rules of the 7 “P’s”
PROER PRIOR PLANNING PREVENTS PISS POOR PERFORMANCE
Pete, a network administrator, is capturing packets on the network and notices that a large amount
of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment
that traffic from the other trafficA. Connect the WAP to a different switch
B. Create a voice VLAN
C. Create a DMZ
D. Set the switch ports to 802.1q mode
Create a voice VLAN
Which of the following security tools can Jane, a security administrator, use to deter theftA. Visualization
B. Cable locks
C. GPS tracking
D. Device encryption
Cable locks
Which of the following can be implemented on a laptop hard drive to help prevent unauthorized
access to dataA. Full disk encryption
B. Key escrow
C. Screen lock
D. Data loss prevention
Full disk encryption
Which of the following network devices allows Jane, a security technician, to perform malware
inspectionA. Load balancer
B. VPN concentrator
C. Firewall
D. NIPS
NIPS
Which of the following is a valid server-role in a Kerberos authentication systemA. Token issuing system
B. Security assertion server
C. Authentication agent
D. Ticket granting server
Ticket granting server
The accounting department needs access to network share A to maintain a number of financial
reporting documents. The department also needs access to network share B in HR to view payroll
documentation for cross-referencing items. Jane, an administrative assistant, needs access to
view one document in network share A to gather data for management reports. Which of the
following gives accounting and Jane the correct rights to these areasA. Accounting should be given read/write access to network share A and read access to network
share B. Jane should be given read access for the specific document on network share A.
B. Accounting should be given read/write access to network share A and read access to network
share B. Jane should be given read access to network share A.
C. Accounting should be given full access to network share A and read access to network share B.
Jane should be given read/write access for the specific document on network share A.
D. Accounting should be given full access to network share A and read access to network share B.
Jane should be given read/write access to network share A.
Accounting should be given read/write access to network share A and read access to network
share B. Jane should be given read access for the specific document on network share A.
Which of the following creates ciphertext by changing the placement of charactersA. Transposition cryptography
B. Hashing
C. Elliptical cryptography
D. Digital signatures
Transposition cryptography
Which of the following malware types uses stealth techniques to conceal itself, cannot install itself
without user interaction, and cannot automatically propagateA. Rootkit
B. Logic bomb
C. Adware
D. Virus
Rootkit
When Pete, an employee, leaves a company, which of the following should be updated to ensure
Pete’s security access is reduced or eliminatedA. RSA
B. CA
C. PKI
D. CRL
CRL
Which of the following should Matt, an administrator, change FIRST when installing a new access
pointA. SSID broadcast
B. Encryption
C. DHCP addresses
D. Default password
Default password
A datacenter has two rows of racks which are facing the same direction. Sara, a consultant,
recommends the racks be faced away from each other. This is an example of which of the
following environmental conceptsA. Fire suppression
B. Raised floor implementation
C. Hot and cool aisles
D. Humidity controls implementation
Hot and cool aisles
Which of the following password policies is the MOST effective against a brute force network
attackA. Password complexity
B. Password recovery
C. 30 day password expiration
D. Account lockout
Account lockout
Which of the following would BEST be used by Sara, the security administrator, to calculate the
likelihood of an event occurringA. SLE
B. ALE
C. ROI
D. ARO
ARO
Which of the following should Matt, an administrator, implement in a server room to help prevent
static electricityA. GFI electrical outlets
B. Humidity controls
C. ESD straps
D. EMI shielding
Humidity controls
Sara, a company’s security officer, often receives reports of unauthorized personnel having
access codes to the cipher locks of secure areas in the building Sara should immediately
implement which of the followingA. Acceptable Use Policy
B. Physical security controls
C. Technical controls
D. Security awareness training
Security awareness training
Pete, an IT security technician, has been tasked with implementing physical security controls for
his company’s workstations. Which of the following BEST meets this needA. Host-based firewalls
B. Safe
C. Cable locks
D. Remote wipe
Cable locks
Which of the following creates ciphertext by replacing one set of characters for anotherA. Substitution cryptography
B. Elliptical cryptography
C. Digital signatures
D. Transposition cryptography
Substitution cryptography
Sara, the IT Manager, would like to ensure that the router and switches are only available from the
network administrator’s workstation. Which of the following would be the MOST cost effective
solution to ensure that only the network administrator can access these devicesA. Restrict console ports
B. Time of day restrictions
C. Implement ACLs
D. Implement an out-of-band administrative network
Implement ACLs
A company is performing internal security audits after a recent exploitation on one of their
proprietary applications. Sara, the security auditor, is given the workstation with limited
documentation regarding the application installed for the audit. Which of the following types of
testing methods is thisA. Sandbox
B. White box
C. Black box
D. Gray box
Gray box
A web server sitting in a secure DMZ has antivirus and anti-malware software which updates daily.
The latest security patches are applied and the server does not run any database software. A day
later, the web server is compromised and defaced. Which of the following is the MOST likely type
of attackA. Header manipulation
B. Zero day exploit
C. Session hijacking
D. SQL injection
Zero day exploit
Which of the following protocols is MOST likely associated with network audit loggingA. ICMP
B. FTPS
C. DNS
D. SNMP
SNMP
Pete, a security administrator, is asked to install and configure centralized software to securely
manage and collect statistics from all of the company’s network devices. Which of the following
should the software supportA. 802.1x
B. ICMP
C. SNMPv3
D. SNMP
SNMPv3
A network consists of various remote sites that connect back to two main locations. Pete, the
security administrator, needs to block TELNET access into the network. Which of the following, by
default, would be the BEST choice to accomplish this goalA. Block port 23 on the L2 switch at each remote site
B. Block port 23 on the network firewall
C. Block port 25 on the L2 switch at each remote site
D. Block port 25 on the network firewall
Block port 23 on the network firewall
Pete, a security administrator, is informed that people from the HR department should not have
access to the accounting department’s server, and the accounting department should not have
access to the HR department’s server. The network is separated by switches. Which of the
following is designed to keep the HR department users from accessing the accounting
department’s server and vice-versaA. ACLs
B. VLANs
C. DMZs
D. NATS
VLANs
Which of the following is BEST utilized to actively test security controls on a particular systemA. Port scanning
B. Penetration test
C. Vulnerability scanning
D. Grey/Gray box
Grey/Gray box
Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a
page is displayed notifying him that this site cannot be visited. Which of the following is MOST
likely blocking Pete’s access to this siteA. Internet content filter
B. Firewall
C. Proxy server
D. Protocol analyzer
Internet content filter
Which of the following has serious security implications for large organizations and can potentially
allow an attacker to capture conversationsA. Subnetting
B. NAT
C. Jabber
D. DMZ
Jabber
Upper management decides which risk to mitigate based on cost. This is an example of:
A. Qualitative risk assessment
B. Business impact analysis
C. Risk management framework
D. Quantitative risk assessment
Quantitative risk assessment
Isolation mode on an AP provides which of the following functionality typesA. Segmentation of each wireless user from other wireless users
B. Disallows all users from communicating directly with the AP
C. Hides the service set identifier
D. Makes the router invisible to other routers
Segmentation of each wireless user from other wireless users
Employees are reporting that unauthorized personnel are in secure areas of the building. This is
MOST likely due to lack of security awareness in which of the following areasA. Impersonation
B. Logical controls
C. Physical security controls
D. Access control policy
Physical security controls
A forensic image of a hard drive has been created. Which of the following can be used to
demonstrate the image has not been tampered withA. Chain of custody
B. Document the image file’s size and time stamps
C. Encrypt the image file
D. Hash of the image file
Hash of the image file
Which of the following secure protocols is MOST commonly used to remotely administer
Unix/Linux systemsA. SSH
B. SCP
C. SFTP
D. SNMP
SSH
Which of the following security concepts can Matt, a security administrator, implement to support
integrityA. Digital signatures
B. Trust models
C. Key escrow
D. Recovery agents
Digital signatures
Which of the following combinations represents multifactor authenticationA. Smart card and hard token
B. Voice print analysis and facial recognition
C. Username and PIN
D. Cipher lock combination and proximity badge
Cipher lock combination and proximity badge
Matt, a developer, recently attended a workshop on a new application. The developer installs the
new application on a production system to test the functionality. Which of the following is MOST
likely affectedA. Application design
B. Application security
C. Initial baseline configuration
D. Management of interfaces
Initial baseline configuration
Which of the following is Jane, a security administrator, MOST likely implementing when deleting
all the unneeded files and modules of a newly installed applicationA. Exception handling
B. Patch management
C. System file clean up
D. Application hardening
Application hardening
Matt, a security administrator, wants to ensure that the message he is sending does not get
intercepted or modified in transit. This concern relates to which of the following conceptsA. Availability
B. Integrity
C. Accounting
D. Confidentiality
Integrity
Which of the following should be used when a business needs a block cipher with minimal key
size for internal encryptionA. AES
B. Blowfish
C. RC5
D. 3DES
Blowfish
Which of the following best practices makes a wireless network more difficult to findA. Implement MAC filtering
B. UseWPA2-PSK
C. Disable SSD broadcast
D. Power down unused WAPs
Disable SSD broadcast
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type of malwareA. Logic bomb
B. Worm
C. Trojan
D. Adware
Trojan
The use of social networking sites introduces the risk of:
A. Disclosure of proprietary information
B. Data classification issues
C. Data availability issues
D. Broken chain of custody
Disclosure of proprietary information
Which the following flags are used to establish a TCP connection? (Select TWO).
A. PSH
B. ACK
C. SYN
D. URG
E. FIN
ACK
SYN
Which of the following is MOST likely to result in data lossA. Accounting transferring confidential staff details via SFTP to the payroll department
B. Back office staff accessing and updating details on the mainframe via SSH
C. Encrypted backup tapes left unattended at reception for offsite storage
D. Developers copying data from production to the test environments via a USB stick
Developers copying data from production to the test environments via a USB stick
Sara, a security administrator, sends an email to the user to verify their password has been reset.
Which of the following threats is BEST mitigated by this actionA. Spear phishing
B. Impersonation
C. Hoaxes
D. Evil twin
Impersonation
Which of the following describes an LDAP injection attackA. Creating a copy of user credentials during the LDAP authentication session
B. Manipulating an application’s LDAP query to gain or alter access rights
C. Sending buffer overflow to the LDAP query service
D. Using XSS to direct the user to a rogue LDAP server
Manipulating an application’s LDAP query to gain or alter access rights
Which of the following is an attack designed to steal cell phone data and contactsA. Bluesnarfing
B. Smurfing
C. Fuzzing
D. Bluejacking
Bluesnarfing
Which of the following best practices is commonly found at the end of router ACLsA. Time of day restrictions
B. Implicit deny
C. Implicit allow
D. Role-based access controls
Implicit deny
Which of the following uses TCP / UDP port 53 by defaultA. DNS
B. SFTP
C. SSH
D. NetBIOS
DNS
An organization is recovering data following a datacenter outage and determines that backup
copies of files containing personal information were stored in an unsecure location, because the
sensitivity was unknown. Which of the following activities should occur to prevent this in the
futureA. Business continuity planning
B. Quantitative assessment
C. Data classification
D. Qualitative assessment
Data classification
Which of the following concepts defines the requirement for data availabilityA. Authentication to RADIUS
B. Non-repudiation of email messages
C. Disaster recovery planning
D. Encryption of email messages
Disaster recovery planning
Which of the following is an example of multifactor authenticationA. Credit card and PIN
B. Username and password
C. Password and PIN
D. Fingerprint and retina scan
Credit card and PIN
Sara, the network administrator, was alerted to an unauthorized email that was sent to specific
VIPs in the company with a malicious attachment. Which of the following types of attacks is MOST
likely being describedA. Vishing
B. Whaling
C. DDoS
D. Pharming
Whaling
sensitive information leakageA. Cable locks
B. Remote wipe
C. Screen lock
D. Voice encryption
Remote wipe
organization’s risk exposure by verifying employee accessA. Account revalidation
B. Incident management
C. Qualitative analysis
D. Quantitative analysis
Incident management
Which of the following is the MAIN benefit of server-side versus client-side input validationA. Server-side input validation results in a more secure system than client-side input validation.
B. Client-side input validation can lead to local buffer overflows while server-side input validation
can lead to remote buffer overflow.
C. Client-side input validation results in a more secure system than server-side input validation.
D. Server-side input validation is prone to buffer overflows while client-side input validation is not.
Server-side input validation results in a more secure system than client-side input validation.
Which of the following is MOST appropriate when storing backup tapes in a physically non-secure
roomA. Use an in-tape GPS tracking device.
B. Store the tapes in a locked safe.
C. Encrypt the tapes with AES.
D. Securely wipe the tapes.
Store the tapes in a locked safe.
Grandfather-Father-Son and Tower of Hanoi are common:
A. Trojans that collect banking information.
B. Backup tape rotation strategies.
C. Penetration testing best practices.
D. Failover practices in clustering.
Backup tape rotation strategies.
Which of the following is the below pseudo-code an example ofIF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT
A. Buffer overflow prevention
B. Input validation
C. CSRF prevention
D. Cross-site scripting prevention
Input validation
Which of the following can BEST be implemented on a mobile phone to help prevent any sensitive
data from being recovered if the phone is lostA. Voice encryption
B. Screen locks
C. Device encryption
D. GPS tracking
Device encryption
Which of the following security concepts would Sara, the security administrator, use to mitigate the
risk of data lossA. Record time offset
B. Clean desk policy
C. Cloud computing
D. Routine log review
Clean desk policy
If Organization A trusts Organization B and Organization B trusts Organization C, then
Organization A trusts Organization C. Which of the following PKI concepts is this describingA. Transitive trust
B. Public key trust
C. Certificate authority trust
D. Domain level trust
Transitive trust
Which of the following is BEST associated with PKIA. Private key
B. Block ciphers
C. Stream ciphers
D. NTLMv2
Private key
Which of the following malware types is BEST described as protecting itself by hooking system
processes and hiding its presenceA. Botnet
B. Rootkit
C. Logic bomb
D. Virus
Rootkit
Sara, a security administrator, manually hashes all network device configuration files daily and
compares them to the previous days’ hashes. Which of the following security concepts is Sara
usingA. Confidentiality
B. Compliance
C. Integrity
D. Availability
Integrity
Following a security failure incident, the chain of custody must be followed in order to:
A. Determine who accessed the compromised equipment pre-incident.
B. Securely lock down any compromised equipment.
C. Preserve and maintain evidence integrity.
D. Provide an accurate timeline detailing how the incident occurred.
Preserve and maintain evidence integrity.
Jane, an IT administrator, is implementing security controls on a Microsoft Windows based kiosk
used at a bank branch. This kiosk is used by the public for Internet banking. Which of the following
controls will BEST protect the kiosk from general public users making system changesA. Group policy implementation
B. Warning banners
C. Command shell restrictions
D. Host based firewall
Group policy implementation
After Matt, a user, enters his username and password at the login screen of a web enabled portal,
the following appears on his screen:
‘Please only use letters and numbers on these fields’
Which of the following is this an example ofA. Proper error handling
B. Proper input validation
C. Improper input validation
D. Improper error handling
Proper input validation
The corporate NIPS requires a daily download from its vendor with updated definitions in order to
block the latest attacks. Which of the following describes how the NIPS is functioningA. Heuristics
B. Anomaly based
C. Signature based
D. Behavior based
Signature based
Pete, a security administrator, needs to update the community strings on the router since they
have been compromised. Which of the following needs to be changedA. SMTP
B. SNMP
C. ICMP
D. IPSec
SNMP
Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE)
A. RC4
B. 3DES
C. AES
D. MD5
E. PGP
F. Blowfish
3DES
AES
Blowfish
Matt, an account manager, arrives at work early in the morning and cannot log into his
workstation. He calls the help desk an hour later to open a trouble ticket, but they tell him there is
nothing wrong with his account. Matt tries his login once more and is granted access. Which of the
following control types BEST explains this anomalyA. Discretionary access control
B. Time of day restrictions
C. Separation of duties
D. Single sign-on
Time of day restrictions
A targeted email attack sent to Sara, the company’s Chief Executive Officer (CEO), is known as
which of the followingA. Whaling
B. Bluesnarfing
C. Vishing
D. Dumpster diving
Whaling
Which of the following network devices allows web traffic to be distributed amongst serversA. Web security gateway
B. Load balancers
C. NIDS
D. Routers
Load balancers
Which of the following provides the LEAST availabilityA. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5
RAID 0
Sara, a security guard, reports that the side of the company building has been marked with spray
paint. Which of the following could this be an example ofA. Interference
B. War driving
C. War chalking
D. War dialing
War chalking
Matt, a security administrator, has the VPN tunnel application set up so that after multiple incorrect
attempts, the VPN service is disabled. Which of the following deterrent techniques does this
describeA. Intrusions detection system
B. Baseline reporting
C. Failopen
D. Failsafe
Failsafe
Sara, a user, receives a call and the caller asks if Sara would be willing to answer a few marketing
questions, and in return be placed in the drawing to win a trip to Hawaii. After Sara agrees, she is
transferred to an automated service which states that some personal information needs to be
collected to verify her full name, birthday, address, and email to be eligible for the Hawaii trip. After
providing the details Sara is then solicited for banking preferences, general purchasing
preferences, and debit card details. Which of the following BEST describes this type of attackA. A hoax
B. Pharming
C. Smurfing
D. Vishing
Vishing
Which of the following devices is BEST suited for servers that need to store private keysA. Hardware security module
B. Hardened network firewall
C. Solid state disk drive
D. Hardened host firewall
Hardware security module
Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what
services and operating systems are running on the corporate network. Which of the following
should be used to complete this taskA. Fingerprinting and password crackers
B. Fuzzing and a port scan
C. Vulnerability scan and fuzzing
D. Port scan and fingerprinting
Port scan and fingerprinting
Which of the following types of data encryption would Matt, a security administrator, use to encrypt
a specific tableA. Full disk
B. Individual files
C. Database
D. Removable media
Database
Which of the following security controls enforces user permissions based on a job roleA. Single sign-on access
B. Group based privileges
C. Account policy enforcement
D. User assigned privileges
Group based privileges
A business has paper forms on hand in the event of a credit processing system failure. This is an
example of which of the followingA. Business process re-engineering
B. Disaster recovery
C. Continuity of operations
D. Enterprise resource planning
Continuity of operations
By default, which of the following ports would Pete, an administrator, block to prevent incoming
RDP connections to a Windows ServerA. 22
B. 161
C. 3389
D. 5631
3389
Which of the following encrypts the body of a packet, rather than just the password, while sending
informationA. LDAP
B. TACACS+
C. ACLs
D. RADIUS
TACACS+
Which of the following should Matt, a security administrator, include when encrypting
smartphones? (Select TWO).
A. Steganography images
B. Internal memory
C. Master boot records
D. Removable memory cards
E. Public keys
Internal memory
Removable memory cards
Which of the following risk related concepts BEST supports the identification of fraudA. Risk avoidance
B. Job rotation
C. ALE calculation
D. Clean desk policy
Job rotation
Which of the following would Pete, a security administrator, do to limit a wireless signal from
penetrating the exterior wallsA. Implement TKIP encryption
B. Consider antenna placement
C. Disable the SSID broadcast
D. Disable WPA
Consider antenna placement
Which of the following are restricted to 64-bit block sizes? (Select TWO).
A. PGP
B. DES
C. AES256
D. RSA
E. 3DES
F. AES
DES
3DES
Which of the following would be implemented to create a network inside a networkA. VLAN
B. NAT
C. NAC
D. VPN
VLAN
Which of the following is a system designed to lure attackers away from production systemsA. Proxy server
B. Spam filter
C. Honeypot
D. Flood guard
Honeypot
Sara, a security analyst, discovers which operating systems the client devices on the network are
running by only monitoring a mirror port on the router. Which of the following techniques did Sara
useA. Active fingerprinting
B. Passive fingerprinting
C. Protocol analyzing
D. Network enumerating
Passive fingerprinting
Which of the following authentication services uses a ticket granting system to provide accessA. RADIUS
B. LDAP
C. TACACS+
D. Kerberos
Kerberos
Matt, the Chief Information Officer (CIO), wants to protect laptop users from zero day attacks.
Which of the following would BEST achieve Matt’s goalA. Host based firewall
B. Host based IDS
C. Anti-virus
D. Anti-spyware
Host based firewall
Which of the following is often rated based on its ability to increase the time it takes to perform an
attackA. Safe
B. Screen lock
C. Patch management
D. Visualization
Safe
The human resources department of a company has requested full access to all network
resources, including those of the financial department. Jane, the administrator, denies this, citing:
A. Conflict of interest
B. Separation of duties
C. Role authentication
D. Implicit deny
Separation of duties
Which of the following is a way to gain access to a protected system while another user is entering
credentialsA. Spim
B. Shoulder surfing
C. DDoS
D. Backdoor
Shoulder surfing
Which of the following would Pete, a security administrator, MOST likely implement in order to
allow employees to have secure remote access to certain internal network services such as file
serversA. Packet filtering firewall
B. VPN gateway
C. Switch
D. Router
VPN gateway
Jane, a security administrator, needs to deploy a wireless network where the wireless encryption
key is negotiated automatically. Which of the following MUST be implementedA. WPA2-PSK
B. 802.1n
C. MAC filtering
D. WPA enterprise
WPA enterprise
Which of the following can be implemented on the company gateway router to prevent IP packets
with a source IP of the internal company network from being routed by the external interface of the
router into the company’s networkA. 802.1x
B. Flood guards
C. Access control lists
D. Loop protection
Access control lists
Which of the following BEST explains the security benefit of a standardized server imageA. All current security updates for the operating system will have already been applied.
B. Mandated security configurations have been made to the operating system.
C. Anti-virus software will be installed and current.
D. Operating system license use is easier to track.
Mandated security configurations have been made to the operating system.
