ISM 324!!!!**

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Some encryption algorithms use stream ciphers and some use block ciphers. What are examples of block ciphers?

AES DES Blowfish

(7) You need to implement a backup strategy that allows the fastest recovery of data. What provides the best solution? A full backup daily A full/differential strategy A full/incremental strategy A differential/incremental strategy

A full backup daily

Your organization hosts a web-based server that remote administrators access via Telnet. Management wants to increase their rights to prosecute unauthorized personnel who access this server. What is the BEST choice?

Add a warning banner

Two companies have decided to work together on a project and implemented an MOU. What represents the GREATEST security risk in this situation?

An MOU doesn't have strict guidelines to protect sensitive data

Administrators ensure server operating systems are updated at least once a month with relevant patches, but they do not track other software updates. What BEST choice to mitigate risks on these servers?

Application patch management

Your organization wants to ensure that employees do not install or play operating system games such as solitaire and FreeCell, on their computers. What is the BEST choice to prevent this?

Application whitelisting

(24) An organization hosts several bays of servers used to support a large online ecommerce business. It wants to ensure that customer data hosted within the datacenter is protected, and it implements several access controls, including an HVAC system. What does the HVAC system help protect? Access Availability Confidentiality Integrity

Availability

(10) Of the following choices, what identifies RPOs and RTOs? Failover clusters BIA RAID DRP

BIA

(11) An organization is creating a business continuity plan (BCP). What will identify business requirements used in the development of the plan? BIA RPO RTO HSM

BIA

After a recent attack causing a data breach, an executive is analyzing the financial losses. She determined that the attack is likely to cast at least $1 million. She wants to ensurer that his information is documented for future planning purposes. Where is she MOST likely to document it?

BIA

Bart wants to send a secure email to Lisa so he decides to encrypt it. Bart wants to ensure that Lisa can verify that he sent it. What does Lisa need to meet this requirement?

Bart's public key

An application requires users to log on with passwords. The application developers want to store the passwords in such a way that it will thwart rainbow table attacks. What is the BEST solution?

Bcrypt

An application developer needs to use an encryption protocol to encrypt credit card within a database used by the application. What would be the FASTEST, while also providing strong confidentiality?

Blowfish

A user's laptop developed a problem and can no longer boot. Help-desk personnel tried to recover the data on the disk, but the disk is encrypted. What can be used to retrieve data from the hard drive?

Recovery agent

An administrator recently learned of an attack on a Virginia-based web Server form IP address 72.52.206.134 at 11:35:33 GMT. However, after investigating the logs, he is unable to see any traffic form that IP address at that time. What is the MOST likely reason why the administrator was unable to identify the attack?

He did not account for time offsets

Homer wants to use digital signatures for his emails and realizes he needs a certificate. What will issue Homer a certificate?

CA

Personnel within your organization turned off the HR data server for over six hours to perform a test. What is the MOST likely purpose of this?

COOP

Your organization is planning to implement an internal PKI. What is required to ensure users can validate certificates?

CRL

A forensic expert is preparing to analyze a hard drive. What should the expert do FIRST?

Capture an image

A security manager is reviewing security policies related to data loss. What is the security administrator MOST likely to be reviewing?

Clean desk policy

(4) What can remove a server as a single point of failure? RAID-1 Mirroring Clustering UPS

Clustering

Security personnel recently released on online training module advising employees not to share personal information on any social media web sites that they visit. What is the advice MOST likely trying to prevent?

Cognitive password attacks

(18) An administrator used a disaster recovery plan to rebuild a critical server after an attack. Of the following choices, how can the administrator verify the system's functionality? Perform a review of the recovery process Install approved changes Compare the system's performance against a performance baseline Removed antivirus software

Compare the system's performance against a performance baseline

Homer noticed that several generators within the nuclear power plant have been turning on without user interaction. Security investigators discovered that an unauthorized file was installed and causing these generators to start at timed intervals. Further, they determined this file was installed during a visit by external engineers. What should Homer recommend to mitigate this threat in the future?

Configure the SCADA within a VLAN

A business continuity expert is creating a BIA. What elements is MOST likely to be omitted from the BIA?

