Professional Documents
Culture Documents
QUESTION NO: 1
Which of the following cryptography types provides the same level of security but uses smaller key
sizes and less computational resources than logarithms which are calculated against a finite field?
A. Elliptical curve
B. Diffie-Hellman
C. Quantum
D. El Gamal
Answer: A
Explanation:
QUESTION NO: 2
Answer: D
Explanation:
QUESTION NO: 3
A security administrator is reviewing remote access and website logs. The administrator notices
that users have been logging in at odd hours from multiple continents on the same day. The
security administrator suspects the company is the victim of which of the following types of attack?
A. TCP/IP hijacking
B. Spoofing
C. Replay
D. Domain name kiting
Answer: C
Explanation:
QUESTION NO: 4
Which of the following is the default rule found in a corporate firewalls access control list?
A. Anti-spoofing
B. Permit all
C. Multicast list
D. Deny all
Answer: D
Explanation:
QUESTION NO: 5
Which of the following is the BEST choice of cryptographic algorithms or systems for providing
whole disk encryption?
Answer: C
Explanation:
QUESTION NO: 6
Which of the following allows a malicious insider to covertly remove information from an
organization?
A. NAT traversal
B. Steganography
C. Non-repudiation
D. Protocol analyzer
Answer: B
Explanation:
QUESTION NO: 7
The server log shows 25 SSH login sessions per hour. However, it is a large company and the
administrator does not know if this is normal behavior or if the network is under attack. Where
should the administrator look to determine if this is normal behavior?
A. Change management
B. Code review
C. Baseline reporting
D. Security policy
Answer: C
Explanation:
QUESTION NO: 8
Which of the following is the BEST approach to perform risk mitigation of user access control
rights?
Answer: B
Explanation:
QUESTION NO: 9
Which of the following software should a security administrator implement if several users are
stating that they are receiving unwanted email containing advertisements?
A. Host-based firewalls
B. Anti-spyware
C. Anti-spam
D. Anti-virus
QUESTION NO: 10
A. user VLANs.
B. failover capability.
C. additional bandwidth.
D. management of VLANs.
Answer: B
Explanation:
QUESTION NO: 11
The security administrator is tasked with authenticating users to access an encrypted database.
Authentication takes place using PKI and the encryption of the database uses a separate
cryptographic process to decrease latency. Which of the following would describe the use of
encryption in this situation?
A. Private Key encryption to authenticate users and private keys to encrypt the database
B. Private Key encryption to authenticate users and public keys to encrypt the database
C. Public key encryption to authenticate users and public keys to encrypt the database
D. Public key encryption to authenticate users and private keys to encrypt the database
Answer: D
Explanation:
QUESTION NO: 12
A security device prevents certain users from accessing the network remotely with specific
applications, but allows VPN connections without any issues. Which of the following access
control models is being used?
A. Mandatory
B. Rule-based
Answer: B
Explanation:
QUESTION NO: 13
Which of the following would provide the MOST reliable proof that a datacenter was accessed at a
certain time of day?
A. Video surveillance
B. Security log
C. Entry log
D. Proximity readers
Answer: A
Explanation:
QUESTION NO: 14
Which of the following application attacks typically involves entering a string of characters and
bypassing input validation to display additional information?
A. Session hijacking
B. Zero day attack
C. SQL injection
D. Cross-site scripting
Answer: C
Explanation:
QUESTION NO: 15
A. NIPS
B. NAC
Answer: D
Explanation:
QUESTION NO: 16
Which of the following technologies directly addresses the need to restrict employees from
browsing inappropriate websites?
A. Bastion host
B. Firewall
C. Proxy server
D. Content filter
Answer: D
Explanation:
QUESTION NO: 17
A security administrator working for a health insurance company needs to protect customer data
by installing an HVAC system and a mantrap in the datacenter. Which of the following are being
addressed? (Select TWO).
A. Integrity
B. Recovery
C. Clustering
D. Confidentiality
E. Availability
Answer: A,E
Explanation:
QUESTION NO: 18
Which of the following camera types would allow a security guard to track movement from one
spot throughout a data center?
Answer: B
Explanation:
QUESTION NO: 19
A user reports they are receiving odd emails. Upon investigation, the administrator finds that most
of the users email boxes appear to be full and bouncing inbound emails at an alarming rate. Which
of the following is MOST likely causing the problem?
Answer: D
Explanation:
QUESTION NO: 20
Which of the following describes when forensic hashing should occur on a drive?
A. After the imaging process and before the forensic image is captured
B. Before the imaging process and then after the forensic image is created
C. After the imaging process and after the forensic image is captured
D. Before and after the imaging process and then hash the forensic image
Answer: D
Explanation:
QUESTION NO: 21
A new file share has been created to store confidential exit interviews. Which of the following
employees should have access to the file share?
Answer: A
Explanation:
QUESTION NO: 22
Answer: A
Explanation:
QUESTION NO: 23
A security administrator reviews the NIDS logs and notices fourteen unsuccessful logins with a
subsequent successful login to a DMZ switch from a foreign IP address. Which of the following
could have led to this network device being accessed?
A. Default account
B. Privilege escalation
C. Denial of service
D. Strong password
Answer: B
Explanation:
QUESTION NO: 24
Answer: D
Explanation:
QUESTION NO: 25
A company runs a site, which has a search option available to the general public. The
administrator is reviewing the site logs and notices an external IP address searching on the site at
a rate of two hits per second. This is an indication of which of the following?
A. Man-in-the-middle attack
B. Data mining
C. Cross-site scripting attack
D. Denial of Service (DoS)
Answer: B
Explanation:
QUESTION NO: 26
Which of the following allows an attacker to identify vulnerabilities within a closed source software
application?
A. Fuzzing
B. Compiling
C. Code reviews
D. Vulnerability scanning
Answer: A
Explanation:
QUESTION NO: 27
Using a combination of a fingerprint reader and retina scanner is considered how many factors of
authentication?
A. One
B. Two
C. Three
D. Four
Answer: A
Explanation:
QUESTION NO: 28
Instead of giving a security administrator full administrative rights on the network, the administrator
is given rights only to review logs and update security related network devices. Additional rights
are handed out to network administrators for the areas that fall within their job description. Which
of the following describes this form of access control?
A. Mandatory vacation
B. Least privilege
C. Discretionary
D. Job rotation
Answer: B
Explanation:
QUESTION NO: 29
Which of the following is a way to immediately push and force a group policy to a workstation?
A. gpedit.msc
B. gpresult.exe
C. gpupdate.exe
D. mmc.exe
Answer: A
Explanation:
QUESTION NO: 30
Which of the following authentication services can be used to provide router commands to enforce
A. RADIUS
B. Kerberos
C. LDAP
D. TACACS+
Answer: D
Explanation:
QUESTION NO: 31
Which of the following is the BEST tool to deploy on the company network to monitor and log
employee’s web surfing activity?
A. Firewall
B. Honeypot
C. Proxy server
D. Protocol analyzer
Answer: C
Explanation:
QUESTION NO: 32
A security administrator is implementing a solution that can integrate with an existing server and
provide encryption capabilities. Which of the following would meet this requirement?
Answer: C
Explanation:
When using USB devices to transfer data from one workstation to another, which of the following
should be performed?
Answer: A
Explanation:
QUESTION NO: 34
A Human Resource manager is assigning access to users in their specific department performing
the same job function. This is an example of:
Answer: A
Explanation:
QUESTION NO: 35
Which of the following ensures that an authorized employees access rights are based on a need
to know?
A. Least privilege
B. Job rotation
C. Implicit deny
D. Separation of duties
Answer: C
Explanation:
Answer: D
Explanation:
QUESTION NO: 37
A programmer cannot change the production system directly and must have code changes
reviewed and approved by the production system manager. Which of the following describes this
control type?
Answer: B
Explanation:
QUESTION NO: 38
Which of the following malware types is MOST commonly installed through the use of thumb
drives to compromise systems and provide unauthorized access?
A. Trojans
B. Botnets
C. Adware
D. Logic bomb
Answer: A
Explanation:
Which of the following BEST describes an attack involving the interception and later
retransmission of the same network traffic?
A. Man-in-the-middle
B. Domain name kiting
C. Spoofing
D. Replay
Answer: D
Explanation:
QUESTION NO: 40
Answer: B
Explanation:
QUESTION NO: 41
The network administrator is concerned about password security. Which of the following protocols
should be used to remotely administer a router?
A. Telnet
B. rlogin
C. PGP
D. SSH
Answer: D
Explanation:
QUESTION NO: 42
A critical system in the datacenter is not connected to a UPS. The security administrator has
coordinated an authorized service interruption to resolve this issue. This is an example of which of
the following?
A. Fault tolerance
B. Continuity of operations
C. Succession planning
D. Data handling error
Answer: C
Explanation:
QUESTION NO: 43
Which of the following is the BEST reason to choose a vulnerability assessment over a penetration
test?
Answer: B
Explanation:
QUESTION NO: 44
Which of the following protocols would allow an attacker to gather the MOST information about an
unsecured network printer’s configuration?
A. ICMP
B. SNMP
C. RBAC
D. RTMP
QUESTION NO: 45
The BEST way to protect the confidentiality of sensitive data entered in a database table is to use:
A. hashing.
B. stored procedures.
C. encryption.
D. transaction logs.
Answer: C
Explanation:
QUESTION NO: 46
A professor at a university is given two keys. One key unlocks a classroom door and the other
locks it. The key used to lock the door is available to all other faculty. The key used to unlock the
door is only given to the professor. Which of the following cryptography concepts is illustrated in
the example above?
Answer: B
Explanation:
QUESTION NO: 47
In an effort to increase security, the security administrator revokes each user’s certificate after one
year. Which of the following would keep an attacker from using the certificate?
A. RA
B. CRL
C. PKI
Answer: B
Explanation:
QUESTION NO: 48
WEP is seen as an unsecure protocol based on its improper use of which of the following?
A. RC6
B. RC4
C. 3DES
D. AES
Answer: B
Explanation:
QUESTION NO: 49
Which of the following solutions would a security administrator MOST likely perform if they were
trying to access several websites from a single workstation that were potentially dangerous (e.g.
contain malware)?
Answer: C
Explanation:
QUESTION NO: 50
A security engineer is troubleshooting a server in the DMZ, which cannot be reached from the
Internet or the internal network. All other servers on the DMZ are able to communicate with this
server. Which of the following is the MOST likely cause?
Answer: C
Explanation:
QUESTION NO: 51
Answer: D,E
Explanation:
QUESTION NO: 52
A security administrator would MOST likely put a network interface card into promiscuous mode to
use which of the following utilities? (Select TWO).
A. Wireshark
B. Nessus
C. Tcpdump
D. Nmap
E. L0phtcrack
Answer: A,C
Explanation:
QUESTION NO: 53
Which of the following would an administrator apply to mobile devices to BEST ensure the
confidentiality of data?
Answer: A
Explanation:
QUESTION NO: 54
Which of the following should be performed on a computer to protect the operating system from
malicious software? (Select TWO).
Answer: A,C
Explanation:
QUESTION NO: 55
A security administrator is assigned to develop an IP address scheme for the corporate network
that allows internal users to have an IP address that cannot be routed to the Internet. Which of the
following IP addresses would meet this requirement?
A. 10.127.0.5
B. 63.75.131.27
C. 172.40.75.95
D. 192.186.202.48
Answer: A
Explanation:
QUESTION NO: 56
Assigning access on a need-to-know basis is a best practice in which of the following controls?
A. Risk assessment
B. Account management
C. Patch management
D. Vulnerability assessment
Answer: B
Explanation:
QUESTION NO: 57
In order to access the network, an employee must swipe their finger on a device. Which of the
following describes this form of authentication?
A. Single sign-on
B. Multifactor
C. Biometrics
D. Tokens
Answer: C
Explanation:
QUESTION NO: 58
Which of the following will prevent inbound ICMP traffic between systems?
A. HIDS
B. VPN
C. Antivirus
D. Personal firewall
Answer: D
Explanation:
QUESTION NO: 59
Which of the following is BEST used to prevent ARP poisoning attacks across a network?
Answer: C
Explanation:
QUESTION NO: 60
Which of the following BEST describes a malicious application that attaches itself to other files?
A. Rootkits
B. Adware
C. Backdoors
D. Virus
Answer: D
Explanation:
QUESTION NO: 61
A physical server goes offline. It takes down six virtual web servers that it was hosting. This is an
example of which of the following vulnerabilities?
Answer: D
Explanation:
QUESTION NO: 62
A security administrator wants to determine what data is allowed to be collected from users of the
corporate Internet-facing web application. Which of the following should be referenced?
Answer: A
Explanation:
QUESTION NO: 63
A. Root Authority
B. LDAP
C. DHCP
D. RAS
Answer: A
Explanation:
QUESTION NO: 64
A security administrator with full administrative rights on the network is forced to temporarily take
time off of their duties. Which of the following describes this form of access control?
A. Separation of duties
B. Discretionary
C. Mandatory vacation
D. Least privilege
Answer: C
Explanation:
QUESTION NO: 65
Which of the following are the BEST reasons to use an HSM? (Select TWO).
Answer: C,E
Explanation:
QUESTION NO: 66
Which of the following will provide the HIGHEST level of wireless network security?
A. WPA2
B. SSH
C. SSID
D. WEP
Answer: A
Explanation:
QUESTION NO: 67
Which of the following would an administrator do to ensure that an application is secure and all
unnecessary services are disabled?
A. Baselining
B. Application hardening
C. Secure application coding
D. Patch management
Answer: B
Explanation:
QUESTION NO: 68
Several existing, poorly documented networks have been integrated. Which of the following would
define expected traffic with the LOWEST impact on existing processes?
Answer: C
Explanation:
QUESTION NO: 69
Answer: C
Explanation:
QUESTION NO: 70
A company hires a security firm to assess the security of the company’s network. The company
does not provide the firm with any internal knowledge or documentation of the network. Which of
the following should the security firm perform?
A. Black hat
B. Black box
C. Gray hat
D. Gray box
Answer: B
Explanation:
QUESTION NO: 71
An employee’s workstation is connected to the corporate LAN. Due to content filtering restrictions,
the employee attaches a 3G Internet dongle to get to websites that are blocked by the corporate
gateway. Which of the following BEST describes a security implication of this practice?
A. A corporate LAN connection and a 3G Internet connection are acceptable if a host firewall is
installed.
B. The security policy should be updated to state that corporate computer equipment should be
dual-homed.
C. Content filtering should be disabled because it may prevent access to legitimate sites.
D. Network bridging must be avoided otherwise it may join two networks of different classifications.
Answer: B
Explanation:
QUESTION NO: 72
The head of security wants to implement an IDS that relies on a baseline to send alerts when
suspicious traffic crosses the network. Which of the following BEST describes this type of IDS
configuration?
A. Network-based IDS
B. Host-based IDS
C. Anomaly-based IDS
D. Signature-based IDS
Answer: A
Explanation:
QUESTION NO: 73
Which of the following risks may result from improper use of social networking and P2P software?
A. Shoulder surfing
B. Denial of service
C. Information disclosure
D. Data loss prevention
Answer: C
Explanation:
QUESTION NO: 74
A. DMZ
B. VLAN
C. NAT
D. NAC
Answer: B
Explanation:
QUESTION NO: 75
Data can potentially be stolen from a disk encrypted, screen-lock protected, smart phone by which
of the following?
A. Bluesnarfing
B. IV attack
C. Honeynet
D. SIM cloning
Answer: A
Explanation:
QUESTION NO: 76
As a computer forensic analyst, which of the following is MOST critical when working with multiple
machines?
Answer: C
Explanation:
The administrator wishes to monitor incoming traffic, but does not want to risk accidentally
blocking legitimate traffic. Which of the following should the administrator implement?
A. A client-based firewall
B. A DMZ
C. A NIDS
D. A HIPS
Answer: C
Explanation:
QUESTION NO: 78
A user reports that their home page is being redirected to an obscure website. An antivirus scan
shows no abnormalities. Which of the following is the MOST probable cause?
A. Worm
B. Botnet
C. Spam
D. Rootkit
Answer: A
Explanation:
QUESTION NO: 79
A company wants to sell some old cell phones on an online auction to recover some of the cost of
the newer phones. Which of the following should be done to ensure the confidentiality of the
information that is stored on the phones (e.g. client phone numbers and email communications)?
Answer: D
Explanation:
Answer: B
Explanation:
QUESTION NO: 81
An employee is processing classified information on a secured laptop and leaves the laptop
unlocked in a public place. This negligence may BEST be attributed to:
Answer: D
Explanation:
QUESTION NO: 82
Which of the following is the primary concern when using a Halon fire suppression system to cover
an entire data center?
Answer: C
Explanation:
A certificate that has been compromised should be published to which of the following?
A. AES
B. CA
C. CRL
D. PKI
Answer: C
Explanation:
QUESTION NO: 84
When a user first moves into their residence, the user receives a key that unlocks and locks their
front door. This key is only given to them but may be shared with others they trust. Which of the
following cryptography concepts is illustrated in the example above?
Answer: D
Explanation:
QUESTION NO: 85
Which of the following wireless security controls can be easily and quickly circumvented using only
a network sniffer? (Select TWO).
A. MAC filtering
B. Disabled SSID broadcast
C. WPA2-Enterprise
D. EAP-TLS
E. WEP with 802.1x
Answer: A,E
Explanation:
Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Answer: B
Explanation:
QUESTION NO: 87
A security administrator is tasked with ensuring that all servers are highly available and that hard
drive failure will not affect an individual server. Which of the following configurations will allow for
high availability? (Select TWO).
A. Hardware RAID 5
B. Load sharing
C. Server clustering
D. Software RAID 1
E. Load balancing
Answer: A,C
Explanation:
QUESTION NO: 88
In the context of authentication models the concept of identification is BEST described as which of
the following?
QUESTION NO: 89
A. AES512
B. SHA256
C. AES256
D. MD5
Answer: A
Explanation:
QUESTION NO: 90
Which of the following is the correct formula for calculating mean time to restore (MTTR)?
Answer: A
Explanation:
QUESTION NO: 91
Which of the following represents the complexity of a password policy which enforces lower case
password using letters from a through z where n is the password length?
A. n26
B. 2n * 26
C. 26n
D. n2 * 26
Answer: C
QUESTION NO: 92
A. Virtualization
B. Network Access Control
C. Virtual Private Networking
D. Network Address Translation
Answer: B
Explanation:
QUESTION NO: 93
Which of the following would BEST prevent the theft of laptops located in the corporate office?
