Security + Questions 262 - 312

Is this your test? Login to manage it. If not, you can make an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program?
2.
1 point
Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss to assist in an FM-200 deployment?
3.
1 point
Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point?
4.
1 point
Which of the following is an example of multifactor authentication?
5.
1 point
Which of the following could cause a browser to display the message below?

"The security certificate presented by this website was issued for a different website's address."
6.
1 point
Which of the following application attacks is used to gain access to SEH?
7.
1 point
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
8.
1 point
Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?
9.
1 point
Which of the following technologies uses multiple devices to share work?
10.
1 point
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using?
11.
1 point
Pete, an employee, is terminated from the company and the legal department needs documents from his encrypted hard drive. Which of the following should be used to accomplish this task?
(Select TWO).
12.
1 point
Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?
13.
1 point
Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall. How could this BEST be accomplished?
14.
1 point
Which of the following BEST describes the weakness in WEP encryption?
15.
1 point
Mike, a network administrator, has been asked to passively monitor network traffic to the company's sales websites. Which of the following would be BEST suited for this task?
16.
1 point
Which of the following pseudocodes can be used to handle program exceptions?
17.
1 point
Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane's company?
18.
1 point
Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST
likely affected?
19.
1 point
Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?
20.
1 point
Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?
21.
1 point
A company that purchased an HVAC system for the datacenter is MOST concerned with which of the following?
22.
1 point
Which of the following passwords is the LEAST complex?
23.
1 point
An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement?
24.
1 point
Which of the following is an application security coding problem?
25.
1 point
Which of the following should the security administrator implement to limit web traffic based on country of origin? (Select THREE).
26.
1 point
Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company's live modem pool. Which of the following activities is MOST appropriate?
27.
1 point
After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:

`Please only use letters and numbers on these fields'

Which of the following is this an example of?
28.
1 point
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?
29.
1 point
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
30.
1 point
Users at a company report that a popular news website keeps taking them to a web page with derogatory content. This is an example of which of the following?
31.
1 point
A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?
32.
1 point
During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).
33.
1 point
Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?
34.
1 point
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?
35.
1 point
Which of the following protocols allows for secure transfer of files? (Select TWO).
36.
1 point
Several bins are located throughout a building for secure disposal of sensitive information.

Which of the following does this prevent?
37.
1 point
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure?
38.
1 point
Which of the following protocols uses an asymmetric key to open a session and then establishes a symmetric key for the remainder of the session?
39.
1 point
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Select TWO).
40.
1 point
Which of the following is an authentication service that uses UDP as a transport medium?
41.
1 point
Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?
42.
1 point
Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?
43.
1 point
Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?
44.
1 point
Which of the following can be used to mitigate risk if a mobile device is lost?
45.
1 point
Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server?
46.
1 point
Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company?
47.
1 point
A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control?
48.
1 point
Which of the following is a management control?
49.
1 point
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
50.
1 point
Which of the following is the MOST specific plan for various problems that can arise within a system?