Recommended solutions

(22) An organization designed its datacenter with hot and cold aisles. Of the following choices, what is not a valid purpose of hot and cold aisles? Regulate cooling Increase availability Reduce cooling costs Fire suppression

Fire supression

Your backup policy for a database server dictates that the amount of time needed to perform backups should be minimized. What backup plans would BEST meet his need?

Full backups on Sunday and incremental backups every other day of the week

You need to submit a CSR to a CA. What would you do FIRST?

Generate a new RSA-Based private key

(6) What helps ensure availability in the event of an extended power outage? UPS Failover clusters RAID Generators

Generators

(3) An administrator is improving the availability of a server and needs to ensure that a hard drive failure does not result in the failure of the server. What will support this goal? (Choose all that apply) Hardware RAID-0 Hardware RAID-1 Software RAID-1 Software RAID-5

Hardware RAID-1 Software RAID-1 Software RAID-5

Users in your organization sign their emails with digital signatures. What provides integrity for these certificates?

Hashing

Which of the following algorithms encrypts data in 64-bit blocks?

DES

(19) A critical system failed. Of the following choices, what would an organization implement to restore it? BIA DRP COOP RAID

DRP

Your organization is working on its business continuity plan. Management wants to ensure that document s provide detailed information on what technicians should do after an outage. Specifically, they want to list the systems to restore and the order in which to restore them. What document includes this information?

DRP

What represents a primary security concern when authorizing mobile devices on a network?

Data security

Your network requires a secure method of sharing encryption keys over a public network. What is the BEST choice?

Diffie-Hellman

Your company has recently provided mobile devices to several employees. A security manager has expressed concerns related to data saved on these devices. What would BEST address these concerns?

Disabling the use of removable media

Your organization wants to improve the security posture of internal database servers. What provides the BEST solution?

Disabling unnecessary services

Your organization plans to issue some employees mobile devices such as smartphones and tablets. These devices don't have a lot of processing power. What cryptographic methods has the LEAST overhead and will work with these mobile devices?

ECC

A security technician runs an automated script every night designed to detect changes in files. What are the most likely protocols used in this script?

ECC and HMAC

Which of the following is an environmental control?

EMI

(26) Of the following choices, what is the best choice to help prevent someone from capturing network traffic? EMI shielding Use hubs instead of switches Ensure that SNMP traps are set Hot and cold aisles

EMI shielding

You are helping implement your company's business continuity plan. For one system, the plan requires an RTO of five hours and an RPO of one day. What would meet this requirement?

Ensure the system can be restored within five hours and ensure it does not lose more than one day of data

With out adequate physical security controls, attackers can cause significant damage to systems within a data center. What could an attacker manipulate to cause extensive physical damage?

Environmental controls

You need to monitor the security posture of several servers in your organization and keep a security administrator aware of their status. What will BEST help you meet this goal?

Establishing baseline reporting

Humidity controls in your data center are failing. You need to convince management of the importance of these. What would you tell them?

Failing humidity controls can cause damage from ESD and condensation

(5) Several servers in your server room are connected to an UPS. What does this provide? Continuity of operations Disaster recovery Fault tolerance Long term power if commercial power fails

Fault tolerance

Your organization is evaluating replacement HVAC systems and is considering increasing current capacities. What is potential security benefit of increasing the HVAC capabilities?

Higher MTBF times of hardware components due to lower temperatures

Maggie is compiling a list of approved software for desktop operating systems within a company. What is the MOST likely purpose of this list?

Host software baseline

(12) A business impact analysis (BIA) determined that a critical business function has a Recovery Time Objective (RTO) of an hour. What site will meet this objective? Hot site Cold Site Warm site RTO site

Hot site

(13) Which of the following continuity-of-operations solutions is the most expensive? Hot site Cold site Warm site Clustered site

Hot site

An organization is considering an alternate location as part of its business continuity plan. It wants to identify a solution that provides the shortest recovery time. What will it choose?

Hot site

You are planning to encrypt data in transit. Which of the following protocols meets this need and encapsulates IP packets within an additional IP header?

IPsec

Your organization is considering storage of sensitive data in a cloud provider. Your organization wants to ensure the data is encrypted wile at rest and while in transit. What type of interoperability agreement can your organization use to ensure the data is encrypted wile in transit?