Answer: C
Explanation:
QUESTION NO: 94
A. Wire shielding
B. Room lighting
C. Fire suppression
D. System availability
Answer: D
Explanation:
Which of the following protocols would be the MOST secure method to transfer files from a host
machine?
A. SFTP
B. WEP
C. TFTP
D. FTP
Answer: A
Explanation:
QUESTION NO: 96
Which of the following would be a reason the IT department would disallow the use of USB flash
storage devices?
Answer: B
Explanation:
QUESTION NO: 97
Which of the following is a vulnerability introduced into a hardware or software product by the
developer?
A. Null session
B. Default account
C. Weak password
D. Back door
Answer: D
Explanation:
A network device blocking incoming traffic which does not match an internal request for traffic is
considered to have:
Answer: A
Explanation:
QUESTION NO: 99
Which of the following is the GREATEST security risk posed by removable media?
Answer: D
Explanation:
Which of the following operating system characteristics allows malware propagation via USB
storage devices? (Select TWO).
A. Small size
B. Autorun
C. Large memory space
D. Mobility
E. Plug 'n play
Answer: B,E
Explanation:
Answer: C
Explanation:
Topic 2, Volume B
Which of the following logical access control methods would a security administrator need to
modify in order to control network traffic passing through a router to a different network?
A. Configuring VLAN 1
B. ACL
C. Logical tokens
D. Role-based access control changes
Answer: B
Explanation:
A. IDS
B. VLAN
C. Firewall
D. DMZ
Answer: C
Explanation:
Which of the following tools was created for the primary purpose of reporting the services that are
open for connection on a networked workstation?
A. Protocol analyzer
B. Port scanner
C. Password crackers
D. Vulnerability scanner
Answer: B
Explanation:
Which of the following is MOST likely to be an issue when turning on all auditing functions within a
system?
Answer: C
Explanation:
Upon opening the browser, a guest user is redirected to the company portal and asked to agree to
the acceptable use policy. Which of the following is MOST likely causing this to appear?
A. NAT
B. NAC
C. VLAN
D. DMZ
Answer: B
Explanation:
USB devices with a virus delivery mechanism are an example of which of the following security
threats?
A. Adware
B. Trojan
C. Botnets
D. Logic bombs
Answer: B
Explanation:
Cell phones with network access and the ability to store data files are susceptible to which of the
following risks?
Answer: C
Explanation:
When establishing a connection between two IP based routers, which of the following protocols is
the MOST secure?
A. TFTP
B. HTTPS
C. FTP
D. SSH
Answer: D
Explanation:
Which of the following algorithms provides better protection against brute force attacks by using a
160-bit message digest?
A. MD5
B. SHA-1
C. LANMAN
D. NTLM
Answer: B
Explanation:
Which of the following access control technologies provides a rolling password for one-time use?
A. RSA tokens
B. ACL
C. Multifactor authentication
D. PIV card
Answer: A
Explanation:
Which of the following technologies is used to verify that a file was not altered?
A. RC5
B. AES
C. DES
D. MD5
Answer: D
Explanation:
Which of the following uses an RC4 key that can be discovered by eavesdropping on plain text
initialization vectors?
A. WEP
B. TKIP
C. SSH
D. WPA
Answer: A
Explanation:
An administrator wants to crack passwords on a server with an account lockout policy. Which of
the following would allow this without locking accounts?
A. Try guessing passwords slow enough to reset the bad count interval.
B. Try guessing passwords with brute force.
C. Copy the password file offline and perform the attack on it.
D. Try only real dictionary words.
Answer: C
Explanation:
A user reports that each time they attempt to go to a legitimate website, they are sent to an
inappropriate website. The security administrator suspects the user may have malware on the
computer, which manipulated some of the user's files. Which of the following files on the user's
system would need to be checked for unauthorized changes?
A. SAM
B. LMhosts
C. Services
D. Hosts
Answer: D
Explanation:
An administrator needs to limit and monitor the access users have to the Internet and protect the
internal network. Which of the following would MOST likely be implemented?
A. A heuristic firewall
B. DNS caching on the client machines
C. A pushed update modifying users' local host file
D. A content-filtering proxy server
Answer: D
Explanation:
Which of the following is a malicious program used to capture information from an infected
computer?
A. Trojan
B. Botnet
C. Worm
D. Virus
Answer: A
Explanation:
The security administrator needs to make a change in the network to accommodate a new remote
location. The new location will be connected by a serial interface, off the main router, through a
commercial circuit. This remote site will also have traffic completely separated from all other traffic.
Which of the following design elements will need to be implemented to accommodate the new
location?
A. Smartcard
B. Iris
C. Password
D. Fingerprints
Answer: B
Explanation:
Mitigating security risks by updating and applying hot fixes is part of:
A. patch management.
B. vulnerability scanning.
C. baseline reporting.
D. penetration testing.
Answer: A
Explanation:
When reviewing IDS logs, the security administrator notices many events pertaining to a "NOOP
sled". Which of the following attacks is occurring?
A. Man-in-the-middle
B. SQL injection
C. Buffer overflow
D. Session hijacking
Answer: C
Explanation:
Which of the following is the MAIN difference between a hotfix and a patch?
Answer: C
Explanation:
A vulnerability assessment was conducted against a network. One of the findings indicated an out-
dated version of software. This is an example of weak:
A. security policies.
B. patch management.
C. acceptable use policies.
D. configuration baselines.
Answer: B
Explanation:
A. Protocol analyzer
B. Anti-virus scanner
C. Network mapper
D. Password cracker
Answer: C
Explanation:
A. SSH
B. IPSec
C. TLS
D. L2TP
Answer: C
Explanation:
A technician visits a customer site which prohibits portable data storage devices. Which of the
following items would be prohibited? (Select TWO).
Answer: A,B
Explanation:
A. Exploit probability
B. Judgment
C. Threat frequency
D. Asset value
Answer: A
Explanation:
Answer: D
Explanation:
Exploitation of security vulnerabilities is used during assessments when which of the following is
true?
A. Security testers have clear and written authorization to conduct vulnerability scans.
B. Security testers are trying to document vulnerabilities without impacting network operations.
C. Network users have permissions allowing access to network devices with security weaknesses.
D. Security testers have clear and written authorization to conduct penetration testing.
Answer: D
Explanation:
Which of the following should a technician deploy to detect malicious changes to the system and
configuration?
A. Pop-up blocker
B. File integrity checker
C. Anti-spyware
D. Firewall
Answer: B
Explanation:
A. Redundant connections
B. RAID
C. Disk striping
D. Redundant power supplies
Answer: B
Explanation:
A technician has installed security software; shortly thereafter the response time slows
considerably. Which of the following can be used to determine the effect of the new software?
A. Event logs
B. System monitor
C. Performance monitor
D. Protocol analyzer
Answer: C
Explanation:
After installing database software the administrator must manually change the default
administrative password, remove a default database, and adjust permissions on specific files.
These actions are BEST described as:
A. vulnerability assessment.
B. mandatory access control.
C. application hardening.
D. least privilege
Answer: C
Explanation:
Perhaps as important as OS and network hardening is application hardening—securing an
application against local and Internet-based attacks. Hardening applications is fairly similar to
hardening operating systems—you remove the functions or components you don’t need, restrict
access where you can, and make sure the application is kept up to date with patches
Incorrect answer:
Not MAC:
a mandatory access control is “a means of restricting access to objects based on the sensitivity
(as represented by a label) of the information contained in the objects and the formal authorization
(i.e., clearance) of subjects to access information of such sensitivity.” In this case, the owner or
subject can’t determine whether access is to be granted to another subject; it is the job of the
operating system to decide.
In MAC, the security mechanism controls access to all objects, and individual subjects cannot
change that access. The key here is the label attached to every subject and object. The label will
identify the level of classification for that object and the level to which the subject is entitled
Security+ All-in-One Guide 2nd Edition Ch 2:Operational Organizational Security
Which of the following is the BEST mitigation method to implement when protecting against a
discovered OS exploit?
A. NIDS
B. Patch
C. Antivirus update
D. HIDS
Answer: B
Explanation:
Which of the following is the primary concern of governments in terms of data security?
A. Integrity
B. Availability
C. Cost
D. Confidentiality
Answer: D
Explanation:
Which of the following is BEST used to change common settings for a large number of deployed
computers?
A. Group policies
B. Hotfixes
C. Configuration baselines
D. Security templates
Answer: A
Explanation:
Which of the following solutions would a company be MOST likely to choose if they wanted to
conserve rack space in the data center and also be able to manage various resources on the
servers?
Answer: B
Explanation:
A rogue wireless network is showing up in the IT department. The network appears to be coming
from a printer that was installed. Which of the following should have taken place, prior to this
printer being installed, to prevent this issue?
Answer: C
Explanation:
Which of the following characteristics distinguishes a virus from a rootkit, spyware, and adware?
A. Eavesdropping
B. Process hiding
C. Self-replication
D. Popup displays
Answer: C
Explanation:
A. AES
B. RSA
C. DES
D. 3DES
Answer: B
Explanation:
Which of the following methods is a best practice for granting access to resources?
Answer: D
Explanation:
Answer: A
Explanation:
When used to encrypt transmissions, which of the following is the MOST resistant to brute force
attacks?
A. SHA
B. MD5
C. 3DES
D. AES256
Answer: D
Explanation:
Which of the following BEST describes how the private key is handled when connecting to a
secure web server?
Answer: A
Explanation:
Answer: D
Explanation:
A technician reviews the system log entries for an internal DNS server. Which of the following
entries MOST warrants further investigation?
Answer: D
Explanation:
A. NIPS.
B. HIDS.
C. firewall.
D. honeypot.
Answer: B
Explanation:
Answer: D
Explanation:
Continuously documenting state and location of hardware from collection to disposition during a
forensic investigation is known as:
A. risk mitigation.
B. data handling.
C. chain of custody.
D. incident response.
Answer: C
Explanation:
Answer: C
Explanation:
Which of the following uses a three-way-handshake for authentication and is commonly used in
PPP connections?
Answer: B
Explanation:
A security analyst has been notified that one of the web servers has stopped responding to web
traffic. The network engineer also reports very high bandwidth utilization to and from the Internet.
Which of the following logs is MOST likely to be helpful in finding the cause and source of the
problem?
A. Access log
B. Event log
C. System log
D. Firewall log
Answer: D
Explanation:
Which of the following ports would need to be open to allow TFTP by default?
A. 69
B. 110
C. 137
D. 339
Answer: A
Explanation:
Which of the following transmission types would an attacker most likely use to try to capture data
packets?
Answer: D
Explanation:
Which of the following describes a port that is left open in order to facilitate access at a later date?
A. Honeypot
B. Proxy server
C. Open relay
D. Backdoor
Answer: D
Explanation:
A. Cookies
B. Logic bomb
C. Adware
D. Spam
Answer: C
Explanation:
Which of the following security types would require the use of certificates to verify a user's
identity?
A. Forensics
B. CRL
Answer: C
Explanation:
A. Vulnerability
B. Mantrap
C. Configuration baselines
D. Threat source
E. Mandatory vacations
Answer: A,D
Explanation:
An administrator believes a user is secretly transferring company information over the Internet.
The network logs do not show any non-standard traffic going through the firewall. Which of the
following tools would allow the administrator to better evaluate the contents of the network traffic?
A. Vulnerability scanner
B. Network anomaly detection
C. Protocol analyzer
D. Proxy server
Answer: C
Explanation:
Which of the following monitoring technology types is MOST dependent on receiving regular
updates?
A. Signature-based
Answer: A
Explanation:
A company has just recovered from a major disaster. Which of the following should signify the
completion of a disaster recovery?
Answer: B
Explanation:
A. RSA
B. SHA-1
C. 3DES
D. MD5
Answer: A
Explanation:
A user tries to plug their laptop into the company's network and receives a warning that their
patches and virus definitions are out-of-date. This is an example of which of the following
mitigation techniques?
A. NAT
Answer: C
Explanation:
A file has been compromised with corrupt data and might have additional information embedded
within it. Which of the following actions should a security administrator follow in order to ensure
data integrity of the file on that host?
A. Disable the wireless network and copy the data to the next available USB drive to protect the
data
B. Perform proper forensics on the file with documentation along the way.
C. Begin chain of custody for the document and disallow access.
D. Run vulnerability scanners and print all reports of all diagnostic results.
Answer: B
Explanation:
Every company workstation contains the same software prior to being assigned to workers. Which
of the following software options would give remote users the needed protection from outside
attackers when they are outside of the company's internal network?
A. HIDS
B. Vulnerability scanner
C. Personal firewall
D. NIPS
Answer: C
Explanation:
To ensure users are logging into their systems using a least privilege method, which of the
following should be done?
Answer: A
Explanation:
A recent security audit shows an organization has been infiltrated with a former administrator's
credentials. Which of the following would be the BEST way to mitigate the risk of this vulnerability?
Answer: C
Explanation:
A security administrator is analyzing the packet capture from an IDS triggered filter. The packet
capture shows the following string:
<scrip>source=http://www.evilsite.jp/evil.js</script>
A. SQL injection
B. Redirection attack
C. Cross-site scripting
D. XLM injection
Answer: C
Explanation:
A. separation of duties.
B. job-based access control
C. least privilege.
D. remote access policy.
Answer: C
Explanation:
Which of the following concepts addresses the threat of data being modified without authorization?
A. Integrity
B. Key management
C. Availability
D. Non-repudiation
Answer: A
Explanation:
An attacker sends packets to a host in hopes of altering the host's MAC table. Which of the
following is the attacker attempting to do?
A. Port scan
B. Privilege escalation
C. DNS spoofing
D. ARP poisoning
Answer: D
Explanation:
Which of the following is a best practice for organizing users when implementing a least privilege
A. By function
B. By department
C. By geographic location
D. By management level
Answer: A
Explanation:
Which of the following describes how long email messages are available in case of a subpoena?
A. Backup procedures
B. Retention policy
C. Backup policy
D. Email server configuration
Answer: B
Explanation:
Management would like to know if anyone is attempting to access files on the company file server.
Which of the following could be deployed to BEST provide this information?
A. Software firewall
B. Hardware firewall
C. HIDS
D. NIDS
Answer: C
Explanation:
Answer: C
Explanation:
Which of the following is of the GREATEST concern in regard to a rogue access point?
A. Rogue access points are hard to find and remove from the network.
B. Rogue access points can scan the company's wireless networks and find other unencrypted
and rouge access points
C. The radio signal of the rogue access point interferes with company approved access points.
D. Rogue access points can allow unauthorized users access the company's internal networks.
Answer: D
Explanation:
A. identification.
B. authorization.
C. validation.
D. repudiation.
Answer: A
Explanation:
Answer: D
Explanation:
The security administrator wants to increase the cipher strength of the company's internal root
certificate. Which of the following would the security administer use to sign a stronger root
certificate?
A. Certificate authority
B. Registration authority
C. Key escrow
D. Trusted platform module
Answer: A
Explanation:
Which of the following describes a semi-operational site that in the event of a disaster, IT
operations can be migrated?
A. Hot site
B. Warm site
C. Mobile site
D. Cold site
Answer: B
Explanation:
Which of the following devices hooks into a LAN and captures traffic?
A. Protocol analyzer
B. Protocol filter
Answer: A
Explanation:
When assessing a network containing resources that require near 100% availability, which of the
following techniques should be employed to assess overall security?
A. Penetration testing
B. Vulnerability scanning
C. User interviews
D. Documentation reviews
Answer: B
Explanation:
A. Cookies
B. XSS
C. DOS
D. Buffer overflow
Answer: B
Explanation:
Which of the following is a reason why wireless access points should not be placed near a
building's perimeter?
Answer: D
Explanation:
A new enterprise solution is currently being evaluated due to its potential to increase the
company's profit margins. The security administrator has been asked to review its security
implications. While evaluating the product, various vulnerability scans were performed. It was
determined that the product is not a threat but has the potential to introduce additional
vulnerabilities. Which of the following assessment types should the security administrator also take
into consideration while evaluating this product?
A. Threat assessment
B. Vulnerability assessment
C. Code assessment
D. Risk assessment
Answer: D
Explanation:
Which of the following tools BEST identifies the method an attacker used after they have entered
into a network?
A. Input validation
B. NIDS
C. Port scanner
D. HIDS
Answer: B
Explanation:
Answer: A
Explanation:
Which of the following is MOST likely the reason why a security administrator would run a Nessus
report on an important server?
Answer: C
Explanation:
Which of the following BEST describes how the mandatory access control (MAC) method works?
Answer: D
Explanation:
Using a smartcard and a physical token is considered how many factors of authentication?
A. One
B. Two
Answer: A
Explanation:
A. TLS
B. WEP
C. HTTP
D. Telnet
Answer: A
Explanation:
A NIDS monitoring traffic on the public-side of a firewall provides which of the following?
Answer: B
Explanation:
A. Schemes
B. Storage locations
C. Chain of custody
D. Table top exercises
Which of the following would a network administrator implement to control traffic being routed
between networks or network segments in an effort to preserve data confidentiality?
A. NAT
B. Group policies
C. Password policies
D. ACLs
Answer: D
Explanation:
The security administrator wants each user to individually decrypt a message but allow anybody to
encrypt it. Which of the following MUST be implemented to allow this type of authorization?
Answer: D
Explanation:
A security administrator is analyzing the packet capture from an IDS triggered filter. The packet
capture shows the following string:
a or1 ==1--
Answer: D
Explanation:
Which of the following has been implemented if several unsuccessful login attempts were made in
a short period of time denying access to the user account, and after two hours the account
becomes active?
A. Account lockout
B. Password expiration
C. Password disablement
D. Screen lock
Answer: A
Explanation:
Answer: A
Explanation:
In the event of a disaster, in which the main datacenter is immediately shutdown, which of the
following would a company MOST likely use with a minimum Recovery Time Objective?
Answer: B
Explanation:
Which of the following methods involves placing plain text data within a picture or document?
A. Steganography
B. Digital signature
C. Transport encryption
D. Stream cipher
Answer: A
Explanation:
A. CCTV
B. Firewall
C. Design reviews
D. Bollards
Answer: A
Explanation:
Topic 3, Volume C
Which of the following can cause hardware based drive encryption to see slower deployment?
Answer: B
Explanation:
Which of the following is a reason to implement Kerberos over local system authentication?
Answer: A
Explanation:
Which of the following should a security administrator implement to ensure there are no security
holes in the OS?
A. Encryption protocols
B. Firewall definitions
C. Patch management
D. Virus definitions
Answer: C
Explanation:
A. Block
B. Fourier
Answer: A
Explanation:
Which of the following control systems is used to maintain proper environmental conditions in a
datacenter?
