General Security Practice Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Blockchain is a unique and increasingly popular implementation of cryptography. A blockchain is a decentralized and distributed ledger that records and verifies transactions between two parties. The list on the left describes each step a block goes through as part of the blockchain cryptographic process. From the list on the left, drag a description to its proper step order on the right.

1.User1 requests a transaction with User2. 2. The transaction is represented online as a block. 3. The block is distributed to everyone on a peer-to-peer network. 4. The network users verify the transaction is valid. 5. The block is added to the chain. 6. The contents of the transaction move to User2.

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information?

Active Directory Active Directory (AD) is a centralized database that is included with the Windows Server operating system. Active Directory is used to store information about a network. It stores such things as user accounts, computers, printers, and security policies.

A newly launched online store wants to secure transactions between the store and customers. The store must guarantee the authenticity of transactions, provide confidentiality, and ensure that only authorized recipients can access the purchase details. Which cryptographic technique would best meet these requirements? Symmetric encryption Hybrid encryption Hashing techniques Asymmetric encryption

Asymmetric encryption

A software patch was inadvertently pushed out early, during the middle of the workday, and has brought business to a halt. The chief executive officer (CEO) demands that the systems return to full operations immediately. What part of the change plan will assist in this task? Impact analysis Test results Backout plan Standard operating procedures

Backout plan

When two different messages produce the same hash value, what has occurred? Birthday attack Hash value Collision High amplification

Collision

Which of the following are often identified as the three main goals of security? (Select three.) Policies Non-repudiation Confidentiality Integrity Employees Availability Assets

Confidentiality Integrity Availability

There are several block cipher modes of operation that can be utilized depending on the application or use. Which of the following block cipher modes of operation uses a nonce combined with a counter that is encrypted? Electronic Code Book (ECB) Counter Mode (CTR) Cipher Block Chaining (CBC) Cipher Feedback Mode (CFB)

Counter Mode (CTR)

You are a security analyst at a large corporation. The corporation is implementing a new system that requires secure logon credential exchange between different departments. The corporation decides to use a cryptographic hashing algorithm for this purpose. Which of the following scenarios best demonstrates the correct use of hashing for secure logon credential exchange?

Each department calculates a hash of their password and sends it to the other departments. The receiving department compares this hash with the hash of the sending department's password they have on file. If the hashes match, the receiving department assumes the sending department has authenticated itself.

What is the primary use of the RACE Integrity Primitives Evaluation Message Digest (RIPEMD)? It is primarily used for file compression. It is primarily used for creating digital watermarks. It is primarily used for email encryption. It is primarily used in Bitcoin and other cryptocurrencies.

It is primarily used in Bitcoin and other cryptocurrencies.

An organization has tasked a cyber security technician with enhancing its framework after recently experiencing a cyber breach. What is the value associated with a public key infrastructure (PKI)? It is a cryptoprocessor implemented as a module within the CPU on a computer or mobile device. It is the framework that establishes trust in using public key cryptography to sign and encrypt messages via digital signatures. It is a cryptoprocessor that implements hardware through a removable or dedicated form factor, such as plug-in PCIe adaptor cards. It summates all revoked and suspended certificates and must be accessible to anyone relying on the validity of the CA's certificates.

It is the framework that establishes trust in using public key cryptography to sign and encrypt messages via digital signatures.

Which of the following types of encryption is specifically designed to be used on Internet of Things (IoT) devices? Homomorphic encryption Block cipher Lightweight cryptography Stream cipher

Lightweight cryptography In 2018, NIST began the process to standardize encryption algorithms called lightweight cryptography. Lightweight cryptography is meant to be used on Internet of Things (IoT) devices.

Which of the following controls is an example of a physical access control method? Hiring background checks Passwords Smart cards Access control lists with permissions Locks on doors

Locks on doors

Which of the following is no longer valid for security purposes? MD5 SHA-1 DES AES

MD5 Explanation MD5 is the weakest hashing algorithm. It produces a message digest of 128 bits. Many security vulnerabilities have been discovered with MD5. As such, it is no longer viable for security purposes. SHA-1 is more secure because it produces a 160-bit message digest. Both DES and AES are symmetric encryption algorithms. DES is weaker than AES.

Which of the following are true concerning the one-time pad (OTP) concept on which a streaming cipher is based? (Select two.) OTP is meant to be used on Internet of Things (IoT) devices. OTP demonstrates what is called perfect secrecy. OTP encrypts the data one chunk at a time. OTP allows data to be worked on without decrypting it first. OTP uses a symmetric encryption key that is the same length as the data being encrypted.

OTP uses a symmetric encryption key that is the same length as the data being encrypted. OTP demonstrates what is called perfect secrecy.

You want to use CCTV to increase your physical security, and you want the ability to remotely control the camera position. Which camera type should you choose? C-mount PTZ Dome Bullet

PTZ A Pan Tilt Zoom (PTZ) camera lets you dynamically move the camera and zoom in on specific areas (cameras without PTZ capabilities are set looking a specific direction). Automatic PTZ mode automatically moves the camera between several preset locations. Manual PTZ lets an operator remotely control the position of the camera.

Which of the following BEST describes compensating controls?

Partial control solution that is implemented when a control cannot fully meet a requirement. Explanation Compensating controls are a partial control solution that is implemented when a control cannot fully meet a requirement. Detective controls monitor network activity and inform the security team of a potential security event. Corrective controls attempt to fix any controls that aren't working properly. Deterrent controls discourage malicious actors from attempting to breach a network.

You are a system administrator for a company that uses Linux servers. One of your tasks is to implement a new smart-card login system for all employees. Which Linux authentication method would you use to accomplish this? Secure Shell (SSH) Password checked against a hash stored in /etc/shadow Local user account names stored in /etc/passwd Pluggable Authentication Module (PAM)

Pluggable Authentication Module (PAM)

A security analyst wants to ensure that the privileges granted to an individual align with the role within the organization. What is the primary tool that the analyst should implement? Non-repudiation Zero trust Authenticating systems Policy enforcement point

Policy enforcement point

A tech company recently moved to a new facility and seeks to bolster its physical security posture. The security team proposes integrating security guards and surveillance cameras as part of the security measures. The chief security officer (CSO) wants to ensure these implementations effectively deter, detect, and report potential security incidents. Given the scenario, which actions will maximize the effectiveness of security guards and cameras in enhancing the organization's physical security? (Select two.)

Position cameras to monitor critical access points and sensitive areas. Implement security guard rotations and unannounced spot checks.

Which technology is primarily used by smart cards to store digital signatures, cryptography keys, and identification codes? Advanced Encryption Standard (AES) Secure Sockets Layer (SSL) Public Key Infrastructure (PKI) Blockchain technology Hashing algorithms

Public Key Infrastructure (PKI)

Which of the following is an entity that accepts and validates information contained within a request for a certificate? Enrollment agent Recovery agent Certificate authority Registration authority

Registration authority

As a network administrator, you are asked to recommend a secure method for transferring data between hosts on a network. Which of the following protocols would you recommend? (Select two.) SCP FTP SFTP TDP RCP

SFTP SCP The Secure File Transfer Protocol (SFTP) is a file transfer protocol that uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data, which prevents data from being transmitted over the network in cleartext. The Secure Copy (SCP) protocol is associated with Unix/Linux networks and is used to transfer files between systems. Like SFTP, SCP relies on SSH to ensure that data and passwords are not transmitted over the network in clear text.

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called? Salting Avalanche Collision Deterministic

Salting

Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message? Sam's public key Sam's private key Mary's public key Mary's private key

Sam's public key

Which type of group can be used for controlling access to objects? Security Authorization Distribution DACL

Security

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access? Keypad locks Smart card Biometric locks Proximity card

Smart card

An organization frequently implements changes, reconfigurations, and patches to enhance its IT infrastructure's security and efficiency. The cybersecurity analyst must carefully analyze dependencies between services, applications, and interfaces to avoid unintended outages and disruptions during service restarts or downtime events. How does understanding dependencies impact the change management process? (Select the three best options.)

Supports the development of post-change performance monitoring to validate system functionality and quickly detect issues. Guides the development of effective backout plans and downtime contingencies. Helps avoid unintended outages and disruptions during service restarts or downtime events.