ISA

(21) Your building is researching the costs and functionality of fire alarm systems for a new building. What capability should the system include to prevent a fire from spreading? Integration with a temperature control system Integration with a CCTV Integration with an HVAC System Integration with proximity card readers

Integration with an HVAC System

(25) You are evaluating the security and availability of a system. Security is more important than availability in the system. If it fails, what state should it fail in? It should fail open It should fail closed It should shut down It should be rebooted

It should fail closed

You are helping your organization create a security policy for incident response. What is the BEST choice to include when an incident requires confiscation of a physical asset?

Keep a record of everyone who took possession of the physical asset

An incident response team is following typical incident response procedures. What phase is the BEST choice for analyzing an incident with a goal of identifying steps to prevent a reoccurrence of the incident?

Lessons learned

A network administrator configured several servers to work together to increase the processing capabilities for a web application. What does the administrator MOST likely implement?

Load balancing

Your company's web site experiences a large number of client requests during certain times of the year. What could your company add to ensure the web site's availability during these times?

Load balancing

Your organization hosts a high-volume web site, which generates a significant amount of revenue. You are asked to recommend a method to increase the availability of this web site. What is the BEST choice?

Load balancing

A security manager needs to identify a policy that will reduce the risk of personnel within an organization colluding to embezzle company funds. What is the BEST choice?

Mandatory vacations

Your organization is updating its disaster recovery documents. You're asked to review the communication plan for possible updates. What should you ensure is included in the communication plan?

Methods used to communicate with response team members, employees, suppliers, and customers

Your organization requires the use of a PKI and it wants to implement a protocol to validate trust with minimal traffic. What protocol validates trust by returning short responses, such as "good" or "revoked"?

OCSP

(8) An organization regularly performs backups of critical systems. Where should it keep a copy of the backups for retention? Off-site With the backed up systems On a mirrored drive of the backed up system On a cluster

Off-site

A recent risk assessment identified several problems with servers in your organization. They occasionally reboot on their own and the operating systems do not have current security fixes. Administrators have had to rebuild some servers from scratch due to mysterious problems. What will mitigate these problems?

Patch management

(9) An organization wants to verify that a tape backup can be restored in its entirety. What should it do? Perform test restores of random files on the backup Perform test restores of the full backup Copy the backup to the hot site Copy the backup to the cold site

Perform test restores of the full backup

(15) Of the following choices, what is needed in a cold site used for continuity of operations? Power and connectivity All required equipment All required equipment with up-to-date patches All required equipment with up-to-date patches and data

Power and connectivity

Your organization blocks access to social media web sites. The primary purpose is to prevent data leakage, such as the accidental disclosure of proprietary information. What is an additional security benefit of this policy?

Protects against banner ad malware

Personnel in an organization are sharing their access codes to cipher locks with unauthorized personnel. As a result, unauthorized personnel are accessing restricted areas of the building. What is the BEST response to reduce this risk?

Provide security training to personnel

An organization needs to improve fault tolerance to increase data availability. However, the organization has a limited budget. What is the BEST choice to meet the organization's needs?

RAID

(2) Which of the following provides fault tolerance through disk mirroring? RAID-0 RAID-1 RAID-2 Clustering

RAID-1

Your organization uses several different types of cryptographic techniques. What techniques uses a private key and a public key?

RSA

Your organization hosts a web site with a back-end database server. During a recent power outage, the server crashed, resulting in a significant amount of lost data. What can your organization implement to prevent this loss from occurring again?

Redundancy

Your company provides electrical and plumbing services to homeowners. Employees use tablets during service calls to record activity, create invoices, and accept credit card payments. What would BEST prevent disclosure of customer data if any of these devices are lost or stolen?

Remote wiping

(17) An organization implemented a disaster recovery plan in response to a hurricane. What is the last step in the disaster recovery process? Activation Recover systems Test systems Review

Review

Get certified Get Ahead (GCGA) has outsourced some application development to your organization. Unfortunately, developers at your organization are having problems getting an application module to work and they want to send the module with accompanying data to a third-party vendor for help in resolving the problem. What should developers consider before doing so?

Review NDAs

What can you use to verify data integrity?

SHA

Key personnel in your organization have mobile devices, which store sensitive information. What can you implement to prevent data loss from these devices if a thief steals one?

Screen lock

What is the MOST likely negative result if administrators do not implement access controls correctly on an encrypted USB hard drive?

Security controls can be bypassed

A security auditor discovered that several employees in the Accounting department can print and sign checks. In her final report, she recommended restricting the number of people who can print checks and the number of people who can sign them. She also recommended that no one should be authorized to print and sign checks. What policy is she recommending?

Separation of duties

(1) An organization is not actively involved in business continuity planning. What is likely to overlook until a disaster results in a major outage? Data encryption Single points of failure Vulnerability scans Penetration tests

Single points of failure

A network administrator needs to update the operating system on switches used within the network. Assuming the organization is following standard best practices, What should the administrator do first?

Submit a request using the change management process

A BCP includes a char listing roles within the organization along with their matching responsibilities during a disaster. It also includes a chain of command. What is the purpose of this chart?

Succession planning

A heavily used application accesses a financial database on a server within your network. Due to recent data breaches, management wants to ensure transport encryption protects this data. What algorithms is the BEST choice to meet this goal?

TLS

The BCP coordinator at your organization is leading a meeting on-site with key disaster recovery personnel. The purpose of the meeting is to perform a test. What type of test is this?

Tabletop exercise

You are preparing to deploy a new application on a virtual server. The virtual server hosts another server application that employees routinely access. What is the BEST method to use when deploying the new application?

Take a snapshot of the VM before deploying the new application

After a recent incident, a forensic analyst was given several hard drives to analyze. What should the analyst do first?

Take hashes and capture system images

(23) Your organization hosts several bays of servers within a server room. What environmental control within the datacenter requires a thermostat? Temperature control Hot and cold aisles Humidity control Generators

Temperature control

(16) An organization is performing a disaster recovery exercise. Of the following choices, what is likely to be included? Test server restoration Picking a hot, warm, or cold site Creation of BIA Determination of the failsafe state

Test server restoration

Homer wants to send a secure email to Marge so he decides to encrypt it. Homer wants to ensure that Marge can verify that he sent it. What does Marge need to verify the certificate that Homer used in this process is valid?

The CA's public key

An attacker was able to sneak into your building but was unable to open the server room door. He bashed the proximity badge reader with a portable fire extinguisher and the door opened. What is the MOST likely reason that the door opened?

The access system was designed to fail-open

A manager is suspected of leaking trade secrets to a competitor. A security investigator is examining his laptop and notices a large volume of vacation pictures on the hard drive. Data on this laptop automatically uploads to a private cloud owned by the company once a week. The investigator noticed that the hashes of most of the pictures on the hard drive are different from the hashes of the pictures in the cloud location. What is the MOST likely explanation for this scenario?

The manager is leaking data using steganography methods

A security analyst tagged a computer stating when he took possession of it. What is the BEST explanation for this?

To begin a chain of custody

Your organization includes a software development division within the IT department. One developer writes and maintains applications for the Sales and Marketing departments. A second develops writes and maintains applications for the payroll department. Once a year, they have to switch roles for at least a month. What is the purpose of this practice?

To enforce a job rotation policy

A user recently worked with classified data on an unclassified system. You need to sanitize all the reclaimed space on this system's hard drives while keeping the system operational. What methods will BEST meet this goal>

Use a cluster tip wiping tool

Your organization has spent a significant amount of money on training employees on security awareness. Your organization wants to validate the success of this training. What is the BEST choice?

Use metrics

An IT department recently had its hardware budget reduced, but the organization still expects them to maintain availability of services. What would BEST help them maintain availability with a reduced budget?

Virtualization

(14) An organization is considering an alternative location as part of its business continuity plan. It wants to identify a solution that provides a balance between cost and recovery time. What will it choose? Hot site Cold site Warm site Mirrored site

Warm site

(20) How can an organization validate a BCP? With a BIA With a hot site With testing With a hierarchical list of critical systems

With testing


Set pelajaran terkait

DONE Global Business Chapter 1 Study Guide

View Set

TOM 301 Chapter 8 Assignment Questions

View Set

Cessation, commence, deter, hamper, obstruction, preclude, procrastinate, scuttle, subside, thwart

View Set

medical terminology- chapter 1 (medical records)

View Set

Chapter 21: Access Control and Authentication

View Set

BIOS 311, Origins & Insertions of the Upper Extremity

View Set