A. HVAC
B. Bollards
C. CCTV
D. Mantrap
Answer: A
Explanation:
A penetration test shows that almost all database servers were able to be compromised through a
default database user account with the default password. Which of the following is MOST likely
missing from the operational procedures?
A. Application hardening
B. OS hardening
C. Application patch management
D. SQL injection
Answer: B
Explanation:
A user reports that their 802.11n capable interface connects and disconnects frequently to an
access point that was recently installed. The user has a Bluetooth enabled laptop. A company in
the next building had their wireless network breached last month. Which of the following is MOST
likely causing the disconnections?
Answer: C
Explanation:
Which of the following facilitates computing for heavily utilized systems and networks?
A. Remote access
B. Provider cloud
C. VPN concentrator
D. Telephony
Answer: C
Explanation:
A security administrator finished taking a forensic image of a computer's memory. Which of the
following should the administrator do to ensure image integrity?
Answer: D
Explanation:
Answer: B
Explanation:
A customer has called a company to report that all of their computers are displaying a rival
company's website when the user types the correct URL into the browser. All of the other websites
the user visits work correctly and other customers are not having this issue. Which of the following
has MOST likely occurred?
Answer: C
Explanation:
A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of
the following?
A. Whaling
B. Bluesnarfing
C. Vishing
D. Dumpster diving
Answer: A
Explanation:
Which of the following describes an attack technique by which an intruder gains physical access
by following an authorized user into a facility before the door is closed?
Answer: B
Explanation:
Which of the following should be reviewed periodically to ensure a server maintains the correct
security configuration?
A. NIDS configuration
B. Firewall logs
C. User rights
D. Incident management
Answer: B
Explanation:
Which of the following is true when a user browsing to an HTTPS site receives the message: a
Site name mismatch'?
Answer: A
Explanation:
A. TCP port
Answer: D
Explanation:
Answer: B
Explanation:
Which of the following access control methods provides the BEST protection against attackers
logging on as authorized users?
Answer: D
Explanation:
Several PCs are running extremely slow all of a sudden. Users of the PCs report that they do a lot
of web browsing and explain that a disgruntled employee from their department was recently fired.
The security administrator observes that all of the PCs are attempting to open a large number of
connections to the same destination. Which of the following is MOST likely the issue?
Answer: D
Explanation:
Which of the following is the BEST way to secure data for the purpose of retention?
A. Off-site backup
B. RAID 5 on-site backup
C. On-site clustering
D. Virtualization
Answer: A
Explanation:
In the event of a disaster resulting in the loss of their data center, a company had determined that
they will need to be able to be back online within an hour or two, with all systems being fully up to
date. Which of the following would BEST meet their needs?
Answer: B
Explanation:
Which of the following has a programmer MOST likely failed to consider if a user entering
improper input is able to compromise the integrity of data?
Answer: D
Explanation:
A. STP
B. UTP
C. Grounding
D. Anti-static wrist straps
Answer: A
Explanation:
A user reports that a web browser stopped working after it was updated. Which of the following
BEST describes a probable cause of failure?
A. The browser was previously compromised and corrupted during the update.
B. Anti-spyware is preventing the browser from accessing the network.
C. A faulty antivirus signature has identified the browser as malware.
D. A network based firewall is blocking the browser as it has been modified.
Answer: D
Explanation:
Which of the following devices is MOST likely to be installed to prevent malicious attacks?
A. VPN concentrator
B. Firewall
Answer: B
Explanation:
Which of the following would allow traffic to be redirected through a malicious machine by sending
false hardware address updates to a switch?
A. ARP poisoning
B. MAC spoofing
C. pWWN spoofing
D. DNS poisoning
Answer: A
Explanation: ARP Poisining: The principle of ARP spoofing is to send fake, or spoofed, ARP
messages onto a LAN. Generally, the aim is to associate the attacker's MAC address with the IP
address of another host (such as the default gateway).
Any traffic meant for that IP address would be mistakenly sent to the attacker instead. The
attacker could then choose to forward the traffic to the actual default gateway (interception) or
modify the data before forwarding it (man-in-the-middle attack). The attacker could also launch a
denial-of-service attack against a victim by associating a nonexistent MAC address to the IP
address of the victim's default gateway.
A denial-of-service attack may be executed if the attacker is able to use ARP snooping to
associate an alternate MAC address with the IP address of the default gateway. Denied access to
the gateway in this way, nothing outside the LAN will be reachable by hosts on the LAN.
ARP spoofing attacks can be run from a compromised host on the LAN, or from an attacker's
machine that is connected directly to the target LAN.
Incorrect answer:
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC)
address of a network interface on a networked device.
A. Kerberos
Answer: B
Explanation:
Which of the following would a security administrator use to diagnose network issues?
A. Proxy
B. Host-based firewall
C. Protocol analyzer
D. Gateway
Answer: C
Explanation:
Which of the following should be implemented on a mobile phone to help prevent a conversation
from being captured?
A. Device encryption
B. Voice encryption
C. GPS tracking
D. Sniffer
Answer: B
Explanation:
A user wishes to encrypt only certain files and folders within a partition. Which of the following
methods should a technician recommend?
A. EFS
B. Partition encryption
Answer: A
Explanation:
Centrally authenticating multiple systems and applications against a federated user database is an
example of:
A. smart card.
B. common access card.
C. single sign-on.
D. access control list.
Answer: C
Explanation:
Which of the following characteristics distinguishes a virus from a rootkit, spyware, and adware?
A. Eavesdropping
B. Process hiding
C. Self-replication
D. Popup displays
Answer: C
Explanation:
A security administrator needs to implement a site-to-site VPN tunnel between the main office and
a remote branch. Which of the following protocols should be used for the tunnel?
A. RTP
B. SNMP
C. IPSec
Answer: C
Explanation:
A. RADIUS
B. LDAP
C. TACACS+
D. Kerberos
Answer: D
Explanation:
A. CD-ROM
B. Filesystem
C. Random access memory
D. Network topology
Answer: C
Explanation:
A security administrator notices an unauthorized vehicle roaming the area on company grounds.
The security administrator verifies that all network connectivity is up and running and that no
unauthorized wireless devices are being used to authenticate other devices; however, the
administrator does notice an unusual spike in bandwidth usage. This is an example of which of the
following attacks?
Answer: D
Explanation:
Which of the following is a best practice when securing a switch from physical access?
Answer: D
Explanation:
A. mitigation.
B. acceptance.
C. elimination.
D. transference.
Answer: D
Explanation:
A security administrator needs to implement a wireless system that will only be available within a
building. Which of the following configurations can the administrator modify to achieve this?
(Select TWO).
A. Proper AP placement
B. Disable SSID broadcasting
C. Use CCMP
Answer: A,D
Explanation:
Which of the following environmental variables reduces the potential for static discharges?
A. EMI
B. Temperature
C. UPS
D. Humidity
Answer: D
Explanation:
Which of the following is an example of implementing security using the least privilege principle?
A. Confidentiality
B. Availability
C. Integrity
D. Non-repudiation
Answer: B
Explanation:
A user reports that the spreadsheet they use for the department will not open. The spreadsheet is
located on a server that was recently patched. Which of the following logs would the technician
review FIRST?
A. Access
B. Firewall
C. Antivirus
Answer: A
Explanation:
A. Personal firewall
B. Complex passwords
C. Anti-spam software
D. OS patching
Answer: A
Explanation:
An attacker captures valid wireless traffic in hopes of transmitting it repeatedly to generate enough
traffic to discover the encryption key. Which of the following is the attacker MOST likely using?
A. War driving
B. Replay attack
C. Bluejacking
D. DNS poisoning
Answer: B
Explanation:
Which of the following is an authentication method that uses symmetric key encryption and a key
distribution center?
A. MS-CHAP
B. Kerberos
C. 802.1x
D. EAP
A. Video surveillance
B. External lighting
C. Physical access log
D. Access control system
Answer: D
Explanation:
An employee keeps getting pop-ups from a program on their computer stating it blocked an
attacking IP address. Which of the following security applications BEST explains this behavior?
A. Antivirus
B. Anti-spam
C. Personal firewall
D. Pop-up blocker
Answer: C
Explanation:
A Maintenance Manager requests that a new group be created for a new development project,
concerning power distribution, in order to email and setup conference meetings to the whole
project team. Which of the following group types would need to be created?
A. Cryptography
B. Steganography
C. Hashing
D. Fuzzing
Answer: A
Explanation:
Which of the following is a malicious program that infects a host computer and has the ability to
replicate itself?
A. Spyware
B. Virus
C. Rootkit
D. Spam
Answer: B
Explanation:
Which of the following concepts is applied FIRST when a user logs into a domain?
A. Virealization
B. Non-repudiation
C. Authorization
D. Identification
Answer: D
Explanation:
Which of the following tools will allow a technician to detect devices and associated IP addresses
on the network?
Answer: B
Explanation:
A. Separation of duties
B. Job rotation
C. Vulnerability assessment
D. Least privilege
Answer: A
Explanation:
Which of the following attacks involves sending unsolicited contact information to Bluetooth
devices configured in discover mode?
A. Impersonation
B. Bluejacking
C. War driving
D. Bluesnarfing
Answer: B
Explanation:
Which of the following has the capability to perform onboard cryptographic functions?
A. Smartcard
B. ACL
C. RFID badge
D. Proximity badge
Answer: A
Explanation:
Shielded communications media is MOST often used to prevent electrical emanations from being
detected and crosstalk between which of the following?
A. Networks
B. Cables
C. VLANs
D. VPNs
Answer: B
Explanation:
Which of the following measures ensures unauthorized users cannot access a WAP in a user's
home?
Answer: C
Explanation:
A. VPN encryption
B. Authenticate users using CHAP
C. Default gateway encryption
D. Border gateway protocol encryption
Answer: A
Explanation:
The president of the company is trying to get to their bank's website, and the browser is displaying
that the webpage is being blocked by the system administrator. Which of the following logs would
the technician review?
A. DNS
B. Performance
C. System
D. Content filter
Answer: D
Explanation:
Which of the following should a technician run to find user accounts that can be easily
compromised?
A. NMAP
B. SNORT
C. John the Ripper
D. Nessus
Answer: C
Explanation:
Which of the following defines the role of a root certificate authority (CA) in PKI?
A. The root CA is the recovery agent used to encrypt data when a user's certificate is lost.
B. The CA stores the user's hash value for safekeeping.
C. The CA is the trusted root that issues certificates.
D. The root CA is used to encrypt email messages to prevent unintended disclosure of data
Answer: C
Explanation:
Which of the following malicious programs compromises system security by exploiting system
access through a virtual backdoor?
A. Virus
B. Trojan
C. Spam
D. Adware
Answer: B
Explanation:
Which of the following BEST represents why a system administrator should download security
patches from the manufacturer's website directly?
Answer: C
Explanation:
Answer: C
Explanation:
Answer: D
Explanation:
Answer: A
Explanation:
Which of the following contains a database of users and passwords used for authentication?
Answer: B
Explanation:
Answer: B
Explanation:
The accounting group, clinical group and operations group only have access to their own
applications. The company often needs auditors to have access to all three groups' applications
with little notice. Which of the following would simplify the process of granting auditors permissions
to all the applications?
A. Create an auditors group and merge the members of the accounting, clinical and operations
groups.
B. Create an auditors group and add each user to the accounting, clinical and operations groups
individually.
C. Create an auditors group and add each of the accounting, clinical and operations groups to the
auditors group
D. Create an auditors group and add the group to each of the accounting, clinical and operations
groups.
Answer: D
Explanation:
Answer: B
Explanation:
Attackers may be able to remotely destroy critical equipment in the datacenter by gaining control
over which of the following systems?
Answer: C
Explanation:
Answer: D
Explanation:
The administrator needs to require all users to use complex passwords. Which of the following
Answer: B
Explanation:
Purchasing insurance on critical equipment is an example of which of the following types of risk
mitigation techniques?
A. Risk avoidance
B. Risk transfer
C. Risk retention
D. Risk reduction
Answer: B
Explanation:
Which of the following would be used to eliminate the need for an administrator to manually
configure passwords on each network device in a large LAN?
A. RADIUS
B. OVAL
C. RAS
D. IPSec VPN
Answer: A
Explanation:
A security administrator responds to a report of a web server that has been compromised. The
Answer: B
Explanation:
After completing a forensic image of a hard drive, which of the following can be used to confirm
data integrity?
A. Chain of custody
B. Image compression
C. AES256 encryption
D. SHA512 hash
Answer: D
Explanation:
A security administrator wants to prevent corporate users from being infected with viruses from
flash based advertisements while using web browsers at work. Which of the following could be
used to mitigate this threat?
A. Content filter
B. Firewall
C. IDS
D. Protocol analyzer
Answer: A
Explanation:
A. Vulnerability assessment
B. Network anomaly detection
C. Penetration test
D. Network mapping program
Answer: C
Explanation:
Answer: D
Explanation:
A user is concerned about threats regarding social engineering and has asked the IT department
for advice. One suggestion offered might be to:
Answer: C
Explanation:
When disposing of old or damaged computer systems, which of the following is the primary
security concern?
Answer: C
Explanation:
Answer: D
Explanation:
The root certificate for the CA for a branch in a city was generated by the CA in a city in another
country. Which of the following BEST describes this trust model?
A. Chain of trust
B. Linear trust
C. Hierarchical trust
D. Web of trust
Answer: C
Explanation:
The security administrator needs to determine whether common words and phrases are being
used as passwords on the company server. Which of the following attacks would MOST easily
accomplish this task?
Answer: B
Explanation:
Answer: D
Explanation:
A. NTLM
B. MD5
C. SHA
D. 3DES
Answer: B
Explanation:
Answer: D
Explanation:
The company president wants to replace usernames and passwords with USB security tokens for
company systems. Which of the following authentication models would be in use?
A. Two factor
B. Form factor
C. Physical factor
D. Single factor
Answer: D
Explanation:
A security administrator wants to detect and prevent attacks at the network perimeter. Which of
the following security devices should be installed to address this concern?
A. NIPS
B. IDS
C. HIPS
D. NDS
Answer: A
Explanation:
Which of the following presents the GREATEST security risk to confidentiality of proprietary
corporate data when attackers have physical access to the datacenter?
Answer: C
Explanation:
Which of the following allows a systems administrator to regain lost keys within a PKI?
A. Recovery agent
B. One time pad
C. CRL
D. Asymmetric keys
Answer: A
Explanation:
A vulnerable service is required between two systems on a network. Which of the following should
an administrator use to prevent an attack on that service from outside the network?
A. Proxy server
B. NIDS
C. Firewall
D. HIDS
Answer: C
Explanation:
A technician needs to validate that a sent file has not been modified in any way. A co-worker
recommends that a thumbprint be taken before the file is sent. Which of the following should be
done?
A. Take an AES hash of the file and send the receiver both the hash and the original file in a
signed and encrypted email.
B. Take a MD5 hash of the file and send the receiver both the hash and the original file in a signed
Answer: B
Explanation:
A technician needs to setup a secure room to enable a private VTC system. Which of the following
should be installed to prevent devices from listening to the VTC?
A. Shielding
B. HIDS
C. HVAC
D. MD5 hashing
Answer: A
Explanation:
Answer: C
Explanation:
Which of the following services should be turned off on a printer to prevent malicious
reconnaissance attempts?
Answer: C
Explanation:
A. EMI shielding
B. Redundancy
C. Video monitoring
D. Humidity controls
E. Load balancing
Answer: C,D
Explanation:
Which of the following is the security concept that describes a user who only has enough access
to complete their work?
A. Least privilege
B. Single sign-on
C. Explicit allow
D. Implicit deny
Answer: A
Explanation:
A security administrator wants to ensure that only authorized personnel are able to gain entry into
a secure area. There is currently no physical security other than a badge reader. Which of the
following would MOST likely be installed to regulate right of entry?
Answer: D
Topic 4, Volume D
Which of the following can be a risk of consolidating servers onto a single virtual host?
A. Data emanation
B. Non-repudiation
C. Environmental control
D. Availability
Answer: D
Explanation:
Which of the following is a security best practice that allows a user to have one ID and password
for all systems?
A. SSO
B. PIV
C. Trusted OS
D. Token
Answer: A
Explanation:
An administrator is explaining the conditions under which penetration testing is preferred over
vulnerability testing. Which of the following statements correctly describes these advantages?
Answer: B
Explanation:
An employee is not able to receive email from a specific user at a different organization; however,
they can receive emails from other users. Which of the following would the administrator MOST
likely check to resolve the user's issue?
Answer: B
Explanation:
Which of the following encryption schemes can be configured as the LEAST secure?
A. RC4
B. Twofish
C. 3DES
D. DES
Answer: D
Explanation:
Which of the following security precautions needs to be implemented when securing a wireless
network? (Select THREE)
Answer: A,B,F
Explanation:
A. A private key
B. A public key
C. A hashing algorithm
D. A symmetric key
Answer: D
Explanation:
Which of the following can be exploited for session hijacking while accessing the Internet?
A. P2P
B. Browser history
C. Cookies
D. SQL
Answer: C
Explanation:
A large amount of continuous small transmissions are originating from multiple external hosts to
the corporate web server, which is also inaccessible to users. Which of the following attacks is
MOST likely the cause?
Answer: C
Explanation:
Which of the following asymmetric algorithms was designed to provide both encryption and digital
signatures?
A. Diffie-Hellman
B. DSA
C. SHA
D. RSA
Answer: D
Explanation:
Which of the following can cause data leakage from web based applications?
A. Device encryption
B. Poor error handling
C. Application hardening
D. XML
Answer: B
Explanation:
Which of the following describes a design element that requires unknown computers connecting to
the corporate network to be automatically part of a specific VLAN until certain company
requirements are met?
Answer: B
Explanation:
Answer: D
Explanation:
Which of the following organizational disaster recovery types would provide a building and network
equipment but not current application data?
A. Warm site
B. Field site
C. Cold site
D. Hot site
Answer: A
Explanation:
Which of the following best practices would a security administrator implement in order to prevent
one user from having too many administrative rights?
A. Complex passwords
Answer: B
Explanation:
An administrator is providing management with a mobile device that allows email access. The
mobile device will be password protected in case of loss. Which of the following additional security
measures should the administrator ensure is in place?
A. The mobile device should erase itself after a set number of invalid password attempts.
B. The password should be alpha-numeric only, due to keypad limitations.
C. The password should be common so that the mobile device can be re-assigned.
D. The mobile device should use and be equipped with removal storage for sensitive data
retrieval.
Answer: A
Explanation:
A. Metadata
B. Information classification
C. Risk transference
D. Access control list
Answer: B
Explanation:
Which of the following alternate site types is the MOST affordable after implementation?