Jane, the security administrator for a company, needs to assign permissions for users on her
network. Which of the following would allow Jane to give ONLY the appropriate permissions
necessaryA. Separation of duties
B. Job rotation
C. Privilege escalation
D. Least privilege
Least privilege
Users in the marketing department are given a different level of access to files than users in the
accounting department. Which of the following types of access control does this BEST describeA. Standard access control
B. Role based access control
C. Mandatory access control
D. Discretionary access control
Role based access control
Which of the following types of data encryption would Jane, a security administrator, use if MBR
and the file systems needed to be includedA. Full disk
B. Individual files
C. Database
D. Partial disk
Full disk
Sara, an employee, enters the datacenter but does not ensure the door was fully closed
afterwards. Which of the following could directly result from this situationA. Clean desk policy
B. Social engineering
C. Tailgating
D. Chain of custody
Tailgating
Which of the following should Pete, the security administrator, change to help mitigate the risk
associated with war drivers discovering the wireless networkA. WPA encryption
B. WEP encryption
C. MAC filtering
D. AP power levels
AP power levels
A. Public key
B. Sender’s IP
C. From field
D. Private key
Private key
Which of the following is the MOST important security requirement for mobile devices storing PIIA. Remote data wipe
B. GPS location service
C. VPN pass-through
D. WPA2 wireless
Remote data wipe
Which of the following is a way to confirm that all staff members know their roles and
responsibilities during an IT disaster or other IT contingency eventA. Table-top exercise
B. Hot site
C. Disaster recovery plan
D. MTTR
Table-top exercise
The main corporate website has a service level agreement that requires availability 100% of thetime, even in the case of a disaster. Which of the following would be required to meet this
demandA. Warm site implementation for the datacenter
B. Geographically disparate site redundant datacenter
C. Localized clustering of the datacenter
D. Cold site implementation for the datacenter
Geographically disparate site redundant datacenter
Which of the following concepts is BEST described as developing a new chain of command in the
event of a contingencyA. Business continuity planning
B. Continuity of operations
C. Business impact analysis
D. Succession planning
Succession planning
Which of the following will allow proper ventilation for servers in a data centerA. Hot/cold aisles
B. Humidity controls
C. EMI shielding
D. Load balancing
Hot/cold aisles
Which of the following combinations represents multifactor authenticationA. Key and proximity badge
B. Fingerprint and proximity badge
C. Retina scan and voice analysis
D. Password and PIN
Fingerprint and proximity badge
Jane, an administrator, is primarily concerned with blocking external attackers from gaining
information on remote employees by scanning their laptops. Which of the following security
applications is BEST suited for this taskA. Host IDS
B. Personal firewall
C. Anti-spam software
D. Anti-virus software
Personal firewall
Which of the following can Pete, the security administrator, implement to filter Internet trafficA. Warning banners
B. Spam filters
C. Host-based firewalls
D. Command shell restrictions
Host-based firewalls
Which of the following should Jane, the security administrator, do FIRST when an employee
reports the loss of a corporate mobile deviceA. Remotely lock the device with a PIN
B. Enable GPS location and record from the camera
C. Remotely uninstall all company software
D. Remotely initiate a device wipe
Remotely initiate a device wipe
Which of the following protocols is used to authenticate the client and server’s digital certificateA. PEAP
B. DNS
C. TLS
D. ICMP
TLS
Which of the following authentication services uses the AAA architecture and runs on TCPA. LDAP
B. Kerberos
C. RADIUS
D. TACACS+
TACACS+
Users have notified Sara, a technician, that the performance of a specific set of servers has
degraded. All of the servers are in the same facility and accessible, but are very slow to respond.
Which of the following is MOST likely the causeA. The servers are not configured in a hot aisle and cool aisle containment.
B. Redundancy and data de-duplication has failed.
C. The UPS is overloaded and has begun the shutdown process.
D. HVAC has failed causing server CPUs to overheat and throttle.
HVAC has failed causing server CPUs to overheat and throttle.
Matt, an administrator, captures malicious DNS traffic on the network. Which of the following tools
would be used to analyze the nature of this trafficA. Sniffer
B. Zone transfer
C. Network tap
D. Application firewall
Sniffer
Which of the following should Pete, an administrator, use to verify the integrity of a downloaded
fileA. CRL
B. CSR
C. AES
D. MD5
MD5
Pete, a security analyst, must authenticate himself and his company when obtaining a certificate.
Which of the following would validate this information for PeteA. Certification authority
B. Key escrow
C. Registration authority
D. Trust model
Registration authority
How often, at a MINIMUM, should Sara, an administrator, review the accesses and right of the
users on her systemA. Annually
B. Immediately after an employee is terminated
C. Every five years
D. Every time they patch the server
Annually
Jane, a user, has reported an increase in email phishing attempts. Which of the following can be
implemented to mitigate the attacksA. Anti-spyware
B. Anti-adware
C. Anti-virus
D. Anti-spam
Anti-spam
Which of the following is a policy that would force all users to organize their areas as well as help
in reducing the risk of possible data theftA. Password behaviors
B. Clean desk policy
C. Data handling
D. Data disposal
Clean desk policy
Which of the following is the BEST reason to have a formal and exercised incident management
planA. All vulnerabilities are mitigated
B. Users do not maintain excessive permissions
C. Patches are not made without testing
D. All parties understand their role in the process
All parties understand their role in the process
Which of the following identifies certificates that have been compromised or suspected of being
compromisedA. Certificate revocation list
B. Access control list
C. Key escrow registry
D. Certificate authority
Certificate revocation list
Which of the following time periods is a best practice for requiring user awareness trainingA. Every 5 years
B. Every 3 years
C. Every 2 years
D. Annually
Annually
In which of the following locations would Sara, a forensic analyst, look to find a hooked processA. BIOS
B. Slack space
C. RAM
D. Rootkit
RAM
A company notices that there is a flaw in one of their proprietary programs that the company runs
in-house. The flaw could cause damage to the HVAC system. Which of the following would the
company transfer to an insurance companyA. Risk
B. Threat
C. Vulnerability
D. Code review
Risk
Which of the following features would allow Pete, a network administrator, to allow or deny access
to a specific list of network clientsA. Content filtering
B. Flood guard
C. URL filtering
D. MAC filtering
MAC filtering
Pete, a system administrator, is using a packet sniffer to troubleshoot remote authentication. Pete
detects a device trying to communicate to UDP ports 1812 and 1813. Which of the following
authentication methods is MOST likely being attemptedA. TACACS+
B. LDAP
C. Kerberos
D. RADIUS
RADIUS
Which of the following is an example of authentication using something Jane, a user, has and
something she knowsA. GSM phone card and PIN
B. Username and password
C. Username and PIN
D. Fingerprint scan and signature
GSM phone card and PIN
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company
network by using a former employee’s credentialA. Account expiration
B. Password complexity
C. Account lockout
D. Dual factor authentication
Account expiration
Which of the following MUST Matt, a security administrator, implement to verify both the integrity
and authenticity of a message while requiring a shared secretA. RIPEMD
B. MD5
C. SHA
D. HMAC
HMAC
Which of the following does Jane, a software developer, need to do after compiling the source
code of a program to attest the authorship of the binaryA. Place Jane’s name in the binary metadata
B. Use Jane’s private key to sign the binary
C. Use Jane’s public key to sign the binary
D. Append the source code to the binary
Use Jane’s private key to sign the binary
During the analysis of malicious code, Matt, a security analyst, discovers JavaScript being used to
send random data to another service on the same system. This is MOST likely an example of
which of the followingA. Buffer overflow
B. XML injection
C. SQL injection
D. Distributed denial of service
Buffer overflow
Account lockout is a mitigation strategy used by Jane, the administrator, to combat which of the
following attacks? (Select TWO).
A. Spoofing
B. Man-in-the-middle
C. Dictionary
D. Brute force
E. Privilege escalation
Dictionary
Brute force
A company’s backup solution performs full backups weekly and is running into capacity issues.
Without changing the frequency of backups, which of the following solutions would reduce the
storage requirementA. Differential backups
B. Magnetic media backups
C. Load balancing
D. Incremental backups
Incremental backups
3DES is created when which of the following scenarios occursA. The DES algorithm is run three consecutive times against the item being encrypted.
B. The DES algorithm has been used by three parties: the receiving party, sending party, and
server.
C. The DES algorithm has its key length increased to 256.
D. The DES algorithm is combined with AES and SHA1.
The DES algorithm is run three consecutive times against the item being encrypted.
Which of the following mitigates the risk of proprietary information being compromisedA. Cloud computing
B. Digital signatures
C. File encryption
D. Visualization
File encryption
Which of the following security tools can Jane, an administrator, implement to mitigate the risks of
theftA. Visualization
B. Host based firewalls
C. HIPS
D. Device encryption
Device encryption
Matt, an attacker, drops a USB flash drive labeled “CEO’s music collection” in the reception area
of a bank hoping an employee will find it. The drive actually contains malicious code. Which of the
following attacks is thisA. Vishing
B. Social engineering
C. Spim
D. Impersonation
Social engineering
Sara, an employee, visits a website and downloads the PDF application to officially become a
member. The network administrator notices large amounts of bandwidth at night from Sara’s
workstation. Which of the following attacks does this describeA. Adware
B. Botnets
C. Logic bomb
D. Spyware
Botnets
Matt, the Chief Information Security Officer (CISO), tells the network administrator that a security
company has been hired to perform a penetration test against his network. The security company
asks Matt which type of testing would be most beneficial for him. Which of the following BEST
describes what the security company might do during a black box testA. The security company is provided with all network ranges, security devices in place, and logical
maps of the network.
B. The security company is provided with no information about the corporate network or physical
locations.
C. The security company is provided with limited information on the network, including all network
diagrams.
D. The security company is provided with limited information on the network, including some
subnet ranges and logical network diagrams.
maps of the network.
B. The security company is provided with no information about the corporate network or physical
locations.
C. The security company is provided with limited information on the network, including all network
diagrams.
D. The security company is provided with limited information on the network, including some
subnet ranges and logical network diagrams.
The security company is provided with no information about the corporate network or physical
locations.
If Pete, an administrator, is blocking port 22, which of the following protocols will this affect(Select TWO)
A. SNMP
B. SSH
C. SMTP
D. FTP
E. Telnet
F. SCP
SSH

SCP

Which of the following allows active exploitation of security vulnerabilities on a system or network
for the purpose of determining true impactA. Port scanning
B. Penetration testing
C. Vulnerability scanning
D. Performing risk analysis
Penetration testing
Which of the following web application security weaknesses can be mitigated by preventing the
use of HTML tagsA. LDAP injection
B. SQL injection
C. Error and exception handling
D. Cross-site scripting
Cross-site scripting
A recent virus outbreak has finally been contained and now several users are reporting latency
issues. A vulnerability scan was performed and no backdoors were found. Upon further
investigation, Matt, the security administrator, notices that websites are being redirected to
unauthorized sites. This is an example of which of the followingA. Botnet
B. Rootkits
C. Trojan
D. Spyware
Spyware
Which of the following is BEST used to control access to the LANA. DMZ
B. NAC
C. NAT
D. Remote access
NAC
Which of the following is a technical preventive controlA. IDS
B. Data backup
C. Audit logs
D. ACLs
ACLs
When deploying virtualized servers, which of the following should a company be the MOST
concerned withA. Integrity
B. Non-repudiation
C. Power consumption
D. Availability
Availability
The main difference between symmetric and asymmetric encryption is that:
A. Symmetric encryption uses the same key for encryption and decryption, while asymmetric
encryption uses one key to encrypt and one to decrypt.
B. In symmetric encryption the encryption key must be of even number length so that it can be
split in two, where one part is used for encryption and the other is used for decryption.
C. Asymmetric encryption uses the same key for encryption and decryption, while symmetric
encryption uses one key to encrypt and one to decrypt.
D. In asymmetric encryption the same key is given to one user in a hashed format and used for
encryption, and to another used in plain text and used for decryption
Symmetric encryption uses the same key for encryption and decryption, while symmetric
encryption uses one key to encrypt and one to decrypt.
Jane, an information security manager, often receives reports about the sharing of cipher lock
codes to gain access to secure areas. Jane would like to implement a new control that would
prevent the sharing of codes and limit access points to only key employees. Which of the following
security controls would BEST mitigate this issueA. Use ACLs
B. Separation of duties
C. Install proximity readers
D. Time of day restrictions
Install proximity readers
Jane, a security administrator, has been tasked with explaining access control aspects to a peer.
Which of the following is a directory service supporting both Windows and Linux authenticationA. LDAP
B. Trusted OS
C. TACACS+
D. PAM
LDAP
Pete, a system administrator, has concerns regarding his users accessing systems and secured
areas using others’ credentials. Which of the following can BEST address this concernA. Create conduct policies prohibiting sharing credentials.
B. Enforce a policy shortening the credential expiration timeframe.C. Implement biometric readers on laptops and restricted areas.
D. Install security cameras in areas containing sensitive systems.
Implement biometric readers on laptops and restricted areas.
Implement biometric readers on laptops and restricted areas.
IPSec
Which of the following is the BEST method to use when preventing a cross-site scripting attack on
a Human Resource systemA. Require all data be filtered through a web application firewall.
B. Restrict permitted HTML encoding to a limited subset of tags and attributes.
C. Provide user education on the threat of cross-site scripting.
D. Input validation upon arrival at the server.
Input validation upon arrival at the server.
Jane’s, a user, word processing software is exhibiting strange behavior, opening and closing itself
at random intervals. There is no other strange behavior on the system. Which of the following
would mitigate this problem in the futureA. Install application updates
B. Encrypt the file system
C. Install HIDS
D. Install anti-spam software
Install application updates
Jane, a user, has an IP address of 172.16.24.43 and visits a website which states that she has an
IP address of 204.211.38.89. Which of the following is being used on the network? (Select TWO).
A. NAT
B. NAC
C. Spoofing
D. DMZ
E. VLANs
F. PAT
NAT
PAT
Which of the following data loss prevention strategies mitigates the risk of replacing hard drives
that cannot be sanitizedA. Visualization
B. Patch management
C. Full disk encryption
D. Database encryption
Full disk encryption
Which of the following is characterized by Matt, an attacker, attempting to leave identificationmarkings for open wireless access pointsA. Initialization vector
B. War chalking
C. Packet sniffing
D. War driving
War chalking
Which of the following can Matt, a security administrator, implement to support confidentiality and
integrityA. PKI
B. Non-repudiation
C. Digital signatures
D. Recovery agents
PKI
Which of the following can Pete, an administrator, use to verify that a downloaded file was not
corrupted during the transferA. NTLM tag
B. LANMAN hash
C. MD5 checksum
D. SHA summary
MD5 checksum
Planning what traffic will be separated, assigning tags, and configuring routing are part of
configuring which of the followingA. IPSec
B. ACL
C. NAT
D. VLAN
VLAN
Jane, an employee, receives an error on an encrypted laptop, making the laptop un-bootable.
Jane now cannot access any files on the laptop. The desktop technician is unable to recover the
key from the computer and will have to inform Jane that the files are now unrecoverable. Which of
the following would have prevented Jane from losing access to the filesA. Certificate Authority
B. Private keys
C. Public keys
D. Key escrow
Key escrow
Which of the following combines authentication and authorization, and does not use the TCP
protocolA. RADIUS
B. Kerberos
C. LDAP
D. TACACS+
RADIUS
Which of the following occurs when two access points share the same SSID broadcast where one
access point is used to capture dataA. Rogue access point
B. Bluesnarfing
C. Evil twin
D. Packet sniffing
Evil twin
Pete and Jane, users in a financial office are reporting that they are not being asked for
credentials anymore when successfully connecting to the company wireless. All other offices are
still being authenticated on the wireless. Which of the following is this an example ofA. Evil twin
B. Interference
C. IV attack
D. War driving
Evil twin
Which of the following is BEST described by a scenario where management chooses to implement
security controls to lessen the impact of a given riskA. Avoidance
B. Transference
C. Deterrence
D. Mitigation
Mitigation
A recent network attack caused several random computers to malfunction, even though those
computers had the latest updates and patches applied. Which of the following describes this type
of attackA. Targeted
B. DDoS
C. Zero day
D. Buffer overflow
Buffer overflow
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security
gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the
tethered connection and corporate data is stolen. Which of the following would BEST prevent this
from occurring againA. Disable the wireless access and implement strict router ACLs
B. Reduce restrictions on the corporate web security gateway
C. Security policy and threat awareness training
D. Perform user rights and permissions reviews
Security policy and threat awareness training
Sara makes a phone call to the help desk pretending to be Jane. Sara states that she has
forgotten her password and asks that it be reset to 12345. Which of the following is Sara
performingA. Shoulder surfing
B. Impersonation
C. Dumpster diving
D. Tailgating
Impersonation
Which of the following default network ports is used by FTPA. 20
B. 22
C. 23
D. 25
20
A company recently installed a load balancer for their servers. The company is MOST concerned
with:
A. Integrity
B. Availability
C. Authentication
D. Confidentiality
Availability
Which of the following pseudocodes MOST likely prevents buffer overflowsA. If input contains < or > then escape the character and execute the program with user input
B. If input is less than 100 characters, then prompt for input again
C. If input contains then remove and execute program with user input
D. If input is greater than 1000 characters then truncate input
If input is greater than 1000 characters then truncate input
Which of the following is usually encrypted when stored or transmittedA. CRL
B. Private key
C. Root certificate
D. Public key
Private key
Which of the following could Jane, a security administrator, implement to mitigate the risk of
tailgating for a large organizationA. Train employees on correct data disposal techniques and enforce policies.
B. Only allow employees to enter or leave through one door at specified times of the day.
C. Only allow employees to go on break one at a time and post security guards 24/7 at each
entrance.
D. Train employees on risks associated with social engineering attacks and enforce policies.
Train employees on risks associated with social engineering attacks and enforce policies.
Pete, a security administrator, implemented design changes and moved certain servers into a
dedicated area that is accessible from the outside network, yet separated from the internal
network. Which of the following did Pete implementA. NAC
B. NAT
C. DMZ
D. VLAN
DMZ
While placing an order at an online bookstore, Sara, a user, enters her correct credentials and is
immediately presented with a pop-up window requesting her username and password again.
Which of the following has MOST likely occurredA. LDAP injection attack
B. Evil twin attack
C. Phishing attack
D. SQL injection attack
Phishing attack
Identifying a list of all approved software on a system is a step in which of the following practicesA. Passively testing security controls
B. Application hardening
C. Host software baselining
D. Client-side targeting
Host software baselining
Pete, an administrator, captures traffic sent between a router and a monitoring server on port 161.
The packet payload contains the strings ‘PUBLIC and ‘PRIVATE1. Which of the following was
MOST likely used to capture this trafficA. Vulnerability scanner
B. Protocol analyzer
C. SNMPv3
D. SNMPv2c
Protocol analyzer
Which of the following is BEST utilized to identify common misconfigurations throughout the
enterpriseA. Vulnerability scanning
B. Port scanning
C. Penetration testing
D. Black box
Vulnerability scanning
Which of the following malware types typically allows Pete, an attacker, to monitor a user’s
computer, is characterized by a drive-by download, and requires no user interactionA. Virus
B. Logic bomb
C. Spyware
D. Adware
Spyware
Which of the following BEST describes a common security concern for cloud computingA. Data may be accessed by third parties who have compromised the cloud platformB. Antivirus signatures are not compatible with virtualized environments
C. Network connections are too slow
D. CPU and memory resources may be consumed by other servers in the same cloud
Data may be accessed by third parties who have compromised the cloud platform
Which of the following is the MOST secure authentication protocolA. CHAP
B. PEAP
C. EAP
D. LEAP
PEAP
Which of the following policies could be implemented to help prevent users from displaying their
login credentials in open view for everyone to seeA. Privacy
B. Clean desk
C. Job rotation
D. Password complexity
Clean desk
Which of the following should Sara, a security technician, create to articulate the requirements for
what is and what is not condoned on company systemsA. Acceptable usage policy
B. Retention policy
C. Privacy policy
D. Access control policy
Acceptable usage policy
Users have reported that when they go to the company website they are sent to a competitor’s site
instead. Which of the following is the MOST likely explanationA. Someone has employed ARP poisoning against the company.
B. Someone has employed DNS poisoning against the company.
C. Someone has accidentally unplugged the company’s web server.
D. The competitor has a more powerful web server.
Someone has employed ARP poisoning against the company.
Sara, an IT Administrator, wants to make sure that only certain devices can connect to the
wireless network. Which of the following can she implement to accomplish this taskA. MAC filtering
B. Increase the power levels of the WAP
C. Dynamic DHCP
D. Disable SSID broadcast
MAC filtering
Which of the following is BEST used to determine the source of a network bottleneckA. Sniffer
B. Router
C. Firewall
D. Switch
Sniffer
Sara, a system administrator, installed new database software and notices that after running port
scan on the server port 21 is now open. The database does not use any type of file transfer
program. Which of the following would reduce the amount of unnecessary services being usedA. NIPS
B. Application hardening
C. NIDS
D. Application base lining
Application hardening
Matt, the administrator, spots a sustained spike in disk activity and CPU utilization; network activity
looks normal. Which of the following might this indicateA. This server is now a member of a botnet.
B. There is a virus infecting the server.
C. There is a smurf attack occurring on the server.
D. Users are copying more files from the server than normal.
There is a virus infecting the server.
Matt, the security administrator, has changed the default settings on a Web server, removing
certain files and directories. This is an example of which of the followingA. Application configuration baseline
B. Application hardening
C. Cross-site scripting prevention
D. Application patch management
Application hardening
Biometrics includes the use of which of the following authentication methodsA. Single sign-on
B. Retinal scan
C. Common access card
D. ACLs
Retinal scan
Pete, the security administrator, wants to implement password controls to mitigate attacks based
on password reuse. Which of the following password controls used together BEST accomplishes
this? (Select TWO).
A. Minimum password age and password history
B. Password complexity and password history
C. Password history and password expiration
D. Password complexity and password expiration
E. Maximum password age and password expiration
Minimum password age and password history
Password history and password expiration
A company that trains their users to lock the doors behind them is MOST likely trying to prevent:
A. Vishing attacks
B. Dumpster diving
C. Shoulder surfing
D. Tailgating
Tailgating
Jane, a security administrator, forgets his card to access the server room. Jane asks Matt if she
could use his card for the day. Which of the following is Jane using to gain access to the server
roomA. Man-in-the-middle
B. Tailgating
C. Impersonation
D. Spoofing
Impersonation
During a forensic investigation, which of the following information is compared to verify the
contents of a hard drive image match the original drive and have not been changed by the imaging
processA. Hash values
B. Chain of custody
C. Order of volatility
D. Time offset
Hash values
Jane brought a laptop in from home and connected the Ethernet interface on the laptop to a wall
jack with a patch cable. Jane was unable to access any network resources. Which of the following
is the MOST likely causeA. Flood guards were enabled on the switch.
B. Loop protection prevented the laptop from accessing the network.
C. Port security was enabled on the switch.
D. Router access control lists prevented the laptop from accessing the network.
Port security was enabled on the switch.
