NDE Certification Practice Questions (CyberQ)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Given below are the steps involved in the access control mechanism. 1.) Once the identification is successful, the system provides the user access to use the system 2.) A user provides their credentials while logging into the system 3.) The system then allows the user to perform only those operations for which the user has been authorized 4.) The system validates the user with the database on the basis of the provided credentials Identify the correct sequence of steps involved in the access control mechanism.

2-4-1-3

Jack, a security specialist was appointed by an organization to implement a highly secured authentication method at the entrance of their science and research center. To accomplish the responsibility, Jack created an authentication method that identifies a person based on the facial features from an image or a video source. Which of the following authentication methods Jack has implemented in the above scenario?

Biometric authentication

Ronnie, a security professional got many tickets stating that certain miscreants have been accessing the files with the credentials of the employees and they are creating havoc in the organization. To prevent such incidents, Ronnie implemented an authentication mechanism that identifies human characteristics for authenticating people. Which of the following types of authentication did Ronnie implement in the above scenario?

Biometric authentication

Sam, a professional hacker, targeted a cloud server to damage the reputation of an organization. He performed an image forgery attack to change the image files and a replay attack to provide outdated content to legitimate users. Which of the following types of attack Sam has performed in the above scenario?

Docker registry attacks

In which of the following locking systems is locking and unlocking achieved by supplying and eliminating power and the locking system mainly uses motors to activate or deactivate the locks?

Electromagnetic

Which of the following types of light system is used during power failures or when normal lighting systems do not operate properly?

Emergency lighting

Which of the following points an organization should NOT consider while designing their infrastructure and architecture?

Have a single location for the server and storage rooms

Identify the access control model in which the access permissions are beyond the user control, which implies that users cannot amend the access policies created by the system.

Role-Based access control

Benson, a security professional plans to implement more stringent security practices in his organization. For this reason, he uses a protocol that provides cryptographic security by encrypting the email messages and digitally signing them to ensure confidentiality, integrity, and nonrepudiation of messages. Which of the following protocols was employed by Benson in the above scenario?

S/MIME

Which of the following protocols is an application layer protocol used for sending digitally signed and encrypted email messages?

S/MIME

Johana, the HR of a renowned consultancy, was hired to recruit right candidates online for their clients. Her work involves scheduling interviews online and shortlisting candidates. Johana, often schedules interviews using web-based applications such as Calendar that automatically notifies her when and which candidate is supposed to be interviewed. Which of the following types of cloud computing service Johana has employed in the above

SaaS

Which of the following objects of a container network model contains the configuration of a container's network stack such as routing table, management of container's interfaces, and DNS settings?

Sandbox

John purchased a new Apple phone and added his Apple ID and password to access the device. John can now access multiple Apple application services such as App Books, Apple fitness+, and Siri through his Apple device using the ID. John can access all these application services without providing individual credentials for each application. Which of the following types of authentication method was demonstrated in the above scenario?

Single sign-on authentication

Williams, a programmer, has developed an authentication mechanism for his eCommerce application by using Google services. This allows the application users to access the website through their Google account. Which of the following authentication methods Williams has implemented in the above scenario?

Single sign-on authentication (SSO)

Benila, a security professional, implemented cryptography-based authentication to ensure strong authentication in her organization. She employed an authentication mechanism that needs a device embedded with a small computer chip that stores personal information of the employee for identification. Identify the type of authentication employed by Benila in the above scenario.

Smart card authentication

In an organization, employees' incoming and outgoing status is being tracked and monitored via a small computer chip implanted on their ID card, which stores their personal information for identification. Which of the following authentication methods the organization has implemented in the above scenario?

Smart card authentication

John, an employee at an organization, was provided with a physical badge that provides access only for the second floor out of five floors in the organization building and that physical badge also tracks John's working hours and break times on the floor based on a record of swipes made by him. Which of the following types of authentication method allowed the organization to record John's total working hours on the floor in the above scenario?

Smart card authentication

Smith, a professional hacker, has decided to perform an attack on the target organization's employees. He tricked the employees to access specific links, which when clicked redirected the victim to a malicious page. The victim is lured to enter their personal information on the malicious page; this information is then retrieved by Smith. Identify the type of attack performed by Smith in the above scenario.

