an embedded system?

ANSWER

a. SoC b. RTOS c. OTG d. COPE

QUESTION 211

Chapter 11

ANSWER

Authentication and Account Management

QUESTION 212

Which authentication factor is based on a unique talent that a user possesses?

ANSWER

a. What you have b. What you are c. What you do d. What you know

QUESTION 213

Which of these is NOT a characteristic of a weak password?

ANSWER

a. A common dictionary word b. A long password c. Using personal information d. Using a predictable sequence of characters

QUESTION 214

Each of the following accounts should be prohibited EXCEPT:

ANSWER

a. Shared accounts b. Generic accounts c. Privileged accounts d. Guest accounts

QUESTION 215

Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?

ANSWER

a. OAuth b. Open ID Connect c. Shibboleth d. NTLM

QUESTION 216

How is key stretching effective in resisting password attacks?

ANSWER

a. It takes more time to generate candidate password digests. b. It requires the use of GPUs. c. It does not require the use of salts. d. The license fees are very expensive to purchase and use it.

QUESTION 217

Which of these is NOT a reason why users create weak passwords?

ANSWER

a. A lengthy and complex password can be difficult to memorize. b. A security policy requires a password to be changed regularly. c. Having multiple passwords makes it hard to remember all of them. d. Most sites force users to create weak passwords even though they do not want to.

QUESTION 218

What is a hybrid attack?

ANSWER

a. An attack that uses both automated and user input b. An attack that combines a dictionary attack with a mask attack c. A brute force attack that uses special tables d. An attack that slightly alters dictionary words

QUESTION 219

A TOTP token code is generally valid for what period of time?

ANSWER

a. Only while the user presses SEND b. For as long as it appears on the device c. For up to 24 hours d. Until an event occurs

QUESTION 220

What is a token system that requires the user to enter the code along with a PIN called?

ANSWER

a. Single-factor authentication system b. Token-passing authentication system c. Dual-prong verification system d. Multifactor authentication system

QUESTION 221

Which of these is a U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel?

ANSWER

a. Personal Identity Verification (PIV) card b. Secure ID Card (SIDC) c. Common Access Card (CAC) d. Government Smart Card (GSC)

QUESTION 222

Which of the following should NOT be stored in a secure password database?

ANSWER

a. Iterations b. Password digest c. Salt d. Plaintext password

QUESTION 223

Creating a pattern of where a user accesses a remote web account is an example of which of the following?

ANSWER

a. Keystroke dynamics b. Geolocation c. Time-Location Resource Monitoring (TLRM) d. Cognitive biometrics

QUESTION 224

Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?

ANSWER

a. Dictionary attack b. Hybrid attack c. Custom attack d. Brute force attack

QUESTION 225

Which human characteristic is NOT used for biometric identification?

ANSWER

a. Retina b. Iris c. Height d. Fingerprint

QUESTION 226

_____ biometrics is related to the perception, thought processes, and understanding of the user.

ANSWER

a. Cognitive b. Standard c. Intelligent d. Behavioral

QUESTION 227

Using one authentication credential to access multiple accounts or applications is known as _____.

ANSWER

a. single sign-on b. credentialization c. identification authentication d. federal login

QUESTION 228

What is a disadvantage of biometric readers?

ANSWER

a. Speed b. Cost c. Weight d. Standards

QUESTION 229

Which type of password attack is a more targeted brute force attack that uses placeholders for characters in certain positions of the password?

ANSWER

a. Rainbow attack b. Mask attack c. Rule attack d. Pass the hash attack

QUESTION 230

Why should the account lockout threshold not be set too low?

ANSWER

a. It could decrease calls to the help desk. b. The network administrator would have to reset the account manually. c. The user would not have to wait too long to have her password reset. d. It could result in denial of service (DoS) attacks.

QUESTION 231

Which one-time password is event-driven?

ANSWER

a. HOTP b. TOTP c. ROTP d. POTP

QUESTION 232

Chapter 12

ANSWER

Access Management

QUESTION 233

What is the current version of TACACS?

