computer

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following attacks is considered easy, allowing threat actors to access user data and read through passwords and PINs, and why is it considered so? A WDoS attack, because WLANs are less secure and can easily be hacked. A disassociation attack, because the device gets disconnected from the network and can be hacked easily. Analysis A WLAN consumer attack, because many users fail to properly configure security on their home WLANs. A jamming attack, because this attack can be achieved using mobile phone networks.

A WLAN consumer attack, because many users fail to properly configure security on their home WLANs.

Which of the following differentiates an access point probe and a dedicated probe? A dedicated probe has the ability t to serve as both a probe and an access point that can provide roaming to wireless users. In contrast, an access point probe only monitors RF transmissions. A dedicated probe is a standard wireless device that can be configured to act as a wireless probe. In contrast, an access point probe is a wireless adapter plugged into a desktop computer to monitor the RF in the area for transmissions. A dedicated probe only monitors RF transmissions, while an access point probe can serve as both a probe and an access point that can provide roaming to wireless users. A dedicated probe is a wireless adapter plugged into a desktop computer to monitor the RF in the area for transmissions. In contrast, an access probe is a standard wireless device that can be configured to act as a wireless probe.

A dedicated probe only monitors RF transmissions, while an access point probe can serve as both a probe and an access point that can provide roaming to wireless users.

What is a Type I hypervisor? A hypervisor that uses binary files for virtualization A hypervisor that runs on security devices A hypervisor that runs directly on computer hardware A hypervisor that runs on host operating system

A hypervisor that runs directly on computer hardware

Suzanne is a cybersecurity expert. She was approached by Alex with a complaint that his payment information has leaked even though he has not made any online payments or shared information with anyone. Suzanne concluded that attackers most likely bumped a portable reader against Alex's smartphone to make an NFC connection and steal the payment information stored on the phone. What should Suzanne suggest to Alex to prevent this type of attack from happening in the future? Alex should protect his smartphone with a unique password or strong PIN. Alex should remain aware of the people around him while making NFC payments. Alex should always turn the NFC off while he's in a crowded area. Alex should configure his device pairing so one device can only send and the other only receive.

Alex should always turn the NFC off while he's in a crowded area.

Which of the following statements correctly defines jamming? An attacker circumvents the security protections in the company's network, accessing the network behind the firewall. An attacker intentionally floods the RF spectrum with extraneous RF signal "noise" that creates interference and prevents communications. An attacker creates false deauthentication or disassociation management frames that appear to come from another client device, causing the client to disconnect from the AP. An attacker tries to mimic an authorized AP, so a user's mobile device such as a laptop or tablet unknowingly connects to the evil twin instead.

An attacker intentionally floods the RF spectrum with extraneous RF signal "noise" that creates interference and prevents communications.

While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks. How should you reply? An enterprise network will have more sensitive and confidential information. Enterprises attract more business when using access control. The devices required for access control can only be afforded by an enterprise. Access controls can only be configured by security admins.

An enterprise network will have more sensitive and confidential information.

Which of the following can protect a password digest from attackers? Password vault Secure key Argon2 Keystroke dynamics

Argon2

You are working as a security administrator. Your enterprise has asked you to choose an access control scheme in which a user is authorized to access the resources if the user has a specific attribute and denied if they don't. Which of the following access control schemes should you choose? Mandatory access control Role-based access control Attribute-based access control Rule-based access control

Attribute-based access control

Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection. Which technology should Sherry suggest? NFC technology can be used to connect mobile devices to speakers RFID technology can be used to connect laptop mouse without any wired connection WLANs can be used to connect mobile devices to speakers Bluetooth technology can be used to connect devices without any wired connection

Bluetooth technology can be used to connect devices without any wired connection

Which of the following best describes skimming? Altering the condition of a secure key by using software Capturing information from the magnetic stripe of a smartcard Altering the condition of a secure key by using hardware Intercepting the OTP to gain unauthorized access

Capturing information from the magnetic stripe of a smartcard

You are a data steward. You have been asked to restrict User A, who has an access clearance of "top secret" in a MAC-enabled network, from accessing files with the access label "secret." This, in turn, does not affect any other user. What action should you take? Change the access label of the files to "top secret" Change the access clearance of User A to "confidential" Change the access label of the files to "confidential" Change the access clearance of User A to "secret"

Change the access clearance of User A to "confidential"

In a multifactor authentication-enabled facility, you are asked the following question: "What type of food was served on your child's first birthday?" Which of the following is the authentication method used here? Cognitive biometrics Security key authentication Behavioral biometrics Physiological biometrics

