Security+ Part 3

Beschreibung

Security+ Part 3
Mike Wen
Quiz von Mike Wen, aktualisiert more than 1 year ago
Mike Wen
Erstellt von Mike Wen vor mehr als 7 Jahre
93
0

Zusammenfassung der Ressource

Frage 1

Frage
An administrator is configuring a new Linux web server where each user account is confined to a cheroot jail. Which of the following describes this type of control?
Antworten
  • SysV
  • Sandbox
  • Zone
  • Segmentation

Frage 2

Frage
A company must send sensitive data over a non-secure network via web services. The company suspects that competitors are actively trying to intercept all transmissions. Some of the information may be valuable to competitors, even years after it has been sent. Which of the following will help mitigate the risk in the scenario?
Antworten
  • Digitally sign the data before transmission
  • Choose steam ciphers over block ciphers
  • Use algorithms that allow for PFS
  • Enable TLS instead of SSL
  • Use a third party for key escrow

Frage 3

Frage
An administrator requests a new VLAN be created to support the installation of a new SAN. Which of the following data transport?
Antworten
  • Fibre Channel
  • SAS
  • Sonet
  • ISCSI

Frage 4

Frage
Which of the following can be mitigated with proper secure coding techniques?
Antworten
  • Input validation
  • Error handling
  • Header manipulation
  • Cross-site scripting

Frage 5

Frage
When implementing a mobile security strategy for an organization which of the following is the MOST influential concern that contributes to that organization's ability to extend enterprise policies to mobile devices?
Antworten
  • Support for mobile OS
  • Support of mobile apps
  • Availability of mobile browsers
  • Key management for mobile devices

Frage 6

Frage
A recent audit has revealed that all employees in the bookkeeping department have access to confidential payroll information, while only two members of the bookkeeping department have job duties that require access to the confidential information. Which of the following can be implemented to reduce the risk of this information becoming compromised in this scenario? (Select TWO)
Antworten
  • Rule-based access control
  • Role-based access control
  • Data loss prevention
  • Separation of duties
  • Group-based permissions

Frage 7

Frage
A project manager is evaluating proposals for a cloud computing project. The project manager is particularly concerned about logical security controls in place at the service provider's facility. Which of the following sections of the proposal would be MOST important to review, given the project manager's concerns?
Antworten
  • CCTV monitoring
  • Perimeter security lighting system
  • Biometric access system
  • Environmental system configuration

Frage 8

Frage
Joe notices there are several user accounts on the local network generating spam with embedded malicious code. Which of the following technical control should Joe put in place to BEST reduce these incidents?
Antworten
  • Account lockout
  • Group Based Privileges
  • Least privilege
  • Password complexity

Frage 9

Frage
A forensics analyst is tasked identifying identical files on a hard drive. Due to the large number of files to be compared, the analyst must use an algorithm that is known to have the lowest collision rate. Which of the following should be selected?
Antworten
  • MD5
  • RC4
  • SHA1
  • AES-256

Frage 10

Frage
In an effort to reduce data storage requirements, a company devices to hash every file and eliminate duplicates. The data processing routines are time sensitive so the hashing algorithm is fast and supported on a wide range of systems. Which of the following algorithms is BEST suited for this purpose?
Antworten
  • MD5
  • SHA
  • RIPEMD
  • AES
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CompTIA Security+
michael smith0754
SY0-401 Part 1 (50 questions)
desideri
Ch 3 - Basic Cryptography
C Danvers
Security + Practice
Elise Berg
Ch 5 - Networking & Server Attacks
C Danvers
Ch 6 - Network Security Devices, Design, and Technology
C Danvers
Ch 7 - Administering a Secure Network
C Danvers
Ch 2 - Malware & Social Engineering
C Danvers
Ch 4 - Advanced Cryptography
C Danvers
CH3: OSI Layers, Devices, and Protocols
Brent Jerdo
CH3: Well-Known Ports
Brent Jerdo