Social Engineering

Smith, a security specialist, was appointed by an organization to set a physical security barrier at the organization entrance. He installed a physical security control that allows only one employee at a time via the insertion of a coin, ticket, or a pass provided to them. Identify the type of physical security control implemented by Smith in the above scenario.

Turnstiles

Which of the following physical security barriers can affect the fast evacuation of occupants in case of a fire emergency as it allows entry of only one person at a time?

Turnstiles

Alice, a shopping freak, logged into an ecommerce app and added certain favorite items to her cart list. Before placing the order, she added her shipping address and debit card details along with the CVV number on the app. After adding her card details, Alice clicked on the proceed option to pay the bill. During the bill payment, Alice received an OTP on her mobile phone. Upon providing a valid OTP on the payment gateway, Alice's order was successfully accepted. Which of the following types of authentication method was demonstrated in the above scenario?

Two-factor authentication

Rachel, a security professional plans to implement an added layer of defense to protect critical assets from sophisticated cyberattacks. She implemented an authentication technique that uses a physical entity such as a security token as one of the credentials and the other credential can include security codes. Identify the type of authentication implemented by Rachel in the above scenario.

Two-factor authentication

Smith, a developer in a software company, has designed a banking application. For security reasons, he created an authentication mechanism that requires logging-in with user credentials as well as an OTP, which is sent to the user's mobile number. Which of the following authentication methods Smith has implemented in the above scenario?

Two-factor authentication

Identify the component of access management that involves tracking the actions performed by a user on a network and keeps track of who, when, and how the users access the network.

Accounting

Given below are the steps involved in the working of mantrap. 1.) Authenticates the person trying to access 2.) First door closes soon after the person enters the room and signals the second door to get unlocked 3.) The first door opens after authentication allows the person to walk in 4.) The second door gets into locked state soon after the person walks out the second door 5.) The second door opens with the person walking out of the room. The first door gets automatically locked soon after the second door opens What is the correct sequence of steps followed in man trapping?

1-3-2-5-4

Given below are the various steps to deal with fire incidents. 1.) Notify the fire and safety department regarding the fire 2.) Detect fire 3.) Evacuate occupants in the building to another safe location 4.) Close all electrical and electronic systems in order to prevent the fire from spreading 5.) What is the correct sequence of steps involved?

2-3-1-4

TACACS+ authentication involves the following steps: 1.) The router and the user exchange authentication parameters 2.) The server responds with the REPLY message based on the provided information 3.) A user initiates the connection for authentication 4.) The router sends the parameters to the server for authentication I dentify the correct order of steps involved.

3-1-4-2

Which of the following practices helps security professionals strengthen the physical security of an organization?

Always advise employees to swipe the card at the entrance

Which of the following components of technical network security controls examines the network devices and identifies weaknesses in the network?

Auditing

James, a network specialist joined an organization. He was provided with administrator privileges, through which he can access the files and servers and perform administrative activities. Which of the following information assurance principles authorizes James to access the server or system files?

Authentication

Which of the following feature of Kubernetes enables the user to change the actual state of the container to the desired state of the container at a controlled rate?

Automated rollouts and rollbacks

David, a new employee at an organization, received a call from HR on one Saturday (weekend) to upload his certificates on the shared drive. David connects to the corporate network to access the drive online from his residence. Which of the following information assurance principles was demonstrated in the above scenario?

Availability

Which of the following practices helps security professionals strengthen the physical security of an organization?

Avoid storing confidential information on mobile devices

Identify the physical barrier that may be defined as a short vertical post which controls and restricts motor vehicles to the parking areas, offices etc. and are mainly used in building entrances, pedestrian areas and areas that require safety and security.

Bollards

John, a network specialist, was instructed to secure the physical environment of an organization. He installed a CCTV camera to cover a certain distance over the main entrance, doorways, and other entry points. The CCTV camera also allows John to use different lenses to cover areas beyond specific distances. Which of the following types of CCTV camera was installed by John in the above scenario?

C-Mount CCTV camera

Teena, a security administrator, plans to tighten the physical security of the organization to protect against malicious intruders. She deployed video surveillance cameras that consist of detachable lenses, provide surveillance for more than 40 ft, and use different lenses according to the distance to be covered. Which of the following types of video surveillance camera is mentioned in the above scenario?