A cyber security analyst wants to reduce the attack surface for a computer that contains top secret data. The analyst installs a cryptoprocessor as a module within the central processing unit (CPU) on the designated computer to accomplish this. What type of cryptoprocessor is the analyst installing? HSM TPM CRLs PKI

TPM

Which action is taken when the private key associated with a digital certificate becomes compromised? The compromised digital certificate is deleted from the system. The compromised digital certificate is reissued with the same private key. The compromised digital certificate is ignored and continues to be used. The compromised digital certificate is added to the certificate revocation list (CRL).

The compromised digital certificate is added to the certificate revocation list (CRL).

What is the purpose of identity and access management (IAM) automation in the onboarding process for new employees in an organization? To establish the rules for the acceptable ways in which network and computer systems may be used by defining acceptable behavior by users. To facilitate knowledge sharing and continuity as employees move into new roles. To automate the provisioning and access management tasks associated with new employees. To carefully plan and assess the implementation of changes in the IT system.

To automate the provisioning and access management tasks associated with new employees.

You are a cybersecurity architect at a tech company that is developing a new mobile payment application. The application will handle sensitive user data including credit card information and personal identification numbers (PINs). Which of the following strategies would best leverage the concept of secure enclaves to protect this sensitive data?

You decide to store all sensitive data in a secure enclave on each user's device, accessible only with the user's unique PIN.

A network administrator for a technology company is introducing a new cybersecurity model to limit data breaches. They wish to enforce a strategy where every system or user inside or outside the network perimeter must prove their legitimacy before accessing resources. What principle would be MOST effective in implementing their new strategy?

Zero trust

A major technology company plans to renovate its headquarters, emphasizing both physical and digital security. The head of the security department is looking to enhance the building's main entry points and contemplates integrating advanced gateways with innovative locking mechanisms. In relation to securing a major technology company's main entry points, which approaches will BEST harness the potential of gateways and locks to ensure optimal security? (Select two.) Implement biometric locks that grant access based on unique physiological characteristics. Install CCTV cameras to increase the effectiveness of the gateways and locks. Install traditional padlocks that require a standard key. Use gateways to redirect all visitors to the company's promotional website. Employ network gateways that scrutinize incoming traffic for malicious activity.

Employ network gateways that scrutinize incoming traffic for malicious activity. Implement biometric locks that grant access based on unique physiological characteristics. Explanation: Network gateways that evaluate incoming traffic for potentially harmful activity effectively act as an organization's first line of digital defense, thereby safeguarding the company's internal network resources. Biometric locks enhance physical security by leveraging unique physiological traits, such as fingerprints or retina scans, thus reducing the likelihood of unauthorized access.

Which option is a benefit of CCTV? Increase security protection throughout an environment. Expand the area visible by security guards. Provide a corrective control. Reduce the need for locks and sensors on doors.

Expand the area visible by security guards.

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate? RIPEMD MD5 HMAC SHA

HMAC

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do? Add his user account to the ACL for the shared folder. Manually refresh Group Policy settings on the file server. Manually refresh Group Policy settings on his computer. Have Marcus log off and log back in.

Have Marcus log off and log back in.

Which of the following types of encryption is specifically designed to allow data to be worked on without decrypting it first? Homomorphic encryption Lightweight cryptography Block cipher Stream cipher

Homomorphic encryption

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do? Implement BitLocker without a TPM. Have each user encrypt the entire volume with EFS. Implement BitLocker with a TPM. Have each user encrypt user files with EFS.

Implement BitLocker with a TPM.

You are a security analyst at a large organization. Your organization uses a third-party certificate authority (CA) for its public key infrastructure (PKI). One day, you receive a certificate signing request (CSR) from a new department in your organization. The CSR contains a public key and the department's information. However, you notice that the department's information does not match the information in the organization's official records. What should you do?

Investigate the discrepancy and verify the department's information before forwarding the CSR to the third-party CA.


Ensembles d'études connexes

lol okay so like this one im actually just making cuz like why not but spanish chores

View Set

Adding and Subtracting Fractions

View Set

Drug Therapy for Bipolar Disorder (ATI Neuro Part 2): Lithium (Practice Questions)

View Set

Multiplying Numbers in Scientific Notation

View Set

Multicultural Literature A. Crafting Description/Types of Writing II

View Set