Security +

QUESTION 1
A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this

B. Block port 23 on the network firewall

QUESTION 2
Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department's server, and the accounting department should not have access to the HR department's server. The network is sepa

B. VLANs

Which of the following is BEST utilized to actively test security controls on a particular system?

B. Penetration test

QUESTION 4
Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking Pete's access to this site?

A. Internet content filter

QUESTION 5
Which of the following has serious security implications for large organizations and can potentially allow an attacker to capture conversations?

C. Jabber

QUESTION 6
Upper management decides which risk to mitigate based on cost. This is an example of:

Answer: D Section:

Isolation mode on an AP provides which of the following functionality types?

A. Segmentation of each wireless user from other wireless users

QUESTION 8
Employees are reporting that unauthorized personnel are in secure areas of the building. This is MOST likely due to lack of security awareness in which of the following areas?

C. Physical security controls

QUESTION 9
A forensic image of a hard drive has been created. Which of the following can be used to demonstrate the image has not been tampered with?

D. Hash of the image file 5

QUESTION 10
Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?

A. SSH

QUESTION 11
Which of the following security concepts can Matt, a security administrator, implement to support integrity?

A. Digital signatures

QUESTION 12
Which of the following combinations represents multifactor authentication?

D. Cipher lock combination and proximity badge

QUESTION 13
Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?

C. Initial baseline configuration

QUESTION 14
6
Which of the following is Jane, a security administrator, MOST likely implementing when deleting all the unneeded files and modules of a newly installed application?

D. Application hardening

QUESTION 15
Matt, a security administrator, wants to ensure that the message he is sending does not get intercepted or modified in transit. This concern relates to which of the following concepts?

B. Integrity

QUESTION 16
Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption?

B. Blowfish

QUESTION 17
Which of the following best practices makes a wireless network more difficult to find?

C. Disable SSD broadcast

QUESTION 18
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?

C. Trojan

QUESTION 19
The use of social networking sites introduces the risk of:

A. Disclosure of proprietary information

QUESTION 20
Which the following flags are used to establish a TCP connection? (Select TWO).

B. ACK
C. SYN

QUESTION 21
Which of the following is MOST likely to result in data loss?

D. Developers copying data from production to the test environments via a USB stick

QUESTION 22
Sara, a security administrator, sends an email to the user to verify their password has been reset. Which of the following threats is BEST mitigated by this action?

B. Impersonation

QUESTION 23
Which of the following describes an LDAP injection attack?

B. Manipulating an application's LDAP query to gain or alter access rights

QUESTION 24
Which of the following concepts defines the requirement for data availability?

C. Disaster recovery planning

QUESTION 25
Which of the following is an example of multifactor authentication?

A. Credit card and PIN

QUESTION 26
Which of the following is an attack designed to steal cell phone data and contacts?

A. Bluesnarfing

QUESTION 27
Which of the following best practices is commonly found at the end of router ACLs?

B. Implicit deny

QUESTION 28
Which of the following uses TCP / UDP port 53 by default?

A. DNS

QUESTION 29
An organization is recovering data following a datacenter outage and determines that backup copies of files containing personal information were stored in an unsecure location, because the sensitivity was unknown. Which of the following activi

C. Data classification

QUESTION 30
Sara, the network administrator, was alerted to an unauthorized email that was sent to specific VIPs in the company with a malicious attachment. Which of the following types of attacks is MOST likely being described?

B. Whaling

QUESTION 31
In the event of a mobile device being lost or stolen, which of the following BEST protects against sensitive information leakage?

B. Remote wipe

QUESTION 32
Which of the following should Sara, a security administrator, perform periodically to reduce an organization's risk exposure by verifying employee access?

A. Account revalidation

QUESTION 33
Which of the following is the MAIN benefit of server-side versus client-side input validation?

A. Server-side input validation results in a more secure system than client-side input validation.

QUESTION 34
Which of the following is MOST appropriate when storing backup tapes in a physically non-secure room?

B. Store the tapes in a locked safe.

QUESTION 35
Grandfather-Father-Son and Tower of Hanoi are common:

B. Backup tape rotation strategies.

QUESTION 36
Which of the following is the below pseudo-code an example of?
IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT

B. Input validation

QUESTION 37
Which of the following can BEST be implemented on a mobile phone to help prevent any sensitive data from being recovered if the phone is lost?

C. Device encryption

QUESTION 38
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?

B. Clean desk policy

QUESTION 39
If Organization A trusts Organization B and Organization B trusts Organization C, then Organization A trusts Organization C. Which of the following PKI concepts is this describing?

A. Transitive trust

QUESTION 40
Which of the following is BEST associated with PKI?

A. Private key

QUESTION 41
Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?

Answer: B Section:

QUESTION 42
Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days' hashes. Which of the following security concepts is Sara using?

Answer: C Integrity

QUESTION 43
Following a security failure incident, the chain of custody must be followed in order to:

C. Preserve and maintain evidence integrity.

QUESTION 44
Jane, an IT administrator, is implementing security controls on a Microsoft Windows based kiosk used at a bank branch. This kiosk is used by the public for Internet banking. Which of the following controls will BEST protect the kiosk from gene

A. Group policy implementation

QUESTION 45
After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen: 'Please only use letters and numbers on these fields' "FirstTest, FirstPass" - www.lead2pass.com 13 Which of

B. Proper input validation

QUESTION 46
The corporate NIPS requires a daily download from its vendor with updated definitions in order to block the latest attacks. Which of the following describes how the NIPS is functioning?