Cognitive biometrics

You are a security consultant. An enterprise client contacted you because their mail domain is blocked due to an unidentified entity using it to send spam. How should you advise them to prevent this from happening in the future? Configure the IMAP to store emails on the email server Configure the POP3 so that it listens on port 25 Configure the POP to monitor incoming and outgoing emails Configure the SMTP relay to limit relays to only local users

Configure the SMTP relay to limit relays to only local users

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply? Containers use hardware hypervisors for virtualization Containers use OS components for virtualization Containers use dedicated physical storage for virtualization Containers use Type I hypervisors for virtualization

Containers use OS components for virtualization

What type of APs can be managed by wireless LAN controllers (WLCs)? Controller AP Standalone APs Fat AP Captive portal APs

Controller AP

In a practical test, Steve was asked to securely connect different on-premises computing devices with a database deployed in the cloud. What action is Steve taking? Using a simple network management protocol Using cloud access security broker Creating a virtual network Using next-generation secure web gateway

Creating a virtual network

Primary investigation after an enterprise security breach revealed that the breach was caused by an unauthorized device physically connected to the enterprise network. Which of the following logs should you examine first while conducting a detailed investigation? DNS server logs Firewall logs DHCP server logs Email server logs

DHCP server logs

You are the security manager of an ISP, and you are asked to protect the name server from being hijacked. Which of the following protocols should you use? DNSSEC FTPS SFTP IMAP

DNSSEC

Who implements access control based on the security level determined by the data owner? Data privacy officer Data custodian Data controller Data processor

Data custodian

Under which vulnerability can an attacker steal information from a user's phone using a device to connect to the phone without physically touching it? Eavesdropping Man-in-the-middle Data theft Device theft

Data theft

Which of the following is a feature of secrets management? Data redundancy Data availability Decreased latency Default encryption

Default encryption

Which of the following access management controls best fits a home network? Role-based access control Discretionary access control Mandatory access control Rule-based access control

Discretionary access control

Which of the following packets contains the field that indicates the function of the packet and an identifier field used to match requests and responses and the type of data being transported along with the data itself? TKIP packet DHCP packet Analysis EAP packet CCMP packet

EAP packet

The following statements regarding centralized administration concepts are presented to you in an interview in which only one of them is correct. Which of these is correct? Directory service is an XML standard that allows secure web domains to exchange user authentication and authorization data. A RADIUS client can be defined as a desktop or a wireless laptop requesting authentication. The transport protocol used by RADIUS is TCP. Extensible authentication protocol is a framework to transport authentication protocols.

Extensible authentication protocol is a framework to transport authentication protocols.

Which of the following can be achieved using availability zones in cloud computing? Less redundancy More visibility Fault tolerance Lower cost

Fault tolerance

Your enterprise recently approved using fingerprint scanners to authenticate employees who access restricted areas. You are assigned to conduct a study on how secure fingerprint authentication is. Which of the following should you report? Fingerprint scanners can be used for trickery in rare cases. Fingerprint scanners have the highest false rejection rate among other authentication methods. Fingerprint scanning is the safest available authentication method. Fingerprint scanners have the lowest false acceptance rate among other authentication methods.

Fingerprint scanners can be used for trickery in rare cases.

A security breach recently occurred in your enterprise. During the incident investigation, you are asked to examine network-based device logs. Which of the following network devices should you examine first? Firewall DNS NIDS and NIPS Routers and switches

Firewall

In an interview, you are asked to explain why software forensic tools are used more than forensic hardware workstations. How should you reply? Forensic hardware workstations have limited functionalities compared to forensic software tools. Forensic hardware workstations make forensic operations more difficult to perform than forensic operations performed by forensic software tools. Forensic hardware workstations are slower than forensic software tools. Forensic hardware workstations are more expensive than forensic software tools.

Forensic hardware workstations are more expensive than forensic software tools.

Which of the following protocols can make accessing data using man-in-the-middle attacks difficult while web browsing? SFTP DNSSEC HTTP IPv6

IPv6

Which of the following is the most versatile cloud model? IaaS PaaS SaaS XaaS

IaaS

You are working as a cloud administrator, and are asked to migrate a virtual machine to a more capable physical machine, as the demand for the service hosted on the VM increased past its limit. As your enterprise still uses conventional switches, migration took time and resulted in customer dissatisfaction. How should you mitigate this issue in the future? Use virtual desktop infrastructure Implement a software-defined network Implement software-defined visibility Create containers in the virtual machine

Implement a software-defined network

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected? Implement a secure network gateway Deactivate the host OS while the guest OS is running Implement virtual machine escape protection Assign different virtual networks for the guest OS and host OS

Implement virtual machine escape protection

Zara has been instructed to organize an event where top companies will come and give a webinar. Since the event is large and the number of people attending is substantial, Zara needs to ensure that there are no disturbances. She thinks preventing devices from communicating and calls from being made or received is the easiest solution. Which factor should Zara use to achieve this? Rogue access point Disassociation Evil twin Jamming

Jamming

Which of the following is an authentication system that issues a ticket after verifying the credentials by which you can authenticate other services? Kerberos TACACS+ SAML RADIUS

Kerberos

Why are mobile devices critical to a digital forensics investigation? Mobile device forensics tools are less expensive than digital forensic workstations. Evidence can be easily retrieved from mobile devices. Mobile devices are widely used by diverse user groups. Mobile devices are almost continually in a user's possession.

Mobile devices are almost continually in a user's possession.

Which of the following is a hardware-based solution for password security? Password vault Salts Password digest Password key

Password key

You want to manage your passwords for different accounts to optimally secure passwords from compromise. Which of the following password management methods should you use? Password generator Password digest Password vault Password key

Password key

An attacker collected many usernames from a website and tried to login into the accounts using the password "passw0rd". What type of attack was this? Pass the hash attack Brute force attack Password spraying Password phishing

Password spraying

You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise's strong password policy, which of the following methods will be the easiest for you to use when retrieving the password? Rule attack Hybrid attack Brute force attack Dictionary attack

Rule attack

You are working as a security admin in an enterprise and have been asked to choose an access control method so that all users can access multiple systems without crossing their limit of access. Which of the following access control methods is the best fit? Discretionary access control Role-based access control Rule-based access control Mandatory access control

Rule-based access control

You are asked to transfer a few confidential enterprise files using the file transfer protocol (FTP). For ensuring utmost security, which variant of FTP should you choose? FTPS TFTP FTP SFTP

SFTP

Which of the following authentication methods belongs in the "something you have" category? Keystroke dynamics Picture password Security key Gait recognition

Security key

Which of the following tools can be used to protect containers from attack? Virtual machine manager Security-Enhanced Linux Software-defined visibility Software-defined networking

Security-Enhanced Linux

Zain, a telecom engineer, plans to relocate a particular AP antenna to a new location. Which of the following configuration options will he use to adjust frequency bands, optimum channels, and available spectrum for data transfer? Antenna placement Spectrum selection Signal strength settings Wi-Fi analyzers Analysis

Spectrum selection

Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate an IoT device? Zigbee Subscriber identity module Narrowband IoT Cellular IoT baseband

Subscriber identity module

Mike, an employee at your company, approached you seeking help with his virtual machine. He wants to save the current state of the machine to roll back to the saved state in case of a malfunction. Which of the following techniques can help Mike? Use containers to save the virtual machine state Use LDAP to save the virtual machine state Take snapshots to save the virtual machine state Apply sandboxing to save the virtual machine state

Take snapshots to save the virtual machine state

In an interview, you were asked to explain the steps involved in a successful authentication by a RADIUS server. How should you answer? The access point (AP) sends a request to the supplicant. The supplicant prompts the user for the credentials. On entering the credentials, the supplicant sends an authentication request to the RADIUS server. If verified, the server sends an authentication acknowledgment to the supplicant, and the user is authorized to join the network. The supplicant prompts the user for the credentials. On entering the credentials, the supplicant sends a request to the access point (AP). The AP then sends an authentication request to the RADIUS server.If verified, the server sends an authentication acknowledgment to the AP. The user is then authorized to join the network. The supplicant sends a request to the access point (AP). The AP prompts the user for credentials. Once credentials are entered, the AP sends an authentication request to the RADIUS server. If verified, the server sends the authentication acknowledgment to the AP. The user is then authorized to join the network. The access point (AP) prompts the user for credentials. On entering the credentials, the AP sends a request to the supplicant. The supplicant sends an authentication request to the RADIUS server.If verified, the server sends an authentication acknowledgment to the AP. The user is then authorized to join the network.

The supplicant sends a request to the access point (AP). The AP prompts the user for credentials. Once credentials are entered, the AP sends an authentication request to the RADIUS server. If verified, the server sends the authentication acknowledgment to the AP. The user is then authorized to join the network.

Which of the following is an example of evidence collected from metadata? RAM slack Drive file slack Time stamp Chain of custody

Time stamp

Which of the following is a motherboard chip that provides cryptographic services? Security key Windowed token Trusted platform module Hardware security module

Trusted platform module

In an interview, the interviewer asks you to boot a PC. A hypervisor screen appears at the start of the boot process. The interviewer then asks you to identify the type of VM monitor program being used. What should your reply be? Type II hypervisor Container Type III hypervisor Type I hypervisor

Type I hypervisor

You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps. How should you implement this without storing the customers' credentials on the BuyMe server? Use Kerberos authentication Use TACACS+ Use RADIUS authentication Use SAML

Use SAML

You are a cloud administrator, and you are asked to configure a VPC such that backend servers are not publicly accessible. What should you do to achieve this goal? Deploy the backend servers on premises Use private subnets for backend servers Deploy backend servers in different availability zones Implement audit logging on backend servers

Use private subnets for backend servers

Your enterprise recently decided to hire new employees as work-from-home interns. For the new employees to work from home, you need to create a network that will allow them to securely access enterprise data from remote locations. Which technology should you use? VPN S/MIME FTPS SNMP

VPN

Which of the following human characteristic is used for authentication? Facial expression Height Veins Breathing pattern

Veins

Sam is asked to help his company design a wireless network for their new location. Which of the following protocols has the strongest wireless security, supports a longer bit of encryption, and improved interaction capabilities with the internet of things (IoT) devices? WPA3 WPA WEP WPA2

WPA3

Which wireless probe can be designed by configuring a laptop computer to scan and record wireless signals within its range at regular intervals and report the information to a centralized database? Wireless device probe Dedicated probes Desktop probe Access point probe

Wireless device probe

In a security review meeting, you proposed using a windowed token with a time-based one-time password (TOTP) to authenticate enterprise employees, and you were asked to explain the working of TOTP. Which of the following should be your reply? With a windowed token with TOTP, a one-time code is generated by the server. The server sends the code to the windowed token. The user enters the code. The user gets authenticated for the correct code. With a windowed token with TOTP, a one-time code is generated by the windowed token using a specific algorithm. The server generates the code using the same algorithm. The user enters the code generated by the windowed token. The user is authenticated if the codes match. With a windowed token with TOTP, a one-time code is generated by the windowed token. The windowed token sends the code to the server. The user enters the code generated by the windowed token. The user gets an authentication for the correct code. With a windowed token with TOTP, a one-time code is generated by the windowed token using a specific algorithm. The server generates the code using a variant of the specific algorithm. The user enters the code. The user is authenticated if the codes match.

With a windowed token with TOTP, a one-time code is generated by the windowed token using a specific algorithm. The server generates the code using the same algorithm. The user enters the code generated by the windowed token. The user is authenticated if the codes match.

You are working as a security admin in an enterprise. While you were analyzing different password attacks, you found that whenever an individual user's password gets cracked, another user with the same password residing in the same password digest file also has their account compromised. How should you prevent this from happening in the future? You should add salt to the passwords before hashing. You should tell the users not to use the same passwords. You should run key stretching algorithms on the passwords. You should store the digest files in a password vault.

You should add salt to the passwords before hashing.

Your enterprise devices are configured with mandatory access control. How should you control user access so that files with a "top secret" label cannot be accessed by any users while "secret" files remain accessible? You should set the clearance of all users to "secret." You should set the clearance of all users to "top secret." You should set the clearance of all users to "confidential." You should change the label of "top secret" files to "confidential."

You should set the clearance of all users to "secret."

Which of the following log management tools has content filtering? syslog-ng journalctl rsyslog nxlog

syslog-ng


संबंधित स्टडी सेट्स

Comprehensive Spreadsheet Modeling

View Set

Statistics Midterm Study Guide Chapter 2

View Set

The successful selling of merchandise depends on the price point, which must be in line with what the consumer is willing to pay for the product. List and describe the levels of price points and give an example of a retailer for each price point.

View Set

Network Pro Part 3 ++++++++++++++++++++++++++++++

View Set

Important Elements from the Periodic Table

View Set

Chapter 9. Making Capital Investment Decisions

View Set

Guida de Examen - Modulo 3 Representaciones simbolicas y algoritmos

View Set

Pharm Ch. 42: Drugs Used to Treat Glaucoma and Other Eye Disorders

View Set

Chapter 8: Harvesting Energy: Glycolysis and Cellular Respiration

View Set