A. Cold site
Answer: A
Explanation:
Which of the following can use a trust system where public keys are stored in an online directory?
A. DES
B. AES
C. PGP
D. WEP
Answer: C
Explanation:
Which of the following elements has the ability to hide a node's internal address from the public
network?
A. NAT
B. NAC
C. NDS
D. VLAN
Answer: A
Explanation:
An administrator would like to update a network machine with a number of vendor fixes
concurrently. Which of the following would accomplish this with the LEAST amount of effort?
Answer: A
Explanation:
A port scan of a network identified port 25 open on an internal system. Which of the following
types of traffic is this typically associated with?
A. Web traffic
B. File sharing traffic
C. Mail traffic
D. Network management traffic
Answer: C
Explanation:
If an end-user forgets the password that encrypts the content of a critical hard drive, which of the
following would aid in recovery of the data?
A. Key escrow
B. Symmetric key
C. Certificate authority
D. Chain of custody
Answer: A
Explanation:
A technician needs to ensure that all major software revisions have been installed on a critical
network machine. Which of the following must they install to complete this task?
A. HIDS
B. Hotfixes
Answer: D
Explanation:
A. Systems monitoring
B. Performance monitoring
C. Performance baselining
D. Protocol analysis
Answer: D
Explanation:
An administrator has discovered that regular users are logging into a stand-alone computer and
editing files they should have read-only access to. Which of the following should the administrator
investigate FIRST?
Answer: B
Explanation:
Answer: C
Explanation:
A technician notices that unauthorized users are connecting to a wireless network from outside of
the building. Which of the following can BEST be implemented to mitigate this issue?
Answer: D
Explanation:
The company's NIDS system is setup to match specifically configured traffic patterns. Which of the
following BEST describes this configuration?
A. Anomaly-based
B. Behavior-based
C. OVAL-based
D. Role-based
Answer: B
Explanation:
Which of the following is commonly used to secure HTTP and SMTP traffic?
A. SHA
B. SFTP
C. TLS
Answer: C
Explanation:
Company A recently purchased the much smaller Company B. The security administrator for
Company A reviews the servers of Company B and determines that all employees have access to
all of the files on every server. Which of the following audits did the security administrator perform?
Answer: A
Explanation:
An administrator is concerned that users are not utilizing strong passwords. Which of the following
can be done to enforce user compliance?
Answer: A
Explanation:
Hooking processes and erasing logs are traits of which of the following?
A. Spam
B. Rootkit
C. Buffer overflow
Answer: B
Explanation:
Which of the following are used by security companies to discover the latest Internet attacks?
A. Port scanner
B. Firewall
C. NIPS
D. Honeypot
Answer: D
Explanation:
A. When encrypting a message with the public key, only the public key can decrypt it.
B. When encrypting a message with the private key, only the private key can decrypt it
C. When encrypting a message with the public key, only the CA can decrypt it.
D. When encrypting a message with the public key, only the private key can decrypt it.
E. When encrypting a message with the private key, only the public key can decrypt it.
Answer: D,E
Explanation:
An email server appears to be running with an increased load. Which of the following can be used
to compare historical performance?
A. Performance baselines
B. Systems monitor
Answer: A
Explanation:
Which of the following allows a security administrator to separate networks from each other?
A. Implicit deny
B. Subnetting
C. SaaS
D. laaS
Answer: B
Explanation:
A user wants to send personally identifiable information to the security office via email, so they can
perform a background check. Which of the following should be used to send the information to the
security office?
A. Level of importance
B. Digital signature
C. Encryption
D. Signature line
Answer: C
Explanation:
Which of the following is used to prevent attacks against the OS on individual computers and
servers?
A. NAT
B. HIDS
Answer: C
Explanation:
A. A private key
B. A public key
C. A hashing algorithm
D. A symmetric key
Answer: D
Explanation:
A. PIV
B. MAC
C. One-time passwords
D. Tokens
Answer: A
Explanation:
Which of the following allows a company to maintain access to encrypted resources when
employee turnover is high?
A. Recovery agent
B. Certificate authority
C. Trust model
D. Key escrow
Which of the following is seen as non-secure based on its ability to only store seven uppercase
characters of data making it susceptible to brute force attacks?
A. PAP
B. NTLMv2
C. LANMAN
D. CHAP
Answer: C
Explanation:
A user reports that after a recent business trip, their laptop started having performance issues and
unauthorized emails have been sent out from the laptop. Which of the following will resolve this
issue?
Answer: A
Explanation:
Which of the following describes the direction a signal will emanate from if a Yagi antenna is
placed parallel to the floor?
A. SELinux
B. vmlinuz
C. System File Checker (SFC)
D. Tripwire
Answer: A
Explanation:
Which of the following wireless attacks uses a counterfeit base station with the same SSID name
as a nearby intended wireless network?
A. War driving
B. Evil twin
C. Rogue access point
D. War chalking
Answer: B
Explanation:
Which of the following should be performed if a smartphone is lost to ensure no data can be
retrieved from it?
A. Device encryption
B. Remote wipe
C. Screen lock
D. GPS tracking
A user receives an unsolicited email to change their online banking password. After clicking on the
link contained in the email the user enters their banking credentials and changes their password.
Days later, when checking their account balance they notice multiple money transfers to other
accounts. Which of the following BEST describes the type of attack?
A. Malicious insider
B. Phishing
C. Smurf attack
D. Replay
Answer: B
Explanation:
A company is testing their backup procedures and realizes that certain critical systems are unable
to be restored properly with the latest tapes. Which of the following is the MOST likely cause?
Answer: B
Explanation:
Answer: C
Explanation:
A new product is being evaluated by the security team. Which of the following would take financial
and business impacts into consideration if this product was likely to be purchased for large scale
use?
A. Risk assessment
B. Strength of security controls
C. Application vulnerability
D. Technical threat
Answer: A
Explanation:
A user reports that the spreadsheet they use for the department will not open. The spreadsheet is
located on a server that was recently patched. Which of the following logs would the technician
review FIRST?
A. Access
B. Firewall
C. Antivirus
D. DNS
An administrator is taking an image of a server and converting it to a virtual instance. Which of the
following BEST describes the information security requirements of a virtualized server?
Answer: B
Explanation:
Which of the following access control methods requires significant background investigations?
Answer: D
Explanation:
Which of the following is capable of providing the HIGHEST encryption bit strength?
A. DES
B. 3DES
C. AES
D. WPA
Answer: C
Explanation:
Which of the following risk mitigation strategies would ensure that the proper configurations are
applied to a system?
A. Incident management
B. Application fuzzing
C. Change management
D. Tailgating
Answer: A
Explanation:
Which of the following is the way of actively testing security controls on a system?
Answer: C
Explanation:
A hard drive of a terminated employee has been encrypted with full disk encryption, and a
technician is not able to decrypt the data. Which of the following ensures that, in the future, a
technician will be able to decrypt this information?
A. Certificate authority
B. Key escrow
C. Public key
D. Passphrase
Answer: B
Explanation:
Employees are allowed access to webmail while on the company network. The employees use
this ability to upload attachments and send email from their corporate accounts to their webmail.
Which of the following would BEST mitigate this risk?
Answer: C
Explanation:
When WPA is implemented using PSK, which of the following authentication types is used?
A. MD5
B. LEAP
C. SHA
D. TKIP
Answer: D
Explanation:
A. Black hat
B. White hat
C. Penetration tester
D. Fuzzer
Answer: A
Explanation:
Which of the following logical controls does a flood guard protect against?
A. Spanning tree
B. Xmas attacks
C. Botnet attack
D. SYN attacks
Answer: D
Explanation:
Which of the following allows a security administrator to divide a network into multiple zones?
(Select TWO]
A. PAT
B. EIGRP
C. VLAN
D. NAT
E. Subnetting
Answer: C,E
Explanation:
Answer: A
Explanation:
A. Vulnerability scanning
B. Penetration testing
C. Port scanning
D. Physical lock testing
Answer: B
Explanation:
A. Sequence numbers
B. Set flags
C. IV length
D. NOOP instructions
Answer: D
Explanation:
Answer: D
Explanation:
The company Chief Information Officer (CIO) contacts the security administrator about an email
asking for money in order to receive the key that would decrypt the source code that the attacker
A. Worm
B. Virus
C. Spyware
D. Ransomware
Answer: D
Explanation:
Answer: D
Explanation:
A. Memory addressing
B. Directory traversal
C. Initial vector
D. Session cookies
Answer: A
Explanation:
A security administrator performs various audits of a specific system after an attack. Which of the
following BEST describes this type of risk mitigation?
Answer: B
Explanation:
Which of the following is the BEST choice for encryption on a wireless network?
A. WPA2-PSK
B. AES
C. WPA
D. WEP
Answer: A
Explanation:
Which of the following protocols assists in identifying a user, by the generation of a key, to
establish a secure session for command line administration of a computer?
A. SFTP
B. FTP
C. SSH
D. DNS
Answer: C
Explanation:
In which of the following locations can password complexity be enforced via group policy?
A. Domain controllers
B. Local SAM databases
Answer: A
Explanation:
Security related training should be used to teach the importance of which of the following
behaviors?
A. Routine audits
B. Data mining
C. Data handling
D. Cross-site scripting
Answer: A
Explanation:
A company has remote workers with laptops that house sensitive data. Which of the following can
be implemented to recover the laptops if they are lost?
A. GPS tracking
B. Whole disk encryption
C. Remote sanitation
D. NIDS
Answer: A
Explanation:
An administrator is updating firmware on routers throughout the company. Where should the
administrator document this work?
A. Event Viewer
B. Router's System Log
Answer: C
Explanation:
Which of the following reduces the likelihood of a single point of failure when a server fails?
A. Clustering
B. Virtualization
C. RAID
D. Cold site
Answer: A
Explanation:
Which of the following is an example of requiring users to have a password that consists of alpha-
numeric and two special characters?
Answer: A
Explanation:
Which of the following elements of PKI are found in a browser's trusted root CA?
A. Private key
B. Symmetric key
C. Recovery key
D. Public key
A. Protocol analyzer
B. Anti-virus scanner
C. Network mapper
D. Password cracker
Answer: C
Explanation:
Which of the following would be used to distribute the processing effort to generate hashes for a
password cracking program?
A. RAID
B. Clustering
C. Redundancy
D. Virtualization
Answer: B
Explanation:
A. Remote wipe
B. GPS tracking
C. Screen lock
D. Voice encryption
Answer: D
Explanation:
Several classified mobile devices have been stolen. Which of the following would BEST reduce
the data leakage threat?
Answer: D
Explanation:
A security administrator is setting up a corporate wireless network using WPA2 with CCMP but
does not want to use PSK for authentication. Which of the following could be used to support
802.1x authentication?
A. LDAP
B. RADIUS
C. Kerberos
D. Smart card
Answer: B
Explanation:
Which of the following would a security administrator implement if a parking lot needs to be
constantly monitored?
A. Video surveillance
B. Mandatory access control
C. Mantraps
D. Proximity readers
Answer: A
Which of the following devices would be installed on a single computer to prevent intrusion?
Answer: C
Explanation: An application firewall is a form of firewall which controls input, output, and/or
access from, to, or by an application or service. It operates by monitoring and potentially blocking
the input, output, or system service calls which do not meet the configured policy of the firewall.
The application firewall is typically built to monitor one or more specific applications or services
(such as a web or database service), unlike a stateful network firewall which can provide some
access controls for nearly any kind of network traffic.
A. malicious IP addresses
B. trusted CA's.
C. untrusted private keys.
D. public keys.
Answer: C
Explanation:
When examining HTTP server logs the security administrator notices that the company's online
store crashes after a particular search string is executed by a single external user. Which of the
following BEST describes this type of attack?
Answer: D
Explanation:
A. PGP
B. Symmetric session keys
C. Diffie-Hellman key exchange
D. Mutual authentication
Answer: C
Explanation:
Answer: B
Explanation:
A system administrator sees a firewall rule that applies to 10.4.4.58/27. Which of the following IP
address ranges are encompassed by this rule?
A. 10.4.4.2710.4.4.58
B. 10.4.4.3210.4.4.63
Answer: B
Explanation:
Topic 5, Volume E
A security administrator wants to implement a more secure way to login to a VPN in addition to a
username and password. Which of the following is the MOST secure way to log in to a VPN?
A. Implementing an ACL
B. Setting up a PKI
C. Implementing a single sign on process
D. Setting up two VPNs
Answer: B
Explanation:
A. All doors to the server room must have signage indicating that it is a server room.
B. All server room users are required to have unique usernames and passwords.
C. All new employees are required to be mentored by a senior employee for their first few months
on the job.
D. New server room construction requires a single entrance that is heavily protected.
Answer: D
Explanation:
Which of the following audit types would a security administrator perform on the network to ensure
each workstation is standardized?
Answer: A
Explanation:
The success of a user security education and awareness plan is largely dependent on support
from:
A. contractors.
B. project management.
C. human resources.
D. senior management.
Answer: D
Explanation:
Which of the following signature-based monitoring systems is used to detect and remove known
worms and Trojans on a host?
A. NIPS
B. Antivirus
C. Anti-spam
D. HIDS
Answer: B
Explanation:
Which of the following is the MOST efficient way to secure a single laptop from an external attack?
A. NIPS
Answer: C
Explanation:
Disabling the SSID broadcast removes the identifier from which of the following wireless packets?
A. Probe
B. ACK
C. Beacon
D. Data
Answer: C
Explanation:
A. Analyzes packets
B. Serves as a honeypot
C. Blocks access to the network
D. Forwards requests for services from a client
Answer: D
Explanation:
Which of the following standards encodes in 64-bit sections, 56 of which are the encryption key?
A. SHA
B. AES
C. DES
D. Blowfish
A. TACACS
B. RAS
C. PPTP
D. Kerberos
Answer: D
Explanation:
Which of the following is used to both deploy and reapply baseline security configurations?
A. Performance baseline
B. Security agent
C. Security template
D. Configuration baseline
Answer: C
Explanation:
Which of the following is BEST suited to detect local operating system compromises?
A. Personal firewall
B. HIDS
C. Anti-spam
Answer: B
Explanation:
A. An ad-hoc network allows access to another computer at the same level of the logged in user,
compromising information.
B. An ad-hoc network allows access to the nearest access point which may allow a direct
connection to another computer.
C. An ad-hoc network allows access to the nearest access point which may give elevated rights to
the connecting user.
D. An ad-hoc network allows access to another computer but with no rights so files cannot be
copied or changed.
Answer: A
Explanation:
A wireless network operates in one of two modes, ad-hoc or infrastructure. In the ad hoc mode,
each station is a peer to the other stations and communicates directly with other stations within the
network. No AP is involved. All stations can send Beacon and Probe frames.
A. A user is able to distribute connections to the network for load balancing using a centralized list
of approved devices.
B. A user is able to distribute connections to the network using cached credentials on a local
machine.
C. A user is able to control connections to the network using a centralized list of approved devices.
D. A user is able to control connections to the network using cached credentials on a local
machine.
Answer: C
Explanation:
A. AES256
B. DES
C. 3DES
D. AES128
Answer: C
Explanation:
Triple DES is a variation of Data Encryption Standard (DES). It uses a 64-bit key consisting of 56
effective key bits and 8 parity bits. The size of the block for Triple-DES is 8 bytes. Triple-DES
encrypts the data in 8-byte chunks. The idea behind Triple DES is to improve the security of DES
by applying DES encryption three times using three different keys. Triple DES algorithm is very
secure (major banks use it to protect valuable transactions), but it is also very slow.
Which of the following encryption technologies is BEST suited for small portable devices such as
PDAs and cell phones?
A. TKIP
B. PGP
C. AES192
D. Elliptic curve
Answer: D
Explanation:
A. SYSLOG
B. SNMP
C. IMAP
D. FTP
Answer: A
A. Availability
B. Confidentiality
C. Delivery
D. Integrity
Answer: D
Explanation:
A penetration tester is required to conduct a port scan on a network. Which of the following
security tools can be used to conduct this scan? (Select TWO).
A. Kismet
B. Snort
C. netcat
D. nslookup
E. Nmap
Answer: C,E
Explanation:
Which of the following is BEST used for providing protection against power fluctuation?
A. Generator
B. Voltmeter
C. UPS
D. Redundant servers
Answer: C
Explanation:
A technician wants to make sure all users in the network are in compliance with company
standards for login. Which of the following tools can the technician use?
Answer: C
Explanation:
Answer: A,C
Explanation:
A secure company portal, accessible publicly but only to company employees, frequently fails to
renew its certificates, resulting in expired certificate warnings for users. These failures: (Select
TWO).
Answer: C,E
Explanation:
Which of the following security controls would a company use to verify that their confidential and
proprietary data is not being removed?
A. Man traps
B. Chain of custody
C. Video surveillance
D. Vulnerability scanners
Answer: C
Explanation:
The last company administrator failed to renew the registration for the corporate web site (e.g.
https://wrtw.comptia.org). When the new administrator tried to register the website it is discovered
that the registration is being held by a series of small companies for very short periods of time.
This is typical of which of the following?
A. Spoofing
B. TCP/IP hijacking
C. Domain name kiting
D. DNS poisoning
Answer: C
Explanation: Domain name kiting is a practice in which participants leverage the 5-day add/drop
grace period mandated by ICANN to “keep” names at no cost by perpetually adding and dropping
them. Under this scheme, a domain name can deliver profit to the owner even if it yields just
pennies per year.
Answer: D
Explanation:
To protect against SQL injection, user input must not directly be embedded in SQL statements.
Instead, parameterized statements must be used (preferred), or user input must be carefully
escaped or filtered.
A. Spam
B. Adware
C. Spyware
D. Worm
Answer: C
Explanation:
Answer: C
Explanation:
Answer: C
Explanation:
Which of the following can be implemented to prevent malicious code from executing?
Answer: C
Explanation:
All administrators are now required to use 15 character passwords. Which of the following is the
BEST method to enforce this new password policy?
A. Email announcements
B. Account expiration configuration
C. Group policy
D. Forcing all users to change their password on next login
Answer: C
Explanation:
Answer: A
Explanation:
Management has requested increased visibility into how threats might affect their organization.
Which of the following would be the BEST way to meet their request without attempting to exploit
those risks?
Answer: B
Explanation:
Which of the following stores information with a trusted agent to decrypt data at a later date, even
if the user destroys the key?
A. Key registration
B. Recovery agent
C. Key escrow
D. Public trust model
Answer: C
Explanation:
A. NAT
B. PAT
C. ACL
D. NAC
Answer: A
Explanation:
When developing a new firewall policy, which of the following methods provides the MOST secure
starting point?