C-Mount CCTV camera

An organization has recently leased an online cloud service. Using these services, subscribers can develop rich, scalable containerized applications through the cloud or on-site data centers. Identify the type of cloud computing service deployed by the organization in the above scenario

CaaS

Which of the following types of service enables the deployment of containers and container management through orchestrators and using which subscribers can develop rich, scalable containerized applications through the cloud or on-site data centers?

CaaS

In an organization, CyberSol.org, the administrator implemented an authorization method that contains a single database. Using this method, the administrator can allow or deny access to the applications and resources to their employees based on the policies. Identify the authorization technique implemented by the administrator in the above scenario.

Centralized Authorization

Which of the following types of cable is made up of a single copper conductor at its center, a plastic layer providing an insulated center conductor, and a braided metal shield?

Coaxial

Identify the type of physical security control that includes hot site and backup power system and is used as an alternative control when the intended controls fail or cannot be used.

Compensating controls

Which of the following types of physical security controls are known as alternative controls that are used when the intended controls fail or cannot be used?

Compensating controls

Abey, a software developer, is working on a prestigious project. John, a colleague of Abey, is a disgruntled employee in the same company. John, with malicious intent, decides to access confidential information regarding the project, which Abey is sharing with the higher management. For this purpose, he uses sniffing programs and captures the traffic originating from Abey's system. As a result, he is able to obtain crucial project details. Identify the information assurance principle on which John has performed the attack in the above scenario.

Confidentiality

Harvey, a system administrator, is assigned a task to create access permissions for users as well as verify the access permissions created for each employee in his organization. For this purpose, he used a type of authorization that maintains a separate database for each resource. Further, for better flexibility, it also enables the employees to provide access to other employees. Which of the following types of authorization was employed by Harvey in the above scenario?

Decentralized Authorization

Identify the type of authorization that maintains a separate database for each resource and the database contains the details of all users who are permitted to access a particular resource.

Decentralized Authorization

John, a new employee at an organization, has completed his training. His work involves dealing with important documents of the organization. On one Sunday, he connected to the corporate server from his residence, accessed and updated the important documents, and saved them on to the cloud. Subsequently, David (the manager) accessed and edited (approved) John's documents from a different location. Which of the following types of virtualization was demonstrated in the above scenario?

Desktop virtualization

Clark, a thief, escaped from the civil forces and tried to enter the nearest company's premises. The security systems installed at the entrance identified the unauthorized entry into the organization's premises and triggered an alarm to activate security teams. Which of the following types of security control system triggered an alarm in the above scenario when the unauthorized intrusion attempt was made?

Detection Controls

Jack, a security inspector, was assigned to install a physical security control in the company premises to defend against intrusion attempts. He implemented a security control that contains motion sensors connected with video surveillance to monitor and identify illegitimate intrusion attempts. Which of the following types of physical security control Jack has implemented in the above scenario?

Detective controls

Richard, a security professional, implements physical security controls according to the needs of the organization. As part of this, he implemented controls that do not prevent access directly but can discourage the attackers by sending warning messages about an intrusion attempt. Which of the following types of physical security controls was implemented by Richard in the above scenario?

Deterrent controls

Which of the following types of physical security controls is used to discourage attackers and send warning messages to them to discourage against intrusion attempts?

Deterrent controls

Steve, a professional in an organization, targeted his colleague James to access his mobile device and steal all the data stored in it. When James left the mobile on his desk, Steve tried to access it but failed to do so as the device was asking either for a fingerprint or valid PIN number to authenticate. Which of the following types of physical lock system James has implemented on his device?

Digital lock

Which of the following access control models can be termed as need-to-know access model where the decision can be taken by an owner to provide or deny access to specific user or a group of users?

Discretionary access control (DAC)

Which of the following components of Docker engine manages the Docker images, containers, networks, and storage volume, and processes the requests of the Docker API?

Docker Daemon

Which of the following components of technical security controls protects the information passing through the network and preserves the privacy and reliability of the data?

Encryption and Protocols

Which of the following practices should be followed by a cloud administrator to secure the container environment?