ANSWER

a. XTACACS b. TACACS+ c. TACACS v9 d. TRACACS

QUESTION 234

How is the Security Assertion Markup Language (SAML) used?

ANSWER

a. It allows secure web domains to exchange user authentication and authorization data. b. It is a backup to a RADIUS server. c. It is an authenticator in IEEE 802.1x. d. It is no longer used because it has been replaced by LDAP.

QUESTION 235

A RADIUS authentication server requires the ________ to be authenticated first.

ANSWER

a. authenticator b. user c. authentication server d. supplicant

QUESTION 236

Which of the following is NOT true regarding how an enterprise should handle an orphaned or dormant account?

ANSWER

a. A formal procedure should be in place for disabling accounts for employees who are dismissed, resign, or retire from the organization. b. Access should be ended as soon as the employee is no longer part of the organization. c. Logs should be monitored because current employees are sometimes tempted to use an older dormant account instead of their own account. d. All orphaned and dormant accounts should be deleted immediately whenever they are discovered.

QUESTION 237

With the development of IEEE 802.1x port security, what type of authentication server has seen even greater usage?

ANSWER

a. RADIUS b. Lite RDAP c. DAP d. RDAP

QUESTION 238

Which of the following is NOT part of the AAA framework?

ANSWER

a. Authentication b. Access c. Authorization d. Accounting

QUESTION 239

What is the version of the X.500 standard that runs on a personal computer over TCP/IP?

ANSWER

a. Lite RDAP b. DAP c. LDAP d. IEEE X.501

QUESTION 240

Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?

ANSWER

a. Privacy officer b. End-user c. Custodian d. Operator

QUESTION 241

Which access control model is the most restrictive?

ANSWER

a. DAC b. MAC c. Role-Based Access Control d. Rule-Based Access Control

QUESTION 242

Which type of access control model uses predefined rules that makes it flexible?

ANSWER

a. ABAC b. DAC c. MAC d. Rule-Based Access Control

QUESTION 243

Which can be used to establish geographical boundaries where a mobile device can and cannot be used?

ANSWER

a. Location-based policies b. Restricted access control policies c. Geolocation policies d. Mobile device policies

QUESTION 244

Which statement about Rule-Based Access Control is true?

ANSWER

a. It requires that a custodian set all rules. b. It is considered obsolete today. c. It dynamically assigns roles to subjects based on rules. d. It is considered a real-world approach by linking a user's job function with security.

QUESTION 245

Which of the following would NOT be considered as part of a clean desk policy?

ANSWER

a. Do not share passwords with other employees. b. Lock computer workstations when leaving the office. c. Place laptops in a locked filing cabinet. d. Keep mass storage devices locked in a drawer when not in use.

QUESTION 246

Which of these is a set of permissions that is attached to an object?

ANSWER

a. Access control list (ACL) b. Subject Access Entity (SAE) c. Object modifier d. Security entry designator

QUESTION 247

Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory?

ANSWER

a. Windows Registry Settings b. AD Management Services (ADMS) c. Group Policy d. Resource Allocation Entities

QUESTION 248

What can be used to provide both file system security and database security?

ANSWER

a. RBASEs b. LDAPs c. CHAPs d. ACLs

QUESTION 249

What is the least restrictive access control model?

ANSWER

a. DAC b. ABAC c. MAC d. Rule-Based Access Control

QUESTION 250

What is the secure version of LDAP?

ANSWER

a. LDAPS b. Secure DAP c. X.500 d. 802.1x

QUESTION 251

Which of the following is the Microsoft version of EAP?

ANSWER

a. EAP-MS b. MS-CHAP c. PAP-MICROSOFT d. AD-EAP

QUESTION 252

Which of the following involves rights given to access specific resources?

ANSWER

a. Identification b. Access c. Authorization d. Accounting

QUESTION 253

Chapter 13

ANSWER

Vulnerability Assessment and Data Security

QUESTION 254

At what point in a vulnerability assessment would an attack tree be utilized?

ANSWER

a. Vulnerability appraisal b. Risk assessment c. Risk mitigation d. Threat evaluation

QUESTION 255

Which of the following is NOT true about privacy?

ANSWER

a. Today, individuals can achieve any level of privacy that is desired. b. Privacy is difficult due to the volume of data silently accumulated by technology. c. Privacy is freedom from attention, observation, or interference based on your decision. d. Privacy is the right to be left alone to the degree that you choose.

QUESTION 256

Which of the following is NOT a risk associated with the use of private data?

ANSWER

a. Individual inconveniences and identity theft b. Associations with groups c. Statistical inferences d. Devices being infected with malware

QUESTION 257

Which of the following is NOT an issue raised regarding how private data is gathered and used?

ANSWER

a. The data is gathered and kept in secret. b. By law, all encrypted data must contain a "backdoor" entry point. c. Informed consent is usually missing or is misunderstood. d. The accuracy of the data cannot be verified.

QUESTION 258

Which of the following is a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, and any other entity that could cause potential harm?

ANSWER

a. Vulnerability assessment b. Penetration test c. Vulnerability scan d. Risk appraisal

QUESTION 259

Which of these should NOT be classified as an asset?

ANSWER

a. Business partners b. Buildings c. Employee databases d. Accounts payable

QUESTION 260

Which of the following command-line tools tests a connection between two network devices?

ANSWER

a. Netstat b. Ping c. Nslookup d. Ifconfig

QUESTION 261

Which statement regarding vulnerability appraisal is NOT true?

ANSWER

a. Vulnerability appraisal is always the easiest and quickest step. b. Every asset must be viewed in light of each threat. c. Each threat could reveal multiple vulnerabilities. d. Each vulnerability should be cataloged.

QUESTION 262

Which of the following constructs scenarios of the types of threats that assets can face to learn who the attackers are, why they attack, and what types of attacks may occur?

ANSWER

a. Vulnerability prototyping b. Risk assessment c. Attack assessment d. Threat modeling

QUESTION 263

Which of the following tools is a Linux command-line protocol analyzer?

ANSWER

a. Wireshark b. Tcpdump c. IP d. Arp

QUESTION 264

Which of the following is a command-line alternative to Nmap?

ANSWER

a. Netcat b. Statnet c. Mapper d. Netstat

QUESTION 265

Which of these is NOT a state of a port that can be returned by a port scanner?

ANSWER

a. Open b. Busy c. Blocked d. Closed

QUESTION 266

Which of the following data sensitivity labels is the highest level of data sensitivity?

ANSWER

a. Ultra b. Confidential c. Private d. Secret

QUESTION 267

Which of the following data sensitivity labels has the lowest level of data sensitivity?

ANSWER

a. Unrestricted b. Public c. Free d. Open

QUESTION 268

Which of the following is NOT a function of a vulnerability scanner?

ANSWER

a. Detects which ports are served and which ports are browsed for each individual system b. Alerts users when a new patch cannot be found c. Maintains a log of all interactive network sessions d. Detects when an application is compromised

QUESTION 269

Which of the following must be kept secure as mandated by HIPAA?

ANSWER

a. PII b. PHI c. PHIL d. PLILP

QUESTION 270

Which statement regarding a honeypot is NOT true?

ANSWER

a. It is typically located in an area with limited security. b. It is intentionally configured with security vulnerabilities. c. It cannot be part of a honeynet. d. It can direct an attacker's attention away from legitimate servers.

QUESTION 271

Which of the following sends "probes" to network devices and examines the responses to evaluate whether a specific device needs remediation?

ANSWER

a. Active scanner b. Probe scanner c. Passive scanner d. Remote scanner

QUESTION 272

If a tester is given the IP addresses, network diagrams, and source code of customer applications, the tester is using which technique?

ANSWER

a. Black box b. White box c. Gray box d. Blue box

QUESTION 273

If a software application aborts and leaves the program open, which control structure is it using?

ANSWER

a. Fail-safe b. Fail-secure c. Fail-open d. Fail-right

QUESTION 274

Chapter 14

ANSWER

Business Continuity

QUESTION 275

Raul has been asked to help develop an outline of procedures to be followed in the event of a major IT incident or an incident that directly impacts IT. What type of planning is this?

ANSWER

a. Disaster recovery planning b. IT contingency planning c. Business impact analysis planning d. Risk IT planning

QUESTION 276

Dilma has been asked with creating a list of potential employees serve in an upcoming tabletop exercise. Which employees will be on her list?

ANSWER

a. All employees b. Individuals on a decision-making level c. Full-time employees d. Only IT managers

QUESTION 277

What is the average amount of time that it will take a device to recover from a failure that is not a terminal failure?

ANSWER

a. MTTR b. MTBR c. MTBF d. MTTI

QUESTION 278

Which of the following is NOT a category of fire suppression systems?

ANSWER

a. Water sprinkler system b. Wet chemical system c. Clean agent system d. Dry chemical system

QUESTION 279

Which of these is NOT required for a fire to occur?

ANSWER

a. A chemical reaction that is the fire itself b. A type of fuel or combustible material c. A spark to start the process d. Sufficient oxygen to sustain the combustion

QUESTION 280

An electrical fire like that would be found in a computer data center is known as what type of fire?

ANSWER

a. Class A b. Class B c. Class C d. Class D

QUESTION 281

Which level of RAID uses disk mirroring and is considered fault-tolerant?

ANSWER

a. Level 1 b. Level 2 c. Level 3 d. Level 4

QUESTION 282

What is the amount of time added to or subtracted from Coordinated Universal Time to determine local time?

ANSWER

a. Time Offset b. Civil time c. Daylight savings time d. Greenwich Mean Time (GMT)

QUESTION 283

What does the abbreviation RAID represent?

ANSWER

a. Redundant Array of IDE Drives b. Resilient Architecture for Interdependent Discs c. Redundant Array of Independent Drives d. Resistant Architecture of Inter-Related Data Storage

QUESTION 284

Which of these is an example of a nested RAID?

ANSWER

a. Level 1-0 b. Level 0-1 c. Level 0+1 d. Level 0/1

QUESTION 285

A(n) ________ is always running off its battery while the main power runs the battery charger.

ANSWER

a. Secure UPS b. Backup UPS c. Off-line UPS d. On-line UPS

QUESTION 286

Which type of site is essentially a duplicate of the production site and has all the equipment needed for an organization to continue running?

ANSWER

a. Cold site b. Warm site c. Hot site d. Replicated site

QUESTION 287

Which of the following can a UPS NOT perform?

ANSWER

a. Prevent certain applications from launching that will consume too much power b. Disconnect users and shut down the server c. Prevent any new users from logging on d. Notify all users that they must finish their work immediately and log off

QUESTION 288

Which of these is NOT a characteristic of a disaster recovery plan (DRP)?

ANSWER

a. It is updated regularly. b. It is a private document used only by top-level administrators for planning. c. It is written. d. It is detailed.

QUESTION 289

What does an incremental backup do?

ANSWER

a. Copies all files changed since the last full or incremental backup b. Copies selected files c. Copies all files d. Copies all files since the last full backup

QUESTION 290

Which question is NOT a basic question to be asked regarding creating a data backup?

ANSWER

a. What media should be used? b. How long will it take to finish the backup? c. Where should the backup be stored? d. What information should be backed up?

QUESTION 291

The chain of ________ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.

ANSWER

a. Forensics b. Evidence c. Custody d. Control

QUESTION 292

What is the maximum length of time that an organization can tolerate between data backups?

ANSWER

a. Recovery time objective (RTO) b. Recovery service point (RSP) c. Recovery point objective (RPO) d. Optimal recovery timeframe (ORT)

QUESTION 293

When an unauthorized event occurs, what is the first duty of the computer forensics response team?

ANSWER

a. To log off from the server b. To secure the crime scene c. To back up the hard drive d. To reboot the system

QUESTION 294

Margaux has been asked to work on the report that will analyze the exercise results with the purpose of identifying strengths to be maintained and weaknesses to be addressed for improvement. What report will she be working on?

ANSWER

a. Identification of critical systems report b. Containment report c. Business continuity report d. After-action report

QUESTION 295

Chapter 15

ANSWER

Risk Migitation

QUESTION 296

Which of the following threats would be classified as the actions of a hactivist?

