Sec misc 2

INFO
STADISTICS
RECORDS
Title of test:
Sec misc 2

Description:
Sec Misc 2

Author:
BA
(Other tests from this author)

Creation Date:
12/06/2018

Category:
Others
Click 'LIKE' to follow the bests test of daypo at facebook
Last comments
No comments about this test.
Content:
After entering the following information into a SOHO wireless router, a mobile device’s user reports being unable to connect to the network: PERMIT 0A: D1: FA. B1: 03: 37 DENY 01: 33: 7F: AB: 10: AB Which of the following is preventing the device from connecting? WPA2-PSK requires a supplicant on the mobile device. Hardware address filtering is blocking the device. TCP/IP Port filtering has been implemented on the SOHO router. IP address filtering has disabled the device from connecting.
A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue? The SSID broadcast is disabled. The company is using the wrong antenna type. The MAC filtering is disabled on the access point. The company is not using strong enough encryption.
Associate which of the following with WPA? TKIP AES CCMP.
CCMP, used in WPA2 wireless, uses what as the base for encryption?.
Ann, a security administrator, has concerns regarding her company’s wireless network. The network is open and available for visiting prospective clients in the conference room, but she notices that many more devices are connecting to the network than should be. Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality for clients? Enable MAC filtering on the wireless access point. Configure WPA2 encryption on the wireless access point. Lower the antenna’s broadcasting power. Disable SSID broadcasting.
A Windows-based computer is infected with malware and is running too slowly to boot and run a malware scanner. Which of the following is the BEST way to run the malware scanner? Kill all system processes Enable the firewall Boot from CD/USB Disable the network connection.
A company administrator has a firewall with an outside interface connected to the Internet and an inside interface connected to the corporate network. Which of the following should the administrator configure to redirect traffic destined for the default HTTP port on the outside interface to an internal server listening on port 8080? Create a dynamic PAT from port 80 on the outside interface to the internal interface on port 8080 Create a dynamic NAT from port 8080 on the outside interface to the server IP address on port 80 Create a static PAT from port 80 on the outside interface to the internal interface on port 8080 Create a static PAT from port 8080 on the outside interface to the server IP address on port 80.
An overseas branch office within a company has many more technical and non-technical security incidents than other parts of the company. Which of the following management controls should be introduced to the branch office to improve their state of security? Initial baseline configuration snapshots Firewall, IPS and network segmentation Event log analysis and incident response Continuous security monitoring processes.
Which of the following is a directional antenna that can be used in point-to-point or point-to-multi-point WiFi communication systems? (Select TWO). Backfire Dipole Omni PTZ Dish.
An administrator needs to secure RADIUS traffic between two servers. Which of the following is the BEST solution? Require IPSec with AH between the servers Require the message-authenticator attribute for each message Use MSCHAPv2 with MPPE instead of PAP Require a long and complex shared secret for the servers.
Ann, the Chief Information Officer (CIO) of a company, sees cloud computing as a way to save money while providing valuable services. She is looking for a cost-effective solution to assist in capacity planning as well as visibility into the performance of the network. Which of the following cloud technologies should she look into? IaaS MaaS SaaS PaaS.
The loss prevention department has purchased a new application that allows the employees to monitor the alarm systems at remote locations. However, the application fails to connect to the vendor’s server and the users are unable to log in. Which of the following are the MOST likely causes of this issue? (Select TWO). URL filtering Role-based access controls MAC filtering Port Security Firewall rules.
A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication works fine, but VLAN 12 does not. Which of the following MUST happen before the server can communicate on VLAN 12? The server’s network switch port must be enabled for 802.11x on VLAN 12. The server’s network switch port must use VLAN Q-in-Q for VLAN 12. The server’s network switch port must be 802.1q untagged for VLAN 12. The server’s network switch port must be 802.1q tagged for VLAN 12.
A vulnerability scan is reporting that patches are missing on a server. After a review, it is determined that the application requiring the patch does not exist on the operating system. Which of the following describes this cause? Application hardening False positive Baseline code review False negative.
Which of the following is an example of a false negative? The IDS does not identify a buffer overflow. Anti-virus identifies a benign application as malware. Anti-virus protection interferes with the normal operation of an application. A user account is locked out after the user mistypes the password too many times.
A major security risk with co-mingling of hosts with different security requirements is: Security policy violations. Zombie attacks. Password compromises. Privilege creep.
Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company? Privacy Policy Least Privilege Acceptable Use Mandatory Vacations.
While rarely enforced, mandatory vacation policies are effective at uncovering: Help desk technicians with oversight by multiple supervisors and detailed quality control systems. Collusion between two employees who perform the same business function. Acts of incompetence by a systems engineer designing complex architectures as a member of a team. Acts of gross negligence on the part of system administrators with unfettered access to system and no oversight.
A company that has a mandatory vacation policy has implemented which of the following controls? Risk control Privacy control Technical control Physical control.
The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future? Job rotation Separation of duties Mandatory Vacations Least Privilege.
A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server’s drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO? (Select TWO). Disk hashing procedures Full disk encryption Data retention policies Disk wiping procedures Removable media encryption.
Which of the following defines a business goal for system restoration and acceptable data loss? MTTR MTBF RPO Warm site.
Which of the following is the GREATEST security risk of two or more companies working together under a Memorandum of Understanding? Budgetary considerations may not have been written into the MOU, leaving an entity to absorb more cost than intended at signing. MOUs have strict policies in place for services performed between the entities and the penalties for compromising a partner are high. MOUs are generally loose agreements and therefore may not have strict guidelines in place to protect sensitive data between the two entities. MOUs between two companies working together cannot be held to the same legal standards as SLAs.
Which of the following is the primary security concern when deploying a mobile device on a network? Strong authentication Interoperability Data security Cloud storage technique.
An administrator wants to minimize the amount of time needed to perform backups during the week. It is also acceptable to the administrator for restoration to take an extended time frame. Which of the following strategies would the administrator MOST likely implement? Full backups on the weekend and incremental during the week Full backups on the weekend and full backups every day Incremental backups on the weekend and differential backups every day Differential backups on the weekend and full backups every day.
The network administrator is responsible for promoting code to applications on a DMZ web server. Which of the following processes is being followed to ensure application integrity? Application hardening Application firewall review Application change management Application patch management.
The security administrator is currently unaware of an incident that occurred a week ago. Which of the following will ensure the administrator is notified in a timely manner in the future? User permissions reviews Incident response team Change management Routine auditing.
A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents. Which of the following would be the BEST technology control to use in this scenario? Content filtering IDS Audit logs DLP.
Which of the following fire suppression systems is MOST likely used in a datacenter? FM-200 Dry-pipe Wet-pipe Vacuum.
Environmental control measures include which of the following? Access list Lighting Motion detection EMI shielding.
Report abuse Terms of use
We use cookies to personalize your experience. If you continue browsing you will be accepting its use. More information.