Ensure the authenticated access to registries

Which of the following points should be considered while designing the infrastructure and architecture for an organization or industry?

Establish procedures explaining how they should be protected

Which of the following levels of virtualization makes the virtual devices independent of the physical computer hardware and creates a massive pool of storage areas for different virtual machines running on the hardware?

Fabric virtualization

Which of the following types of cable is made of glass or plastic and is least susceptible to wiretapping threats?

Fiber optic

Sam, an employee at organization, works in a file storage facility that manages the company's documents and files. Due to a short circuit in the storage facility, a small fire broke out at the corner of the room. As Sam is already located on the site, he used a manual fire-suppression system that discharges an agent from a cylindrical vessel to stop the initial fire from spreading to other rooms. Identify the type of fire-suppression system Sam has used in the above scenario.

Fire extinguisher

Identify the virtualization approach in which the guest OS is not aware that it is running in a virtualized environment and sends commands to the virtual machine manager (VMM) to interact with the computer hardware.

Full virtualization

Which of the following points need be considered by the organization while designing the infrastructure and architecture?

Have emergency exits

Which of the following types of fire detection system is used to detect and respond to the thermal energy generated due to fire incidents?

Heat detectors

Williams, an infrastructure designer, was assigned to design the arrangement of servers in a data center. The requirement is that the arrangement of equipment should maintain airflow to save energy. The arrangement designed by Williams can save the hardware from humidity and heat and increases hardware performance. Which of the following options was employed by Williams in the above scenario?

Hot and cold aisles

In which of the following types of virtualization approach, the guest OS adopts the functionality of para virtualization and uses the VMM for binary translation to different types of hardware resources?

Hybrid virtualization

Which of the following components of virtualization is an application or firmware that enables multiple guest operating systems to share a host's hardware resources?

Hypervisor

Hoshea, a security professional, has adopted cloud computing technology that provides authentication services such as single-sign-on, multi-factor-authentication, identity governance and administration, access management, and intelligence collection to the subscribed enterprises. Identify the type of cloud computing service deployed by Hoshea in the above scenario.

IDaaS

Identify the type of cloud computing service that offers authentication services to the subscribed enterprises and is managed by a third-party vendor to provide identity and access management services.

IDaaS

James, a software engineer, is working from a remote location and connects his laptop to the company's server through a VPN. The company has implemented a security protocol that provides authentication as well as encryption of the data passing through the VPN tunnels. Identify the network security protocol implemented by the company for secure communication.

IPsec

Which of the following information assurance principles ensures that the information is not modified or tampered by any unauthorized parties?

Integrity

Sally, a security professional, implemented a protocol for authenticating requests in computer networks. The protocol implemented by Sally is based on the client-server model, and uses encryption technology and a "ticket" mechanism to prove the identity of a user on a non-secure network. Identify the protocol implemented by Sally in the above scenario.

Kerberos

Kevin, a cloud security architect, was planning to automate the deployment, scaling, and management of containerized applications. He deployed a platform that groups different containers into several logical units for easy management and discovery. Which of the following technologies was utilized by Kevin in the above scenario?

Kubernetes

Which of the following Docker native network driver helps in creating a network connection between container interfaces and its parent host interface or sub-interfaces?

MACVLAN

James, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource. Which of the following access control models James has implemented in the above scenario?

Mandatory access control (MAC)

John, a security guard at an organization, was instructed to lock the server room and handover the keys to the administrative department. As the administrative team was in meeting with the manager, John kept the keys with him and handed them over after completion of the meeting. Which of the following lock systems is demonstrated in the above scenario?

Mechanical lock

Bob has recently purchased a new laptop and enabled all the required security controls. The next day while verifying whether all the security mechanisms were enabled on his system or not, he found that the "firewall" was disabled. He immediately enabled the firewall option on his laptop. Identify the component of technical security controls that Bob enabled to protect his laptop from network-related threats.

Network security devices

Which of the following practices is NOT a measure for strengthening the physical security of an organization?

Never follow copyright rules and licensing restrictions

Which of the following information assurance principles ensures that a party in a communication cannot deny sending the message?

Nonrepudiation

Identify the access control terminology that is referred to as an explicit resource on which an access restriction is imposed.

Object

Which of the following protocols is an application layer protocol that provides cryptographic privacy and authentication for network communication and enhances the security of emails?

PGP

Which of the following types of HVAC system are used in locations where the space required for fixing all the components of a split system is available?

Packaged heating and air-conditioning system

Don, a professional hacker, targeted Bob's email account to access his emails. He initiated brute-force and dictionary attacks from two different systems with an impression that any one of these methods can compromise the Bob email account at the earliest possible time. Which of the following types of authentication method Don has been trying to bypass in the above scenario?

Password authentication

Which of the following layers in the OSI model includes all cabling and network systems, power support for cables and systems, and environment supporting the systems?

Physical Layer

John, an employee at an organization, was provided with an access ID card to access only specific portions of the organization's building. He can enter specific areas by swiping his ID card against the card reader at the entrance. One day, John wanted to meet his friend Bob who works on the second floor of the same building where he has no access to enter. John swiped his ID card against the access reader on the second floor but the door remained closed. Which of the following types of physical security controls prevented John from entering the second floor?

Preventative controls

Which of the following protocols provides centralized authentication, authorization, and accounting (AAA) for remote access servers to communicate with a central server?

RADIUS

Clark, a network security specialist, was assigned to secure an organization's network. Clark implemented a network defense approach that can tackle network attacks such as DoS and DDoS and includes security monitoring methods such as IDS, SIMS, TRS, and IPS. Which of the following network defense approaches did Clark implement in the above scenario?

Reactive Approach

Which of the following network defense techniques examines the causes for attacks in networks by using fault-finding mechanisms, security forensics techniques, and post-mortem analysis?

Retrospective Approach

Jack, a cloud administrator, was using Kubernetes resilient framework to manage the applications running in a container. Due to certain technical issues, the container failed to restart and also stopped responding to the user-defined health checks. The Kubernetes that Jack was using has automatically replaced and rescheduled the containers. Which of the following feature of Kubernetes has solved the container issue in the above scenario?

Self-healing

Freddy, a network engineer, detects that the network cabling of his organization was flawed and insecure. To implement secure network cabling, he installed a type of cable where each pair of wires is individually guarded with foil and is less susceptible to external interference. Identify the type of cable utilized by Freddy in the above scenario.

Shielded twisted pair

Identify the type of UPS used for server rooms as it supplies power below 10 kVA.

Standby on-line hybrid

Which of the following UPS systems is no longer commonly used as it could become unstable when operating a modern computer power supply load?

Standby-Ferro

Identify the fire-fighting system that provides a pre-piped water system for organizations and provides water supply to hose lines in certain locations.

Standpipe system

Margaret, a system administrator, regularly administers the devices connected to the organizational network. She found that certain devices are vulnerable to sniffing attacks. To protect the device from such attacks, Margaret employed a protocol that encrypts the entire communication between the client and the server, including the user's password, which protects it from sniffing attacks. Identify the protocol employed by Margaret in the above scenario.

TACACS+

Which of the following environmental threats affects electrical and electronic appliances, can lead to issues such as corrosion and short-circuits, and damages magnetic tapes and optical storage media?

Temperature and humidity

Which of the following types of physical threat involves activities such as planting a vehicle bomb, human bomb, or a postal bomb in and around the organization's premises that impacts the physical security of the organization?

Terrorism

Bob, an employee at an organization, was assigned with responsibilities of training and monitoring guards, assisting guards during crisis situations, handle crowds, and maintaining facilities such as keys and locks. Identify the position held by Bob in the above scenario.

The plant's security officer

Which of the following activities is a physical security measure implemented for maintaining servers and backup devices?

Use rack mount servers

Which of the following practices helps network administrators overcome the risks associated with network cabling?

Use transparent conduits for cabling in highly sensitive areas

Identify the type of man-made threat that includes former employees who try to compromise the system by willingly harming the system components.

Vandalism

Which of the following components in a Kubernetes cluster architecture is a backing store for the data in the Kubernetes cluster?

etcd


संबंधित स्टडी सेट्स

Chapter 6: Interpersonal Communication

View Set

MU 3100 Unit 7 Quiz 2021 - HB Quizlet PDF

View Set

Mastering Biology: DNA replication: synthesis and repair

View Set