ANSWER

a. External threat b. Internal threat c. Environmental threat d. Compliance threat

QUESTION 297

Which of these is NOT a response to risk?

ANSWER

a. Mitigation b. Transference c. Resistance d. Avoidance

QUESTION 298

Agnella was asked to create a report that listed the reasons why a contractor should be provided penetration testing authorization. Which of the follow would she NOT list in her report?

ANSWER

a. Legal authorization b. Indemnification c. Limit retaliation d. Access to resources

QUESTION 299

Which of the following risk control types would use video surveillance systems and barricades to limit access to secure sites?

ANSWER

a. Operational b. Managerial c. Technical d. Strategic

QUESTION 300

Which of the following approaches to risk calculation typically assigns a numeric value (1‒10) or label (High, Medium, or Low) represents a risk?

ANSWER

a. Quantitative risk calculation b. Qualitative risk calculation c. Rule-based risk calculation d. Policy-based risk calculation

QUESTION 301

Which of the following is the average amount of time that it will take a device to recover from a failure that is not a terminal failure?

ANSWER

a. MTTF b. MTTR c. FIT d. MTBF

QUESTION 302

Which of the following covers the procedures of managing object authorizations?

ANSWER

a. Asset management b. Task management c. Privilege management d. Threat management

QUESTION 303

Which statement does NOT describe a characteristic of a policy?

ANSWER

a. Policies define appropriate user behavior. b. Policies identify what tools and procedures are needed. c. Policies communicate a unanimous agreement of judgment. d. Policies may be helpful if it is necessary to prosecute violators.

QUESTION 304

Tomassa is asked to determine the expected monetary loss every time a risk occurs. Which formula will she use?

ANSWER

a. AV b. ARO c. ALE d. SLE

QUESTION 305

What is a collection of suggestions that should be implemented?

ANSWER

a. Policy b. Guideline c. Standard d. Code

QUESTION 306

Simona needs to research a control that attempts to discourage security violations before they occur. Which control will she research?

ANSWER

a. Deterrent control b. Preventive control c. Detective control d. Corrective control

QUESTION 307

Which statement is NOT something that a security policy must do?

ANSWER

a. State reasons why the policy is necessary. b. Balance protection with productivity. c. Be capable of being implemented and enforced. d. Be concise and easy to understand.

QUESTION 308

What describes is the ability of an enterprise data center to revert to its former size after expanding?

ANSWER

a. Scalability b. Elasticity c. Contraction d. Reduction

QUESTION 309

Which policy defines the actions users may perform while accessing systems and networking equipment?

ANSWER

a. End-user policy b. Acceptable use policy c. Internet use policy d. User permission policy

QUESTION 310

While traveling abroad, Giuseppe needs to use public Internet café computers to access the secure network. Which of the following non-persistence tools should he use?

ANSWER

a. Snapshot b. Live boot media c. Revert to known state d. Secure Configuration

QUESTION 311

Bria is reviewing the company's updated personal email policy. Which of the following will she NOT find in it?

ANSWER

a. Employees should not use company email to send personal email messages. b. Employees should not access personal email at work. c. Employees should not forward company emails to a personal email account. d. Employees should not give out their company email address unless requested.

QUESTION 312

For adult learners, which approach is often preferred?

ANSWER

a. Pedagogical b. Andragogical c. Institutional d. Proactive

QUESTION 313

Which of the following is NOT a security risk of social media sites for users?

ANSWER

a. Personal data can be used maliciously. b. Users may be too trusting. c. Social media security is lax or confusing. d. Social media sites use popup ads.

QUESTION 314

Which of the following is NOT a time employee training should be conducted?

ANSWER

a. After monthly patch updates. b. When a new computer is installed. c. During an annual department retreat. d. When an employee is promoted.

QUESTION 315

Bob needs to create an agreement between his company and a third-party organization that demonstrates a "convergence of will" between the parties so that they can work together. Which type of agreement will Bob use?

ANSWER

a. SLA b. BPA c. ISA d. MOU

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials