security+ (45)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Elainy wants to adopt appropriate response and recovery controls for natural disasters. What type of control should she use to prepare for a multi-hour power outage caused by a tornado?

a generator

Matt sets up a network with intentional vulnerabilities and then instruments it so that he can watch attackers and catch details of their attacks and techniques. What has Matt set up?

a honeynet

Shara has been asked to deploy 5G cellular inside her organization. What concern should she raise with her management about the effort to implement it?

5G requires high levels of antenna density for full coverage.

Cheryl is worried about VoIP phones used in his company because of the use of SMS as part of their multifactor authentication rollout. Which of the following types of attack should he be concerned about?

An SMS token redirect

Steve is considering implementing off-site storage. When he does, his data-center manager offers four solutions. Which of these answers will best ensure resilience and why?

Back up to an off-site location at least 90 miles away to make sure that a natural disaster does not destroy both copies.

AES and DES are a sample of what type of cipher?

Block ciphers that encrypt groups of plain-text symbols all together

What are the key limiting factors for cryptography on low-power devices?.

There are system limitations on memory, CPU, and storage.

Rachel's organization uses a CCTV monitoring system in their main office building, which is occupied and in use 24-7. The system uses cameras connected to displays to provide real-time monitoring. What additional feature is the most likely to receive requests to ensure that her organization can effectively use the CCTV system to respond to theft and other issues?

DVR

Liam works for a company that manufactures portable medical devices, such as insulin pumps. He is worried about ensuring these devices are secure. Which of the following is the most necessary step for him to take?

Ensure all communications with the device are encrypted.

You are worried about the security of new devices your company has implemented. Some of these devices use SoC technology. What would be the best security solution you could take for these?

Ensuring each has its own cryptographic key

Yasmine is responsible for secure communications with her company's e-commerce server. All communications with the server using TLS. Which of the following is the most secure option for Yasmine to store the private key on the e-commerce server?

HSM

Why is heating, ventilation, and air-conditioning (HVAC) part of organizational security planning?

HVAC systems are important for availability.

What term is used to describe encryption that can allow computations to be conducted on ciphertext, with the results matching what would have happened if the same computations were performed on the original plain text?

Homomorphic encryption

Jared is a security engineer with a manufacturing company. During a recent investigation, he found that an engineer's compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and could not be blocked from connecting to them. What should Jared do to alleviate this threat?

Implement account usage auditing on the SCADA system.

The company that Kevin works for has selected a nondescript building and doesn't use exterior signage to advertise that the facility belongs to them. What physical security term describes this type of security control?

Industrial camouflage

What purpose does a transit gateway serve in cloud services?

It connects virtual private clouds and on-premises networks.

What is NOT a benefit of a serverless architecture?

It is ideal for complex applications.

Joce has been asked to implement a directory service. Which of the following technologies should she deploy?

LDAP

When you are concerned about application security, what is the most important issue in memory management?

Make sure you release any memory you allocate.

You are responsible for server room security for your organization. You are worried about the physical theft of the computers. Which of the following would be best able to identify theft or attempted theft?

Motion sensor-activated cameras

Elizabeth is responsible for virtualization management in her company. She is worried about VM's escape. What methods would be the most effective in alleviating this risk?

Only share resources between the VM and host if absolutely necessary.

Olivia wants to apply a cloud service for her organization that does not require her to do any coding or system administration, and she wants to do a minimal configuration to perform the tasks that her organization needs to achieve. What type of cloud service is she most likely seeking?

SaaS

Edward knows that TLS sessions start using asymmetric encryption, and then move to use symmetric keys. What limitation of asymmetric cryptography drives this design decision?

Speed and computational overhead

Henry is responsible for physical security in his company. He wants to look for a good way to protect the USB thumb drives that have BitLocker keys stored on them. Which of the following would be the best answer for this situation?.

Store the drives in a secure cabinet or safe.

Bruce needs a cryptographic algorithm that provides low latency. What type of cryptosystem is most likely to meet this performance requirement?

Symmetric encryption

Amanda wants to ensure that IoT devices in her company have a secure configuration when they are deployed and that they are ready for further configuration for their specific purposes. Which of the following terms is used to describe these standard configurations used as part of her configuration management program?

a baseline configuration

Michelle wants to analyze real-world attack patterns against systems similar to what she already has deployed in her company. She would like to see local commands on a compromised system and have access to any tools or other materials the attackers would normally deploy. Which of the following technologies could she apply to do this?

a honeypot

Web developers in your organization currently have direct access to the production server and can deploy code directly to it. This can result in unsecured code, or simply code flaws being deployed to the live system. What would be the best change you could make to alleviate this threat?

implementing a stage server

Trevor is reviewing the logs for his company's web applications. He finds what he thinks is a breach. After further investigation, it appears as if the attacker executed code from one of the libraries the application uses, code that is no longer even used by the application. Which of the following best describes this attack?

code reuse attack

Caroline is worried about security for her server room. She wants the most secure lock she can find for the server room door. Which of the following would be the optimal choice for her?

deadbolt

Nathan wants to prevent systems that are infected with malware from connecting to a botnet controller that he knows the hostnames for. What type of solution can he use to prevent the systems from reaching the controller?

dns sinkhole

Chris wants to implement a biometric system for the entrance of his company. Which of the following systems is likely to be most accepted by members of his organization's staff?

fingerprint

What term describes extending cloud computing to the edge of an enterprise network?

fog computing

Cameron is using infrared cameras to verify that servers in his data center are being properly racked. What datacenter elements is he worried about?

hot and cold aisles

Charles wants to put a fire suppression system in place in an area where highly sensitive electronics are in use. What type of fire suppression system is best suited to this type of environment if Charles is concerned about potential harm to first responders or on-site staff?

inert gas

Which of the following is the most important advantage of implementing SDN?

it provides scalability

Allan has been asked to explain the security implications for an embedded system that his company is considering building and selling. Which of the following answers is not a typical concern for embedded systems?

lack of bulk storage

Juana is responsible for servers in her company. She is finding a fault-tolerant solution that can handle two drives failing. Which of the following should she select?

raid 6

Tony wants to implement off-site cold backups. What backup technology is most popularly used for this type of need?

tape

Gerald is concerned about unauthorized people entering the organization's building. Which of the following would be most effective in preventing this threat?

security guards

What is the primary threat model against static codes used for multi-factor authentication?

theft

What concern causes organizations to choose physical locks over electronic locks?.

they do not require power

Tim is building a Faraday cage around his server room. What is the major purpose of a Faraday cage?

to block EMI

Dennis replaces sensitive data in his database with unique identifiers. The identifiers allow him to continue to take actions on the data without exposing the data itself. What type of solution has he deployed?

tokenization

Emily is worried about securing the computer systems in vehicles. Which of the following vehicle types has significant cybersecurity vulnerabilities?

uav airplanes automobiles

Jim works as an administrator for a healthcare company. He has to support an older, legacy application. He is worried that this legacy application might have vulnerabilities that would affect the rest of the network. What is the most useful method to alleviate this?

use an application container

John wants to make sure that the files he encrypts remain secure for as long as possible. What should John do to maximize the longevity of his encrypted file's security?

use the longest key possible

How does asymmetric encryption support nonrepudiation?

using digital signatures

Gerald is responsible for managing the many virtual machines on his company's networks. Over the past two years, the organization has increased the number of virtual machines significantly. Gerald is no longer able to effectively manage a large number of machines. Which of the following is the term for this situation?

vm sprawl

Adam is designing an embedded system, which needs to provide low-power, peer-to-peer communications. Which of the following technologies is the best answer to this purpose?

zigbee


संबंधित स्टडी सेट्स

6.1 Measuring the Size of the Economy: Gross Domestic Product

View Set

Anatomy and Physiology: Midterm 1

View Set

Chapter 4 Exam - Premiums and Proceeds

View Set

Biology Chapter 5 review questions

View Set

Med Surg - Chapter 31 Patients with Infectious Respiratory Problems (1)

View Set

CHAPTER 7 ANXIETY AND SLEEP DISORDERS

View Set

Ch6 practice test Communications II

View Set

unit 9 test (ecosystem approach)

View Set

AH 2 Ch. 53 Care of Patients with Liver Problems

View Set