A. Implicit deny
B. Least privilege
C. Stateful inspection
D. Due diligence
Answer: A
Explanation:
Implicit deny means that the firewall only permits the specific needed applications to pass through
the firewall, and everything else is denied.
Which of the following should be updated whenever software is upgraded on a production system?
A. Baseline
B. Group policy
C. LDAP entry
D. Antivirus
Answer: A
Explanation:
An administrator is required to keep certain workstations free of malware at all times, but those
workstations need to be able to access any Internet site. Which of the following solutions would be
the BEST choice?
Answer: A
Explanation:
The best initial protection against malicious code is antivirus software.
Reference: CompTIA Secutiy+ Deluxe Study Guide, p. 492.
Which of the following combinations of items would constitute a valid three factor authentication
system?
Answer: A
Explanation:
Which of the following BEST describes a tool used to encrypt emails in transit?
Answer: D
Which of the following security threats would MOST likely use IRC?
A. Botnets
B. Adware
C. Logic bombs
D. Spam
Answer: A
Explanation:
A user reports that after opening an email from someone they knew, their computer is now
displaying unwanted images. Which of the following software can the technician MOST likely
install on the computer to mitigate this threat?
A. Anti-spam
B. Antivirus
C. HIDS
D. Firewall
Answer: B
Explanation:
Which of the following tools will detect protocols that are in use?
A. Spoofing
B. Port scanner
C. Proxy server
Answer: B
Explanation:
An auditor would use credentials harvested from a SQL injection attack during which of the
following?
A. Forensic recovery
B. Vulnerability assessment
C. Penetration test
D. Password strength audit
Answer: C
Explanation:
Answer: A
Explanation:
A key escrow system stores keys for the purpose of law enforcement access. One of the proposed
methods of dealing with key escrow involves the storage of key information with a third party,
referred to as a key escrow agency.
Which of the following will allow a technician to restrict access to one folder within a shared folder?
A. NTLM
Answer: D
Explanation:
A data entry technician uses an application from the Internet to gain administrative rights on a
system. Gaining unauthorized domain rights is an example of:
A. A logic bomb.
B. A rootkit.
C. Spyware.
D. Privilege escalation.
Answer: D
Explanation:
Which of the following would be implemented to provide a check and balance against social
engineering attacks?
A. Password policy
B. Single sign-on
C. Separation of duties
D. Biometric scanning
Answer: C
Explanation:
Which of the following tools would BEST allow a security administrator to view the contents of
unencrypted network traffic?
Answer: B
Explanation:
Answer: D
Explanation:
A. SHA1
B. Blowfish
C. DES
D. AES
Answer: C
Explanation:
At midnight on January 1st, an administrator receives an alert from the system monitoring the
servers in the datacenter. All servers are unreachable. Which of the following is MOST likely to
have caused the DOS?
A. Rootkit
B. Virus
Answer: C
Explanation:
Logic bombs are programs or snippets of code that execute when a certain predefined event
occurs. Logic bombs may also be set to go off on a certain date or when a specified set of
circumstances occurs.
Which of the following would an auditor use to determine if an application is sending credentials in
clear text?
A. Vulnerability scanner
B. Protocol analyzer
C. Rainbow table
D. Port scanner
Answer: B
Explanation:
Which of the following security controls targets employee accounts that have left the company
without going through the proper exit process?
Answer: B
Explanation:
Which of the following logs would MOST likely indicate that there is an ongoing brute force attack
A. Firewall
B. System
C. Performance
D. Access
Answer: B
Explanation:
System logs will frequently tell you what was accessed and in what manner. These logs are
usually explicit in describing the events that occurred during a security violation.
A technician reports that an employee that retired five years ago still has access to the marketing
department’s folders. Which of the following should have been conducted to avoid this security
risk?
Answer: D
Explanation:
A. Availability
B. Integrity
C. Confidentiality
D. Privacy
Answer: A
Explanation:
Answer: C
Explanation:
After a disaster, a security administrator is helping to execute the company disaster recovery plan.
Which of the following security services should be restored FIRST?
Answer: A
Explanation:
Which of the following security concerns stern from the use of corporate resources on cell
phones? (Select TWO).
Answer: A,E
Explanation:
A. Protocol analyzer
B. VPN
C. Performance monitor
D. Spam filter
Answer: C
Explanation:
Answer: C
Explanation:
Which of the following should be disabled to help prevent boot sector viruses from launching when
a computer boots?
A. SNMP
B. DMZ
C. USB
D. Hard Drive
Answer: C
Explanation:
A. UPS
B. Transfer switch
C. Circuit breaker
D. Backup generator
Answer: A
Explanation:
A UPS will allow you to continue to function in the absence of power for only a short duration. For
fault tolerance in situations of longer duration, you will need a backup generator. Backup
generators run off of gasoline or diesel and generate the electricity needed to provide steady
power.
In a standard PKI implementation, which of the following keys is used to sign outgoing messages?
Answer: A
Explanation:
The security administrator is investigating a breach of the company’s web server. One of the web
developers had posted valid credentials to a web forum while troubleshooting an issue with a
vendor. Logging which of the following would have created the BEST way to determine when the
breach FIRST occurred? (Select TWO).
A. Unsuccessful login
B. Source OS
C. Destination IP
D. Number of hops from source
E. Source IP
F. Successful login
Which of the following authentication models often requires different systems to function together
and is complicated to implement in non-homogeneous environments?
Answer: B
Explanation:
Which of the following would be MOST useful for a security technician to run on a single, stand-
alone machine with no network interface to verify its overall security posture?
A. Password cracker
B. Protocol analyzer
C. Network mapper
D. Port scanner
Answer: A
Explanation:
One of the primary purposes of visualization in a data center is to reduce which of the following?
Answer: A
Which of the following would MOST likely determine which user inadvertently shut down the
company’s web server?
A. Access logs
B. Application logs
C. DNS logs
D. Performance logs
Answer: A
Explanation:
Answer: A
Explanation:
On network devices where strong passwords cannot be enforced, the risk of weak passwords is
BEST mitigated through the use of which of the following?
Answer: A
Explanation:
A. MD5
B. NTLM
C. Blowfish
D. LANMAN
Answer: A
Explanation:
Which of the following allows management to track whether staff members have accessed an
authorized area?
A. Physical tokens
B. Physical access logs
C. Man-traps
D. Hardware locks
Answer: B
Explanation:
Which of the following is used to provide a fixed-size bit-string regardless of the size of the input
source?
A. SHA
B. 3DES
C. PGP
D. WEP
Answer: A
Explanation:
A new application support technician is unable to install a new approved security application on a
departmental’s workstation. The security administrator needs to do which of the following?
Answer: A
Explanation:
An intruder has gained access to a server and installed an application to obtain credentials. Which
of the following applications did the intruder MOST likely install?
A. Account dictionary
B. Vulnerability scanner
C. Protocol analyzer
D. Password cracker
Answer: D
Explanation:
Answer: D
Explanation:
A. strong authentication.
B. restricting read permission.
C. secure network protocols.
D. whole disk encryption.
Answer: D
Explanation:
The firewall administrator sees an outbound connection on IP port 50 and UDP port 500. Which of
the following is the cause?
Answer: A
Explanation:
Answer: A
Explanation:
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are
officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its
primary purpose is to detect weak Unix passwords.
A user reports that they cannot print anything from the file server or off the web to the network
printer. No other users are having any problems printing. The technician verifies that the user’s
computer has network connectivity. Which of the following is the MOST probable reason the user
cannot print?
Answer: D
Explanation:
A remote network administrator calls the helpdesk reporting that they are able to connect via VPN
but are unable to make any changes to the internal web server. Which of the following is MOST
likely the cause?
Answer: B
Explanation:
Which of the following standards could be used to rate the risk exposure of vulnerabilities on a
network?
A. RADIUS
B. Certificate authority
C. OVAL
D. TACACS
Answer: C
A security administrator has reports of an employee writing harassing letters on a workstation, but
every time the security administrator gets on the workstation there is no evidence of the letters.
Which of the following techniques will allow the security administrator to acquire the necessary
data?
A. VLAN
B. Memory forensics
C. Firewall
D. Dumpster diving
Answer: B
Explanation:
An administrator needs to implement a backup strategy that provides the fastest recovery in case
of data corruption. Which of the following should the administrator implement?
Answer: C
Explanation:
A network administrator places a firewall between a file server and the public Internet and another
firewall between the file server and the company’s internal servers. This is an example of which of
the following design elements?
Answer: A
Explanation:
Which of the following describes what has occurred after a user has successfully gained access to
a secure system?
A. Authentication
B. Authenticity
C. Identification
D. Confidentiality
Answer: A
Explanation:
Which of the following security attacks would be MOST likely to occur within the office without the
use of technological tools?
A. Phishing
B. Cold calling
C. Shoulder surfing
D. SPIM
Answer: C
Explanation:
One form of social engineering is known as shoulder surfing and involves nothing more than
watching someone when they enter their sensitive data. They can see you entering a password,
typing in a credit card number, or entering any other pertinent information. The best defense
against this type of attack is simply to survey your environment before entering personal data.
Which of the following is a service that provides authentication, authorization and accounting to
connecting users?
A. LANMAN
B. WPA
C. RADIUS
D. CHAP
Answer: C
Explanation:
Which of the following would MOST likely monitor user web traffic?
A. A proxy server
B. Enable cookie monitoring
C. A software firewall
D. Enable Internet history monitoring
Answer: A
Explanation:
When implementing a group policy restricting users from running software installations, the
administrator needs to be aware of which of the following disadvantages?
Answer: D
Explanation:
A. TACACS
B. CHAP
C. LDAP
D. Kerberos
Answer: D
Explanation:
Which of the following key types would a user MOST likely receive from a secure e-commerce
website?
A. Private key
B. Public key
C. CRL
D. Key escrow
Answer: B
Explanation:
Which of the following can be used to prevent ongoing network based attacks?
A. NIDS
B. HIDS
C. NAT
D. NIPS
Answer: D
Explanation:
Answer: C
Explanation:
A user reports that they opened an attachment from an email received through a distribution list.
At a later date, several computers started behaving abnormally. Which of the following threats has
MOST likely infected the computer?
A. Pop-ups
B. Spyware
C. Spam
D. Logic bomb
Answer: D
Explanation:
A technician notices that folder permissions are changing randomly on the server. Which of the
following tools would the technician use to identify the issue?
A. System monitor
B. DMZ
C. Firewall
D. Protocol analyzer
Answer: D
Explanation:
Which of the following protocols allows a user to selectively encrypt the contents of an email
message at rest?
Answer: D
Explanation:
A technician completes a WLAN audit and notices that a number of unknown devices are
connected. Which of the following can BEST be completed to mitigate the issue?
Answer: D
Explanation:
Topic 6, Volume F
Answer: D
Explanation:
A company sets up wireless access points for visitors to use wireless devices. Which of the
following encryption methods should they implement to provide the highest level of security?
Answer: C
Explanation:
Which of the following would a security administrator be MOST likely to use if a computer is
suspected of continually sending large amounts of sensitive data to an external host?
A. Performance baseline
B. Virus scanner
C. Honeypot
D. Protocol analyzer
Answer: D
Explanation:
Which of the following contains a list of certificates that are compromised and invalid?
A. CA
B. CRL
C. TTP
D. RA
Answer: B
Explanation:
Certificate revocation is the process of revoking a certificate before it expires. A certificate may
need to be revoked because it was stolen, an employee moved to a new company, or someone
has had their access revoked. A certificate revocation is handled either through a Certificate
Revocation List (CRL).
Answer: A
Explanation:
If an administrator wanted to be able to identify exactly which Internet sites are being accessed
most frequently, which of the following tools would MOST likely be used?
A. Port scanner
B. IDS
C. Proxy server
D. Firewall
Answer: C
Explanation:
Which of the following methods allows the administrator to create different user templates to
comply with the principle of least privilege?
Answer: D
Explanation:
Answer: C
Explanation:
A. Job rotation
B. Least privilege
C. Separation of duties
D. Access controls
Answer: D
Explanation:
A web server that the employees use to fill out their time cards needs to be protected. The web
server needs to be accessible to employees both inside the campus and at remote sites. Some of
the employees use computers that do not belong to the company to do their work. Which of the
following would BEST protect the server?
A. Place the server in a DMZ and require all users to use the company’s VPN software to access
it.
B. Place the server in a subnet that is blocked at the firewall.
C. Place the server in a DMZ after hardening the OS.
D. Require all users to use a PKI token stored on a physical smart card to authenticate to the
server.
Answer: C
Explanation:
A. Penetration test
B. Vulnerability scan
C. Port scan
D. Social engineering
Answer: A
Explanation:
The security administrator wants to know if a new device has any known issues with its available
applications. Which of the following would be BEST suited to accomplishing this task?
A. Vulnerability scanner
B. Port scanner
C. Network mapper
D. Protocol analyzer
Answer: A
Explanation:
Which of the following are BEST practices in regards to backup media? (Select TWO).
Answer: D,E
Explanation:
Answer: A
Explanation:
Which of the following is an advanced security tool used by security administrators to divert
malicious attacks to a harmless area of the network?
A. Firewall
B. TCP/IP hijacking
C. Proxy server
D. Honeypot
Answer: D
Explanation:
Which of the following would be the BEST course of action to maintain network availability during
an extended power outage?
Answer: C
Explanation:
Answer: C
Explanation:
Which of the following redundancy planning concepts is generally the LEAST expensive?
A. Warm site
B. Hot site
C. Mobile site
D. Cold site
Answer: D
Explanation:
Which of the following can the administrator do to verify that a tape backup can be recovered in its
entirety?
Answer: B
Explanation:
A. HR employees
B. Information security employees
C. All employees
D. Executive management
E. Vendors
Answer: B,D
Explanation:
Answer: B
Explanation:
Answer: A
Explanation:
In general, which of the following is considered the MOST resistant to physical eavesdropping
A. Coaxial cable
B. Wireless access points
C. Fiberoptic cable
D. CAT5 network cable
Answer: C
Explanation:
Which of the following behavioral biometric authentication models should a technician deploy in a
secure datacenter?
A. Voice recognition
B. Fingerprint recognition
C. Iris scan
D. Retina scan
Answer: A
Explanation:
A. ARP spoofing
B. Kiting
C. DNS
D. DDoS
Answer: B
Explanation:
Which of the following would allow an administrator to perform internal research on security
threats and common viruses on multiple operating systems without risking contamination of the
A. A VLAN
B. A firewall
C. A virtual workstation
D. A honey pot
Answer: C
Explanation:
Which of the following threats is mitigated by ensuring operating system patches are current?
A. ARP poisoning
B. Distributed DoS
C. Unknown threats
D. Known threats
Answer: D
Explanation:
Which of the following environmental controls would require a thermostat within the datacenter?
A. Air flowcontrol
B. Moisture control
C. Temperature control
D. Fire suppression
Answer: C
Explanation:
A server needs to be configured to allow the sales department ability to read and write a file.
Everyone else in the company only needs read access. Which of the following access control lists
will do this?
Answer: A
Explanation:
Which of the following will allow a security administrator to help detect a DDoS?
A. Performance baseline
B. Task manager
C. NetBIOS
D. NIC bindings
Answer: A
Explanation:
An administrator wants to make sure that all users of a large domain are restricted from installing
software. Which of the following should MOST likely be done?
Answer: A
Explanation:
A single point of failure is a security concern primarily because it affects which of the following?
Answer: D
Explanation:
Which of the following is MOST likely the reason why a security administrator would run a NMAP
report on an important server?
Answer: C
Explanation:
Which of the following should be done if a USB device is found in a parking lot?
Answer: C
Explanation:
Which of the following, if implemented on a server, will ensure availability if half of the drives fail?
A. RAID 0
B. RAID 1
Answer: B
Explanation:
RAID level 1 RAID 1 is disk mirroring. Disk mirroring provides 100 percent redundancy because
everything is stored on two disks. If one disk fails, another disk continues to operate. The failed
disk can be replaced, and the RAID 1 array can be regenerated.
Answer: A
Explanation:
A. Key management.
B. Availability.
C. Confidentiality.
D. Non-repudiation.
Answer: D
Explanation:
Which of the following is a best practice relating to non-administrative user rights on a server?
Answer: D
Explanation:
Which of the following is MOST likely to occur if the input of a web form is not properly sanitized?
(Select TWO).
A. SQL injection
B. Backend file system crash
C. Web load balancing
D. Cross-site scripting
E. Logic bomb
Answer: A,D
Explanation:
Rainbow tables are primarily used to expose which of the following vulnerabilities?
A. Available ports
B. Weak encryption keys
C. Weak passwords
D. Available IP addresses
Answer: C
Explanation:
Which of the following can be an attack vector against employees who share pictures, location,
Answer: A
Explanation:
Which of the following tools allows a security company to identify the latest unknown attacks
utilized by attackers?
A. IDS
B. Honeypots
C. Port scanners
D. Code reviews
Answer: B
Explanation:
Which of the following is the BEST reason to conduct annual security awareness training?
Answer: A
Explanation:
If continuity plans are not regularly exercised, which of the following aspects of business continuity
Answer: D
Explanation:
Large, partially self-governing, collection of hosts executing instructions for a specific purpose is
an example of which type of malware?
A. Virus
B. Worm
C. Trojan
D. Botnet
Answer: D
Explanation:
Which of the following attacks is BEST described as the interruption of network traffic
accompanied by the insertion of malicious code?
A. Spoofing
B. Man-in-the-middle
C. Spear phishing
D. DoS
Answer: B
Explanation:
A. Shoulder surfing
B. Tailgating
C. Impersonation
D. Packet sniffing
Answer: C
Explanation:
Randomly attempting to connect to wireless network access points and documenting the locations
of accessible networks is known as which of the following?
A. Packet sniffing
B. War chalking
C. Evil twin
D. War driving
Answer: B
Explanation:
Penetration testing should only be used during controlled conditions with express consent of the
system owner because:
Answer: D
Explanation:
A. CRL
B. Key escrow
C. Recovery agent
D. CA
Answer: D
Explanation:
Which of the following should be checked regularly to avoid using compromised certificates?
A. CRL
B. PKI
C. Key escrow
D. CA
Answer: A
Explanation:
A user was able to access a system when they arrived to work at 5:45 a.m. Just before the user
left at 6:30 p.m., the user was unable to access the same system, even though the user could ping
the system. In a Kerberos realm, which of the following is the MOST likely reason for this?
Answer: A
Explanation:
Answer: B
Explanation:
A company is looking at various solutions to manage their large datacenter. The company has a
lot of sensitive data on unreliable systems. Which of the following would allow the company to
minimize their footprint?
A. Infrastructure as a Service
B. Implement a NAC server
C. Software as a Service
D. Create a new DMZ
Answer: A
Explanation:
A small company needs to invest in a new expensive database. The company’s budget does not
include the purchase of additional servers or personnel. Which of the following solutions would
allow the small company to save money on hiring additional personnel and minimize the footprint
in their current datacenter?
Answer: D
Explanation:
Which of the following is a policy that would force all users to organize their areas as well as help
in reducing the risk of possible data theft?
A. Password behaviors
B. Clean desk policy
C. Data handling
D. Data disposal
Answer: B
Explanation:
The security administrator has recently informed all users of a new attack from individuals sending
out emails pretending to represent reputable companies to gain personal and financial information.
Which of the following attacks is the security administrator trying to make users aware of in the
company?
A. Vishing attacks
B. Phishing attacks
C. Smurf attacks
D. Zero day attacks
Answer: B
Explanation:
The security administrator is getting reports from users that they are accessing certain websites
and are unable to download anything off of those sites. The security administrator is also receiving
several alarms from the IDS about suspicious traffic on the network. Which of the following is the
MOST likely cause?
Answer: A
Explanation:
A visitor plugs their laptop into the network and receives a warning about their antivirus being out-
of-date along with various patches that are missing. The visitor is unable to access the Internet or
any network resources. Which of the following is the MOST likely cause?
A. The IDS detected that the visitor’s laptop did not have the right patches and updates so the IDS
blocked access to the network.
B. The security posture is disabled on the network but remediation must take place before access
is given to the visitor on that laptop.
C. The security posture is enabled on the network and remediation must take place before access
is given to the visitor on that laptop.
D. The IPS detected that the visitor’s laptop did not have the right patches and updates so it
prevented its access to the network.
Answer: C
Explanation:
A security administrator notices unusual activity from a server when reviewing system logs and
finds it has been compromised. After investigating the incident, the administrator determines the
attack successfully exploited a vulnerability in IIS. This application can be disabled to prevent any
further incidents because it was not necessary for any server functions. Which of the following
could have prevented this incident?
Answer: C
Explanation:
Answer: D
Explanation:
Answer: A
Explanation:
Which of the following is an example of authentication using something a user has and something
a user is?
Answer: D
Explanation:
A. root certificate.
B. key in escrow.
C. public key.
D. private key.
Answer: D
Explanation:
Which of the following must a security administrator do when the private key of a web server has
been compromised by an intruder?
Answer: A
Explanation:
Which of the following is a security administrator MOST likely to use to centrally manage
authentication across network devices? (Select TWO).
A. TACACS+
B. Kerberos
C. RADIUS
D. LDAP
E. MSSQL
Answer: A,C
Explanation:
A. VLAN separation
B. Access control
C. Loop protection
D. DMZ
Answer: C
Explanation:
Which of the following attacks is MOST likely prevented when a website does not allow the a€?<’
character as the input in a web form field?
A. Integer overflow
B. SQL injection
C. Buffer overflow
D. Cross-site scripting
Answer: D
Explanation:
Which of the following must be installed on a flash drive to allow for portable drive data
confidentiality?
A. USB encryptor
B. Hardware write lock
C. USB extension cable
D. Ext2 file system
Answer: A
Explanation:
A. Logic bomb
B. Backdoor
C. Rootkit
D. Spyware
Answer: A
Explanation:
While browsing the Internet, an administrator notices their browser behaves erratically, appears to
download something, and then crashes. Upon restarting the PC, the administrator notices
performance is extremely slow and there are hundreds of outbound connections to various
websites. Which of the following BEST describes what has occurred?
Answer: A
Explanation:
A user downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type of malware?
A. Logic bomb
B. Worm
C. Trojan
D. Adware
Answer: C
Explanation:
An online banking portal is not accessible by customers during a holiday season. IT and network
administrators notice sustained, extremely high network traffic being directed towards the web
interface of the banking portal from various external networks. Which of the following BEST
describes what is occurring?
A. X-Mas attack
B. DDoS attack
C. DNS poisoning
D. DOS attack
Answer: B
Explanation:
While chatting with friends over IM, a user receives numerous instant messages from strangers
advertising products or trying to send files. Which of the following BEST describes the threat?
A. Spear phishing
B. Spam
C. Spim
D. Spoofing
Answer: C
Explanation:
Which of the following is the MOST secure way of storing keys or digital certificates used for
decryption/encryption of SSL sessions?
A. Database
B. HSM
C. Key escrow
D. Hard drive
Which of the following is the MOST likely implication of a corporate firewall rule that allows TCP
port 22 from any internal IP to any external site?
A. Data leakage can occur as an SSH tunnel may be established to home PCs.
B. NAT of external websites to the internal network will be limited to TCP port 22 only.
C. Host based firewalls may crash due to protocol compatibility issues.
D. IPSec VPN access for home users will be limited to TCP port 22 only.
Answer: A
Explanation:
A. Accounting transferring confidential staff details via SFTP to the payroll department.
B. Back office staff accessing and updating details on the mainframe via SSH.
C. Encrypted backup tapes left unattended at reception for offsite storage.
D. Developers copying data from production to the test environments via a USB stick.
Answer: D
Explanation:
A network administrator changes the default users and passwords on an 802.11n router. Which of
the following is an example of network management?
A. System hardening
B. Rule-based management
C. Network separation
D. VLAN management
Which of the following is the file transfer function that utilizes the MOST secure form of data
transport?
A. TFTP
B. FTP active
C. FTP passive
D. SFTP
Answer: D
Explanation:
Which of the following, when used in conjunction with software-based encryption, enhances
platform authentication by storing unique RSA keys and providing cryptoprocessing?
A. LDAP
B. TPM
C. Kerberos
D. Biometrics
Answer: B
Explanation:
Which of the following is the BEST way to mitigate data leakage if a portable device is
compromised?
Which of the following is a removable device that may be used to encrypt in a high availability
clustered environment?
A. Cloud computer
B. HSM
C. Biometrics
D. TMP
Answer: B
Explanation:
Which of the following devices provides storage for RSA or asymmetric keys and may assist in
user authentication? (Select TWO).
Answer: A,B
Explanation:
Which of the following exploitation types involves injection of pseudo-random data in order to
crash or provide unexpected results from an application?
A. Cross-site forgery
B. Brute force attack
C. Cross-site scripting
Answer: D
Explanation:
Which of the following can be disabled to prevent easy identification of a wireless network?
A. WEP
B. MAC filtering
C. SSID
D. LEAP
Answer: C
Explanation:
Which of the following should be enabled to ensure only certain wireless clients can access the
network?
A. DHCP
B. SSID broadcast
C. MAC filtering
D. AP isolation
Answer: C
Explanation:
The security administrator implemented privacy screens, password protected screen savers, and
hired a secure shredding and disposal service. Which of the following attacks is the security
administrator trying to mitigate? (Select TWO).
A. Whaling
B. Dumpster diving
Answer: B,C
Explanation:
A security administrator wants to prevent users in sales from accessing their servers after 6:00
p.m., and prevent them from accessing accounting's network at all times. Which of the following
should the administrator implement to accomplish these goals? (Select TWO).
A. Separation of duties
B. Time of day restrictions
C. Access control lists
D. Mandatory access control
E. Single sign-on
Answer: B,C
Explanation:
A. Device locks
B. Video surveillance
C. Mantraps
D. Proximity readers
Answer: D
Explanation:
Answer: D
Explanation:
Which of the following attacks allows a user to access a location by following someone who has
access?
A. Session hijacking
B. Bluesnarfing
C. Tailgating
D. Shoulder surfing
Answer: C
Explanation:
A. Trusted OS
B. Smart card
C. Biometrics
D. Multifactor
Answer: D
Explanation:
Which of the following access control methods is considered the MOST difficult to forge?
A. RFIDs
Answer: B
Explanation:
Which of the following is MOST likely to be the last rule contained on any firewall?
Answer: B
Explanation:
A. Biometrics
B. SSO
C. PIV
D. Tokens
Answer: D
Explanation:
Which of the following is an example of the type of access control methodology provided on
Windows systems by default?
A. Single Sign-On
B. Discretionary Access Control (DAC)
Answer: B
Explanation:
Which of the following is the MOST thorough way to discover software vulnerabilities after its
release?
A. Baseline reporting
B. Design review
C. Code review
D. Fuzzing
Answer: C
Explanation:
Answer: A
Explanation:
A. Vulnerability scanning
B. Zero day attack
Answer: A
Explanation:
Answer: B
Explanation:
Topic 7, Volume G
Which of the following application attacks can be used against Active Directory based systems?
A. XML injection
B. SQL injection
C. LDAP injection
D. Malicious add-ons
Answer: C
Explanation:
Which of the following is a security best practice implemented before placing a new server online?
A. On-demand computing
B. Host software baselining
C. Virtualization
Answer: B
Explanation:
A. Antivirus
B. GPS tracking
C. Cable locks
D. Device encryption
Answer: C
Explanation:
Which of the following is a technical control that should be implemented to prevent data loss from
laptop theft?
A. GPS tracking
B. Antivirus
C. Hard drive encryption
D. Cable locks
Answer: C
Explanation:
Which of the following software types helps protect against non-malicious but irritating malware?
A. Pop-up blockers
B. Antivirus
C. Host-based firewalls
D. Anti-spyware
Which of the following is the MOST common security issue on web-based applications?
A. Hardware security
B. Transport layer security
C. Input validation
D. Fuzzing
Answer: C
Explanation:
A. CCTV
B. Armed guard
C. Proper lighting
D. Access list
Answer: B
Explanation:
Which of the following security concerns is MOST prominent when utilizing cloud computing
service providers?
A. Video surveillance
B. Mobile device access
C. Removable storage media
D. Blended systems and data
Answer: D
Which of the following is an example of forcing users to change their password every 90 days?
Answer: C
Explanation:
Answer: D
Explanation:
Which of the following is an example of allowing a user to perform a self-service password reset?
A. Password length
B. Password recovery
C. Password complexity
D. Password expiration
Answer: B
Explanation:
Which of the following is a security control that can utilize a command such as a€?deny ip any
any’?
A. ACL
B. Content inspection
C. Network bridge
D. VPN
Answer: A
Explanation:
Which of the following is a security best practice when an employee leaves the company?
Answer: B
Explanation:
Which of the following is an account management principle for simplified user administration?
Answer: C
Explanation:
Which of the following web application security weaknesses can be mitigated by preventing the
use of HTML tags?
A. LDAP injection
B. SQL injection
C. Error and exception handling
D. Cross-site scripting
Answer: D
Explanation:
Which of the following appears to the user as a legitimate site but is in fact an attack from a
malicious site?
A. Phishing
B. DoS
C. XSRF
D. XSS
Answer: D
Explanation:
A. multifactor.
B. single sign-on.
C. user specific.
D. job function specific.
Answer: D
Explanation:
A system administrator could have a user level account and an administrator account to prevent:
A. password sharing.
B. escalation of privileges.
C. implicit deny.
D. administrative account lockout.
Answer: B
Explanation:
Which of the following would be the BEST action to perform when conducting a corporate
vulnerability assessment?
Answer: B
Explanation:
A Black Box assessment of an application is one where the security assessor has:
Answer: B
Explanation:
A user browsing the Internet sees a message on a webpage indicating their computer is infected.
The message states that antivirus software should be downloaded from the site to clean the
infection. Which of the following is occurring in this situation?
A. Social engineering
B. Adware
C. Botnet
D. Trojan
Answer: A
Explanation:
Which of the following BEST explains the security benefit of a standardized server image?
A. All current security updates for the operating system will have already been applied.
B. Mandated security configurations have been made to the operating system.
C. Anti-virus software will be installed and current.
D. Operating system license use is easier to track.
Answer: B
Explanation:
A business-critical application will be installed on an Internet facing server. Which of the following
is the BEST security control that should be performed in conjunction with updating the application
to the MOST current version?
Answer: D
Explanation:
A web application has been found to be vulnerable to a SQL injection attack. Which of the
following BEST describes the required remediation action?
A. Change the server’s SSL key and add the previous key to the CRL.
B. Install a host-based firewall.
C. Install missing security updates for the operating system.
D. Add input validation to forms.
Answer: D
Explanation:
A company needs to reduce the risk of employees emailing confidential data outside of the
company. Which of the following describes an applicable security control to mitigate this threat?
Answer: A
Explanation:
Which of the following security controls should be implemented to prevent server administrators
from accessing information stored within an application on a server?
A. File encryption
B. Full disk encryption
C. Change management
D. Implicit deny
Answer: A
Explanation:
Which of the following should be enforced on mobile devices to prevent data loss from stolen
devices?
A. Device encryption
B. HIDS
C. USB encryption
D. Host-based firewall
Answer: A
Explanation:
A. IPv6
B. DNSSEC
C. SNMPv2
D. SNMPv3
Answer: A
Explanation:
Which of the following is MOST likely used to secure the creation of cryptographic keys?
Answer: C
Explanation:
Which of the following is MOST likely to reduce the threat of a zero day vulnerability?
A. Patch management
B. Network-based intrusion detection system
C. Disabling unnecessary services
D. Host-based intrusion detection system
Answer: C
Explanation:
A proximity badge is provided to all users, each with the owners’ photo. The photos are not
checked and users trade badges to be able to access resources for which they are not personally
authorized. This is an example of which of the following?
Answer: B
Explanation:
During the analysis of malicious code, a security analyst discovers JavaScript being used to send
random data to another service on the same system. This is MOST likely an example of which of
the following?
A. Buffer overflow
B. XML injection
C. SQL injection
D. Distributed denial of service
Answer: A
A security administrator discovers that Server1 and Server2 have been compromised, and then
observes unauthorized outgoing connections from Server1 to Server2. On Server1 there is an
executable named tcpdump and several files that appear to be network dump files. Finally, there
are unauthorized transactions in the database on Server2. Which of the following has MOST likely
occurred?
Answer: C
Explanation:
Which of the following MOST likely occurs when a user discovers a packet capture attack on a
computer connected to a wireless network?
A. Invalid checksums
B. Large dump files
C. Sequence numbers
D. Header manipulation
Answer: B
Explanation:
Which of the following is MOST relevant when investigating a SQL injection attack?
A. Stored procedures
B. Header manipulation
C. Malformed frames
Answer: A
Explanation:
A. Sequence numbers
B. Set flags
C. IV length
D. NOOP instructions
Answer: D
Explanation:
A. Overlap
B. Java instructions
C. Payload section
D. Flags
Answer: D
Explanation:
A system administrator was recently laid off for compromising various accounting systems within
the company. A few months later, the finance department reported their applications were not
working correctly. Upon further investigation, it was determined that unauthorized accounting
software was installed onto a financial system and several application exploits existed within that
system. This is an example of which of the following?
A. Rootkit
Answer: D
Explanation:
A user reports that there have been several invalid charges on their company credit card. The user
said these charges occurred after a recent phone call to the bank due to an unusual email the user
received. While examining the email, the security administrator notices that the phone number on
the email does not match the phone number listed on the bank’s website. Upon calling that
number, the technician did reach the exact answering system as the bank and eventually to an
actual bank representative. This is an example of which of the following?
A. Vishing
B. Phishing
C. SPIM
D. Spear Phishing
Answer: A
Explanation:
During a company’s relocation, a security administrator notices that several hard copies of
company directories are being thrown away in public dumpsters. Which of the following attacks is
the company vulnerable to without the proper user training and awareness?
A. Hoaxes
B. Pharming
C. Social engineering
D. Brute force
Answer: C
Explanation:
A security administrator performs several war driving routes each month and recently has noticed
a certain area with a large number of unauthorized devices. Which of the following attack types is
MOST likely occurring?
A. Interference
B. Rogue access points
C. IV attack
D. Bluejacking
Answer: B
Explanation:
Users of specific systems are reporting that their data has been corrupted. After a recent patch
update to those systems, the users are still reporting issues of data being corrupt. Which of the
following assessment techniques need to be performed to identify the issue?
Answer: B
Explanation:
A security administrator has recently performed a detailed datacenter inventory of all hardware
and software. This analysis has resulted in identifying a lot of wasted resources. Which of the
following design elements would eliminate the wasted resources and improve the datacenter’s
footprint?
A. NAC
B. Virtualization
C. Remote access implementation
D. Hosted IP Centrex
Answer: B
A user reports that after a recent business trip, their laptop started having performance issues and
unauthorized emails have been sent out from the laptop. Which of the following will resolve this
issue?
Answer: A
Explanation:
The company encryption policy requires all encryption algorithms used on the corporate network
to have a key length of 128-bits. Which of the following algorithms would adhere to company
policy?
A. DES
B. SHA
C. 3DES
D. AES
Answer: D
Explanation:
If a security administrator is reviewing a JPEG’s metadata and hash against an unverified copy of
the graphic, which of the following is the administrator looking for?
A. Steganography
B. Chain of custody
C. Digital signatures
Answer: A
Explanation:
Which of the following technologies is often used by attackers to hide the origin of an attack?
A. Open proxy
B. Load balancer
C. Flood guard
D. URL filtering
Answer: A
Explanation:
Which of the following is susceptible to reverse lookup attacks if not configured properly?
A. SSL
B. IPSec
C. ICMP
D. DNS
Answer: D
Explanation:
Which of the following are the two basic components upon which cryptography relies?
Which of the following can be used to verify the integrity of a message’s content as well as the
identity of the sender?
A. Recovery agent
B. Digital signature
C. Key escrow
D. Trust models
Answer: B
Explanation:
Which of the following describes the direction the signal will emanate from if a wireless omni-
directional antenna is placed parallel to the floor?
Answer: D
Explanation:
Which of the following should be checked for when conducting a wireless audit? (Select TWO).
A. Open relays
B. Antenna placement
C. Encryption of wireless traffic
D. URL filtering
E. Open proxies
Which of the following passwords have the MOST similar key space? (Select TWO).
A. AnDwWe9
B. check123
C. Mypassword!2~
D. C0mPTIA
E. 5938472938193859392
Answer: A,D
Explanation:
A security administrator has discovered through a password auditing software that most
passwords can be discovered by cracking the first seven characters and then cracking the second
part of the password. Which of the following is in use by the company?
A. LANMAN
B. MD5
C. WEP
D. 3DES
Answer: A
Explanation:
A security engineer working at a public CA is implementing and installing a new CRL. Where
should the administrator logically place the server?
A. On a wireless network
B. Inside the DMZ
C. On an non-routable network
Answer: B
Explanation:
A security engineer is deploying a new CA. Which of the following is the BEST strategy for the root
CA after deploying an intermediate trusted CA?
Answer: D
Explanation:
A security administrator has installed a new server and has asked a network engineer to place the
server within VLAN 100. This server can be reached from the Internet, but the security engineer is
unable to connect from the server to internal company resources. Which of the following is the
MOST likely cause?
Answer: C
Explanation:
A security administrator is researching the main difference between TACACS and TACACS+
before deciding which one to install. The administrator has discovered that:
Answer: B
Explanation:
Which of the following is true when a user browsing to an HTTPS site receives the message:
a€?The site’s certificate is not trusted’?
Answer: B
Explanation:
An security administrator shows a user a method of hiding information by printing text so small that
it appears as a period or colon. Which of the following BEST describes this security type?
A. Steganography
B. Quantum cryptography
C. Transport encryption
D. Hashing
Answer: A
Explanation:
An IT administrator wants to provide 250 staff with secure remote access to the corporate network.
Which of the following BEST achieves this requirement?
Answer: C
Explanation:
A network administrator must configure an FTP server in active-mode. Which of the following is
the control port by default?
A. 20
B. 21
C. 22
D. 23
Answer: B
Explanation:
A technician must configure a network device to allow only certain protocols to the external
servers and block requests to other internal sources. This is an example of a:
A. demilitarized zone.
B. load balancer.
C. layer 2 switch.
D. stateful firewall.
Answer: D
Explanation:
Which of the following protocols should be used to ensure that the data remains encrypted during
transport over the Internet? (Select THREE).
Answer: A,B,D
Explanation:
A user is no longer able to transfer files to the FTP server. The security administrator has verified
the ports are open on the network firewall. Which of the following should the security administrator
check?
A. Anti-virus software
B. ACLs
C. Anti-spam software
D. NIDS
Answer: B
Explanation:
A. HTTP
B. HTTPS
C. SFTP
D. Kerberos
Answer: D
Explanation:
Which of the following controls would the security administrator implement if clients have to use at
A. Password complexity
B. Username lockout
C. File encryption strength
D. Account disablement
Answer: A
Explanation:
Which of the following account policies would be enforced if a user tried to log into their account
several times and was disabled for a set amount of time?
A. Recovery
B. Expiration
C. Lockout
D. Disablement
Answer: C
Explanation:
Which of the following security controls should be implemented if an account was created for a
temporary user that will only be employed for the next four months?
A. Expiration
B. Disablement
C. Lockout
D. Complexity
Answer: A
Explanation:
A. HSM device
B. Locking cabinet
C. Device encryption
D. GPS tracking
Answer: B
Explanation:
A. Mitigation
B. Acceptance
C. Deterrence
D. Avoidance
Answer: D
Explanation:
Which of the following ports would a security administrator block if the administrator wanted to
stop users from accessing outside SMTP services?
A. 21
B. 25
C. 110
D. 143
Answer: B
Explanation:
A. HVAC
B. Humidity controls
C. Video monitoring
D. Thermostats
Answer: A
Explanation:
Which of the following can be implemented that will only prevent viewing the home screen on a
mobile device if left momentarily unattended?
Answer: B
Explanation:
An in-line network device examines traffic and determines that a parameter within a common
protocol is well outside of expected boundaries. This is an example of which of the following?
Answer: A
Explanation:
A. Cloud computing
B. Separation of duties
C. Portable media encryption
D. File and folder encryption
Answer: D
Explanation:
Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing
data using a personal laptop while connected by VPN. The affected company wants access to the
laptop to determine loss, but the insider’s lawyer insists the laptop cannot be identified. Which of
the following would BEST be used to identify the specific computer used by the insider?
A. IP address
B. User profiles
C. MAC address
D. Computer name
Answer: C
Explanation:
Which of the following is the MOST effective method to provide security for an in-house created
application during software development?
A. Third-party white box testing of the completed application before it goes live
B. Third-party black box testing of the completed application before it goes live
C. Explicitly include security gates during the SDLC
D. Ensure an application firewall protects the application
Answer: C
Explanation:
Which of the following is MOST likely occurring if a website visitor has passwords harvested from
the web browser’s cache?
A. Buffer overflow
B. XSRF
C. Cookies
D. Pharming
Answer: B
Explanation:
An attacker incorrectly submits data on a website’s form and is able to determine the type of
database used by the application and the SQL statements used to query that database. Which of
the following is responsible for this information disclosure?
A. SQL injection
B. Fuzzing
C. XSS
D. Error handling
Answer: D
Explanation:
Which of the following describes why the sender of an email may encrypt the email with a private
key?
A. Confidentiality
B. Non-repudiation
C. Transmission speed
D. Transport encryption
Answer: B
When granting access, which of the following protocols uses multiple-challenge responses for
authentication, authorization and audit?
A. TACACS
B. TACACS+
C. LDAP
D. RADIUS
Answer: B
Explanation:
Upper management decides which risk to mitigate based on cost. This is an example of:
Answer: D
Explanation:
Which of the following is the primary purpose of using a digital signature? (Select TWO).
A. Encryption
B. Integrity
C. Confidentiality
D. Non-repudiation
E. Availability
Answer: B,D
A. Twofish
B. ACLs
C. LDAP
D. Kerberos
Answer: C
Explanation:
Which of the following attacks is manifested as an embedded HTML image object or JavaScript
image tag in an email?
A. Exception handling
B. Adware
C. Cross-site request forgery
D. Cross-site scripting
Answer: D
Explanation:
Which of the following increases the key space of a password the MOST?
A. FTP
B. TFPT
C. SFTP
D. FTPS
Answer: C
Explanation:
Which of the following is the primary security reason why social networking sites should be
blocked in a large corporation?
A. The proxy server needs to be specially configured for all social networking sites.
B. The data traffic can cause system strain and can overwhelm the firewall rule sets.
C. The users’ work productivity decreases greatly.
D. The users can unintentionally post sensitive company information.
Answer: D
Explanation:
Which of the following describes the importance of enacting and maintaining a clean desk policy?
Answer: B
Explanation:
An online book review forum is being designed for anonymous customers to share feedback with
other potential readers. The intention for the forum is to integrate into an existing online bookstore
in order to boost sales. Which of the following BEST represents the expected level of
confidentiality, integrity, and availability needed for the forum content that has been contributed by
users?
Answer: D
Explanation:
Which of the following protocols implements security at the lowest OSI layer?
A. IPSec
B. SSL
C. ICMP
D. SSH
Answer: A
Explanation:
In which of the following locations would a forensic analyst look to find a hooked process?
Answer: C
Explanation:
Which of the following processes collects business/unit requirements as a main input when
developing a business continuity plan?
A. SLA
B. DRP
C. BIA
D. NIST
Answer: C
Explanation:
Answer: B
Explanation:
A. Encryption
Answer: B
Explanation:
Proper wireless antenna placement and radio power setting reduces the success of which of the
following reconnaissance methods?
A. Rogue APs
B. War driving
C. Packet analysis
D. RF interference
Answer: B
Explanation:
A. WPA
B. TKIP
C. CCMP
D. WEP
Answer: C
Explanation:
The decision to build a redundant data center MOST likely came from which of the following?
Answer: C
Explanation:
During business continuity planning, it is determined that a critical application can have no more
than one hour of recovery time. Which of the following will be needed to meet this objective?
A. Off-site storage
B. Hot site
C. Warm site
D. Cold site
Answer: B
Explanation:
Topic 8, Volume H
A bulk update process fails and writes incorrect data throughout the database. Which of the
following concepts describes what has been compromised?
A. Authenticity
B. Integrity
C. Availability
D. Confidentiality
Answer: B
Explanation:
In high traffic areas, security guards need to be MOST concerned about which of the following
attacks?
Answer: D
Explanation:
Which of the following BEST describes an attack whereby unsolicited messages are sent to
nearby mobile devices?
A. Smurf attack
B. Bluejacking
C. Bluesnarfing
D. War driving
Answer: B
Explanation:
Which of the following protocols would an administrator MOST likely use to monitor the
parameters of network devices?
A. SNMP
B. NetBIOS
C. ICMP
D. SMTP
Answer: A
Explanation:
Which of the following mitigation strategies is established to reduce risk when performing updates
to business critical systems?
Answer: C
Explanation:
Which of the following network ACL entries BEST represents the concept of implicit deny?
Answer: C
Explanation:
Applying detailed instructions to manage the flow of network traffic at the edge of the network,
including allowing or denying traffic based on port, protocol, address, or direction is an
implementation of which of the following?
A. Virtualization
B. Port security
C. IPSec
D. Firewall rules
Answer: D
Explanation:
Which of the following cloud computing concepts is BEST described as providing an easy-to-
configure OS and on-demand computing for customers?
Answer: A
Explanation:
User awareness training about proper disclosure of information, handling of corporate data, and
security policies is important due to the popularity of which of the following?
Answer: A
Explanation:
Which of the following environmental controls would BEST be used to regulate cooling within a
datacenter?
A. Fire suppression
B. Video monitoring
C. EMI shielding
D. Hot and cold aisles
Answer: D
Explanation:
Answer: D
Explanation:
Which of the following is the MOST appropriate risk mitigation strategy to use in order to identify
an unauthorized administrative account?
A. Change management
B. Incident management
C. Routine audits of system logs
D. User’s rights and permissions review
Answer: D
Explanation:
Which of the following would be used to notify users of proper system usage?
Answer: A
Explanation:
Which of the following concepts ensures that the data is only viewable to authorized users?
A. Availability
Answer: D
Explanation:
Which of the following concepts ensures that the data does not change in route to its final
destination?
A. Integrity
B. Redundancy
C. Confidentiality
D. Availability
Answer: A
Explanation:
A security administrator is in charge of a datacenter, a hot site and a cold site. Due to a recent
disaster, the administrator needs to ensure that their cold site is ready to go in case of a disaster.
Which of the following does the administrator need to ensure is in place for a cold site?
A. Location with all required equipment loaded with all current patches and updates
B. Location with duplicate systems found in the datacenter
C. Location near the datacenter that meets power requirements
D. Location that meets power and connectivity requirements
Answer: D
Explanation:
Which of the following business continuity activities would a company implement in order to
restore a critical system after a disruption or failure?
Answer: C
Explanation:
Which of the following would a security administrator MOST likely look for during a vulnerability
assessment?
Answer: B
Explanation:
Which of the following is used in conjunction with PEAP to provide mutual authentication between
peers?
A. LEAP
B. MSCHAPv2
C. PPP
D. MSCHAPv1
Answer: B
Explanation:
Answer: D
Explanation:
The MAIN difference between qualitative and quantitative risk assessment is:
A. quantitative is based on the number of assets while qualitative is based on the type of asset.
B. qualitative is used in small companies of 100 employees or less while quantitative is used in
larger companies of 100 employees or more.
C. quantitative must be approved by senior management while qualitative is used within
departments without specific approval.
D. quantitative is based on hard numbers while qualitative is based on subjective ranking.
Answer: D
Explanation:
A. Preventive
B. Detective
C. Protective
D. Proactive
Answer: B
Explanation:
Answer: B
Explanation:
In an 802.11n network, which of the following provides the MOST secure method of both
encryption and authorization?
Answer: B
Explanation:
A. FTP active
B. FTP passive
C. SCP
D. FTPS
Answer: D
Explanation:
An offsite location containing the necessary hardware without data redundancy would be an
example of which of the following off-site contingency plans?
Answer: C
Explanation:
Upon investigation, an administrator finds a suspicious system-level kernel module which modifies
file system operations. This is an example of which of the following?
A. Trojan
B. Virus
C. Logic bomb
D. Rootkit
Answer: D
Explanation:
A. Whaling
B. Shoulder surfing
C. Dumpster diving
D. War driving
Answer: B
Explanation:
Which of the following is an example of allowing another user physical access to a secured area
without validation of their credentials?
Answer: B
Explanation:
Which of the following methods of access, authentication, and authorization is the MOST secure
by default?
A. Kerberos
B. TACACS
C. RADIUS
D. LDAP
Answer: A
Explanation:
Which of the following would be implemented to allow access to services while segmenting access
to the internal network?
A. IPSec
B. VPN
C. NAT
D. DMZ
Answer: D
Explanation:
Which of the following devices BEST allows a security administrator to identify malicious activity
after it has occurred?
Answer: B
Explanation:
A. VLAN
B. Flood guards
C. Cloud computing
D. Firewall rules
Answer: D
Explanation:
Which of the following prevents numerous SYN packets from being accepted by a device?
A. VLAN management
B. Transport encryption
C. Implicit deny
D. Flood guards
Answer: D
Explanation:
A. NIDS
B. Protocol analyzers
Answer: D
Explanation:
Which of the following protocols should be blocked at the network perimeter to prevent host
enumeration by sweep devices?
A. HTTPS
B. SSH
C. IPv4
D. ICMP
Answer: D
Explanation:
Which of the following should be performed before a hard drive is analyzed with forensics tools?
Answer: C
Explanation:
Which of the following assists in identifying if a system was properly handled during transport?
Answer: D
Explanation:
Which of the following requires special handling and explicit policies for data retention and data
distribution?
Answer: A
Explanation:
Which of the following will teach employees about malicious attempts from an attacker to obtain
bank account information?
Answer: B
Explanation:
Which of the following software types BEST dissects IP frames for inspection or review by a
security administrator?
A. Protocol analyzer
B. Load balancer
C. Software firewall
Answer: A
Explanation:
Which of the following devices is used to optimize and distribute data workloads across multiple
computers or networks?
A. Load balancer
B. URL filter
C. VPN concentrator
D. Protocol analyzer
Answer: A
Explanation:
Actively monitoring data streams in search of malicious code or behavior is an example of:
A. load balancing.
B. an Internet proxy.
C. URL filtering.
D. content inspection.
Answer: D
Explanation:
A. 22
B. 69
C. 80
D. 443
A technician needs to allow seven specific users connection to a new access point. Which of the
following should be performed to achieve this action?
Answer: A
Explanation:
Which of the following systems implements a secure key distribution system that relies on
hardcopy keys intended for individual sessions?
A. Blowfish
B. PGP/GPG
C. One-time pads
D. PKI
Answer: C
Explanation:
The fundamental difference between symmetric and asymmetric key cryptographic systems is that
symmetric key cryptography uses:
Which of the following devices is typically used at the enclave boundary to inspect, block, and re-
route network traffic for security purposes?
A. Load balancers
B. Protocol analyzers
C. Firewalls
D. Spam filter
Answer: C
Explanation:
Which of the following BEST describes the proper method and reason to implement port security?
A. Apply a security control which ties specific ports to end-device MAC addresses and prevents
additional devices from being connected to the network.
B. Apply a security control which ties specific networks to end-device IP addresses and prevents
new devices from being connected to the network.
C. Apply a security control which ties specific ports to end-device MAC addresses and prevents all
devices from being connected to the network.
D. Apply a security control which ties specific ports to end-device IP addresses and prevents
mobile devices from being connected to the network.
Answer: A
Explanation:
Which of the following secure protocols is MOST commonly used to remotely administer
Unix/Linux systems?
A. SSH
B. SCP
Answer: A
Explanation:
A. Maintains a copy of a user’s public key for the sole purpose of recovering messages if it is lost
B. Maintains a secured copy of a user’s private key to recover the certificate revocation list
C. Maintains a secured copy of a user’s private key for the sole purpose of recovering the key if it
is lost
D. Maintains a secured copy of a user’s public key in order to improve network performance
Answer: C
Explanation:
Which of the following devices should be used to allow secure remote network access for mobile
users?
A. NIDS
B. Protocol analyzer
C. SFTP
D. VPN concentrator
Answer: D
Explanation:
Which of the following technologies is used to verify that a file was not altered?
A. RC5
B. AES
Answer: D
Explanation:
A. Demand Computing
B. Infrastructure as a Service (IaaS)
C. Software as a Service (SaaS)
D. Platform as a Service (PaaS)
Answer: C
Explanation:
IPSec has been chosen for remote access VPN connections for telecommuters. Which of the
following combinations would BEST secure the connection?
Answer: D
Explanation:
Which of the following ports are used for NetBIOS by default? (Select TWO).
A. 135
B. 139
C. 143
Answer: B,E
Explanation:
Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following
BCP concepts?
A. Succession planning
B. Remove single points of failure
C. Risk management
D. Business impact analysis
Answer: D
Explanation:
Which of the following security applications would an administrator use to help reduce the amount
of bandwidth used by web browsing?
A. HIDS
B. Proxy server
C. NIPS
D. Personal software firewall
Answer: B
Explanation:
Which of the following is the MOST secure condition a firewall should revert to when it is
overloaded with network traffic?
A. Fail danger
B. Fail safe
Answer: C
Explanation:
Which of the following can restrict a computer from receiving network traffic?
A. HIDS
B. Software firewall
C. Antivirus
D. NIDS
Answer: B
Which of the following is the primary location where global policies are implemented in an
organization?
A. Physical memory
B. Domain
C. User documentation
D. Security group
Answer: B
Explanation:
Which of the following sits inline with network traffic and helps prevent malicious behavior as it
occurs by either dropping packets or correcting TCP stream related issues?
A. HIPS
B. NIDS
C. NIPS
D. HIDS
Which of the following network security devices is the BEST to use when increasing the security of
an entire network, or network segment, by preventing the transmission of malicious packets from
known attacking sources?
A. Honeypot
B. Firewall
C. HIDS
D. NIDS
Answer: B
Explanation:
Which of the following would be used to gain access to a data center where the administrator
would have to use multiple authentication factors?
Answer: A
Explanation:
The physical location of rogue access points can be discovered by using which of the following?
A. IPS
B. Remote monitoring
C. Creating honeypots
D. War driving
Answer: D
Explanation:
Employee A sends employee B an encrypted message along with a digital signature. Employee B
wants to make sure that the message is truly from employee A. Which of the following will
employee B do to verify the source of the message?
Answer: D
Explanation:
Answer: C
Explanation:
Which of the following is the primary difference between role-based access control and rule-based
access control?
A. Both are based on local legal regulations but role based provides greater security.
B. One is based on identity and the other on authentication.
C. One is based on job function and the other on a set of approved instructions.
D. Both are based on job title but rule based provides greater user flexibility.
Answer: C
Explanation:
Which of the following devices would be used to gain access to a secure network without affecting
network connectivity?
A. Router
B. Vampire tap
C. Firewall
D. Fiber-optic splicer
Answer: B
Explanation:
A. Ensures that all private keys are publicly accessible to PKI users
B. Provides a system for recovering encrypted data even if the users lose private keys
C. Provides a system for recovering encrypted data when public keys are corrupted
D. Ensures the security of public keys by storing the keys confidentially
Answer: B
Explanation:
A security manager decides to assign the daily responsibility of firewall and NIDS administration to
different technicians. This is an example of which of the following?