Matt, a new employee, installed an application on his workstation that allowed Internet users to
have access to his workstation. Which of the following security related training could have
mitigated this actionA. Use of proper password procedures
B. Use of personally owned devices
C. Use of social networking and P2P networks
D. Use of clean desk policies
Use of social networking and P2P networks
Which of the following threats can result from a lack of controls for personal webmailA. Bandwidth exhaustion
B. Cross-site request forgery
C. Data leakage
D. Least privilege
Data leakage
Which of the following is identified by the command: INSERT INTO users (“admin”, “admin”);’A. SQL Injection
B. Directory traversal
C. LDAP injection
D. Session hijacking
SQL Injection
Which of the following attacks is MOST likely to be performed against an FTP serverA. DLL injection
B. SQL injection
C. LDAP injection
D. Command injection
Command injection
After performing a port scan, Sara, a network administrator, observes that port 443 is open. Which
of the following services is MOST likely runningA. SSL
B. FTP
C. TELNET
D. SSH
SSL
Establishing a published chart of roles, responsibilities, and chain of command to be used during a
disaster is an example of which of the followingA. Fault tolerance
B. Succession planning
C. Business continuity testing
D. Recovery point objectives
Succession planning
Matt, a security administrator, conducted a scan and generated a vulnerability report for the Chief
Executive Officer (CEO). The vulnerability report indicated several vulnerabilities but the CEO has
decided that cost and operational impact outweigh the risk. This is an example of which of the
followingA. Risk transference
B. Risk acceptance
C. Risk avoidance
D. Risk mitigation
Risk acceptance
A good password policy should contain which of the following rules? (Select THREE)
A. Length
B. Expiration
C. Tokens
D. Smart card
E. Enrollment
F. Complexity
G. Biometrics
Length
Expiration
Complexity
Jane, a security administrator, identifies a WEP-encrypted WAP on the network that is located at
the end of the building. Jane has noticed that it is the most utilized WAP on the network. When
trying to manage the WAP, she is unable to gain access. Which of the following has MOST likely
happened to the WAPA. The WAP is under an IV attack
B. The WAP’s MAC address has been spoofed
C. The WAP is a rogue access point
D. The WAP was victim to a bluejacking attack
The WAP is a rogue access point
Jane, a human resources employee, receives an email from a family member stating there is a
new virus going around. In order to remove the virus, a user must delete the Boot.ini file from the
system immediately. This is an example of which of the followingA. Hoax
B. Spam
C. Whaling
D. Phishing
Hoax
A network IPS is used for which of the followingA. To identify and document network based intrusions and network traffic
B. To document and analyze network visualization threats and performance
C. To identify and prevent network based intrusions or unwanted network traffic
D. To document and analyze malware and viruses on the Internet
To identify and prevent network based intrusions or unwanted network traffic
A risk is identified that an attacker, given the right credentials, could potentially connect to the
corporate network from a nearby business’s parking lot. Which of the following controls can be put
in place to reduce the likelihood of this occurring? (Select TWO).
A. TKIP
B. Antenna placement
C. Power level controls
D. WPA
E. WPA2
F. Disable SSID broadcasting
WPA2
Disable SSID broadcasting
Which of the following could cause a browser to display the message below”The security certificate presented by this website was issued for a different website’s address.”
A. The website certificate was issued by a different CA than what the browser recognizes in its
trusted CAs.
B. The website is using a wildcard certificate issued for the company’s domain,
C. HTTPS://127.0.01 was used instead of HTTPS://localhost.
D. The website is using an expired self signed certificate.
HTTPS://127.0.01 was used instead of HTTPS://localhost.
Sara, an administrator, is hardening email application communication to improve security. Which
of the following could be performedA. Remove gateway settings from the route table
B. Password protect the server BIOS
C. Disabling high I/O services
D. Require TLS when using SMTP
Require TLS when using SMTP
Which of the following increases proper airflow in a datacenterA. Humidity controls
B. Video monitoring
C. Temperature controls
D. Hot and cold aisles
Hot and cold aisles
Jane, an IT security technician, needs to create a way to secure company mobile devices. Which
of the following BEST meets this needA. Implement voice encryption, pop-up blockers, and host-based firewalls.
B. Implement firewalls, network access control, and strong passwords.
C. Implement screen locks, device encryption, and remote wipe capabilities.
D. Implement application patch management, antivirus, and locking cabinets.
Implement screen locks, device encryption, and remote wipe capabilities.
In which of the following orders should Jane, an administrator, capture a system’s data for
forensics investigationA. Hard disk, swap file, system memory, CPU cache
B. CPU cache, system memory, swap file, hard disk
C. System clock, flash BIOS, memory, hard disk
D. Flash BIOS, system memory, swap file, hard disk
CPU cache, system memory, swap file, hard disk
CPU cache, system memory, swap file, hard disk
A public key
A private key
Which of the following would MOST likely ensure that swap space on a hard disk is encryptedA. Database encryption
B. Full disk encryption
C. Folder and file encryption
D. Removable media encryption
Full disk encryption
Which of the following can be utilized in order to provide temporary IT support during a disaster,
where the organization sets aside funds for contingencies, but does not necessarily have a
dedicated site to restore those servicesA. Hot site
B. Warm site
C. Cold site
D. Mobile site
Mobile site
Which of the following, when used on a file, creates a non-reversible numeric representation of the
file’s compositionA. AES
B. SHA
C. 3DES
D. RC4
SHA
Banning of personally owned electronic devices at work BEST strengthens which of the following
security principlesA. Encourages hard drive encryption
B. Impedes shoulder surfing
C. Prevention of data leakage
D. Decreases workplace disruption
Prevention of data leakage
Implementation of routine file hash validation is an example of which of the following security
conceptsA. Vulnerability
B. Confidentiality
C. Integrity
D. Availability
Integrity
Which of the following is the BEST method for ensuring all files and folders are encrypted on all
corporate laptops where the file structures are unknownA. Folder encryption
B. File encryption
C. Whole disk encryption
D. Steganography
Whole disk encryption
A company is installing a new security measure that would allow one person at a time to be
authenticated to an area without human interaction. Which of the following does this describeA. Fencing
B. Mantrap
C. A guard
D. Video surveillance
Mantrap
Which of the following provides authentication, authorization, and accounting servicesA. PKI
B. WPA2
C. NTLMv2
D. RADIUS
RADIUS
Which of the following should be considered when implementing WPA vs. WPA2A. LEAP vs. PEAP
B. SSID vs. MAC
C. SHA1 vs. MD5
D. CCMP vs. TKIP
CCMP vs. TKIP
A popular software application is used on all company workstation desktop and laptop computers.Which of the following is the BEST patch management processA. The patch management software should be approved by the change management group to
ensure adherence to corporate policies.
B. The Chief Information Officer should approve and centrally deploy the patch to all company
workstations in a staggered manner.
C. Users should individually download and verify the patch with an MD5 checksum utility before
applying it to their own workstation.
D. The support team should receive vendor update notifications and deploy patches in test
environment before deploying to workstations.
The support team should receive vendor update notifications and deploy patches in test
environment before deploying to workstations.
Which of the following network protocols transmits a user’s credentials in clear-text? (Select
TWO).
A. SSH
B. HTTPS
C. SCP
D. Telnet
E. FTP
F. TFTP
HTTPS
Telnet
Data classification and labeling is an example of:
A. Preventative administrative control
B. Deterrent technical control
C. Preventative technical control
D. Deterrent administrative control
Preventative administrative control
Jane, a security administrator, must be able to identify and validate every use of local
administrative accounts across a large number of Windows and Linux servers. Which of the
following offers the BEST solutionA. Modify the system baseline to increase log retention and enable a host firewall
B. Monitor LDAP and Active Directory for the use of Administrative accounts
C. Add or enable a NIDS signature for administrative activity
D. Implement centralized log collection for each server and define a log review process
Monitor LDAP and Active Directory for the use of Administrative accounts
Which of the following is MOST likely used to establish a secure connection between email
gatewaysA. TLS
B. PGP
C. HTTPS
D. SCP
TLS
Which of the following describes how Pete, an employee, gains access to a location by entering
with a fellow co-worker and not using his own credentialsA. Impersonation
B. Tailgating
C. Evil twin
D. Shoulder surfing
Tailgating
Sara, a security administrator, examines a network session to a compromised database server
with a packet analyzer. Within the session there is a repeated series of the hex character 90 (x90).
Which of the following attack types has occurredA. Buffer overflow
B. Cross-site scripting
C. XML injection
D. SQL injection
Buffer overflow
When employees that use certificates leave the company they should be added to which of the
followingA. PKI
B. CA
C. CRL
D. TKIP
CRL
Which of the following should Matt, a security technician, implement to identify untrusted
certificatesA. CA
B. PKI
C. CRL
D. Recovery agent
CRL
Jane, a security analyst, noticed an increase in malware infections on a user’s system. She
identified an email that requests the user change her password. This attack would BEST be
described as which of the followingA. Phishing
B. Spoofing
C. Privilege escalation
D. Shoulder surfing
Phishing
A corporate datacenter operates in a humid area near an ocean and often has hardware failures.
Which of the following controls would help prevent these issuesA. Fire suppression
B. HVAC
C. RAID
D. Cold aisles
HVAC
When Pete, a security administrator, cannot verify who provided a hard drive image, then:
A. Chain of custody is preserved
B. The image must be rehashed
C. The hash must be verified
D. Chain of custody is destroyed
Chain of custody is destroyed
If Sara, an attacker, is attempting to determine the operating system using banner information,
which of the following techniques could she be usingA. Whois lookup
B. nslookup
C. Port scanning
D. Fingerprinting
Fingerprinting
Pete, an administrator, is creating a new security policy and must consider many stakeholders as
well as current regulations, and the company direction. For the BEST success in policy roll out,
which stakeholder is the MOST important for Pete to considerA. End users
B. Information security team
C. Senior leadership team
D. Customers and vendors
Senior leadership team
Which of the following is an encapsulated authentication protocolA. CCMP
B. LEAP
C. TKIP
D. WEP
LEAP
Which of the following is a layer three protocol used for VPN connectionsA. SSH
B. ICMP
C. IPSec
D. SSL
IPSec
Which of the following can Matt, a security administrator, implement on a mobile device to help
prevent a conversation from being picked up on another deviceA. Bluetooth
B. Screen locks
C. Strong passwords
D. Voice encryption
Voice encryption
When a username is checked against an access list, which of the following does it provideA. Identification and authentication
B. Identification and authorization
C. Authentication and authorization
D. Authentication and integrity
Identification and authentication
A network device that protects an enterprise based only on source and destination addresses is
BEST described as:
A. IDS
B. ACL
C. Stateful packet filtering
D. Simple packet filtering
Simple packet filtering
Which of the following terms is used to describe predictable failure points for equipment or
servicesA. RTO
B. MTTR
C. RPO
D. MTBF
MTBF
Which of the following account policies would Sara, a security administrator, implement to disable
a user’s account after a certain period of timeA. Lockout
B. Expiration
C. Complexity
D. Recovery
Expiration
Highly sensitive data is stored in a database and is accessed by an application on a DMZ server.
The disk drives on all servers are fully encrypted. Communication between the application server
and end-users is also encrypted. Network ACLs prevent any connections to the database server
except from the application server. Which of the following can still result in exposure of the
sensitive data in the database serverA. SQL Injection
B. Theft of the physical database server
C. Cookies
D. Cross-site scripting
SQL Injection
Matt, the security administrator, is implementing a new design to minimize the footprint in the
datacenter and reduce the amount of wasted resources without losing physical control of the
equipment. Which of the following would Matt need to implementA. Visualization
B. Cloud computing
C. New ACLs
D. VLAN management
Visualization
A third party application has the ability to maintain its own user accounts or it may use single signon.
To use single sign-on, the application is requesting the following information: OU=Users,
DC=Domain, DC=COM. This application is requesting which of the following authentication
servicesA. TACACS+
B. RADIUS
C. LDAP
D. Kerberos
LDAP
Which of the following can grant access based solely on TCP/IP informationA. Time of day restrictions
B. Implicit deny
C. ACLs
D. Least privilege
ACLs
Which of the following should Sara, a technician, apply to prevent guests from plugging in their
laptops and accessing the company networkA. Secure router configuration
B. Port security
C. Sniffers
D. Implicit deny
Port security
Pete, the Chief Security Officer (CSO), is concerned about misuse of company assets and wishes
to determine who may be responsible. Which of the following would be the BEST course of
actionA. Create a single, shared user account for every system that is audited and logged based upon
time of use.
B. Implement a single sign-on application on equipment with sensitive data and high-profile
shares.
C. Enact a policy that employees must use their vacation time in a staggered schedule.
D. Separate employees into teams led by a person who acts as a single point of contact for
observation purposes.
Enact a policy that employees must use their vacation time in a staggered schedule.
Jane, a user, has attempted to enter her username and password three times unsuccessfully.
Jane receives a message to try again in one hour. This is an example of which of the followingA. Account expiration
B. Account recovery
C. Account lockout
D. Account disablement
Account lockout
Sara, an attacker, tricks a user into authenticating to a fake wireless network and then inserts
malicious code into strings as the user passes by. Which of the following describes this attackA. SQL injection
B. Malicious insider
C. Evil twin
D. User impersonation
Evil twin
Which of the following is a vulnerability associated with disabling pop-up blockersA. An alert message from the administrator may not be visible
B. A form submitted by the user may not open
C. The help window may not be displayed
D. Another browser instance may execute malicious code
Another browser instance may execute malicious code
Due to limited resources, a company must reduce their hardware budget while still maintaining
availability. Which of the following would MOST likely help them achieve their objectivesA. Visualization
B. Remote access
C. Network access control
D. Blade servers
Visualization
Jane, a security administrator, has been tasked with explaining authentication services to the
company’s management team. The company runs an active directory infrastructure. Which of the
following solutions BEST relates to the host authentication protocol within the company’s
environmentA. Kerberos
B. Least privilege
C. TACACS+
D. LDAP
Kerberos
Which of the following incident response procedures BEST allows Sara, the security technician, to
identify who had possession of a hard drive prior to forensics analysisA. Chain of custody
B. Tracking man hours
C. Witnesses
D. Capturing system images
Chain of custody
Ticket-Granting-Tickets (TGTs) are common in which of the following authentication schemesA. LDAP
B. RADIUS
C. Kerberos
D. TACACS+
Kerberos
Sara, a security administrator, implemented design changes which allowed for greater availability
of IP addresses. Which of the following did Sara implementA. Subnetting
B. DMZ
C. PAT
D. VLAN
PAT
Jane, an IT security administrator, is attempting to implement PKI within her organization. Which
of the following BEST explains why the company needs PKIA. The company needs PKI because the organization is based on trust models with many external
organizations.
B. The company needs PKI because they need the ability to encrypt messages with centralized
verification.
C. The company needs PKI because there is insufficient key escrow for outsourced SSL
certificates.
D. The company needs PKI because it only has one recovery agent within the company.
The company needs PKI because they need the ability to encrypt messages with centralized
verification.
Which of the following BEST prevents collusionA. Separation of duties
B. Signal sign-on
C. Mandatory vacations
D. Job rotation
Mandatory vacations
Which of the following allows Pete, a security technician, to recover from a loss of staff after an
earthquakeA. Business continuity plan
B. Continuity of operations
C. Disaster recovery
D. Succession planning
Succession planning
Jane, an administrator, values transport security strength above network speed when
implementing an SSL VPN. Which of the following encryption ciphers would BEST meet her
needsA. SHA256
B. RC4
C. 3DES
D. AES128
D. AES128
Which of the following is an authentication method that can be secured by using SSLA. RADIUS
B. LDAP
C. TACACS+
D. Kerberos
LDAP
Which of the following is a symmetrical key block cipher that encrypts MOST quicklyA. 3DES
B. RSA
C. Blowfish
D. SHA256
E. Diffie-Hellman
SHA256
Which of the following would BEST meet a server authentication requirement for a wireless
network, but the network has no PKI in placeA. PEAP
B. PAP
C. EAP-TLS
D. LEAP
LEAP
Which of the following can be used to determine which services may be running on a host, but not
if they are exploitableA. Baseline analyzer
B. Port scanner
C. Virus scanner
D. Vulnerability scanner
Port scanner
Which of the following, when incorporated into a disk encryption solution, adds the MOST
securityA. SHA256 hashing
B. Password complexity requirement
C. HMAC
D. Trusted platform module
Trusted platform module
Upon inspecting sniffer traffic, Jane, a technician, observes an entry that originates from port TCP
53422 with a destination of TCP 22. Which of the following protocols is MOST likely in useA. HTTP
B. HTTPS
C. SSH
D. DNS
SSH
Role-based access control is BEST defined as an authorization system by which:
A. Privileges are granted to persons based on membership in one or more functional groups.
B. A separate user account is created for each functional role a person has.
C. Access is limited to the time of day a person is expected to work.
D. Privileges are assigned to each person based upon authorized requests.
Privileges are granted to persons based on membership in one or more functional groups.
Which of the following fire suppression systems should be used in a datacenter that will put out the
fire and not cause physical harm to equipment and dataA. Water
B. Halon
C. Oxygen
D. Foam
Halon
In order to enter a corporate office, employees must enter a PIN. Which of the following are
common risks when using this type of entry system? (Select TWO)
A. Shoulder surfing
B. Key logging
C. Tailgating
D. Man-in-the-middle attacks
E. Dumpster diving
Shoulder surfing
Tailgating
Which of the following is often used to verify connectivity on a network?A. DNS
B. DHCP
C. ICMP
D. NAC
ICMP
Which of the following is BEST identified as an attack where a large number of users are fooled
into entering user credentials into a fake websiteA. Pharming
B. Whaling
C. Phishing
D. Privilege escalation
Pharming
Sara, a student, is interested in learning about distributed denial of service attacks. Which of the
following types of malware is MOST likely the primary focus of her studyA. Botnets
B. Logic bombs
C. Spyware
D. Trojans
Botnets
Which of the following BEST describes a
DMZA. A subnet that allows all outbound activity
B. A network that allows all inbound traffic
C. A transitional subnet that screens all traffic
D. A subnet that denies all inbound connectivity
A transitional subnet that screens all traffic
Following the order of volatility, taking hashes, and maintaining a chain of custody describes which
of the followingA. Forensics
B. Incident response
C. Business continuity
D. Disaster recovery
Forensics
Which of the following is an example of a false negativeA. The IDS does not identify a buffer overflow
B. Anti-virus identifies a benign application as malware.
C. Anti-virus protection interferes with the normal operation of an application.
D. A user account is locked out after the user mistypes the password too many times.
A user account is locked out after the user mistypes the password too many times.
Sara and Jane, users, are reporting an increase in the amount of unwanted email that they are
receiving each day. Which of the following would be the BEST way to respond to this issue without
creating a lot of administrative overheadA. Deploy an anti-spam device to protect the network.
B. Update the anti-virus definitions and make sure that it is set to scan all received email
C. Set up spam filtering rules in each user’s mail client.
D. Change the firewall settings to block SMTP relays so that the spam cannot get in.
Deploy an anti-spam device to protect the network.
Which of the following is similar to a smurf attack, but uses UDP instead to ICMPA. X-Mas attack
B. Fraggle attack
C. Vishing
D. Man-in-the-middle attack
Fraggle attack
Which of the following could be applied on a router in order to permit or deny certain portsA. Port security
B. Subnetting
C. Access control lists
D. Network address translation
Access control lists
Pete, a security administrator, wants to secure remote telnet services and decides to use the
services over SSH. Which of the following ports should Pete allow on the firewall by defaultA. 21
B. 22
C. 23
D. 25
22
Which of the following accurately describes the STRONGEST multifactor authenticationA. Something you are, something you haveB. Something you have, something you know
C. Something you are near to, something you have
D. Something you have, someone you know
Something you are, something you have
Which of the following is the BEST solution to securely administer remote serversA. SCP
B. SSH
C. Telnet
D. SFTP
SSH
A company has sent all of its private keys to a third party. The third party company has created a
secure list of these keys. Which of the following has just been implementedA. Key escrow
B. CRL
C. CA
D. Recovery agent
Key escrow
Which of the following authentication protocols forces centralized wireless authenticationA. WPA2-Personal
B. WPA2-Enterprise
C. WPA2-CCMP
D. WPA2-TKIP
WPA2-Enterprise
The fundamental information security principals include confidentiality, availability and which of the
followingA. The ability to secure data against unauthorized disclosure to external sources
B. The capacity of a system to resist unauthorized changes to stored information
C. The confidence with which a system can attest to the identity of a user
D. The characteristic of a system to provide uninterrupted service to authorized users
The capacity of a system to resist unauthorized changes to stored information
Which of the following risks could IT management be mitigating by removing an all-in-one deviceA. Continuity of operations
B. Input validation
C. Single point of failure
D. Single sign on
Single point of failure
Social networking sites are used daily by the marketing team for promotional purposes. However,
confidential company information, including product pictures and potential partnerships, have been
inadvertently exposed to the public by dozens of employees using social networking sites. Which
of following is the BEST response to mitigate this threat with minimal company disruptionA. Mandate additional security awareness training for all employees.
B. Report each employee to Human Resources for termination for violation of security policies
C. Implement a data loss prevention program to filter email.
D. Block access to social networking sites from the corporate network
Mandate additional security awareness training for all employees.
A computer is put into a restricted VLAN until the computer’s virus definitions are up-to-date.
Which of the following BEST describes this system typeA. NAT
B. NIPS
C. NAC
D. DMZ
NAC
Sara, an IT administrator, wants to protect a cluster of servers in a DMZ from zero day attacks.
Which of the following would provide the BEST level of protectionA. NIPS
B. NIDS
C. ACL
D. Antivirus
NIPS
Which of the following inspects traffic entering or leaving a network to look for anomalies against
expected baselines?
IPS
Which of the following BEST describes a software vulnerability that is actively being used by Sara
and Jane, attackers, before the vendor releases a protective patch or updateA. Buffer overflow
B. IV attack
C. Zero day attack
D. LDAP injection
Zero day attack
Which of the following BEST allows Pete, a security administrator, to determine the type, source,
and flags of the packet traversing a network for troubleshooting purposesA. Switches
B. Protocol analyzers
C. Routers
D. Web security gateways
Protocol analyzers
Sara, an attacker, is recording a person typing in their ID number into a keypad to gain access to
the building. Sara then calls the helpdesk and informs them that their PIN no longer works and
would like to change it. Which of the following attacks occurred LASTA. Phishing
B. Shoulder surfing
C. Impersonation
D. Tailgating
Impersonation
Sara, a security administrator, is noticing a slow down in the wireless network response. Sara
launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which
of the following type of attacks is underwayA. IV attack
B. Interference
C. Blue jacking
D. Packet sniffing
IV attack
Which of the following would Pete, a security administrator, change to limit how far a wireless
signal will travelA. SSID
B. Encryption methods
C. Power levels
D. Antenna placement
Power levels
Which of the following ports should be open in order for Sara and Pete, users, to identify websites
by domain nameA. TCP 21
B. UDP22
C. TCP 23
D. UDP 53
UDP 53
Sara, an administrator, suspects a denial of service attack on the network, but does not know
where the network traffic is coming from or what type of traffic it is. Which of the following would
help Sara further assess the situationA. Protocol analyzer
B. Penetration testing
C. HTTP interceptor
D. Port scanner
Protocol analyzer
Sara, a security administrator, has configured a trusted OS implementation on her servers. Which
of the following controls are enacted by the trusted OS implementationA. Mandatory Access Controls
B. Time-based Access Controls
C. Discretionary Access Controls
D. Role Based Access Controls
Mandatory Access Controls
Which of the following ports would be blocked if Pete, a security administrator, wants to deny
access to websitesA. 21
B. 25
C. 80
D. 3389
80
Pete, the security administrator, is implementing a web content fitter. Which of the following is the
MOST important design consideration in regards to availabilityA. The number of filter categories
B. Other companies who are using the system
C. Fail state of the system
D. The algorithm of the filtering engine
Fail state of the system
Which of the following is where an unauthorized device is found allowing access to a networkA. Bluesnarfing
B. Rogue access point
C. Honeypot
D. IV attack
Rogue access point
When used alone, which of the following controls mitigates the risk of Sara, an attacker, launching
an online brute force password attackA. Account expiration
B. Account lockout
C. Password complexity
D. Password length
Account lockout
Pete, a security engineer, is trying to inventory all servers in a rack. The engineer launches RDP
sessions to five different PCs and notices that the hardware properties are similar. Additionally, the
MAC addresses of all five servers appear on the same switch port. Which of the following is MOST
likely the causeA. The system is running 802.1 x
B. The system is using NAC
C. The system is in active-standby mode
D. The system is virtualized
The system is virtualized
Which of the following security concepts establishes procedures where creation and approval are
performed through distinct functionsA. Discretionary access control
B. Job rotation
C. Separation of duties
D. Principle of least privilege
Separation of duties
While traveling Matt, an employee, decides he would like to download some new movies onto his
corporate laptop. While installing software designed to download movies from multiple computers
across the Internet. Matt agrees to share portions of his hard drive. This scenario describes one of
the threats involved in which of the following technologiesA. Social networking
B. ALE
C. Cloud computing
D. P2P
P2P
Which of the following is an attack where Pete spreads USB thumb drives throughout a bank’s
parking lot in order to have malware installed on the banking systemsA. Tailgating
B. Replay attack
C. Virus
D. Social engineering
Social engineering
Pete, a security administrator, has configured and implemented an additional public intermediate
CA. Which of the following must Pete submit to the major web browser vendors in order for the
certificates, signed by this intermediate, to be trustedA. Die root CA’s private key
B. The root CA’s public key
C. The intermediate CA’s public key
D. The intermediate CA’s private key
The intermediate CA’s public key
Which of the following is BEST described by a scenario where organizational management
chooses to implement an internal Incident Response Structure for the businessA. Deterrence
B. Separation of duties
C. Transference
D. Mitigation
Mitigation
A data loss prevention strategy would MOST likely incorporate which of the following to reduce the
risk associated with data lossA. Enforced privacy policy, encryption of VPN connections, and monitoring of communications
entering the organization.
B. Enforced acceptable usage policy, encryption of confidential emails, and monitoring of
communications leaving the organization.
C. Enforced privacy policy, encryption of VPN connections, and monitoring of communications
leaving the organization.
D. Enforced acceptable usage policy, encryption of confidential emails, and monitoring of
communications entering the organization.
Enforced acceptable usage policy, encryption of confidential emails, and monitoring of
communications leaving the organization.
In a wireless network, which of the following components could cause too much coverage, too little coverage, and interferenceA. MAC filter
B. AP power levels
C. Phones or microwaves
D. SSID broadcasts
AP power levels
Which of the following has a default port of 22A. SSH
B. FTP
C. TELNET
D. SCAP
FTP
The public key is used to perform which of the following? (Select THREE).
A. Validate the CRL
B. Validate the identity of an email sender
C. Encrypt messages
D. Perform key recovery
E. Decrypt messages
F. Perform key escrow
Validate the identity of an email sender
Encrypt messages
Decrypt messages
Pete, a network administrator, implements the spanning tree protocol on network switches. Which
of the following issues does this addressA. Flood guard protection
B. ARP poisoning protection
C. Loop protection
D. Trunking protection
Loop protection
Matt, a security administrator, has noticed that the website and external systems have been
subject to many attack attempts. To verify integrity of the website and critical files, Matt should:
A. Require all visitors to the public web home page to create a username and password to view
the pages in the website
B. Configure the web application firewall to send a reset packet to the incoming IP from where an
attack or scan signature has been detected.
C. Create file hashes for website and critical system files, and compare the current file hashes to
the baseline at regular time intervals.
D. Reboot the web server and database server nightly after the backup has been completed.
Create file hashes for website and critical system files, and compare the current file hashes to
the baseline at regular time intervals.
Matt, the administrator, has been told to confirm what account an email was sent from. Which of
the following is this an example ofA. Surveillance
B. E-discovery
C. Chain of custody
D. Integrity
E-discovery
Which of the following BEST describes a denial of service attackA. Sara, the attacker, attempts to have the receiving server run a payload using programming
commonly found on web servers.
B. Sara, the attacker, overwhelms a system or application, causing it to crash and bring the server
down to cause an outage.
C. Sara, the attacker, overwhelms a system or application, causing it to crash, and then redirects
the memory address to read from a location holding the payload.
D. Sara, the attacker, attempts to have the receiving server pass information to a back-end
database from which it can compromise the stored information.
Sara, the attacker, overwhelms a system or application, causing it to crash and bring the server
down to cause an outage.
The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of
the following would BEST achieve the CIO’s goalA. Host based firewall
B. Host based IDS
C. Anti-virus
D. Anti-spyware
Host based firewall
Matt, a server administrator, sets up database forms based on security rating levels. If a user has
the lowest security rating then the database automatically determines what access that user has.
Which of the following access control methods does this describeA. Mandatory access control
B. Role based access control
C. Rule based access control
D. Discretionary access control
Mandatory access control
Which of the following is a best practice when securing a switch from physical accessA. Disable unnecessary accounts
B. Print baseline configuration
C. Enable access lists
D. Disable unused ports
Disable unused ports
Pete, a security administrator, has observed repeated attempts to break into the network. Which of
the following is designed to stop an intrusion on the networkA. NIPS
B. HIDS
C. HIPS
D. NIDS
NIPS
Jane, an IT security technician working at a bank, has implemented encryption between two
locations. Which of the following security concepts BEST exemplifies the protection provided by
this exampleA. Integrity
B. Confidentiality
C. Cost
D. Availability
Confidentiality
While Sara is logging into the server from her workstation, she notices Pete watching her enter the
username and password. Which of the following social engineering attacks is Pete executingA. Impersonation
B. Tailgating
C. Piggybacking
D. Shoulder surfing
Shoulder surfing
The log management system at Company A is inadequate to meet the standards required by their
corporate governance team. A new automated log management system has been put in place.
This is an example of which of the followingA. Data integrity measurement
B. Network traffic analysis
C. Risk acceptance process
D. Continuous monitoring
Continuous monitoring
Several users’ computers are no longer responding normally and sending out spam email to the
users’ entire contact list. This is an example of which of the followingA. Trojan virus
B. Botnet
C. Worm outbreak
D. Logic bomb
Worm outbreak
Which of the following should Sara, a security technician, perform as the FIRST step when
creating a disaster recovery plan for a mission critical accounting systemA. Implementing redundant systems
B. Removal of single points of failure
C. Succession planning
D. Business impact assessment
Business impact assessment
Which of the following is the MOST secure protocol for Pete, an administrator, to use for managing
network devicesA. FTP
B. TELNET
C. FTPS
D. SSH
SSH
Which of the following is the BEST incident response procedure to take when a previous
employee enters a facilityA. Notify Computer Emergency Response Team (CERT) of the security breach to document it.
B. Take screenshots of the employee’s workstation.
C. Take hashes of the employee’s workstation.
D. Notify security to identify employee’s whereabouts.
Notify security to identify employee’s whereabouts.
Which of the following activities should be completed in order to detect anomalies on a networkA. Incident management
B. Change management
C. User permissions reviews
D. Log reviews
Log reviews
Which of the following is an example of a false negativeA. The IDS does not identify a buffer overflow
B. Anti-virus identifies a benign application as malware.
C. Anti-virus protection interferes with the normal operation of an application.
D. A user account is locked out after the user mistypes the password too many times.
The IDS does not identify a buffer overflow
Which of the following reduces the likelihood of a single point of failure when a server failsA. Clustering
B. Visualization
C. RAID
D. Cold site
Clustering
Jane, a security administrator, wants to prevent users in sales from accessing their servers after
6:00 p.m., and prevent them from accessing accounting’s network at all times. Which of the
following should Jane implement to accomplish these goals? (Select TWO).
A. Separation of duties
B. Time of day restrictions
C. Access control lists
D. Mandatory access control
E. Single sign-on
Time of day restrictions
Access control lists
Which of the following describes the ability for a third party to verify the sender or recipient of a
given electronic message during authenticationA. Entropy
B. Principle of least privilege
C. Non-repudiation
D. Code signing
Non-repudiation
Which of the following protocols provides Pete, an administrator, with the HIGHEST level of
security for device trapsA. ICMP
B. SNMPv3
C. SSH
D. IPSec
SNMPv3
Jane has a vendors server in-house for shipping and receiving. She wants to ensure that if the
server goes down that the server in-house will be operational again within 24 hours. Which of thefollowing should Jane define with the vendorA. Mean time between failures
B. A warm recovery site
C. Mean time to restore
D. A hot recovery site
Mean time to restore
Which of the following procedures would be used to mitigate the risk of an internal developer
embedding malicious code into a production systemA. Audit management
B. Mobile device management
C. Incident management
D. Change management
Change management
To mitigate the adverse effects of network modifications, which of the following should Matt, the
security administrator, implementA. Change management
B. Routine auditing
C. Incident management
D. Log auditing
Change management
Jane, a security technician, wants to implement secure wireless with authentication. Which of the
following allows for wireless to be authenticated via MSCHAPv2A. PEAP
B. WPA2 personal
C. TKIP
D. CCMP
PEAP
Pete, a user, is having trouble dialing into the network from their house. The administrator checks
the RADIUS server, the switch connected to the server, and finds that the switch lost configuration
after a recent power outage. The administrator replaces the switch and is able to ping the switch,
but not the RADIUS server. Which of the following is the MOST likely causeA. The switch needs to have QoS setup correctly.
B. Port security is not enabled on the switch.
C. VLAN mismatch is occurring.
D. The DMZ is not setup correctly
VLAN mismatch is occurring.
Which of the following would MOST likely be implemented in order to prevent employees from
accessing certain websitesA. VPN gateway
B. Router
C. Proxy server
D. Packet filtering firewall
Proxy server
When reviewing a digital certificate for accuracy, which of the following would Matt, a security
administrator, focus on to determine who affirms the identity of the certificate ownerA. Trust models
B. CRL
C. CA
D. Recovery agent
CA
Sara, a security analyst, suspects that a rogue web server is running on the network. Which of the
following would MOST likely be used to identify the server’s IP addressA. Port scanner
B. Telnet
C. Traceroute
D. Honeypot
Port scanner
Which of the following is an improved version of the LANMAN hashA. LM2
B. NTLM
C. SHA
D. MD5
NTLM
Which of the following will help Matt, an administrator; mitigate the risk of static electricityA. Lightening rods
B. EMI shielding
C. Humidity controls
D. Temperature controls
Humidity controls
An application company sent out a software patch for one of their applications on Monday. The
company has been receiving reports about intrusion attacks from their customers on Tuesday.
Which of the following attacks does this describeA. Zero day
B. Directory traversal
C. Logic bomb
D. Session hijacking
Zero day
A company needs to remove sensitive data from hard drives in leased computers before the
computers are returned to the supplier. Which of the following is the BEST solutionA. Re-image with a default OS
B. Physical destruction of the hard drive
C. Format drive using a different file system
D. Sanitization using appropriate software
Sanitization using appropriate software
Which of the following techniques floods an application with data in an attempt to find
vulnerabilitiesA. Header manipulation
B. Steganography
C. Input validation
D. Fuzzing
Fuzzing
ane, a security administrator, has applied security labels to files and folders to manage and
restrict access. Which of the following is Jane usingA. Mandatory access control
B. Role based access control
C. Implicit access control
D. Discretionary access control
Mandatory access control
Sara, a user, on a public Wi-Fi network logs into a webmail account and is redirected to a search
engine. Which of the following attacks may be occurringA. Evil twin
B. Bluesnarfing
C. War chalking
D. Bluejacking
Evil twin
When moving from an internally controlled environment to a fully outsourced infrastructure
environment, such as cloud computing, it is MOST important to:
A. Implement mandatory access controls.
B. Ensure RAID 0 is implemented on servers.
C. Impose time of day restrictions across all services
D. Encrypt all confidential data.
Encrypt all confidential data.
Which of the following would help Pete, an administrator, prevent access to a rogue access point
connected to a switchA. Enable spanning tree protocol
B. Enable DHCP snooping
C. Disable VLAN trunking
D. Establish a MAC limit and age
Establish a MAC limit and age
A company wants to have a backup site that is a good balance between cost and recovery time
objectives. Which of the following is the BEST solutionA. Hot site
B. Remote site
C. Cold site
D. Warm site
Warm site
While conducting a network audit, Sara, a security administrator, discovers that most clients are
routing their network traffic through a desktop client instead of the company router. Which of the
following is this attack typeA. ARP poisoning
B. Session hijacking
C. DNS poisoning
D. Pharming attack
ARP poisoning
Which of the following is a reason why Pete, a security administrator, would implement port
securityA. To inspect the TPC and UDP ports of incoming traffic
B. To port C++code into Java bit-code in a secure manner
C. To implement secure datacenter electronic access
D. To limit the number of endpoints connected through the same switch port
To limit the number of endpoints connected through the same switch port
Which of the following is the MAIN benefit of server-side versus client-side input validationA. Server-side input validation results in a more secure system than client-side input validation.
B. Client-side input validation can lead to local buffer overflows while server-side input validation
can lead to remote buffer overflow.
C. Client-side input validation results in a more secure system than server-side input validation.
D. Server-side input validation is prone to buffer overflows while client-side input validation is not.
Server-side input validation results in a more secure system than client-side input validation.
Which of the following would be the BEST reason for Jane, a security administrator, to initially
select individual file encryption over whole disk encryptionA. It provides superior key redundancy for individual files.
B. The management of keys is easier to maintain for file encryption
C. It is faster to encrypt an individual file.
D. It provides protected access to all users
It is faster to encrypt an individual file.
Which of the following implements two factor authentication based on something you know and
something you haveA. Users shall authenticate to the system via a Kerberos enabled authentication server working
with an integrated PKI only.
B. The system shall require users to authenticate to the system with a combination of a password
or PIN and a smartcard
C. The system shall authenticate only authorized users by fingerprint and retina scan.
D. Users shall possess a combination of 8 digit PINs and fingerprint scanners.
The system shall require users to authenticate to the system with a combination of a password
or PIN and a smartcard
Which of the following should be done before resetting a user’s password due to expirationA. Verify the user’s domain membership
B. Verify the user’s identity
C. Advise the user of new policies
D. Verity the proper group membership
Verify the user’s identity
Sara, an attacker, calls the company’s from desk and tries to gain insider information by providing
specific company information to gain the attendant’s trust. The front desk immediately alerts the IT
department about this incident. This is an example of which of the followingA. Shoulder surfing
B. Whaling
C. Tailgating
D. Impersonation
Impersonation
Which of the following is based on X.500 standardsA. RADIUS
B. TACACS
C. Kerberos
D. LDAP
LDAP
Which of the following functions of a firewall allows Pete, an administrator, to map an external
service to an internal hostA. AP isolation
B. Port forwarding
C. DMZ
D. NAT
Port forwarding
Which of the following malware types is MOST likely to execute its payload after Jane, an
employee, has left the companyA. Rootkit
B. Logic bomb
C. Worm
D. Botnet
Logic bomb
Hashing algorithms are used to address which of the followingA. Confidentiality
B. Compatibility
C. Availability
D. Integrity
Integrity
After setting up a root CA. which of the following can Pete, a security administrator, implement to
allow intermediate CAs to handout keys and certificatesA. CRL
B. Spanning tree
C. Trust model
D. Key escrow
Trust model
Which of the following should be implemented to restrict wireless access to the hardware address
of a NICA. URL filtering
B. WPA2 and EAP
C. PEAP and WPA
D. MAC filtering
MAC filtering
Which of the following is the purpose of the spanning tree protocolA. Loop protection
B. Access control lists
C. Secure device configuration
D. Implicit deny
Loop protection
Sara, the security engineer, has discovered that a breach is in progress on a non-production
system of moderate importance. Which of the following should Sara collect FIRSTA. Memory dump, ARP cache
B. Live system image, route table
C. Temp files, hosts file
D. Offline system image, router logs
Memory dump, ARP cache
While traveling, users need access to an internal company web server that contains proprietary
information. Pete, the security administrator, should implement a:
A. NAC
B. VLAN
C. DMZ
D. RAS
RAS
Which of the following is used by Matt, a security administrator, to lower the risks associated with
electrostatic discharge, corrosion, and thermal breakdownA. Temperature and humidity controls
B. Routine audits
C. Fire suppression and EMI shielding
D. Hot and cold aisles
Temperature and humidity controls
Workers of a small local organization have implemented an off-site location in which the
organization can resume operations within 10 business days in the event of a disaster. This type
of site is BEST known as which of the followingA. Hot site
B. High-availability site
C. Cold site
D. Warm site
Cold site
Which of the following may cause Jane, the security administrator, to seek an ACL work aroundA. Zero day exploit
B. Dumpster diving
C. Virus outbreak
D. Tailgating
Zero day exploit
Which of the following ports would be blocked if Pete, a security administrator, wants to disable
FTPA. 21
B. 23
C. 25
D. 110
21
Sara, a security administrator, suspects that a web server may be under attack. The web logs
have several entries containing variations of the following entries:
‘or 1=1–
or1’=1–
‘or1=1’—
Which of the following attacks is MOST likely occurringA. Zero day exploit
B. Buffer overflow
C. SQL injection
D. Man-in-the-middle
SQL injection
Which of the following attacks would be used if Sara, a user, is receiving unwanted text
messagesA. Packet sniffing
B. Bluesnarfing
C. Smurf attack
D. Blue jacking
Blue jacking
Which of the following practices reduces the attack surface of a wireless network? (Select TWO)
A. Antenna placement
B. Using TKIP instead on AES
C. Power-level control
D. Using WPA2 instead of WPA
E. Using RADIUS
Antenna placement
Power-level control
Matt, a security administrator, is responsible for provisioning role-based user accounts in an
enterprise environment. A user has a temporary business need to perform multiple roles within the
organization. Which of the following is the BEST solution to allow the user to perform multiple
rolesA. Create expiring unique user IDs per role
B. Allow access to an existing user ID
C. Assign multiple roles to the existing user ID
D. Create an additional expiring generic user ID
Assign multiple roles to the existing user ID
An application programmer reports to Sara, the security administrator, that the antivirus software
installed on a server is interfering with one of the production HR applications, and requests that
antivirus be temporarily turned off. How should Sara respond to this requestA. Ask the programmer to replicate the problem in a test environment.
B. Turn off antivirus, but install a host intrusion prevention system on the server.
C. Update the server’s antivirus and anti-malware definitions from the vendor’s site
D. Turn off antivirus, but turn on the host-based firewall with a deny-all rule set.
Ask the programmer to replicate the problem in a test environment.
A packet filtering firewall can protect from which of the followingA. SOL injection
B. Brute force attack
C. Port scan
D. DNS poisoning
Port scan
Which of the following can Matt, an administrator, use to ensure the confidentiality of a file when it
is being sent over FTPA. WPA2
B. PGP
C. MD5
D. NTLMv2
PGP
Pete, a user, submitted a form on the Internet but received an unexpected response shown below
Server Error in “/” Application
Runtime error in script on asp.net version 2.0
Which of the following controls should be put in place to prevent Pete from learning this
information about the web server in the future?A. Patch management
B. Error handling
C. Fuzzing
D. Input validation
Error handling
Employees are reporting that they are receiving unusual calls from the help desk for the purpose
of verifying their user credentials. Which of the following attack types is occurringA. Vishing
B. Spear phishing
C. Phishing
D. Pharming
Vishing
Sara, a forensic invest gator, believes that the system image she was presented with is not the
same as the original source. Which of the following should be done to verify whether or not the
image has been tampered withA. Compare file sizes from the original with the system image.
B. Reimage the original source with a read-only tool set to ignore errors.
C. Compare hashes of the original source and system image.
D. Compare time stamps from the original with the system image.
Compare hashes of the original source and system image.
Which of the following is a feature of Kerberos?A. One-way encryption
B. Vendor patch management
C. Only available for Linux systems
D. Single sign-on
Single sign-on
An SQL injection vulnerability can be caused by which of the followingA. Password complexity
B. Improper input validation
C. Discretionary access controls
D. Cross-site request forgery
Improper input validation
Which of the following is BEST used to break a group of IP addresses into smaller network
segments or blocksA. NAT
B. Visualization
C. NAC
D. Subnetting
Subnetting
Which of the following would Sara, a security administrator, utilize to identity a weakness within
various applications without exploiting that weakness?A. Protocol analyzer
B. Port scanner
C. Vulnerability scan
D. Penetration test
Vulnerability scan
Matt, a security administrator, wants to allow content owners to determine who has access to tiles.
Which of the following access control types does this describeA. Rule based access control
B. Discretionary access control
C. Role based access control
D. Mandatory access control
Discretionary access control
Which of the following commands can Matt, an administrator, use to create a forensically sound
hard drive imageA. grep
B. dump
C. dcfldd
D. hex
dcfldd
Which of the following technologies would allow the removal of a single point of failureA. Dual-homing a server
B. Clustering a SQL server
C. Adding a second VLAN to a switch
D. Assigning a second IP address to a NIC
Dual-homing a server
Jane, the administrator, is tasked with deploying a strong encryption cipher. Which of the following
ciphers would she be the LEAST likely to chooseA. DES
B. Two fish
C. 3DES
D. AES
Two fish
Jane, a security administrator, has completed the imaging process for 20 computers that were
deployed. The image contains the operating system and all required software. Which of the
following is this an example ofA. Implementing configuration hardening
B. Implementing configuration baseline
C. Implementing due diligence
D. Deploying and using a trusted OS
Deploying and using a trusted OS
Which of the following open standards should Pete, a security administrator, select for remote
authentication of usersA. TACACS
B. RADIUS
C. WPA2
D. RIPEMD
RADIUS
Matt, a system administrator, wants to establish a nightly available SQL database. Which of the
following would be implemented to eliminate a single point of failure in storage and serversA. RAID 5 and a storage area network
B. Two striped drives and clustering
C. Two mirrored drives and clustering
D. RAID 0 and load balancing
RAID 5 and a storage area network
Which of the following malware types is MOST commonly associated with command and controlA. Rootkits
B. Logic bombs
C. Botnets
D. Backdoors
Botnets
Which of the following security chips does BitLocker utilizeA. BIOS
B. CPU
C. CMOS
D. TPM
TPM
While performing basic forensic analysis of a hard drive in Sara’s, the security administrator,
possession, which of the following should be verified during the analysisA. Witness statements
B. Image hashes
C. Chain of custody
D. Order of volatility
Image hashes
Which of the following policies is implemented in order to minimize data loss or theftA. PII handling
B. Password policy
C. Chain of custody
D. Zero day exploits
A. PII handling
Which of the following allows Pete, a security technician, to prevent email traffic from entering the
company serversA. IDS
B. URL filtering
C. VPN concentrators
D. Spam filter
Spam filter
A. IDS
B. URL filtering
C. VPN concentrators
D. Spam filter
TACACS+
SSH
When integrating source material from an open source project into a highly secure environment,
which of the following precautions should prevent hidden threatsA. Design review
B. Code review
C. Risk assessment
D. Vulnerability scan
Code review
Which of the following can Sara, a security administrator, implement to ensure that encrypted files
and devices can be recovered if the passphrase is lostA. Private key rings
B. Trust models
C. Registration
D. Key escrow
Key escrow
An administrator responsible for building and validating security configurations is a violation of
which of the following security principlesA. Least privilege
B. Job rotation
C. Separation of duties
D. Best business practices
Separation of duties
Sara, a network security administrator, has been tasked with setting up a guest wireless network
for her corporation. The requirements for this connection state that it must have password
authentication, with passwords being changed every week. Which of the following security
protocols would meet this goal in the MOST secure mannerA. WPA – CCMP
B. WPA – PSK
C. WPA2-CCMP
D. WPA2-PSK
WPA2-PSK
Which of the following are security relevant policies? (Select THREE)
A. Information classification policy
B. Network access policy
C. Data security standard
D. Procurement policy
E. Domain name policy
F. Auditing and monitoring policy
G. Secure login process
Information classification policy
Network access policy
Auditing and monitoring policy
Which of the following attacks is manifested as an embedded HTML image object or JavaScript
image tag in an emailA. Exception handling
B. Adware
C. Cross-site request forgery
D. Cross-site scripting
Cross-site scripting
Which of the following network solutions would BEST allow Jane, a security technician, to host an
extranet application for her companyA. Platform as a Service
B. Infrastructure as a Service
C. Storage as a Service
D. Software as a Service
Software as a Service
Jane, a VPN administrator, was asked to implement an encryption cipher with a MINIMUM
effective security of 128-bits. Which of the following should Jane select for the tunnel encryptionA. Blowfish
B. DES
C. SHA256
D. HMAC
Blowfish
Which of the following could Sara, an administrator, use in a workplace to remove sensitive data at
rest from the premisesA. Network sniffer
B. Personally owned devices
C. Vulnerability scanner
D. Hardware locks
Personally owned devices
Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate
employee activities in sensitive areasA. Mandatory vacations
B. Collusion
C. Time of day restrictions
D. Least privilege
Mandatory vacations
Traffic has stopped flowing to and from the company network after the inline IPS hardware failed.
Which of the following has occurredA. Failsafe
B. Congestion
C. Fuzzing
D. Disaster recovery
Failsafe
A company is installing a wireless network in a building that houses several tenants. Which of the
following should be considered to make sure none of the other tenants can detect the company’s
wireless network? (Select TOO).
A. Static IP addresses
B. Wireless encryption
C. MAC filtering
D. Antenna placement
E. Power levels
Antenna placement
Power levels
Which of the following network devices will prevent port scansA. Firewall
B. Load balancers
C. NIDS
D. Sniffer
Firewall
Which of the following multifactor authentication methods uses biometricsA. Somewhere you are
B. Something you have
C. Something you know
D. Something you are
Something you are
Marketing creates a new folder and requests the following access be assigned:
Sales Department – Read
Marketing Department – Full Control
Inside Sales – Read Write
This is an example of which of the followingA. RBAC
B. MAC
C. RSA
D. DAC
RBAC
Sara, the software security engineer, is trying to detect issues that could lead to buffer overflows
or memory leaks in the company software. Which of the following would help Sara automate this
detectionA. Input validation
B. Exception handling
C. Fuzzing
D. Code review
Fuzzing
Which of the following control types is video monitoringA. Detective
B. Management
C. Preventative
D. Access
Detective
Pete, the Chief Executive Officer (CEO) of a company, has increased his travel plans for the next
two years to improve business relations. Which of the following would need to be in place in case
something happens to PeteA. Succession planning
B. Disaster recovery
C. Separation of duty
D. Removing single loss expectancy
Succession planning
Which of the following allows a server to request a website on behalf of Jane, a userA. Sniffers
B. Proxies
C. Load balancers
D. Firewall
Proxies
Matt, a systems security engineer, is determining which credential-type authentication to use
within a planned 802.1x deployment. He is looking for a method that does not require a client
certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credentialtype
authentication method BEST fits these requirementsA. EAP-TLS
B. EAP-FAST
C. PEAP-CHAP
D. PEAP-MSCHAPv2
PEAP-MSCHAPv2
Sara, a security administrator, has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encryptedfollowing should she do next to ensure all web traffic to the company web server is encrypted?
A. Install both the
private and the public key on the client machine.
B. Install both the private and the public key on the web server.
C. Install the public key on the web server and the private key on the client machine.
D. Install the public key on the client machine and the private key on the web server.
Install both the private and the public key on the web server.
Pete, a security administrator, would like to implement laptop encryption to protect data. The Chief
Executive Officer (CEO) believes this will be too costly to implement and decides the company will
purchase an insurance policy instead. Which of the following is this an example ofA. Risk avoidance
B. Risk deterrence
C. Risk acceptance
D. Risk transference
Risk transference
Matt, a security administrator, needs to Telnet into a router to change some configurations. Which
of the following ports would need to be open to allow Matt to change the configurationsA. 23
B. 125
C. 143
D. 3389
23
The IT Security Department has completed an internal risk assessment and discovered the use of
an outdated antivirus definition file. Which of the following is the NEXT step that management
should takeA. Analyze the vulnerability results from the scan.
B. Mitigate risk and develop a maintenance plan.
C. Ignore risk and document appropriately to address at a later time.
D. Transfer risk to web application developers.
Mitigate risk and develop a maintenance plan.
Which of the following elements makes up the standard equation used to define risk? (Select
TWO).
A. Confidence
B. Reproducibility
C. Impact
D. Likelihood
E. Exploitability
Impact
Likelihood
Matt’s CRL is over six months old. Which of the following could Matt do in order to ensure he has
the current information? (Select TWO).
A. Update the CRL
B. Change the trust model
C. Deploy a key escrow
D. Query the intermediate CA
E. Deploy a recovery agent
F. Deploy OCSP
Deploy OCSL
Update the CRL
Matt, the security administrator, notices a spike in the number of SQL injection attacks against a
web server connected to a backend SQL database. Which of the following practices should be
used to prevent an application from passing these attacks on to the databaseA. OS hardening
B. Application patch management
C. Error and exception handling
D. Input validation
Input validation
Jane’s guest, Pete, comes to her office to meet her for lunch. She uses her encoded badge to
enter, and he follows in behind her. This is an example of which of the followingA. Tailgating
B. Least privilege
C. Whaling
D. Vishing
Tailgating
A vulnerability has been found in a service that is unnecessary for the corporate environment.
Which of the following is the BEST way to mitigate this vulnerabilityA. Issue a hotfix to lower the vulnerability risk on the network
B. Issue a group policy to disable the service on the network.
C. Issue a service pack to ensure the service is current with all available patches
D. Issue a patch to ensure the service has a lower level of risk if compromised.
Issue a group policy to disable the service on the network.
Broadcast traffic is having a negative impact on network performance. Which of the following
might help minimize this issueA. Use NAT to hide the IPs of each of the workstations.
B. Separate the network onto a number of different switches.
C. Separate the network into a number of different VLANs.
D. Route all the Unicast traffic through the proxy server.
Separate the network into a number of different VLANs.
One of the concerns regarding portable digital music devices in a corporate environment is they:
A. can distract users during various security training exercises.
B. can also be used as a USB removable drive.
C. can be used as recorders during meetings.
D. may cause interference with wireless access points
can also be used as a USB removable drive.
Which of the following describes separating encryption keys into multiple parts to store with trusted
third partiesA. Ticket granting ticket
B. Key recovery
C. Key escrow
D. Key registration
Key escrow
Which of the following authentication services relies on a shared secretA. RADIUS
B. LDAP
C. Kerberos
D. Tokens
RADIUS
Which of the following is characterized by an attack against a mobile deviceA. Evil twin
B. Header manipulation
C. Blue jacking
D. Rogue AP
Blue jacking
Which of the following should Pete, a security technician, apply to a server to BEST prevent SYN
attacksA. Loop protection
B. Flood guards
C. Port security
D. ACL
Flood guards
When implementing a wireless network, which of the following will decrease the visibility of the
networkA. Decreasing the encryption strength
B. Disabling the SSID broadcast
C. Enabling WPA2 encryption
D. Enabling MAC filtering
Disabling the SSID broadcast
Which of the following describes the process of removing unnecessary accounts and services
from an application to reduce risk exposureA. Error and exception handling
B. Application hardening
C. Application patch management
D. Cross-site script prevention
Application hardening
Mandatory vacation, job rotation, and separation of duties policies all enhance the overall security
posture by doing which of the followingA. Making it more convenient to review logs for malicious activity
B. Making it more difficult to hide malicious activity by insiders
C. Reducing risks associated with viruses and malware
D. Reducing risks associated with Internet attackers
Making it more difficult to hide malicious activity by insiders
A recent policy change requires Pete, a security administrator, to implement TLS wherever
possible. Which of the following can TLS secure? (Select THREE).
A. SNMP
B. HTTP
C. LDAP
D. ICMP
E. SMTP
F. IPSec
G. SSH
LDAP
HTTP
IPSec
Which of the following allows a company to correct security issues within their softwareA. Application fuzzing
B. Cross-site scripting
C. Configuration baseline
D. Patch management
Anti-malware
Matt, a network engineer, is setting up an IPSec VPN. Which network-layer key management
standard and its protocol can be used to negotiate the connectionA. AH
B. Kerberos
C. EAP
D. IKE
IKE
Which of the following devices can Sara, an administrator, implement to detect and stop known
attacksA. Signature-based NIDS
B. Anomaly-based NIDS
C. Signature-based NIPS
D. Anomaly-based NIPS
Signature-based NIPS
Which of the following represents the WEAKEST passwordA. PaSsWoRd
B. [email protected]&
C. [email protected]&
D. PassW1rD
PaSsWoRd
Which of the following is mainly used for remote access into the networkA. XTACACS
B. TACACS+
C. Kerberos
D. RADIUS
RADIUS
In order to prevent users from surfing the web at work, Jane, the administrator, should block which
of the following ports? (Select TWO).
A. TCP 25
B. TCP 80
C. TCP 110
D. TCP 443
E. UDP 80
F. UDP 8080
TCP 80
TCP 443
Matt, the IT administrator, wants to ensure that if any mobile device gets lost no data can be
retrieved. Which of the following can he implement on the mobile devices to help accomplish thisA. Cable locks
B. Strong passwords
C. Voice encryption
D. Remote sanitization
Remote sanitization
Matt, a security administrator, wants to configure all the switches and routers in the network in
order to security monitor their status. Which of the following protocols would he need to configure
on each deviceA. SMTP
B. SNMPv3
C. IPSec
D. SNMP
SNMPv3
Jane, a security administrator, recently configured the firewall for the corporate office. Some users
report that they are unable to access any resources outside of the company. Which of the
following is the MOST likely reason for the lack of accessA. Jane forgot to save the configuration on the firewall
B. Jane forgot to account for the implicit deny statement
C. Jane forgot to connect the internal firewall port back to the switch
D. Jane specifically denied access for all users
Jane specifically denied access for all users
Which of the following describes common concerns when implementing IPSA. Legitimate traffic will be incorrectly blocked
B. False negatives will disrupt network throughput
C. Incompatibilities with existing routers will result in a DoS
D. Security alerts will be minimal until adequate traffic is collected
Legitimate traffic will be incorrectly blocked
Which of the following network design elements will allow Jane, a security technician, to access
internal company resources without the use of a DS3, Satellite, or T1 connectionA. CSU/DSU
B. Firewall
C. Router
D. DSL
CSU/DSU
Which of the following utilizes the ECHO function of Internet Control Message Protocol (ICMP) to
overwhelm a victim’s systemA. Logic bomb
B. Whaling
C. Man-in-the-middle
D. Smurf attack
Smurf attack
Matt, an administrator, is concerned about the wireless network being discovered by war driving.
Which of the following can be done to mitigate thisA. Enforce a policy for all users to authentic through a biometric device.
B. Disable all SSID broadcasting
C. Ensure all access points are running the latest firmware.
D. Move all access points into public access areas.
Disable all SSID broadcasting
Jane, the administrator of a small company, wishes to track people who access the secured server
room, which is secured only by a simple hardware key lock. Jane does not have much of a budget
or the approval to make significant construction changes. Given the limitations, which of the
following can she do in the meantimeA. Implement a sign in/out sheet with on-site security personnel
B. Install a 24/7 closed-circuit camera system
C. Install a separate hardware lock with limited keys
D. Implement a cipher key lock
Implement a cipher key lock
Which of the following enterprise security controls is BEST implemented by the use of a RADIUS
serverA. ACL
B. NAT
C. VLAN
D. 802.1X
802.1X
Pete, the security administrator at a financial institution, has finished downloading a new system
patch and needs to verify its authenticity. Which of the following is the correct MD5 string for the
file he downloadedA. 1a03b7fe4c67d9012gb42b4de49d9f3b
B. b42b4de49d9f3b1a03b7fe4c67d9012
C. 303b7fe4c67d9012b42b4de49d9f3b134
D. ab42b4de49d9f3b1a03b7f34c67d9012
ab42b4de49d9f3b1a03b7f34c67d9012
One of the advantages of Trusted Platform Modules (TPM) is:
A. it cannot be modified by a silent background process.
B. it is tied to the system’s MAC address for secured tracking.
C. it cannot be used as the basis for securing other encryption methods.
D. it can be tied to the user’s logon account for additional authentication
it can be tied to the user’s logon account for additional authentication
Which of the following protocols is MOST closely linked with SSLA. SNMP
B. TLS
C. FTP
D. ICMP
TLS
Which of the following would Jane, an administrator, use to detect an unknown security
vulnerabilityA. Patch management
B. Application fuzzing
C. ID badge
D. Application configuration baseline
Application fuzzing
Which of the following data center environmental controls must be property configured to prevent
equipment failure from waterA. Lighting
B. Temperature
C. Humidity
D. Halon fire suppression
Humidity
Matt, a corporate user, has volunteered to participate in a test group for full disk encryption on
employees’ laptops. After his laptop’s hard drive has been fully encrypted, the network
administrator is still able to access Matt’s files across a SMB share. Which of the following is the
MAIN reason why the files are still accessible to the administratorA. Matt must reboot his laptop before the encryption is activated.
B. Files moved by the network administrator off Matt’s laptop are automatically decrypted
C. Full disk encryption only secures files when the laptop is powered off
D. The network administrator can decrypt anyone’s files.
Full disk encryption only secures files when the laptop is powered off
Hashing and encryption provide for which of the following? (Select TWO)
A. Authentication
B. Availability
C. Identification
D. Confidentiality
E. Authorization
F. Integrity
Confidentiality
Integrity
Which of the following will require exceptions when considering the use of 802.1x port securityA. Switches
B. Printers
C. Laptops
D. Desktops
Printers
Which of the following data encryption types will BEST protect data in motion and at rest to a cloud
providerA. File encryption
B. Transport
C. PKI
D. SHA-256
File encryption
Which of the following will mitigate the effects of devices in close proximity?
EMI shielding
A major CA has been compromised and a new patch has been released to make necessary
changes on user machines. Which of the following is likely to be updated as a part of this patchA. Recovery agent
B. CRL
C. Key escrow
D. PKI
CRL
Which of the following uses both a public and private keyA. RSA
B. AES
C. MD5
D. SHA
RSA
Visitors entering a building are required to close the back door before the front door of the same
entry room is open. Which of the following is being describedA. Tailgating
B. Fencing
C. Screening
D. Mantrap
Mantrap
Symmetric encryption utilizes________. While asymmetric encryption utilizes__________.
A. Public keys, one time
B. Shared keys, private keys
C. Private keys, session keys
D. Private keys, public keys
Shared keys, private keys
Jane, an administrator, notices that after 2.000 attempts a malicious user was able to compromise
an employee’s password. Which of the following security controls BEST mitigates this type of
external attack? (Select TWO).
A. Account expiration
B. IDS
C. Password complexity
D. Server logging
E. Account lockout
F. Proxy server
Password complexity
Account lockout
Matt, the network engineer, has been tasked with separating network traffic between virtual
machines on a single hypervisor. Which of the following would he implement to BEST address this
requirement? (Select TWO).
A. Virtual switch
B. NAT
C. System partitioning
D. Access-list
E. Disable spanning tree
F. VLAN
Virtual switch
VLAN
Sara, an IT manager, wants to change the firewall rules to allow RemoteOfficeB to connect to the
corporate network using SSH. Which of the following rules would only allow necessary accessA. Permit RemoteOfficeB any port 69
B. Permit RemoteOfficeB any all
C. Permit RemoteOfficeB any port 22
D. Permit any corporate port 443
Permit RemoteOfficeB any port 22
Which of the following attacks is characterized by someone following a staff member who is
entering a corporate facilityA. Evil twin
B. Tailgating
C. Shoulder surfing
D. Impersonation
Tailgating
Speaking a passphrase into a voice print analyzer is an example of which of the following security
conceptsA. Two factor authentication
B. Identification and authorization
C. Single sign-on
D. Single factor authentication
Two factor authentication
Jane, a corporate user, is trying to secure her laptop from drive-by download before she leaves for
a computer conference. Which of the following should be installed to keep Jane’s laptop secure
from these attacksA. Full disk encryption
B. Host based firewall
C. Antivirus system
D. Network based firewall
Antivirus system
Which of the following detection methods may generate an alert when Matt, an employee,
accesses a server during non-business hoursA. Signature
B. Time of Day restrictions
C. Heuristic
D. Behavioral
Behavioral
Which of the following data is typically left unencrypted in software based full disk encryptionA. OS registry
B. Extended partition
C. BIOS
D. MBR
MBR
Which of the following is an authentication service that uses symmetrical keys and ticketsA. RADIUS
B. TACACS+
C. Kerberos
D. LDAP
Kerberos
Jane, a security architect, is working on setting up a secure email solution between internal
employees and external customers. Which of the following would BEST meet her goalA. Public key infrastructure
B. Key escrow
C. Internal certificate authority
D. Certificate revocation list
Public key infrastructure
Which of the following allows multiple internal IP addresses to be mapped to one specific external
IP addressA. VLAN
B. NAT
C. NAC
D. PAT
NAT
Which of the following would Jane, a security administrator, use to encrypt transmissions from
streaming video transmissions, keeping in mind that each bit must be encrypted as it comes
across the networkA. IDEA
B. AES
C. RC4
D. 3DES
RC4
Matt, a user, finds a flash drive in the parking lot and decides to see what is on it by using his
company laptop. A few days later Matt reports his laptop is running slow and is unable to perform
simple tasks. The security administrator notices several unauthorized applications have been
installed. CPU usage is unusually high, and a collection of screenshots of Matt’s recent activity
has been transmitted over the network .This is an example of which of the followingA. Backdoor
B. Logic bomb
C. Rootkit
D. Spyware
Spyware
Pete, the security administrator, found that several of the company’s workstations are infected with
a program aimed at stealing users’ cookies and reporting them back to the malicious user. Which
of the following attack types is the malicious user MOST likely to carry out with this informationA. Man-in-the-middle
B. Session hijacking
C. Command injection
D. Trojan infection
Session hijacking
Sara, a security administrator, is implementing remote management for network infrastructure
using SNMP. Which of the following statements is true about SNMPA. Read communities allow write permissions
B. Relays mail based on domain keys and access headers
C. SNMP communities are encrypted using PKI
D. Write communities allow both read and write permissions
Write communities allow both read and write permissions
Which of the following mitigation techniques is Pete, a security administrator, MOST likely to
implement after the software has been released to the publicA. Error and exception handling
B. Fuzzing
C. Secure coding
D. Patch management
Patch management
Which of the following BEST defines riskA. A threat will have a larger impact than anticipated
B. Remediation of a known vulnerability is cost prohibitive
C. A degree of probability of loss
D. A user leaves a system unsecure
A degree of probability of loss
Companies allowing remote access to internal systems or systems containing sensitive data
should provide access using:
A. dial-up or broadband networks using passwords.
B. wireless networks using WPA encryption.
C. VPN with two factor authentication.
D. carrier based encrypted data networks
VPN with two factor authentication.
Which of the following is the proper order for incident responseA. Detection, preparation, containment, eradication, recovery
B. Preparation, detection, containment, eradication, recovery
C. Preparation, detection, recovery, eradication, containment
D. Detection, containment, eradication, recovery, preparation
Preparation, detection, containment, eradication, recovery
Which of the following is considered the MOST secure wireless encryption measure to implementA. TKIP
B. CCMP
C. WPA2
D. WEP
WPA2
Sara, a security engineer, is testing encryption ciphers for performance. Which of the following
ciphers offers strong encryption with the FASTEST speedA. 3DES
B. Blowfish
C. Serpent
D. AES256
Blowfish
A team is developing a new application with many different screens that users can access. The
team decides to simplify access by creating just two internal application roles. One role is granted
read-only access to the summary screen. The other role is granted update access to all screens.
This simplified access model may have a negative security impact on which of the followingA. Remote access
B. Identity management
C. Least privilege
D. Authentication
Least privilege
Which of the following would be the BEST choice for attacking a complex password hashA. Man in the middle
B. Dictionary files
C. Rainbow tables
D. Brute-force intrusion
Rainbow tables
In order for Pete, a user, to logon to his desktop computer, he must provide his username,
password, and use a common access card with a PIN. Which of the following authentication
methods is Pete usingA. Single factor
B. Two factor
C. Three factor
D. Four factor
Two factor
Which of the following is a reason why a company might deploy data encryptionA. To maintain the integrity of the information
B. To keep information confidential
C. To prevent data corruption
D. To prevent backup tape theft
To keep information confidential
Which of the following would Sara, a security administrator, implement to divert and analyze
attacksA. Protocol analyzer
B. DMZ
C. Port scanner
D. Honeypot
Honeypot
In PKI, the public key is used to:
A. Decrypt the signature CRC
B. Decrypt an email message
C. Encrypt an email message
D. Encrypt the signature hash
Encrypt an email message
Jane, a security technician, needs to open ports on a firewall to allow for domain name resolution.
Which of the following ports should Jane open? (Select TWO).
A. TCP 21
B. TCP 23
C. TCP 53
D. UDP 23
E. UDP 53
UDP 53
TCP 53
After a new firewall has been installed, devices cannot obtain a new IP address. Which of the
following ports should Matt, the security administrator, open on the firewallA. 25
B. 68
C. 80
D. 443
68
The health care department is storing files with names, addresses, and social security numbers on
a corporate file server. Matt, the security analyst, comes across this data in an audit. Which of the
following has Matt discoveredA. Personal identifiable information
B. Data classification rules
C. Data disposal procedures
D. Data handling rules
Personal identifiable information
Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message
is 160-bits long. Which of the following hashing methods would Matt have to use to obtain this
digital fingerprintA. SHA1
B. MD2
C. MD4
D. MD5
SHA1
Which of the following would Jane, a security administrator, use to authenticate remote users into
the networkA. RADIUS
B. XTACACS
C. TACACS
D. ACLs
RADIUS
A company wants to implement a policy that helps reduce employee stress and decrease the
likelihood of security incidents caused by job dissatisfaction. Which of the following will MOST
likely have a positive impact on the employee stress and job satisfactionA. Change management
B. Mandatory vacations
C. Due care
D. Service Level Agreements
Mandatory vacations
Pete would like to implement a new tape backup plan for HR to speed up the process of nightly
backups on their file systems HR does not make many file alterations on Tuesday through
Thursday. Pete does a full backup on Monday and again on Friday. Which of the following should
Pete do to speed up the backups Tuesday through ThursdayA. Incremental backups Tuesday through Thursday
B. Full backups Tuesday through Thursday
C. Differential backups Tuesday through Thursday
D. Differential backups Tuesday and Wednesday
Incremental backups Tuesday through Thursday
Sara, a user, needs to copy a file from a Linux workstation to a Linux server using the MOST
secure file transfer method available. Which of the following protocols would she useA. SCP
B. FTP
C. SNMP
D. TFTP
SCP
Which of the following would Matt, a security administrator, use to encrypt transmissions from an
internal database to an internal server, keeping in mind that the encryption process must add as
little latency to the process as possibleA. ECC
B. RSA
C. SHA
D. 3DES
3DES
Matt, a system administrator, notices that there have been many failed login attempts to the virtual
server’s management interface. Which of the following would be the BEST way for him to secure
the virtual server’s OSA. Implement QoS
B. Create an access control list
C. Isolate the management network
D. Enable SSH
Isolate the management network
Which of the following wireless attacks MOST likely targets a smart phoneA. War driving
B. Whaling
C. IV attack
D. Bluesnarfing
Bluesnarfing
Which of the following host security procedures will facilitate in the identification of Advanced
Persistent Threats (APT)A. Remote wipe
B. Group policy implementation
C. Host software baselining
D. Antivirus
Host software baselining
Jane, a security technician, has been called into a meeting with the management team who has a
requirement for comprehensive vetting of specialized employees as part of the hiring process.
Funding and resources are not an issue since staff members are in high risk positions and have
access to sensitive data. Which of the following access control types BEST meets the
requirementA. Rule based access control
B. Discretionary access control
C. Mandatory access control
D. Role based access control
Mandatory access control
A company wants to ensure that its hot site is prepared and functioning. Which of the following
would be the BEST process to verily the backup datacenter is prepared for such a scenarioA. Site visit to the backup data center
B. Disaster recovery plan review
C. Disaster recovery exercise
D. Restore from backup
Disaster recovery exercise
Pete, the security administrator, would like all users connecting to the corporate SSL VPN router
to have up-to-date patches and antivirus signatures verified prior to accessing the internal
network. Which of the following would MOST likely be employed as the verification processA. The router ACL matches VPN traffic. The NAC server verifies antivirus signatures are
supported and up-to-date.
B. The NAC server processes the authentication, and then it matches patches and antivirus
signatures with its local database.
C. The access control server connects to the agent on the users’ client to set minimal accepted
levels of patching and signatures allowed. The agent creates a token which the router can match
for access.
D. The router sends queries to the access control server; the access control server handles proxy
requests to third party patching and antivirus servers.
The router sends queries to the access control server; the access control server handles proxy
requests to third party patching and antivirus servers.
In which of the following access control types does the operating system data classification
determine who has access to certain resourcesA. Discretionary Access Control
B. Role based Access Control
C. Mandatory Access Control
D. Rule based Access Control
Mandatory Access Control
Sara, a security administrator, needs to simplify the management of access to remote files and
folders. Which of the following can she implement to BEST accomplish thisA. Group based ACLs
B. Creating multiple copies of the files and folders
C. Discretionary access control
D. User based ACLs
Group based ACLs
Matt, a security administrator, wants to implement a secure wireless network. Which of the
following is the MOST secure wireless protocolA. WPA2
B. WPA
C. WEP
D. AES
WPA2
Which of the following protocols allows for the LARGEST address spaceA. IPX
B. IPv4
C. IPv6
D. Appletalk
IPv6
In order to justify the cost of a new security appliance, the administrator should do which of the
followingA. RIO analysis
B. Benchmarking
C. Market analysis
D. Usability testing
RIO analysis
Which of the following is responsible for masking the activity of an on-going attack from the
administrator’s operating system monitoring toolsA. Rootkit
B. Botnet
C. Spyware
D. Trojan
Rootkit
Which of the following forms of FTP uses TLS to securely send informationA. SCP
B. FTPS
C. SFTP
D. HTTPS
FTPS
Which of the following BEST allows Jane, a security administrator, to perform ongoing
assessments of existing weaknesses within an enterpriseA. Vulnerability scanning
B. NIPS
C. HIDS
D. Protocol analyzer
Vulnerability scanning
Jane, an attacker, compromises a payroll system and replaces a commonly executed application
with a modified version which appears to run as normal but also executes additional functions.
Which of the following would BEST describe the slightly modified applicationA. Trojan
B. Rootkit
C. Spyware
D. Adware
Trojan
To protect corporate data on removable media, a security policy should mandate that all
removable devices use which of the followingA. Full disk encryption
B. Application isolation
C. Digital rights management
D. Data execution prevention
Full disk encryption
Which of the following application attacks is identified by use of the SCRIPT tagA. XSS
B. Buffer overflow
C. Directory traversal
D. Zero day
XSS
Which of the following would allow Pete, a security analyst, to assess his company’s proficiency
with a particular security processA. Risk Assessment
B. Capability Maturity Model
C. Risk Calculation
D. Trusted Platform Module
Capability Maturity Model
The Chief Security Officer (CSO) informs Jane, the technician, that there is a new requirement for
all data repositories where data must be encrypted when not in use. The CSO wants Jane to applythis requirement to all corporate servers. Which of the following data encryption types will BEST fill
this requirement?A. Mobile device encryption
B. Full disk encryption
C. Transport encryption
D. Database encryption
Database encryption
Jane, a security technician, needs to develop access controls for the network. In which of the
following access control types does a user determine who has access to certain network
resourcesA. Mandatory Access Control
B. Rule based Access Control
C. Role based Access Control
D. Discretionary Access Control
Discretionary Access Control
Which of the following should Pete, the security technician, use to secure DNS zone transfersA. VLAN
B. DIMSSEC
C. ACL
D. 802.1X
ACL
Matt, a network engineer, is implementing a VPN solution. Which of the following can Matt use to
secure the user authentication sessionA. GPG
B. PGP
C. CHAP
D. RSA
CHAP
Sara, a user in the human resources department, requests a privacy screen for her monitor at
work. Which of the following social engineering attack is Sara attempting to preventA. Impersonation
B. Vishing
C. Shoulder surfing
D. Tailgating
Shoulder surfing
A password history value of three means which of the followingA. Three different passwords are used before one can be reused.
B. A password cannot be reused once changed for three years.
C. After three hours a password must be re-entered to continue.
D. The server stores passwords in the database for three days.
Three different passwords are used before one can be reused.
In order to provide flexible working conditions, a company has decided to allow some employees
remote access into corporate headquarters. Which of the following security technologies could be
used to provide remote access? (Select TWO).
A. Subnetting
B. NAT
C. Firewall
D. NAC
E. VPN
Firewall
VPN
Which of the following is the BEST approach to perform risk mitigation of user access control
rightsA. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.
Perform routine user permission reviews.
All of the following are valid cryptographic hash functions EXCEPT:
A. RIPEMD
B. RC4
C. SHA-512
D. MD4
RC4
Which of the following can prevent an unauthorized person from accessing the network by
plugging into an open network jackA. 802.1x
B. DHCP
C. 802.1q
D. NIPS
802.1x
A targeted email attack sent to Sara, the company’s Chief Executive Officer (CEO), is known as
which of the followingA. Whaling
B. Bluesnarfing
C. Vishing
D. Dumpster diving
Whaling
After verifying that the server and database are running, Jane, the administrator, is still unable to
make a TCP connection to the database. Which of the following is the MOST likely cause for thisA. The server has data execution prevention enabled
B. The server has TPM based protection enabled
C. The server has HIDS installed
D. The server is running a host-based firewall
The server is running a host-based firewall
In regards to secure coding practices, why is input validation importantA. It mitigates buffer overflow attacks.
B. It makes the code more readable.
C. It provides an application configuration baseline.
D. It meets gray box testing standards.
It mitigates buffer overflow attacks.
Which of the following is a best practice before deploying a new desktop operating system imageA. Install network monitoring software
B. Perform white box testing
C. Remove single points of failure
D. Verify operating system security settings
Verify operating system security settings
Which of the following steps should follow the deployment of a patchA. Antivirus and anti-malware deployment
B. Audit and verification
C. Fuzzing and exploitation
D. Error and exception handling
Audit and verification
Which of the following would be used when a higher level of security is desired for encryption key
storageA. TACACS+
B. L2TP
C. LDAP
D. TPM
TPM
A security administrator needs to determine which system a particular user is trying to login to at
various times of the day. Which of the following log types would the administrator checkA. Firewall
B. Application
C. IDS
D. Security
Security
If Pete, a security administrator, wants to ensure that certain users can only gain access to the
system during their respective shifts, which of the following best practices would he implementA. Separation of duties
B. Time of day restrictions
C. Implicit deny rule
D. Least privilege
Time of day restrictions
Which of the following MUST be updated immediately when an employee is terminated to prevent
unauthorized accessA. Registration
B. CA
C. CRL
D. Recovery agent
CRL
A small business owner has asked the security consultant to suggest an inexpensive means to
deter physical intrusions at their place of business. Which of the following would BEST meet their
requestA. Fake cameras
B. Proximity readers
C. Infrared cameras
D. Security guards
Fake cameras
Employee badges are encoded with a private encryption key and specific personal information.
The encoding is then used to provide access to the network. Which of the following describes this
access control typeA. Smartcard
B. Token
C. Discretionary access control
D. Mandatory access control
A. Smartcard
Which of the following devices would MOST likely have a DMZ interfaceA. Firewall
B. Switch
C. Load balancer
D. Proxy
Firewall
A security administrator is observing congestion on the firewall interfaces and a high number of
half open incoming connections from different external IP addresses. Which of the following attack
types is underwayA. Cross-site scripting
B. SPIM
C. Client-side
D. DDoS
DDoS
Which of the following tools would Matt, a security administrator, MOST likely use to analyze a
malicious payloadA. Vulnerability scanner
B. Fuzzer
C. Port scanner
D. Protocol analyzer
Protocol analyzer
Which of the following application security testing techniques is implemented when an automated
system generates random input dataA. Fuzzing
B. XSRF
C. Hardening
D. Input validation
Fuzzing
Which of the following can be used by a security administrator to successfully recover a user’s
forgotten password on a password protected fileA. Cognitive password
B. Password sniffing
C. Brute force
D. Social engineering
Brute force
A security administrator wants to check user password complexity. Which of the following is the
BEST tool to useA. Password history
B. Password logging
C. Password cracker
D. Password hashing
Password cracker
Certificates are used for: (Select TWO).
A. client authentication
B. WEP encryption
C. access control lists
D. code signing
E. password hashing
client authentication
code signing
Which of the following is a hardware based encryption deviceA. EFS
B. TrueCrypt
C. TPM
D. SLE
TPM
Which of the following BEST describes a protective countermeasure for SQL injectionA. Eliminating cross-site scripting vulnerabilities
B. Installing an IDS to monitor network traffic
C. Validating user input in web applications
D. Placing a firewall between the Internet and database servers
Validating user input in web applications
Which of the following MOST interferes with network-based detection techniquesA. Mime-encoding
B. SSL
C. FTP
D. Anonymous email accounts
SSL
A certificate authority takes which of the following actions in PKIA. Signs and verifies all infrastructure messages
B. Issues and signs all private keys
C. Publishes key escrow lists to CRLs
D. Issues and signs all root certificates
Issues and signs all root certificates
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the
following attacksA. Malicious code on the local system
B. Shoulder surfing
C. Brute force certificate cracking
D. Distributed dictionary attacks
Malicious code on the local system
Separation of duties is often implemented between developers and administrators in order to
separate which of the followingA. More experienced employees from less experienced employees
B. Changes to program code and the ability to deploy to production
C. Upper level management users from standard development employees
D. The network access layer from the application access layer
Changes to program code and the ability to deploy to production
A security administrator needs to update the OS on all the switches in the company. Which of the
following MUST be done before any actual switch configuration is performedA. The request needs to be sent to the incident management team.
B. The request needs to be approved through the incident management process.
C. The request needs to be approved through the change management process.
D. The request needs to be sent to the change management team.
The request needs to be approved through the change management process.
Jane, an individual, has recently been calling various financial offices pretending to be another
person to gain financial information. Which of the following attacks is being describedA. Phishing
B. Tailgating
C. Pharming
D. Vishing
Vishing
The security administrator wants each user to individually decrypt a message but allow anybody to
encrypt it. Which of the following MUST be implemented to allow this type of authorizationA. Use of CA certificate
B. Use of public keys only
C. Use of private keys only
D. Use of public and private keys
Use of public and private keys
A user in the company is in charge of various financial roles but needs to prepare for an upcoming
audit. They use the same account to access each financial system. Which of the following security
controls will MOST likely be implemented within the companyA. Account lockout policy
B. Account password enforcement
C. Password complexity enabled
D. Separation of duties
Separation of duties
An employee is granted access to only areas of a network folder needed to perform their job.
Which of the following describes this form of access controlA. Separation of duties
B. Time of day restrictions
C. Implicit deny
D. Least privilege
Least privilege
A CRL is comprised of:
A. malicious IP addresses
B. trusted CA’s
C. untrusted private keys
D. public keys
public keys
Which of the following may significantly reduce data loss if multiple drives fail at the same timeA. Visualization
B. RAID
C. Load balancing
D. Server clustering
RAID
Which of the following should be considered to mitigate data theft when using CAT5 wiringA. CCTV
B. Environmental monitoring
C. Multimode fiber
D. EMI shielding
EMI shielding
To help prevent unauthorized access to PCs, a security administrator implements screen savers
that lock the PC after five minutes of inactivity. Which of the following controls is being described
in this situationA. Management
B. Administrative
C. Technical
D. Operational
Technical
Which of the following IP addresses would be hosts on the same subnet given the subnet mask
255.255.255.224? (Select TWO).
A. 10.4.4.125
B. 10.4.4.158
C. 10.4.4.165
D. 10.4.4.189
E. 10.4.4.199
10.4.4.165
10.4.4.189
Which of the following algorithms has well documented collisions? (Select TWO).
A. AES
B. MD5
C. SHA
D. SHA-256
E. RSA
MD5
SHA
Jane, the security administrator, needs to be able to test malicious code in an environment where
it will not harm the rest of the network. Which of the following would allow Jane to perform this kind
of testingA. Local isolated environment
B. Networked development environment
C. Infrastructure as a Service
D. Software as a Service
Local isolated environment
A company is sending out a message to all users informing them that all internal messages need
to be digitally signed. This is a form of which of the following conceptsA. Availability
B. Non-repudiation
C. Authorization
D. Cryptography
Non-repudiation
Which of the following transportation encryption protocols should be used to ensure maximum
security between a web browser and a web serverA. SSLv2
B. SSHv1
C. RSA
D. TLS
TLS
Developers currently have access to update production servers without going through an approval
process. Which of the following strategies would BEST mitigate this riskA. Incident management
B. Clean desk policy
C. Routine audits
D. Change management
Change management
A server containing critical data will cost the company $200/hour if it were to be unavailable due to
DoS attacks. The security administrator expects the server to become unavailable for a total of two
days next year. Which of the following is true about the ALEA. The ALE is $48.
B. The ALE is $400.
C. The ALE is $4,800.
D. The ALE is $9,600.
The ALE is $9,600.
To reduce an organization’s risk exposure by verifying compliance with company policy, which of
the following should be performed periodicallyA. Qualitative analysis
B. Quantitative analysis
C. Routine audits
D. Incident management
Routine audits
Which of the following is a difference between TFTP and FTPA. TFTP is slower than FTP.
B. TFTP is more secure than FTP.
C. TFTP utilizes TCP and FTP uses UDP.
D. TFTP utilizes UDP and FTP uses TCP.
TFTP utilizes UDP and FTP uses TCP.
A system administrator decides to use SNMPv3 on the network router in AuthPriv mode. Which of
the following algorithm combinations would be validA. AES-RC4
B. 3DES-MD5
C. RSA-DSA
D. SHA1-HMAC
3DES-MD5
Which of the following are encryption algorithms that can use a 128-bit key size? (Select TWO).
A. AES
B. RC4
C. Twofish
D. DES
E. SHA2
AES
Twofish
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server.
After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in
sequence again. Which of the following utilities was he MOST likely using to view this issueA. Spam filter
B. Protocol analyzer
C. Web application firewall
D. Load balancer
Protocol analyzer
Which of the following specifications would Sara, an administrator, implement as a network access
controlA. 802.1q
B. 802.3
C. 802.11n
D. 802.1x
802.1x
Which of the following is characterized by an attacker attempting to map out an organization’s staff
hierarchy in order to send targeted emailsA. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing
Whaling
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order
to perform malicious activitiesA. XSS
B. SQL injection
C. Directory traversal
D. Packet sniffing
Packet sniffing
Which of the following provides the MOST protection against zero day attacks via email
attachmentsA. Anti-spam
B. Anti-virus
C. Host-based firewalls
D. Patch management
Anti-spam
Which of the following access controls enforces permissions based on data labeling at specific
levelsA. Mandatory access control
B. Separation of duties access control
C. Discretionary access control
D. Role based access control
Mandatory access control
A username provides which of the followingA. Biometrics
B. Identification
C. Authorization
D. Authentication
Identification
Use of group accounts should be minimized to ensure which of the followingA. Password security
B. Regular auditing
C. Baseline management
D. Individual accountability
Individual accountability
Privilege creep among long-term employees can be mitigated by which of the following
proceduresA. User permission reviews
B. Mandatory vacations
C. Separation of duties
D. Job function rotation
User permission reviews
In which of the following scenarios is PKI LEAST hardenedA. The CRL is posted to a publicly accessible location.
B. The recorded time offsets are developed with symmetric keys.
C. A malicious CA certificate is loaded on all the clients.
D. All public keys are accessed by an unauthorized user.
A malicious CA certificate is loaded on all the clients.
Configuring the mode, encryption methods, and security associations are part of which of the
followingA. IPSec
B. Full disk encryption
C. 802.1x
D. PKI
IPSec
Which of the following assessments would Pete, the security administrator, use to actively test that
an application’s security controls are in placeA. Code review
B. Penetration test
C. Protocol analyzer
D. Vulnerability scan
Penetration test
Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknessesA. Penetration test
B. Code review
C. Vulnerability scan
D. Brute Force scan
Vulnerability scan
A security administrator has just finished creating a hot site for the company. This implementation
relates to which of the following conceptsA. Confidentiality
B. Availability
C. Succession planning
D. Integrity
Availability
In the initial stages of an incident response, Matt, the security administrator, was provided the hard
drives in question from the incident manager. Which of the following incident response procedures
would he need to perform in order to begin the analysis? (Select TWO).
A. Take hashes
B. Begin the chain of custody paperwork
C. Take screen shots
D. Capture the system image
E. Decompile suspicious files
Take hashes
Capture the system image
Which of the following is used to certify intermediate authorities in a large PKI deploymentA. Root CA
B. Recovery agent
C. Root user
D. Key escrow
Root CA
Which of the following components MUST be trusted by all parties in PKIA. Key escrow
B. CA
C. Private key
D. Recovery key
CA
When checking his webmail, Matt, a user, changes the URL’s string of characters and is able to
get into another user’s inbox. This is an example of which of the followingA. Header manipulation
B. SQL injection
C. XML injection
D. Session hijacking
Session hijacking
Elliptic curve cryptography: (Select TWO)
A. is used in both symmetric and asymmetric encryption.
B. is used mostly in symmetric encryption.
C. is mostly used in embedded devices.
D. produces higher strength encryption with shorter keys.
E. is mostly used in hashing algorithms.
is mostly used in embedded devices.

produces higher strength encryption with shorter keys.

Which of the following would an antivirus company use to efficiently capture and analyze new and
unknown malicious attacksA. Fuzzer
B. IDS
C. Proxy
D. Honeynet
Honeynet
Why is it important for a penetration tester to have established an agreement with management as
to which systems and processes are allowed to be testedA. Penetration test results are posted publicly, and some systems tested may contain corporate
secrets.
B. Penetration testers always need to have a comprehensive list of servers, operating systems, IP
subnets, and department personnel prior to ensure a complete test.
C. Having an agreement allows the penetration tester to look for other systems out of scope and
test them for threats against the in-scope systems.
D. Some exploits when tested can crash or corrupt a system causing downtime or data loss.
Some exploits when tested can crash or corrupt a system causing downtime or data loss.
A system administrator is using a packet sniffer to troubleshoot remote authentication. The
administrator detects a device trying to communicate to TCP port 49. Which of the following
authentication methods is MOST likely being attemptedA. RADIUS
B. TACACS+
C. Kerberos
D. LDAP
TACACS+
An administrator wants to minimize the amount of time needed to perform backups during the
week. It is also acceptable to the administrator for restoration to take an extended time frame.
Which of the following strategies would the administrator MOST likely implementA. Full backups on the weekend and incremental during the week
B. Full backups on the weekend and full backups every day
C. Incremental backups on the weekend and differential backups every day
D. Differential backups on the weekend and full backups every day
Full backups on the weekend and incremental during the week
Which of the following can be used in code signingA. AES
B. RC4
C. GPG
D. CHAP
GPG
Which of the following can use RC4 for encryption? (Select TWO).
A. CHAP
B. SSL
C. WEP
D. AES
E. 3DES
SSL
WEP
Which of the following defines a business goal for system restoration and acceptable data lossA. MTTR
B. MTBF
C. RPO
D. Warm site
RPO
Which of the following defines an organization goal for acceptable downtime during a disaster or
other contingencyA. MTBF
B. MTTR
C. RTO
D. RPO
RTO
Which of the following is an attack vector that can cause extensive physical damage to a
datacenter without physical accessA. CCTV system access
B. Dial-up access
C. Changing environmental controls
D. Ping of death
Changing environmental controls
An ACL placed on which of the following ports would block IMAP trafficA. 110
B. 143
C. 389
D. 465
143
Which of the following provides the HIGHEST level of confidentiality on a wireless networkA. Disabling SSID broadcast
B. MAC filtering
C. WPA2
D. Packet switching
WPA2
Which of the following controls should be used to verify a person in charge of payment processing
is not colluding with anyone to pay fraudulent invoicesA. Least privilege
B. Security policy
C. Mandatory vacations
D. Separation of duties
Mandatory vacations
Which of the following allows a company to maintain access to encrypted resources when
employee turnover is highA. Recovery agent
B. Certificate authority
C. Trust model
D. Key escrow
Recovery agent
Please be aware that if you do not accept these terms you will not be allowed to take this
CompTIA exam and you will forfeit the fee paid.
A. RETURN TO EXAM
B. EXIT EXAM
RETURN TO EXAM
Which of the following should be implemented to stop an attacker from mapping out addresses
and/or devices on a networkA. Single sign on
B. IPv6
C. Secure zone transfers
D. VoIP
Secure zone transfers
Which of the following anti-malware solutions can be implemented to mitigate the risk of phishingA. Host based firewalls
B. Anti-spyware
C. Anti-spam
D. Anti-virus
Anti-spam
Which of the following can be used to mitigate risk if a mobile device is lostA. Cable lock
B. Transport encryption
C. Voice encryption
D. Strong passwords
Strong passwords
Which of the following should the security administrator do when taking a forensic image of a hard
driveA. Image the original hard drive, hash the image, and analyze the original hard drive.
B. Copy all the files from the original into a separate hard drive, and hash all the files.
C. Hash the original hard drive, image the original hard drive, and hash the image.
D. Image the original hard drive, hash the original hard drive, and analyze the hash.
Hash the original hard drive, image the original hard drive, and hash the image.
A marketing employee requests read and write permissions to the finance department’s folders.
The security administrator partially denies this request and only gives the marketing employee
read-only permissions. This is an example of which of the followingA. Job rotation
B. Separation of duties
C. Least privilege
D. Change management
Least privilege
Mike, a network administrator, has been asked to passively monitor network traffic to the
company’s sales websites. Which of the following would be BEST suited for this taskA. HIDS
B. Firewall
C. NIPS
D. Spam filter
NIPS
An administrator notices an unusual spike in network traffic from many sources. The administrator
suspects that:
A. it is being caused by the presence of a rogue access point.
B. it is the beginning of a DDoS attack.
C. the IDS has been compromised.
D. the internal DNS tables have been poisoned.
it is the beginning of a DDoS attack.
Mike, a security professional, is tasked with actively verifying the strength of the security controls
on a company’s live modem pool. Which of the following activities is MOST appropriateA. War dialing
B. War chalking
C. War driving
D. Bluesnarfing
War dialing
Users at a company report that a popular news website keeps taking them to a web page with
derogatory content. This is an example of which of the followingA. Evil twin
B. DNS poisoning
C. Vishing
D. Session hijacking
DNS poisoning
An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never
sent the message. Which of the following aspects of PKI BEST ensures the identity of the senderA. CRL
B. Non-repudiation
C. Trust models
D. Recovery agents
Non-repudiation
Which of the following protocols would be used to verify connectivity between two remote devices
at the LOWEST level of the OSI modelA. DNS
B. SCP
C. SSH
D. ICMP
ICMP
Users require access to a certain server depending on their job function. Which of the following
would be the MOST appropriate strategy for securing the serverA. Common access card
B. Role based access control
C. Discretionary access control
D. Mandatory access control
Role based access control
Jane, a security administrator, has observed repeated attempts to break into a server. Which of
the following is designed to stop an intrusion on a specific serverA. HIPS
B. NIDS
C. HIDS
D. NIPS
HIPS
Matt, the security administrator, notices a large number of alerts on the NIDS. Upon further
inspection, it is determined that no attack has really taken place. This is an example of a:
A. false negative
B. true negative
C. false positive
D. true positive
false positive
Matt, the IT Manager, wants to create a new network available to virtual servers on the same
hypervisor, and does not want this network to be routable to the firewall. How could this BEST be
accomplishedA. Create a VLAN without a default gateway.
B. Remove the network from the routing table.
C. Create a virtual switch.
D. Commission a stand-alone switch.
Create a virtual switch.
A security administrator has configured FTP in passive mode. Which of the following ports should
the security administrator allow on the firewall by defaultA. 20
B. 21
C. 22
D. 23
21
A company that purchased an HVAC system for the datacenter is MOST concerned with which of
the followingA. Availability
B. Integrity
C. Confidentiality
D. Fire suppression
Availability
Which of the following pseudocodes can be used to handle program exceptionsA. If program detects another instance of itself, then kill program instance.
B. If user enters invalid input, then restart program.
C. If program module crashes, then restart program module.
D. If user’s input exceeds buffer length, then truncate the input.
If program module crashes, then restart program module.
Which of the following devices can Sara, an administrator, implement to detect and stop known
attacksA. Signature-based NIDS
B. Anomaly-based NIDS
C. Signature-based NIPS
D. Anomaly-based NIPS
Signature-based NIPS
Which of the following protocols would be implemented to secure file transfers using SSLA. TFTP
B. SCP
C. SFTP
D. FTPS
FTPS
Which of the following security concepts are used for data classification and labeling to protect
data? (Select TWO).
A. Need to know
B. Role based access control
C. Authentication
D. Identification
E. Authorization
Need to know
Authorization
While setting up a secure wireless corporate network, which of the following should Pete, an
administrator, avoid implementingA. EAP-TLS
B. PEAP
C. WEP
D. WPA
C. WEP
Jane, an administrator, hears reports of circles being drawn in the parking lot. Because the
symbols fall within range of the company’s wireless AP, the MOST likely concern is:
A. that someone has used war chalking to help others access the company’snetwork
B. that the symbols indicate the presence ofan evil twin of a legitimate AP
C. that someone is planning to install an AP where the symbols are, to cause interference
D. that a rogue access point has been installed within range of the symbols
that someone has used war chalking to help others access the company’snetwork
Which of the following are used to implement VPNs? (Select TWO).
A. SFTP
B. IPSec
C. HTTPS
D. SNMP
E. SSL
IPSec
SSL
Which of the following describes how Sara, an attacker, can send unwanted advertisements to a
mobile deviceA. Man-in-the-middle
B. Bluejacking
C. Bluesnarfing
D. Packet sniffing
Bluejacking
Matt, a security administrator, is receiving reports about several SQL injections and buffer
overflows through his company’s website. Which of the following would reduce the amount of
these attack typesA. Antivirus
B. Anti-spam
C. Input validation
D. Host based firewalls
Input validation
Enforcing data encryption of removable media ensures that the:
A. lost media cannot easily be compromised.
B. media can be identified.
C. location of the media is known at all times.
D. identification of the user is non-repudiated.
lost media cannot easily be compromised.
Pete, an employee, is terminated from the company and the legal department needs documents
from his encrypted hard drive. Which of the following should be used to accomplish this task(Select TWO).
A. Private hash
B. Recovery agent
C. Public key
D. Key escrow
E. CRL
Recovery agent
Key escrow
A company had decided to assign employees laptops instead of desktops to mitigate the risk of
company closures due to disasters. Which of the following is the company trying to ensureA. Succession planning
B. Fault tolerance
C. Continuity of operations
D. Removing single points of failure
Continuity of operations
Which of the following mitigation strategies is established to reduce risk when performing updates
to business critical systemsA. Incident management
B. Server clustering
C. Change management
D. Forensic analysis
Change management
Which of the following can Pete, a security administrator, use to distribute the processing effort
when generating hashes for a password cracking programA. RAID
B. Clustering
C. Redundancy
D. VisualizationWhich of the following can Pete, a security administrator, use to distribute the processing effort
when generating hashes for a password cracking programA. RAID
B. Clustering
C. Redundancy
D. Visualization
Clustering
Which of the following should Jane, a security administrator, perform before a hard drive is
analyzed with forensics toolsA. Identify user habits
B. Disconnect system from network
C. Capture system image
D. Interview witnesses
Capture system image
Pete, the security administrator, wants to ensure that traffic to the corporate intranet is secure
using HTTPS. He configures the firewall to deny traffic to port 80. Now users cannot connect to
the intranet even through HTTPS. Which of the following is MOST likely causing the issueA. The web server is configured on the firewall’s DMZ interface.
B. The VLAN is improperly configured.
C. The firewall’s MAC address has not been entered into the filtering list.
D. The firewall executes an implicit deny.
The firewall executes an implicit deny.
Mike, a user, receives an email from his grandmother stating that she is in another country and
needs money. The email address belongs to his grandmother. Which of the following attacks is
thisA. Man-in-the-middle
B. Spoofing
C. Relaying
D. Pharming
Spoofing
Which of the following protocols can be used to secure traffic for telecommutersA. WPA
B. IPSec
C. ICMP
D. SMTP
IPSec
Which of the following allows Pete, a security technician, to provide the MOST secure wireless
implementationA. Implement WPA
B. Disable SSID
C. Adjust antenna placement
D. Implement WEP
Implement WPA
Which of the following is a management controlA. Logon banners
B. Written security policy
C. SYN attack prevention
D. Access Control List (ACL)
Written security policy
Which of the following risk concepts BEST supports the identification of fraudA. Risk transference
B. Management controls
C. Mandatory vacations
D. Risk calculation
Mandatory vacations
Which of the following security strategies allows a company to limit damage to internal systems
and provides loss controlA. Restoration and recovery strategies
B. Deterrent strategies
C. Containment strategies
D. Detection strategies
Containment strategies
In order for Sara, a client, to logon to her desktop computer, she must provide her username,
password, and a four digit PIN. Which of the following authentication methods is Sara usingA. Three factor
B. Single factor
C. Two factor
D. Four factor
Single factor
Which of the following must Jane, a security administrator, implement to ensure all wired ports are
authenticated before a user is allowed onto the networkA. Intrusion prevention system
B. Web security gateway
C. Network access control
D. IP access control lists
Network access control
Mike, a server engineer, has received four new servers and must place them in a rack in the
datacenter. Which of the following is considered best practiceA. All servers’ air exhaust toward the cold aisle.
B. All servers’ air intake toward the cold aisle.
C. Alternate servers’ air intake toward the cold and hot aisle.
D. Servers’ air intake must be parallel to the cold/hot aisles.
All servers’ air intake toward the cold aisle.
Mike, a security analyst, has captured a packet with the following payload.
GET ../../../../system32/cmd.exe
Which of the following is this an example ofA. SQL injection
B. Directory traversal
C. XML injection
D. Buffer overflow
Directory traversal
A security administrator needs to open ports on the firewall to allow for secure data transfer.
Which of the following TCP ports would allow for secure transfer of files by defaultA. 21
B. 22
C. 23
D. 25
22
Which of the following technologies would allow for a secure tunneled connection from one site to
another? (Select TWO).
A. SFTP
B. IPSec
C. SSH
D. HTTPS
E. ICMP
IPSec
SSH
Which of the following sets numerous flag fields in a TCP packetA. XMAS
B. DNS poisoning
C. SYN flood
D. ARP poisoning
XMAS
Which of the following network design elements provides for a one-to-one relationship between an
internal network address and an external network addressA. NAT
B. NAC
C. VLAN
D. PAT
NAT
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
A. Impersonation
B. Tailgating
C. Dumpster diving
D. Shoulder surfing
Shoulder surfing
In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him
understand what traffic patterns are normal on his network. Which of the following tools would help
Pete determine traffic patternsA. Syslog
B. Protocol analyzer
C. Proxy server
D. Firewall
Protocol analyzer
TKIP uses which of the following encryption ciphersA. RC5
B. AES
C. RC4
D. 3DES
RC4
Jane, an administrator, needs to transfer DNS zone files from outside of the corporate network.
Which of the following protocols must be usedA. TCP
B. ICMP
C. UDP
D. IP
TCP
Common access cards use which of the following authentication modelsA. PKI
B. XTACACS
C. RADIUS
D. TACACS
PKI
Which of the following application attacks is used to gain access to SEH?A. Cookie stealing
B. Buffer overflow
C. Directory traversal
D. XML injection
Buffer overflow
Which of the following does a second authentication requirement mitigate when accessing
privileged areas of a website, such as password changes or user profile changesA. Cross-site scripting
B. Cookie stealing
C. Packet sniffing
D. Transitive access
Cookie stealing
Jane, a security technician, has been tasked with preventing contractor staff from logging into the
company network after business hours. Which of the following BEST allows her to accomplish
thisA. Time of day restrictions
B. Access control list
C. Personal identity verification
D. Mandatory vacations
Time of day restrictions
Which of the following ports does DNS operate on, by defaultA. 23
B. 53
C. 137
D. 443
53
Sara from IT Governance wants to provide a mathematical probability of an earthquake using facts
and figures. Which of the following concepts would achieve thisA. Qualitative Analysis
B. Impact Analysis
C. Quantitative Analysis
D. SLE divided by the ARO
SLE divided by the ARO
A buffer overflow can result in which of the following attack typesA. DNS poisoning
B. Zero-day
C. Privilege escalation
D. ARP poisoning
Privilege escalation
Which of the following is true concerning WEP securityA. WEP keys are transmitted in plain text.
B. The WEP key initialization process is flawed.
C. The pre-shared WEP keys can be cracked with rainbow tables.
D. WEP uses the weak RC4 cipher.
The WEP key initialization process is flawed.
Which of the following can be used on a smartphone to BEST protect against sensitive data loss if
the device is stolen? (Select TWO).
A. Tethering
B. Screen lock PIN
C. Remote wipe
D. Email password
E. GPS tracking
F. Device encryption
Remote wipe
Device encryption
Which of the following can be implemented on a lost mobile device to help recover itA. Remote sanitization
B. GPS tracking
C. Voice encryption
D. Patch management
GPS tracking
Sara, a security administrator, needs to implement the equivalent of a DMZ at the datacenter
entrance. Which of the following must she implementA. Video surveillance
B. Mantrap
C. Access list
D. Alarm
Mantrap
Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses
to gather data on new malware. Which of the following is being implemented by Jane’s companyA. Vulnerability scanner
B. Honeynet
C. Protocol analyzer
D. Port scanner
Honeynet
Sara, a senior programmer for an application at a software development company, has also
assumed an auditing role within the same company. She will be assessing the security of the
application. Which of the following will she be performingA. Blue box testing
B. Gray box testing
C. Black box testing
D. White box testing
White box testing
Jane, a security analyst, wants to ensure that data is being stored encrypted, in the event that a
corporate laptop is stolen. Which of the following encryption types will accomplish her goalA. IPSec
B. Secure socket layer
C. Whole disk
D. Transport layer security
Whole disk
Which of the following BEST describes a directory traversal attackA. A malicious user can insert a known pattern of symbols in a URL to access a file in another
section of the directory.
B. A malicious user can change permissions or lock out user access from a webroot directory or
subdirectories.
C. A malicious user can delete a file or directory in the webroot directory or subdirectories.
D. A malicious user can redirect a user to another website across the Internet.
A malicious user can insert a known pattern of symbols in a URL to access a file in another
section of the directory.
Sara, the Chief Executive Officer (CEO) of a corporation, wishes to receive her corporate email
and file attachments on her corporate mobile computing device. If the device is lost or stolen, the
BEST security measure to ensure that sensitive information is not comprised would be:
A. to immediately file a police report and insurance report
B. the ability to remotely wipe the device to remove the data
C. to immediately issue a replacement device and restore data from the last backup
D. to turn on remote GPS tracking to find thedevice and track its movements
the ability to remotely wipe the device to remove the data
In her morning review of new vendor patches, a security administrator has identified an exploit thatis marked as critical. Which of the following is the BEST course of actionA. The security administrator should wait seven days before testing the patch to ensure that the
vendor does not issue an updated version, which would require reapplying the patch.
B. The security administrator should download the patch and install it to her workstation to test
whether it will be able to be applied to all workstations in the environment.
C. The security administrator should alert the risk management department to document the patch
and add it to the next monthly patch deployment cycle.
D. The security administrator should download the patch to the test network, apply it to affected
systems, and evaluate the results on the test systems.
The security administrator should download the patch to the test network, apply it to affected
systems, and evaluate the results on the test systems.
Which of the following protocols allows for secure transfer of files? (Select TWO).
A. ICMP
B. SNMP
C. SFTP
D. SCP
E. TFTP
SFTP
SCP
Sara, a security administrator, is configuring a new firewall. She has entered statements into the
firewall configuration as follows:
Allow all Web traffic
Deny all Telnet traffic
Allow all SSH traffic
Mike, a user on the network, tries unsuccessfully to use RDP to connect to his work computer at
home. Which of the following principles BEST explains why Mike’s attempt to connect is not
successfulA. Explicit deny
B. Loop protection
C. Implicit deny
D. Implicit permit
Implicit deny
Jane, a security administrator, notices that a program has crashed. Which of the following logs
should Jane checkA. Access log
B. Firewall log
C. Audit log
D. Application log
Application log
Users at a corporation are unable to login using the directory access server at certain times of the
day. Which of the following concepts BEST describes this lack of accessA. Mandatory access control
B. Least privilege
C. Time of day restrictions
D. Discretionary access control
Time of day restrictions
Which of the following passwords is the LEAST complexA. MyTrain!45
B. [email protected]!!
C. [email protected]
D. [email protected]#8
[email protected]!!
During a penetration test from the Internet, Jane, the system administrator, was able to establish a
connection to an internal router, but not successfully log in to it. Which ports and protocols are
MOST likely to be open on the firewall? (Select FOUR).
A. 21
B. 22
C. 23
D. 69
E. 3389
F. SSH
G. Terminal services
H. Rlogin
I. Rsync
J. Telnet
22
23
SSH
Telnet
During an anonymous penetration test, Jane, a system administrator, was able to identify a shared
print spool directory, and was able to download a document from the spool. Which statement
BEST describes her privilegesA. All users have write access to the directory.
B. Jane has read access to the file.
C. All users have read access to the file.
D. Jane has read access to the directory.
All users have read access to the file.
Sara, an IT security technician, has identified security weaknesses within her company’s code.
Which of the following is a common security coding issueA. Input validation
B. Application fuzzing
C. Black box testing
D. Vulnerability scanning
Input validation
Which of the following is an application security coding problemA. Error and exception handling
B. Patch management
C. Application hardening
D. Application fuzzing
Error and exception handling
Matt, an IT security technician, needs to create a way to recover lost or stolen company devices.
Which of the following BEST meets this needA. Locking cabinets
B. GPS tracking
C. Safe
D. Firewalls
GPS tracking
An IT security technician needs to establish host based security for company workstations. Which
of the following will BEST meet this requirementA. Implement IIS hardening by restricting service accounts.
B. Implement database hardening by applying vendor guidelines.
C. Implement perimeter firewall rules to restrict access.
D. Implement OS hardening by applying GPOs.
Implement OS hardening by applying GPOs.
Jane, an IT security technician, receives a call from the vulnerability assessment team informing
her that port 1337 is open on a user’s workstation. Which of the following BEST describes this
type of malwareA. Logic bomb
B. Spyware
C. Backdoor
D. Adware
Backdoor
Which of the following is the MOST specific plan for various problems that can arise within a
systemA. Business Continuity Plan
B. Continuity of Operation Plan
C. Disaster Recovery Plan
D. IT Contingency Plan
IT Contingency Plan
Pete, an employee, needs a certificate to encrypt data. Which of the following would issue Pete a
certificateA. Certification authority
B. Key escrow
C. Certificate revocation list
D. Registration authority
Certification authority
Which of the following BEST describes the weakness in WEP encryptionA. The initialization vector of WEP uses a crack-able RC4 encryption algorithm. Once enough
packets are captured an XOR operation can be performed and the asymmetric keys can be
derived.
B. The WEP key is stored in plain text and split in portions across 224 packets of random data.
Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain
text key.
C. The WEP key has a weak MD4 hashing algorithm used. A simple rainbow table can be used to
generate key possibilities due to MD4 collisions.
D. The WEP key is stored with a very small pool of random numbers to make the cipher text. As
the random numbers are often reused it becomes easy to derive the remaining WEP key.
The WEP key is stored with a very small pool of random numbers to make the cipher text. As
the random numbers are often reused it becomes easy to derive the remaining WEP key.
Which of the following is used to ensure message integrity during a TLS transmission?B. RSA
C. AES
D. HMAC
A. RIPEMD
HMAC
Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years.
Each breach has cost the company $3,000. A third party vendor has offered to repair the security
hole in the system for $25,000. The breached system is scheduled to be replaced in five years.
Which of the following should Sara do to address the riskA. Accept the risk saving $10,000.
B. Ignore the risk saving $5,000.
C. Mitigate the risk saving $10,000.
D. Transfer the risk saving $5,000.
Transfer the risk saving $5,000.
A company has asked Pete, a penetration tester, to test their corporate network. Pete was
provided with all of the server names, configurations, and corporate IP addresses. Pete was then
instructed to stay off of the Accounting subnet as well as the company web server in the DMZ.
