Final Exam Security+

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following statements about domain reputation is correct?

Domain reputation will be low if the domain is used for distributing malware or launching attacks.

Which of the following can be achieved using availability zones in cloud computing?

Fault tolerance

You are asked to configure your firewall in such a way that the traffic from source address range 117.112.10.25 through 117.112.15.100 is allowed, while traffic from 117.112.12.25 through 117.112.13.25 is denied, and traffic from 117.112.12.200 through 117.112.13.10 is allowed. How should you configure the firewall?

Allow 117.112.10.25 through 117.112.15.100; deny 117.112.12.25 through 117.112.13.25; force-allow 117.112.12.200 through 117.112.13.10

While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks. How should you reply?

An enterprise network will have more sensitive and confidential information.

Which of the following is the most versatile cloud model?

IaaS

Which of the following digital certificates are self-signed and do not depend on the higher-level certificate authority (CA) for authentication?

Root digital certificates

You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise's strong password policy, which of the following methods will be the easiest for you to use when retrieving the password?

Rule attack

You are working as a security admin in an enterprise and have been asked to choose an access control method so that all users can access multiple systems without crossing their limit of access. Which of the following access control methods is the best fit?

Rule-based access control

Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?

Bluesnarfing Bluesnarfing is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection. In a bluesnarfing attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to the Bluetooth device without the owner's knowledge or permission.

Which of the following best describes a host-based firewall?

A host-based firewall is a software firewall that protects a single endpoint device.

You are analyzing the settings for your network's firewall. There is currently a log-only rule set for the source address 112.101.2.4. Which of the following configuration may create a log entry?

A rule is set to allow all packets from 112.101.2.1 through 112.101.2.22.

Which of the following is a layer 2 attack?

ARP poisoning

Which of the following best describes skimming?

Capturing information from the magnetic stripe of a smartcard

Which of the following best describes a preimage attack?

Comparing a known digest with an unknown digest

Which of the following is a feature of secrets management?

Default encryption When secrets management is implemented, data is encrypted in transit and at rest with AES-256-bit encryption keys.

John and Sarah are working for Star Alliance. John had to send certain confidential data and messages to Sarah online. The use of which of the following will ensure that the message's sender is, in fact, John?

Digital certificate

What is the difference between protecting against eavesdropping and protecting against a man-in-the-middle (MITM) attack when working with devices with NFC?

Eavesdropping can be prevented by being aware of one's surroundings while using NFC technology, while MITM attack can be prevented by configuring in a pairing method so only one side can send and the other can receive it at a time.

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?

Evil twin An evil twin is an AP that is set up by an attacker. This AP is designed to mimic an authorized AP, so a user's mobile device like a laptop or tablet will unknowingly connect to this evil twin instead. Attackers can then capture the transmissions from users to the evil twin AP.

In an interview, you are given the following scenario: David sent a message to Tina saying, "There is no school today!" For some reason, the message showed up on Tina's device as, "Come to the school ASAP!" You (the candidate) are asked to name the type of attack that would cause this situation. Which of the following should you identify?

Man in the Middle (MITM)

Which of the following is a standard format for digital certificates?

x.509


Conjuntos de estudio relacionados

GOVT-2305 Test 6 Review: Ch. 18 Social Safety Networks

View Set

Actus Reus - Omissions and Causation

View Set