A. Implicit deny
B. Separation of duties
C. Least privilege
D. Job rotation
Answer: B
Explanation:
A. Behavior-based
B. Anomaly-based
C. OVAL-based
D. Signature-based
Answer: D
Explanation:
Which of the following security applications would be MOST useful to traveling employees?
(Select THREE).
A. Anti-spam
B. Personal software firewall
C. NIDS
D. External corporate firewall
E. NIPS
F. Antivirus
Answer: A,B,F
Explanation:
Answer: D
Explanation:
Employee A wants to send employee B an encrypted message that will identify employee A as the
Answer: A,E
Explanation:
A. New IP headers
B. Payload encryption
C. NAT traversal
D. Payload compression
Answer: B
Explanation:
A. RSA
B. AES
C. IPSec
D. Elliptic curve
Answer: A
Explanation:
A technician places a network jack in the parking garage for administrative use. Which of the
following can be used to mitigate threats from entering the network via this jack?
Answer: A
Explanation:
Which of the following provides an organization with the ability to hide an internal private network,
while simultaneously providing additional IP addresses?
A. VLAN
B. NAT
C. VPN
D. DMZ
Answer: B
Explanation:
A. Public
B. Private
C. Symmetric
D. CA key
Answer: B
Explanation:
A. RSA
B. MD5
C. WPA
D. DES
A security administrator works for a corporation located in a state with strict data breach disclosure
laws. Compliance with these local legal regulations requires the security administrator to report
data losses due to which of the following?
A. Cryptography
B. Backup corruption
C. Power failures
D. Hacking
Answer: D
Explanation:
A. logic bomb.
B. rootkit.
C. Trojan.
D. botnet.
Answer: D
Explanation:
Which of the following would a technician implement to mitigate SQL injection security risks?
Answer: A
Explanation:
Which of the following encryption methods is being used when both parties share the same secret
key?
A. Asymmetric
B. Certificate based
C. Symmetric
D. Kerberos
Answer: C
Explanation:
After a recent viral intrusion, an administrator wishes to verify the server’s functionality post-clean-
up. The administrator should:
A. analyze the NIDS logs for any errant connections that may have been recorded.
B. install any hotfixes that may have been overlooked.
C. compare the systems performance against the configuration baseline.
D. ensure that the antivirus applications definitions are up-to-date.
Answer: C
Explanation:
A small company wants to hire a security assessment team for the server and network
infrastructure. Which of the following needs to be defined before penetration testing occurs?
A. Vulnerability scan
B. Bandwidth requirements
C. Protocols analysis
D. Rules of engagement
Answer: D
Explanation:
Which operating system hardening procedure can be implemented to ensure all systems have the
A. Group policies
B. Patch management
C. Security templates
D. Configuration baselines
Answer: B
Explanation:
In the event of a fire, the MOST appropriate setting for electronic cipher locks would be to:
A. allow personnel to exit the building only after security confirms the threat and electronically
releases all locks.
B. allow personnel to exit the building without any forms of authentication.
C. allow personnel to exit the building using only a photo ID badge.
D. allow personnel to exit the building only after using a valid swipe card and key.
Answer: B
Explanation:
The company’s administrative assistant acts as the main point of contact for outside sales vendors
and provides information over the phone. Which of the following is the GREATEST threat that the
administrative assistant should be educated about?
Answer: B
Explanation:
In the past several weeks, there have been an increased amount of failed remote desktop login
attempts from an external IP address. Which of the following ports should the administrator
change from its default to control this?
A. 21
B. 25
C. 3389
D. 4658
Answer: C
Explanation:
A. AES256
B. PGP
C. SSL
D. WEP
Answer: D
Explanation:
Which of the following BEST describes when code that is initiated on a virtual machine directly
affects the host?
A. VM cluster
B. VM escape
C. VM hypervisor
D. VM hardware abstraction
Answer: B
Explanation:
Which of the following tools is used to report a wide range of security and configuration problems
A. Protocol analyzer
B. Vulnerability scanner
C. Port scanner
D. TACACS
Answer: B
Explanation:
A user reports that their system is slow and reboots on its own. The technician is unable to
remotely control the computer and realizes that they no longer have administrative rights to that
workstation. Which of the following is MOST likely the cause?
A. Spam
B. DDoS
C. Adware
D. Rootkit
Answer: D
Explanation:
A user creates an archive of files that are sensitive and wants to ensure that no one else can
access them. Which of the following could be used to assess the security of the archive?
A. Password cracker
B. Port scanner
C. Firewall
D. Protocol analyzer
Answer: A
Explanation:
Which of the following is the BEST way for an attacker to conceal their identity?
Answer: D
Explanation:
A. IPSec
B. SHTTP
C. SSL
D. SFTP
Answer: A
Explanation:
Answer: B
Explanation:
Which of the following does an attacker with minimal rights need to accomplish to continue
attacking a compromised system?
A. Rootkit
B. Logic bomb
C. Cross-site scripting
D. Privilege escalation
Virtualization technology can be implemented to positively affect which of the following security
concepts?
A. Non-repudiation
B. Confidentiality
C. Availability
D. Integrity
Answer: C
Explanation:
Which of the following uses both private and public key algorithms for email encryption and
decryption?
A. CA
B. DES
C. PGP
D. AES256
Answer: C
Explanation:
A user reports random windows opening and closing after installing new software. Which of the
following has MOST likely infected the computer?
A. Worm
B. Spam
C. Rootkit
D. Adware
Answer: D
Explanation:
Answer: A
Explanation:
Which of the following will allow a technician to restrict access to one folder within a shared folder?
A. NTLM
B. IPSec
C. NTLMv2
D. NTFS
Answer: D
Explanation:
Answer: C
Explanation:
A. job rotation.
B. single sign on.
C. separation of duties.
D. implicit deny.
Answer: C
Explanation:
Which of the following BEST describes the use of geographically distinct nodes to flood a site or
sites with an overwhelming volume of network traffic?
A. Spoofing
B. DoS
C. Replay
D. DDoS
Answer: D
Explanation:
The security administrator wants to know if a new device has any known issues with its available
applications. Which of the following would be BEST suited to accomplish this task?
A. Vulnerability scanner
B. Port scanner
C. Network mapper
D. Protocol analyzer
Answer: A
Explanation:
An administrator believes a user has more access to a financial application than they should.
Which of the following policies would this MOST likely violate?
Answer: C
Explanation:
Which of the following is the BEST course of action to ensure an email server is not an open
relay?
Answer: A
Explanation:
An administrator is having difficulty getting staff to adhere to group policy directives regarding
streaming audio. Bandwidth utilization increases around the time that a popular radio show is
broadcast. Which of the following is the BEST solution to implement?
Answer: C
Explanation:
Which of the following is used to encrypt the data sent from the server to the browser in an SSL
session?
A. Private Key
Answer: D
Explanation:
Which of the following is the MAIN difference between bluejacking and bluesnarfing?
Answer: B
Explanation:
A. RADIUS
B. VPN
C. RDP
D. CHAP
Answer: A
Explanation:
Which of the following ensures that an employee cannot continue carrying out fraudulent
activities?
A. Biometric reader
B. Job rotation
C. Two-factor authentication
Answer: B
Explanation:
Which of the following concepts is applied when a user enters a password to gain authorized
access to a system?
A. Identification
B. Privatization
C. Authentication
D. Non-repudiation
Answer: C
Explanation:
Which of the following BEST describes what users are required to provide in a two factor
authentication system?
Answer: C
Explanation:
Answer: D
A user loses a USB device containing credit card numbers. Which of the following would BEST
protect the data?
Answer: A
Explanation:
During a data exfiltration penetration test, which of the following is the NEXT step after gaining
access to a system?
Answer: D
Explanation:
Which of the following would an administrator MOST likely update after deploying a service pack?
A. Configuration baseline
B. Patch
C. Hotfix
D. Group policy
Answer: A
Explanation:
A security administrator has received an SD memory card for the purpose of forensic analysis.
The memory card is left on the administrator’s office desk at the end of the day. The next day the
security guard returns the SD card to the administrator because it was found by the night janitor.
Which of the following incident response procedures has been violated?
A. Chain of custody
B. Evidence gathering
C. Data retention
D. Securing the site
Answer: A
Explanation:
A. Security
B. DNS
C. Application
D. System
Answer: A
Explanation:
A. Biometrics
B. Proximity reader
C. Door access
D. Man-trap design
Answer: C
Explanation:
Which of the following is able to detect that a local system has been compromised?
Answer: B
Explanation:
Verifying the time and date certain users access a server is an example of which of the following
audit types?
A. Retention policy
B. Account login
C. User rights
D. Account lockout
Answer: B
Explanation:
Which of the following is required for an anomaly detection system to evaluate traffic properly?
A. Baseline
B. Signature
C. Vulnerability assessment
D. Protocol analyzer
Answer: A
Explanation:
An administrator is concerned about the amount of time it would take to investigate email that may
be subject to inspection during legal proceedings. Which of the following could help limit the
company’s exposure and the time spent on these types of proceedings?
Answer: A
Explanation:
Answer: A
Explanation:
A user from the accounting department is in the Customer Service area and tries to connect to the
file server through their laptop, but is unable to access the network. The network administrator
checks the network connection and verifies that there is connectivity. Which of the following is the
MOST likely cause of this issue?
Answer: C
Explanation:
Which of the following RAID types would be implemented for disk mirroring?
A. RAID 0
B. RAID 1
Answer: B
Explanation:
Which of the following is MOST likely to be used to transfer malicious code to a corporate network
by introducing viruses during manufacturing?
A. P2P software
B. BIOS chips
C. USB drives
D. Cell phones
Answer: C
Explanation:
Which of the following defines the process and accounting structure for handling system upgrades
and modifications?
Answer: B
Explanation:
Which of the following BEST describes why USB storage devices present a security risk to the
confidentiality of data?
Implementing a mandatory vacation policy for administrators is a security best practice because of
which of the following?
Answer: B
Explanation:
A user is recording a file on disk. Which of the following will allow a user to verify that the file is the
original?
A. 3DES
B. NTFS
C. RSA
D. MD5
Answer: D
Explanation:
A. Botnet
B. Rootkit
C. Virus
D. Logic bomb
Answer: A
Explanation:
Which of the following is BEST suited to determine which services are running on a remote host?
A. Log analyzer
B. Antivirus
C. Protocol analyzer
D. Port scanner
Answer: D
Explanation:
Which of the following is a best practice when creating groups of user and computer accounts in a
directory service?
Answer: A
Explanation:
Which of the following allows two people to communicate securely without having to know each
other prior to communicating?
A. 3DES
B. AES
C. Symmetric keys
D. PKI
Answer: D
Explanation:
Answer: D
Explanation:
Multiple machines are detected connecting to a specific web server during non-business hours
and receiving instructions to execute a DNS attack. Which of the following would be responsible?
A. Virus
B. Adware
C. Logic Bomb
D. Botnet
Answer: D
Explanation:
Which of the following is the BEST solution for an administrator to implement in order to learn
more about the zero-day exploit attacks on the internal network?
A. A Honeypot
B. A stateful firewall
C. A HIDS
D. An IDS
Answer: A
Explanation:
System resource monitors and baselines on web servers should be used by security team
members to detect:
Answer: D
Explanation:
A technician wants to implement a change across the production domain. Which of the following
techniques should the technician perform?
Answer: C
Explanation:
A user logs onto a laptop with an encrypted hard drive. There is one password for unlocking the
encryption and one password for logging onto the network. Both passwords are synchronized and
used to login to the machine. Which of the following authentication types is this?
A. Biometric
B. Single sign-on
C. Three factor
D. Two factor
Answer: B
Explanation:
Limiting access to a file resource to only the creator by default, is an example of applying which of
the following security concepts?
A. Behavior-based security
Answer: C
Explanation:
Which of the following would protect an employee’s network traffic on a non-company owned
network?
A. Antivirus
B. 802.1x
C. VPN
D. RADIUS
Answer: C
Explanation:
A security administrator is worried about attackers accessing a specific server within the
company’s network. Which of the following would allow the security staff to identify unauthorized
access to the server?
A. HIDS
B. Antivirus
C. Anti-spyware
D. Honeypotadministrator to perform internal research
Answer: A
Explanation:
Which of the following can be used to prevent ongoing network based attacks?
A. NIDS
B. HIDS
C. NAT
Answer: D
Explanation:
Which of the following audit systems should be enabled in order to audit user access and be able
to know who is trying to access critical systems?
A. Group policy
B. Account expiration
C. Password policy
D. Failed logon attempts
Answer: D
Explanation:
Which of the following vulnerability assessment tools would be used to identify weaknesses in a
company’s router ACLs or firewall?
A. Rainbow tables
B. Intrusion prevention systems
C. Brute force attacks
D. Port scanner
Answer: D
Explanation:
An administrator wants to make sure that all users of a large domain are restricted from installing
software. Which of the following should MOST likely be done?
Answer: B
Explanation:
The firewall administrator sees an outbound connection on IP port 50 and UDP port 500. Which of
the following is the cause?
Answer: A
Explanation:
Which of the following methods allows the administrator to create different user templates to
comply with the principle of least privilege?
Answer: D
Explanation:
Which of the following can be used to create a unique identifier for an executable file?
A. Blowfish
B. NTLM
C. DES
D. SHA
Answer: D
Explanation:
In the event of a disaster resulting in the loss of their data center, a company had determined that
they will need to be able to be back online within the next day, with some systems. Which of the
following would BEST meet their needs?
Answer: D
Explanation:
A network administrator is alerted to an incident on a file server. The alerting application is a file
integrity checker. Which of the following is a possible source of this HIDS alert?
A. ARP poisoning
B. DDOS
C. Teardrop attack
D. Rootkit
Answer: D
Explanation:
An on-going attack on a web server has just been discovered. This server is non-critical but holds
Answer: B
Explanation:
Which of the following has a primary goal of hiding its processes to avoid detection?
A. Worm
B. Rootkit
C. Logic bomb
D. Virus
Answer: B
Explanation:
A. 23
B. 53
C. 80
D. 8080
Answer: B
Explanation:
A recipients public key can be used by a data sender to ensure which of the following?
A. Sender anonymity
B. Data confidentiality
Answer: B
Explanation:
Which of the following system types would a security administrator need to implement in order to
detect and mitigate behavior-based activity on the network?
A. Antivirus server
B. NIPS
C. Signature-based security devices
D. NIDS
Answer: B
Explanation:
The technical user group has read and write access to a network share. The executive user group
has full control of the same network share. A user is a member of both groups. Which of the
following BEST describes the users permissions on the share?
A. The user is able to modify, write, delete and read documents in network share.
B. The user is able to modify, write and delete documents in network share.
C. The user is able to write and read documents in the network share.
D. The user is able to modify and write documents in network share.
Answer: A
Explanation:
An administrator is configuring a new system in a domain. Which of the following security events is
MOST important to monitor on the system?
Answer: B
Explanation:
Which of the following provides active protection to critical operating system files?
A. NIPS
B. Firewall
C. HIPS
D. HIDS
Answer: C
Explanation:
A disaster recovery exercise should include which of the following action types?
Answer: D
Explanation:
Answer: D
Explanation:
Answer: C
Explanation:
Which of the following are reasons why a key may be revoked? (Select TWO).
A. Key compromise
B. Lost password
C. CA compromise
D. Public key compromise
E. Lost trust
Answer: A,C
Explanation:
Which of the following redundancy planning concepts would MOST likely be used when trying to
strike a balance between cost and recovery time?
A. Hot site
B. Cold site
C. Warm site
D. Field site
Answer: C
Explanation:
Which of the following should the network administrator use to remotely check if a workstation is
running a P2P application?
Answer: B
Explanation:
The security policy at a company clearly specifies that server administrators cannot have access
to log servers or permissions to review log files. These rights are granted only to security
administrators. This policy is an example of which of the following industry best practices?
A. Separation of duties
B. Job rotation
C. Privilege escalation
D. Implicit deny
Answer: A
Explanation:
Which of the following is the process by which encryption keys are distributed?
Answer: C
Explanation:
Management wants a security assessment conducted on their network. The assessment must be
conducted during normal business hours without impacting users. Which of the following would
BEST facilitate this?
Answer: D
Explanation:
The manager has tasked an administrator to test the security of the network. The manager wants
to know if there are any issues that need to be addressed, but the manager is concerned about
affecting normal operations. Which of the following should be used to test the network?
Answer: C
Explanation:
The company’s new administrative assistant wants to use their name as a password and asks if it
is appropriate. Which of the following is the BEST reason for not allowing this?
Answer: A
Explanation:
A user reports a problem with resetting a password on the company website. The help desk
determined the user was redirected to a fraudulent website. Which of the following BEST
describes this attack type?
Answer: B
Explanation:
Which of the following security protocols could be configured to use EAP when connecting to a
wireless access point?
A. WPA-personal/TKIP
B. RADIUS
C. IPSec
D. WPA2-enterprise
Answer: D
Explanation:
An administrator needs to ensure that all machines deployed to the production environment follow
strict company guidelines. Which of the following are they MOST likely to use?
Answer: B
Explanation:
The network administrator has been tasked with creating a VPN connection to a vendors site. The
vendor is using older equipment that does not support AES. Which of the following would be the
network administrators BEST option for configuring this link?
A. 3DES
Answer: A
Explanation:
A new software application is designed to interact with the company’s proprietary devices.
Systems where the software is installed can no longer connect to the devices. Which of the
following should the administrator do FIRST?
Answer: B
Explanation:
A. Rootkits
B. Cross-site scripting
C. SMTP open relays
D. DNS poisoning
Answer: B
Explanation:
Which of the following is the BEST way to restrict the GUI interface on a workstation?
A. Batch file
B. Registry edits
C. Group policy
D. Local policy
A. HIPS
B. Access point
C. NIDS
D. Firewall
Answer: D
Explanation:
Which of the following cryptographic methods provides the STRONGEST security when
implemented correctly?
A. WEP
B. Elliptic curve
C. MD5
D. NTLM
Answer: B
Explanation:
After accessing several different Internet sites a user reports their computer is running slow. The
technician verifies that the antivirus definitions on that workstation are current. Which of the
following security threats is the MOST probable cause?
A. Trojan
B. Worm
C. Spyware
D. Spam
Answer: C
Explanation:
Which of the following is the MOST common way to allow a security administrator to securely
administer remote *NIX based systems?
A. IPSec
B. PPTP
C. SSL/TLS
D. SSH
Answer: D
Explanation:
Which of the following protocols requires the use of a CA based authentication process?
A. FTPS implicit
B. FTPS explicit
C. MD5
D. PEAP-TLS
Answer: D
Explanation: