Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
During a routine security assessment of a network, the security administrator discovers a user workstation with multiple SSH connections to servers outside the corporate network. Using a protocol analyzer, the administrator identifies hundreds of gigabytes of information being transferred to an external server via SCP. After identifying the user, the administrator discovers that today is the user’s last day of employment, and that the employee is going to work for a competitor. Which of the following tactics is being used to steal company secrets?
a) Logic bomb |
c) Data exfiltration |
|
When considering security requirements which require third party vendor requests, which of the following is a correctly ordered set of events from start to finish?
a) RFP, RFQ, RFC |
b) RFI, RFQ, RFP |
|
As a condition of being awarded a new contract, an organization must increase the security of its VPN ensuring that one compromised SA session key cannot be used to compromise any other sessions. Which of the following could be configured to meet this requirement?
a) Opportunistic encryption |
d) Perfect forward secrecy
|
|
A new Chief Information Officer’s (CIO’s) primary initiative is to reduce risk and the number of vulnerabilities affecting an organization. Which of the following reduces the number of locations to patch internal applications?
a) Provide application access through a VDI |
b) Host applications using terminal services |
|
Which of the following practices is MOST likely employed during e-discovery?
a) Legal hold and chain of custody |
a) Legal hold and chain of custody |
|
A new system has recently been built using the SSDLC process and is in the validation process to ensure the system is behaving correctly. During this process, the development team notices that the system is behaving as it should, except for a few minor internal application bugs. Which of the following validation types would be a result of this issue?
a) Application interface validation |
b) Code validation |
|
A security administrator notices a network intrusion and quickly solves the problem by closing an unused port. Which of the following should be completed?
a) After action report |
a) After action report |
|
A server administrator needs to find a web service that will allow most systems to communicate over HTTP using an XML based protocol. Which of the following communication methods will allow this?
a) SOAP |
a) SOAP |
|
An IT Manager has requested that specific files stored on the company SAN containing data which is not protected by patent law, but is classified as trade secret encrypted with a block cipher which is both secure and fast. Which of the following BEST satisfies the request?
a) Blowfish |
a) Blowfish |
|
An administrator uses an iSCSI unencrypted connection over the corporate network. Which of the following vulnerabilities would be present in regards to iSCSI authentication?
a) Authentication uses the older TACACS protocol and is vulnerable to a botnet attack. |
b) Authentication is vulnerable to a dictionary attack. |