C. Signature based

QUESTION 47
Pete, a security administrator, needs to update the community strings on the router since they have been compromised. Which of the following needs to be changed?

B. SNMP

QUESTION 48
Which of the following authentication services uses the AAA architecture and runs on TCP?

D. TACACS+

QUESTION 49
Users have notified Sara, a technician, that the performance of a specific set of servers has degraded. All of the servers are in the same facility and accessible, but are very slow to respond. Which of the following is MOST likely the cause?

D. HVAC has failed causing server CPUs to overheat and throttle.

QUESTION 50
Matt, an administrator, captures malicious DNS traffic on the network. Which of the following tools would be used to analyze the nature of this traffic?

A. Sniffer

QUESTION 51
Which of the following explains the difference between a public key and a private key?

D. The private key is only used by the client and kept secret while the public key is available to all.

QUESTION 52
User A is a member of the payroll security group. Each member of the group should have read/write permissions to a share. User A was trying to update a file but when the user tried to access the file the user was denied. Which of the following

B. Rights are not set correctly

QUESTION 53
A technician is implementing a new wireless network for an organization. The technician should be concerned with all of the following wireless vulnerabilities EXCEPT:

B. 802.11 mode. 15

QUESTION 54
An administrator has advised against the use of Bluetooth phones due to bluesnarfing concerns. Which of the following is an example of this threat?

B. Unauthorized intrusions into the phone to access data

QUESTION 55
An administrator wants to block users from accessing a few inappropriate websites as soon as possible. The existing firewall allows blocking by IP address. To achieve this goal the administrator will need to:

C. upgrade to a URL based filter to achieve the desired result.

QUESTION 56
An administrator wishes to deploy an IPSec VPN connection between two routers across a WAN. The administrator wants to ensure that the VPN is encrypted in the most secure fashion possible. Which of the following BEST identifies the correct IPS

A. IPSec in tunnel mode, using both the ESP and AH

QUESTION 57
An administrator has just performed an audit on their network. The security administrator has not allowed the results to be shown to the IT departmental staff. Which of the following BEST describes the reasoning for this?

C. Separation of duties

QUESTION 58
Which of the following is the primary objective of a business continuity plan (BCP)?

A. Addresses the recovery of an organizations business operations

QUESTION 59
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was

D. $7,290

QUESTION 60
All of the following are organizational policies that reduce the impact of fraud EXCEPT:

B. password complexity rules.

QUESTION 61
Which of the following features would allow Pete, a network administrator, to allow or deny access to a specific list of network clients?

D. MAC filtering

QUESTION 62
Pete, a system administrator, is using a packet sniffer to troubleshoot remote authentication. Pete detects a device trying to communicate to UDP ports 1812 and 1813. Which of the following authentication methods is MOST likely being attempted

D. RADIUS

QUESTION 63
Which of the following is an example of authentication using something Jane, a user, has and something she knows?

A. GSM phone card and PIN

QUESTION 64
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee's credential?

A. Account expiration

QUESTION 65
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?

D. HMAC

QUESTION 66
Which of the following does Jane, a software developer, need to do after compiling the source code of a program to attest the authorship of the binary?

B Use Jane's private key to sign the binary

QUESTION 187
A technician is investigating intermittent switch degradation. The issue only seems to occur when the buildings roof air conditioning system runs. Which of the following would reduce the connectivity issues?

C. Shielding

QUESTION 188
According to company policy an administrator must logically keep the Human Resources department separated from the Accounting department. Which of the following would be the simplest way to accomplish this?

D. VLAN

QUESTION 189
A technician is testing the security of a new database application with a website front-end. The technician notices that when certain characters are input into the application it will crash the server. Which of the following does the technici

D. Input validation

QUESTION 190
An organization is installing new servers into their infrastructure. A technician is responsible for making sure that all new servers meet security requirements for uptime. In which of the following is the availability requirements identified

A. Service level agreement

QUESTION 191
Why is bluesnarfing more of a security concern than blue jacking?

B. The target device has its data accessed or stolen from another Bluetooth device.

QUESTION 192
Which of the following is the MOST effective way to minimize restoration time and conserve storage space while adhering to industry best practices?

A. Perform full backups weekly and differential backups nightly, with the tapes stored in a secure, off-site location.

QUESTION 193
A company takes orders exclusively over the Internet. Customers submit orders via a web-based application running on the external web server which is located on Network A. Warehouse employees use an internal application, on its own server, to

A. ADD on Network A, NONE on Network B

QUESTION 194
A company takes orders exclusively over the Internet. Customers submit orders via a web-based application running on the external web server which is located on Network A. Warehouse employees use an internal application, on its own server, to

B. Place the accounting database and accounting employees on Network B.

QUESTION 195
A company takes orders exclusively over the Internet. Customers submit orders via a web-based application running on the external web server which is located on network A. Warehouse employees use an internal application, on its own server, to

B. CHANGE on Network B, NONE on Network