Pete was told that social engineering was not in the test scope as well. Which of the following
BEST describes this penetration testA. Gray box
B. Black box
C. White box
D. Blue box
White box
Which of the following is an authentication and accounting service that uses TCP for connecting to
routers and switchesA. DIAMETER
B. RADIUS
C. TACACS+
D. Kerberos
TACACS+
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on
a production systemA. Input validation
B. Network intrusion detection system
C. Anomaly-based HIDS
D. Peer review
Input validation
Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation
methods would provide the MOST physical protectionA. Sign in and sign out logs
B. Mantrap
C. Video surveillance
D. HVAC
Mantrap
Which of the following should be connected to the fire alarm system in order to help prevent the
spread of a fire in a server room without data loss to assist in an FM-200 deploymentA. Water base sprinkler system
B. Electrical
C. HVAC
D. Video surveillance
HVAC
Matt, a security consultant, has been tasked with increasing server fault tolerance and has been
given no budget to accomplish his task. Which of the following can Matt implement to ensure
servers will withstand hardware failureA. Hardware load balancing
B. RAID
C. A cold site
D. A host standby
RAID
Pete has obtained a highly sensitive document and has placed it on a network drive which has
been formatted with NTFS and is shared via CIFS. Which of the following access controls apply to
the sensitive file on the serverA. Discretionary
B. Rule based
C. Role based
D. Mandatory
Discretionary
Which of the following fire suppression systems is MOST likely used in a datacenterA. FM-200
B. Dry-pipe
C. Wet-pipe
D. Vacuum
FM-200
A security administrator has installed a new KDC for the corporate environment. Which of the
following authentication protocols is the security administrator planning to implement across the
organizationA. LDAP
B. RADIUS
C. Kerberos
D. XTACACS
Kerberos
Which of the following uses only a private keyA. RSA
B. ECC
C. AES
D. SHA
AES
While opening an email attachment, Pete, a customer, receives an error that the application has
encountered an unexpected issue and must be shut down. This could be an example of which of
the following attacksA. Cross-site scripting
B. Buffer overflow
C. Header manipulation
D. Directory traversal
Buffer overflow
Jane has recently implemented a new network design at her organization and wishes to passively
identify security issues with the new network. Which of the following should Jane performA. Vulnerability assessment
B. Black box testing
C. White box testing
D. Penetration testing
Vulnerability assessment
A database server containing personal information and a file server containing non-critical
information must be secured. Which of the following would be a BEST practice to secure the
servers? (Select TWO).
A. Place the file server behind a door requiring biometric authorization.
B. Place both servers under the system administrator’s desk.
C. Place the database server behind a door with a cipher lock.
D. Place the file server in an unlocked rack cabinet.
E. Place the database server behind a door requiring biometric authorization.
Place the file server behind a door requiring biometric authorization.

Place the database server behind a door requiring biometric authorization.

A company is experiencing an extraordinary amount of web traffic that is crippling the server. The
web traffic suddenly stops. The mail server experiences the same amount of traffic as before then
crashes. Which of the following attacks would this BEST describeA. DoS
B. Spam
C. Man-in-the-middle
D. Replay
DoS
Which of the following would ensure confidentiality and authorization to the management interface
of a routerA. Enable an access list and RADIUS
B. Enable SSH and TACACS
C. Enable an access list and PKI
D. Enable LDAP and strong passwords
Enable SSH and TACACS
Which of the following BEST describes a demilitarized zoneA. A buffer zone between protected and unprotected networks.
B. A network where all servers exist and are monitored.
C. A sterile, isolated network segment with access lists.
D. A private network that is protected by a firewall and a VLAN.
A buffer zone between protected and unprotected networks.
A security technician is attempting to explain why some of the company policies should be
changed for high risk IT positions. Which of the following concepts BEST explains the support for
fraud detectionA. Time of day restrictions is more likely to discover fraud than the other fraud detection methods.
B. Least privilege principles allow internal audit teams to discover fraud while a staff member is
out of the office.
C. Separation of duties is a better fraud detection method than mandatory vacations; therefore, it
should be used.
D. Mandatory vacations support the company discovering fraud while staff members are out of the
office.
. Mandatory vacations support the company discovering fraud while staff members are out of the
office.
A security technician is working with the network firewall team to implement access controls at the
company’s demarc as part of the initiation of configuration management processes. One of the
network technicians asks the security technician to explain the access control type found in a
firewall. With which of the following should the security technician respondA. Rule based access control
B. Role based access control
C. Discretionary access control
D. Mandatory access control
Rule based access controlRule based access control
Sara, a security administrator, has been tasked with explaining smart cards to the company’s
management team. Which of the following are smart cards? (Select TWO).
A. DAC
B. Tokens
C. CAC
D. ACL
E. PIV
CAC
PIV
Jane, a security architect, is implementing security controls throughout her organization. Which of
the following BEST explains the vulnerability in the formula that a Risk = Threat x Vulnerability x
ImpactA. Vulnerability is related to the risk that an event will take place.
B. Vulnerability is related to value of potential loss.
C. Vulnerability is related to the probability that a control will fail.
D. Vulnerability is related to the probability of the event.
Vulnerability is related to the probability that a control will fail.
The information security department regularly walks the campus and around the buildings looking
for unauthorized open wireless networks. This is an example of which of the followingA. A site survey
B. Antenna placement
C. War dialing
D. War driving
War driving
The lobby of the hotel allows users to plug in their laptops to access the Internet. This network is
also used for the IP based phones in the hotel lobby. Mike, the security engineer, wants to secure
the phones so that guests cannot electronically eavesdrop on other guests. Which of the following
would Mike MOST likely implementA. VLAN
B. Port security
C. MPLS
D. Separate voice gateway
VLAN
Jane, the security engineer, is tasked with hardening routers. She would like to ensure that
network access to the corporate router is allowed only to the IT group and from authorized
machines. Which of the following would MOST likely be implemented to meet this security goal(Select TWO).
A. SNMP
B. HTTPS
C. ACL
D. Disable console
E. SSH
F. TACACS+
ACL
TACACS+
Which of the following can be used to discover if a security attack is occurring on a web serverA. Creating a new baseline
B. Disable unused accounts
C. Implementing full disk encryption
D. Monitoring access logs
Monitoring access logs
Jane, the CEO, receives an email wanting her to clink on a link to change her username and
password. Which of the following attacks has she just receivedA. Hoaxes
B. Whaling
C. Bluejacking
D. Vishing
Whaling
Pete, the system administrator, wishes to monitor and limit users’ access to external websites.
Which of the following would BEST address thisA. Block all traffic on port 80.
B. Implement NIDS.
C. Use server load balancers.
D. Install a proxy server.
Install a proxy server.
Sara, the security administrator, must configure the corporate firewall to allow all public IP
addresses on the internal interface of the firewall to be translated to one public IP address on the
external interface of the same firewall. Which of the following should Sara configureA. PAT
B. NAP
C. DNAT
D. NAC
PAT
Which of the following settings can Jane, the network administrator, implement in the computer lab
to ensure that user credentials cannot be captured by the next computer userA. Implement full drive encryption on all lab computers.
B. Reverse the computer to its original state upon reboot.
C. Do not display last username in logon screen.
D. Deploy privacy screens on all lab computers.
Do not display last username in logon screen.
Jane, a security administrator, is reviewing the company’s official documentation to mitigate the
risk of data loss due to personally owned devices being connected to perform company related
work. Which of the following documentation should Jane MOST likely review and updateA. Acceptable risk
B. Data retention policy
C. Acceptable use policy
D. End user license agreement
Acceptable use policy
After a production outage, which of the following documents contains detailed information on the
order in which the system should be restored to serviceA. Succession planning
B. Disaster recovery plan
C. Information security plan
D. Business impact analysis
Disaster recovery plan
Pete, a security administrator, has implemented SSH across all network infrastructure devices in
the enterprise. Which of the following protocols will be used to exchange keying material within
SSHA. Transport layer protocol
B. IPSec
C. Diffie-Hellman
D. Secure socket layer
Diffie-Hellman
Matt, a security analyst, needs to select an asymmetric encryption method that allows for the
same level of encryption strength with a lower key length than is typically necessary. Which of the
following encryption methods offers this capabilityA. Twofish
B. Diffie-Hellman
C. ECC
D. RSA
ECC
Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that
the cost per record for a breach is $300. The likelihood that their database would be breached in
the next year is only 5%. Which of the following is the ALE that Sara should report to management
for a security breachA. $1,500
B. $3,750
C. $15,000
D. $75,000
$3,750
Matt must come up with a design solution which will enable remote users to securely access
network resources. Which of the following design elements will enable Matt to meet this objectiveA. DMZ
B. VLAN
C. VPN
D. NAT
VPN
Sara, a security technician, has been asked to design a solution which will enable external users
to have access to a Web server, while keeping the internal network unaffected by this access.
Which of the following would BEST meet this objectiveA. Place the Web server on a VLAN
B. Place the Web server inside of the internal firewall
C. Place the Web server in a DMZ
D. Place the Web server on a VPN
Place the Web server in a DMZ
Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the
following ports should be opened on the firewallA. TCP 23
B. UDP 69
C. TCP 22
D. TCP 21
TCP 22
Matt, a security technician, notices a high number of ARP spoofing attacks on his network. Which
of the following design elements would mitigate ARP spoofing attacksA. Flood guards
B. Implicit deny
C. VLANs
D. Loop protection
Flood guards
Matt works for an organization that requires data to be recovered in the shortest amount of time
possible. Which of the following backup types would BEST meet the organization’s needsA. Full backups daily
B. Differential backups monthly
C. Full backups weekly
D. Incremental backups monthly
Full backups daily
Sara, a security architect, has developed a framework in which several authentication servers
work together to increase processing power for an application. Which of the following does this
representA. Warm site
B. Load balancing
C. Clustering
D. RAID
Clustering
How would a technician secure a router configuration if placed in an unsecured closetA. Mount the router into an immovable rack.
B. Enable SSH for maintenance of the router.
C. Disable the console port on the router.
D. Label the router with contact information.
Disable the console port on the router.
Which of the following firewall rules would only block tftp traffic and record itA. deny udp any server log
B. deny udp any server eq 69
C. deny tcp any server log
D. deny udp any server eq 69 log
deny udp any server eq 69 log
Which of the following services should be disabled to stop attackers from using a web server as a
mail relayA. IMAP
B. SMTP
C. SNMP
D. POP3
SMTP
A security administrator has a requirement to encrypt several directories that are non-hierarchical.
Which of the following encryption models would BEST meet this requirementA. AES512
B. Database encryption
C. File encryption
D. Full disk encryption
Full disk encryption
Pete, a security analyst, has been tasked with explaining the different types of malware to his
colleagues. The two malware types that the group seems to be most interested in are backdoors
and logic bombs. Which of the following differentiates these two types of malwareA. A backdoor is a coding issue that can be discovered by proper configuration management
processes.
B. A logic bomb is typically hidden within the boot sector of the hard drive and is used to cause
DDoS.
C. A backdoor is a third generation attack which is typically low risk because only highly trained staff can achieve it.
D. A logic bomb is undetectable by current antivirus signatures because a patch has not been
issued.
A backdoor is a coding issue that can be discovered by proper configuration management
processes.
Pete, a security analyst, has been tasked with explaining the different types of malware to his
colleagues. The two malware types that the group seems to be most interested in are botnets and
viruses. Which of the following explains the difference between these two types of malwareA. Viruses are a subset of botnets which are used as part of SYN attacks.
B. Botnets are a subset of malware which are used as part of DDoS attacks.
C. Viruses are a class of malware which create hidden openings within an OS.
D. Botnets are used within DR to ensure network uptime and viruses are not.
Botnets are a subset of malware which are used as part of DDoS attacks.
A. Thumb drives present a significant threat which is mitigated by HSM.
B. Software encryption can perform multiple functions required by HSM.
C. Data loss by removable media can be prevented with DLP.
D. Hardware encryption is faster than software encryption.
Hardware encryption is faster than software encryption.
Which of the following technologies can store multi-tenant data with different security
requirementsA. Data loss prevention
B. Trusted platform module
C. Hard drive encryption
D. Cloud computing
Cloud computing
Which of the following technologies prevents USB drives from being recognized by company
systemsA. Registry keys
B. Full disk encryption
C. USB encryption
D. Data loss prevention
Registry keys
Matt, a security analyst, needs to implement encryption for company data and also prevent theft of
company data. Where and how should Matt meet this requirementA. Matt should implement access control lists and turn on EFS.
B. Matt should implement DLP and encrypt the company database.
C. Matt should install Truecrypt and encrypt the company server.
D. Matt should install TPMs and encrypt the company database.
Matt should implement DLP and encrypt the company database.
Which of the following types of encryption will help in protecting files on a PEDA. Mobile device encryption
B. Transport layer encryption
C. Encrypted hidden container
D. Database encryption
Mobile device encryption
Which of the following is MOST closely associated with BitLockerA. ACL
B. DOS
C. DLP
D. TPM
TPM
Which of the following does full disk encryption preventA. Client side attacks
B. Clear text access
C. Database theft
D. Network-based attacks
Clear text access
Pete, a security analyst, has been informed that the development team has plans to develop an
application which does not meet the company’s password policy. Which of the following should
Pete do NEXTA. Contact the Chief Information Officer and ask them to change the company password policy so
that the application is made compliant.
B. Tell the application development manager to code the application to adhere to the company’s
password policy.
C. Ask the application development manager to submit a risk acceptance memo so that the issue
can be documented.
D. Inform the Chief Information Officer of non-adherence to the security policy so that the
developers can be reprimanded.
Tell the application development manager to code the application to adhere to the company’s
password policy.
Sara, a security manager, has decided to force expiration of all company passwords by the close
of business day. Which of the following BEST supports this reasoningA. A recent security breach in which passwords were cracked.
B. Implementation of configuration management processes.
C. Enforcement of password complexity requirements.
D. Implementation of account lockout procedures.
A recent security breach in which passwords were cracked.
Which of the following presents the STRONGEST access controlA. MAC
B. TACACS
C. DAC
D. RBAC
MAC
Which of the following encompasses application patch managementA. Configuration management
B. Policy management
C. Cross-site request forgery
D. Fuzzing
Configuration management
Sara, an application developer, implemented error and exception handling alongside input
validation. Which of the following does this help preventA. Buffer overflow
B. Pop-up blockers
C. Cross-site scripting
D. Fuzzing
Buffer overflow
Which of the following is the LEAST volatile when performing incident response proceduresA. Registers
B. RAID cache
C. RAM
D. Hard drive
Hard drive
Which of the following can allow Sara, a security analyst, to encrypt individual files on a systemA. EFS
B. Single sign-on
C. TLS
D. Journaled file system
EFS
An encryption method where the plain text and cipher text are always the same size is an example
of which of the following types of encryptionA. RC4
B. MD5
C. Steam Cipher
D. Block Cipher
Block Cipher
The information security team does a presentation on social media and advises the participants
not to provide too much personal information on social media web sites. This advice would BEST
protect people from which of the followingA. Rainbow tables attacks
B. Brute force attacks
C. Birthday attacks
D. Cognitive passwords attacks
Cognitive passwords attacks
The compliance team comes out with a new policy that all data stored on tapes over 3 years must
be degaussed. This BEST describes which of the following types of policiesA. Data handling
B. Data classification
C. Data labeling
D. Data disposal
Data disposal
Pete’s corporation has outsourced help desk services to a large provider. Management has
published a procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing
the technician to work on their PC. Which of the following does this procedure preventA. Collusion
B. Impersonation
C. Pharming
D. Transitive Access
Impersonation
Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has
implemented a security control to limit the connecting MAC addresses to a single port. Which of
the following wireless attacks would this addressA. Interference
B. Man-in-the-middle
C. ARP poisoning
D. Rogue access point
Rogue access point
Which of the following can be implemented with multiple bit strengthA. AES
B. DES
C. SHA-1
D. MD5
E. MD4
AES
Jane, the security administrator, is having issues with unauthorized users connecting to the
wireless network. For administrative reasons, she cannot implement any wireless encryption
methods. Which of the following can she implement to prevent unauthorized users from
connecting to the networkA. NIPS
B. Disable unused ports
C. MAC filtering
D. WEP
MAC filtering
Matt, the security administrator, wants to secure the wireless network. Which of the following
encryption methods offers the MOST securityA. WPA2 ENT AES
B. WPA2 PSK AES
C. WPA2 ENT TKIP
D. WPA2 PSK TKIP
WPA2 ENT AES
Sara, the IT administrator, wants to control which devices can connect to the wireless network.
Which of the following can she implement to accomplish this taskA. WPA2 Enterprise with AES encryption
B. Decrease the WAP’s power levels
C. Static IP addressing
D. MAC address filtering
MAC address filtering
Pete, the system administrator, has instituted a policy banning personal digital music and video
players from the company premises. Which of the following would be the BEST reason for such a
policyA. The company would be legally liable for any personal device that is lost on its premises.
B. It is difficult to verify ownership of offline device’s digital rights management and ownership.
C. The media players may act as distractions during work hours and adversely affect user
productivity.
D. If connected to a computer, unknown malware may be introduced into the environment.
If connected to a computer, unknown malware may be introduced into the environment.
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provideA. No competition with the company’s official social presence
B. Protection against malware introduced by banner ads
C. Increased user productivity based upon fewer distractions
D. Elimination of risks caused by unauthorized P2P file sharing
Protection against malware introduced by banner ads
Pete, the system administrator, is concerned about unauthorized access at all entrances into the
building. PIN pad readers have been installed, but users have developed the habit of holding the
door for others behind them. Which of the following would BEST prevent thisA. Install mantraps at every unmanned entrance.
B. Replace the PIN pad readers with card readers.
C. Implement video and audio surveillance equipment.
D. Require users to sign conduct policies forbidding these actions.
Install mantraps at every unmanned entrance.
Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the
downtime in the event of a disaster, but does not have the budget approval to implement or
maintain an offsite location that ensures 99.99% availability. Which of the following would be
Pete’s BEST optionA. Use hardware already at an offsite location and configure it to be quickly utilized.
B. Move the servers and data to another part of the company’s main campus from the server
room.
C. Retain data back-ups on the main campus and establish redundant servers in a virtual
environment.
D. Move the data back-ups to the offsite location, but retain the hardware on the main campus for
redundancy.
Use hardware already at an offsite location and configure it to be quickly utilized.
Jane, a network administrator, has configured a 48-port switch to isolate four different
departments. Which of the following has Jane MOST likely configured on the switch?A. NAC
B. 802.1x
C. VLAN
D. DMZ
VLAN
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher
which will encrypt 8 bits at a time before sending the data across the network. Which of the
following has Sara selectedA. Block cipher
B. Stream cipher
C. CRC
D. Hashing algorithm
Block cipher
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the
authenticator. Which of the following is configured in the RADIUS server and what technologies
should the authentication protocol be changed toA. PAP, MSCHAPv2
B. CHAP, PAP
C. MSCHAPv2, NTLMv2
D. NTLM, NTLMv2
PAP, MSCHAPv2
Which of the following is an important implementation consideration when deploying a wireless network that uses a shared passwordA. Authentication server
B. Server certificate
C. Key length
D. EAP method
Key length
Which of the following would satisfy wireless network implementation requirements to use mutual
authentication and usernames and passwordsA. EAP-MD5
B. WEP
C. PEAP-MSCHAPv2
D. EAP-TLS
PEAP-MSCHAPv2
A security analyst needs to ensure all external traffic is able to access the company’s front-end
servers but protect all access to internal resources. Which of the following network design
elements would MOST likely be recommendedA. DMZ
B. Cloud computing
C. VLAN
D. Visualization
DMZ
Layer 7 devices used to prevent specific types of html tags are called:
A. firewalls.
B. content filters.
C. routers.
D. NIDS.
content filters.
Which of the following allows a network administrator to implement an access control policy based
on individual user characteristics and NOT on job functionA. Attributes based
B. Implicit deny
C. Role based
D. Rule based
Attributes based
Which of the following network architecture concepts is used to securely isolate at the boundary
between networksA. VLAN
B. Subnetting
C. DMZ
D. NAT
DMZ
In which of the following categories would creating a corporate privacy policy, drafting acceptable
use policies, and group based access control be classifiedA. Security control frameworks
B. Best practice
C. Access control methodologies
D. Compliance activity
Best practice
Which of the following devices is typically used to provide protection at the edge of the network
attack surfaceA. Firewall
B. Router
C. Switch
D. VPN concentrator
Firewall
A malicious program modified entries in the LMHOSTS file of an infected system. Which of the
following protocols would have been affected by thisA. ICMP
B. BGP
C. NetBIOS
D. DNS
NetBIOS
A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet
interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks.
Which of the following is MOST likely the reason for the sub-interfacesA. The network uses the subnet of 255.255.255.128.
B. The switch has several VLANs configured on it.
C. The sub-interfaces are configured for VoIP traffic.
D. The sub-interfaces each implement quality of service.
The switch has several VLANs configured on it.
Digital Signatures provide which of the followingA. Confidentiality
B. Authorization
C. Integrity
D. Authentication
E. Availability
Integrity
– Exhibit —
— Exhibit —
Use the exhibit button to show a video of an attack.
Which of the following BEST describes the type of attack that is occurringA. Smurf Attack
B. Man in the middle
C. Backdoor
D. Replay
E. Spear Phishing
F. Xmas Attack
G. Blue Jacking
H. Ping of Death
Smurf Attack
Which of the following BEST describes a SQL Injection attackA. The attacker attempts to have the receiving server pass information to a back-end database
from which it can compromise the stored information.
B. The attacker attempts to have the receiving server run a payload using programming commonly
found on web servers.
C. The attacker overwhelms a system or application, causing it to crash and bring the server down
to cause an outage.
D. The attacker overwhelms a system or application, causing it to crash, and then redirects the
memory address to read from a location holding the payload.
The attacker attempts to have the receiving server pass information to a back-end database
from which it can compromise the stored information.
Which of the following is a hardware-based security technology included in a computerA. Symmetric key
B. Asymmetric key
C. Whole disk encryption
D. Trusted platform module
Trusted platform module
An administrator might choose to implement a honeypot in order to:
A. Provide load balancing for network switches.
B. Distract potential intruders away from critical systems.
C. Establish a redundant server in case of a disaster.
D. Monitor any incoming connections from the Internet.
Distract potential intruders away from critical systems.
In an enterprise environment, which of the following would be the BEST way to prevent users from
accessing inappropriate websites when AUP requirements are constantly changingA. Deploy a network proxy server
B. Configure Internet content filters on each workstation
C. Deploy a NIDS
D. Deploy a HIPS
Deploy a network proxy server
An administrator notices that former temporary employees’ accounts are still active on a domain.
Which of the following can be implemented to increase security and prevent this from happeningA. Implement a password expiration policy.
B. Implement an account expiration date for permanent employees.
C. Implement time of day restrictions for all temporary employees.
D. Run a last logon script to look for inactive accounts.
Run a last logon script to look for inactive accounts.
A trojan was recently discovered on a server. There are now concerns that there has been a
security breach that allows unauthorized people to access data. The administrator should be
looking for the presence of a/an:
A. logic bomb
B. backdoor
C. adware application
D. rootkit
backdoor
Which of the following protocols uses TCP instead of UDP and is incompatible with all previous
versionsA. TACACS
B. XTACACS
C. RADIUS
D. TACACS+
TACACS+
Which of the following is an authentication service that uses UDP as a transport mediumA. TACACS+
B. LDAP
C. Kerberos
D. RADIUS
RADIUS

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>