Security+ 601 Practice Test 4

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28
At a glance
Powered by AI
The document discusses authentication methods, access controls, and security best practices for protecting systems and data. Biometric identification, strong authentication, and physical security measures are some examples discussed.

Requiring biometric identification for user logins would best prevent unauthorized access to workstations in secured areas without permission.

Cable locks should be installed on laptops placed in an internet cafe to best prevent theft since the building does not have wireless and the laptops could easily be taken otherwise.

Question 1:

Dion Training is concerned with the possibility of employees accessing another user's
workstation in secured areas without their permission. Which of the following would BEST
be able to prevent this from happening?

A. Require biometric identification for user logins


B. Require a username and a password for user logins
C. Enforce a policy that requires passwords to be changed every 30 days
D. Install security cameras in secure areas to monitor logins

During her login session, Sally is asked by the system for a code sent to her via text (SMS)
message. Which of the following concerns should she raise to her organization’s AAA
services manager?

A. SMS should be encrypted to be secure


B. SMS messages may be accessible to attackers via VoIP or other systems
C. SMS should be paired with a third factor
D. SMS is a costly method of providing a second factor of authentication
Question 3:
Larger image

Dion Training has recently opened an Internet café for students to use during their lunch
break. Unfortunately, Dion Training doesn’t have any wireless networks in their building,
so they have placed three laptops in the Internet café. What protection should be installed
to best prevent the laptops from being stolen?

A. Proximity badge
B. Safe
C. Cable locks
D. CCTV

Question 4:

Which of the following cryptographic algorithms is classified as asymmetric?

A. AES
B. RC4
C. RSA
D. DES
Question 5:

Your organization requires the use of TLS or IPSec for all communications with an
organization's network. Which of the following is this an example of?

A. Data at rest
B. Data in transit
C. Data in use
D. DLP

Question 6:

Which protocol is paired with OAuth2 to provide authentication of users in a federated


identity management solution?

A. Kerberos
B. ADFS
C. SAML
D. OpenID Connect

Question 7:

You have just completed identifying, analyzing, and containing an incident. You have
verified that the company uses older unencrypted SSDs as part of their default
configuration, and the manufacturer does not provide a SE utility for the devices. The
storage devices contained top-secret data that would bankrupt the company if it fell into a
competitor’s hands. After safely extracting the device's data and saving it to a new self-
encrypting drive, you have been asked to dispose of the SSDs securely. Which of the
following methods should you use?

A. Physically destroy the storage devices


B. Conduct zero-fill on the storage devices
C. C. Use a secure erase (SE) utility on the storage devices
D. D. Perform a cryptographic erase (CE) on the storage devices
Question 8:

(Sample Simulation – On the real exam for this type of question, you would receive 3-5
pictures and be asked to drag and drop them into place next to the correct term.)
Larger image

How would you appropriately categorize the authentication method being displayed here?

A. Biometric authentication
B. One-time password authentication
C. Multi-factor authentication
D. PAP authentication

Question 9:

Which of the following is NOT a means of improving data validation and trust?

A. Encrypting data in transit


B. Using MD5 checksums for files
C. Decrypting data at rest
D. Implementing Tripwire
Question 10
Which of the following would a virtual private cloud infrastructure be classified as?

A. Infrastructure as a Service
B. Platform as a Service
C. Software as a Service
D. Function as a Service

Question 11:

Which of the following hashing algorithms results in a 256-bit fixed output?

A. MD-5
B. SHA-1
C. NTLM
D. SHA-2

Question 12:

You have been asked to help design a new architecture for Dion Training’s website. The
current architecture involves a single server that hosts the website in its entirety. The
company’s newest course has been creating a lot of interest on social media. The CIO is
concerned that the single server will not be able to handle the increased demand that could
result from this increased publicity. What technology should you implement in the new
architecture to allow multiple web servers to serve up the courses and meet this expected
increase in demand from new students?

A. VPN concentrator
B. DLP
C. RAID
D. Load balancer

Question 13:

You are trying to find a rogue device on your wired network. Which of the following
options would NOT help find the device?

A. MAC validation
B. Port scanning
C. Site surveys
D. War walking
Question 14:

A salesperson's laptop has become unresponsive after attempting to open a PDF in their
email. A cybersecurity analyst reviews the IDS and anti-virus software for any alerts or
unusual behavior but finds nothing suspicious. Which of the following threats would BEST
classify this scenario?

A. Ping of death
B. Zero-day malware
C. PII exfiltration
D. RAT

Question 15:

What type of malware changes its binary pattern in its code on specific dates or times to
avoid detection by antimalware software?

A. Logic bomb
B. Trojan
C. Ransomware
D. Polymorphic virus

Question 16:

A security analyst conducts a nmap scan of a server and found that port 25 is open. What
risk might this server be exposed to?

A. Open file/print sharing


B. Web portal data leak
C. Clear text authentication
D. Open mail relay

Question 17:

A macOS user is browsing the internet in Google Chrome when they see a notification that
says, "Windows Enterprise Defender: Your computer is infected with a virus, please click
here to remove it!" What type of threat is this user experiencing?

A. Phishing
B. Rogue anti-virus
C. Pharming
D. Worm
Question 18:

A cybersecurity analyst from BigCorp contacts your company to notify them that several
of your computers were seen attempting to create a denial of service condition against their
servers. They believe your company has become infected with malware, and those
machines were part of a larger botnet. Which of the following BEST describes your
company's infected computers?

A. Monsters
B. Zero-day
C. Zombie
D. Bugs

Question 19:

During a vulnerability scan of your network, you identified a vulnerability on an appliance


installed by a vendor on your network under an ongoing service contract. You do not have
access to the appliance's operating system as the device was installed under a support
agreement with the vendor. What is your best course of action to remediate or mitigate this
vulnerability?

A. Contact the vendor to provide an update or to remediate the vulnerability


B. Try to gain access to the underlying operating system and install the patch
C. Mark the identified vulnerability as a false positive
D. Wait 30 days, run the scan again, and determine if the vendor corrected the
vulnerability

Question 20:

Richard attempted to visit a website and received a DNS response from the DNS cache
server pointing to the wrong IP address. Which of the following attacks has occurred?

A. DNS brute forcing


B. ARP spoofing
C. DNS poisoning
D. MAC spoofing
Question 21:
A security analyst is conducting a log review of the company's web server and found two
suspicious entries:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

[12Nov2020 10:07:23] “GET /logon.php?user=test’+oR+7>1%20—HTTP/1.1” 200 5825

[12Nov2020 10:10:03] “GET /logon.php?user=admin’;%20—HTT{/1.1” 200 5845

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

The analyst contacts the web developer and asks for a copy of the source code to the
logon.php script. The script is as follows:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

php

include(‘../../config/db_connect.php’);

$user = $_GET[‘user’];

$pass = $_GET[‘pass’];

$sql = “SELECT * FROM USERS WHERE username = ‘$user’ AND password = ‘$pass’”;

$result = MySQL_query($sql) or die (“couldn’t execute query”);

if (MySQL_num_rows($result) !=0 ) echo ‘Authentication granted!’;

else echo ‘Authentication failed!’;

?>

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Based on source code analysis, which type of vulnerability is this web server vulnerable to?

A. Command injection
B. SQL injection
C. Directory traversal
D. LDAP injection
Question 22:

You have just received a phishing email disguised to look like it came from
support@diontraining.com asking you to send your username and password because your
account has been locked out due to inactivity. Which of the following social engineering
principles is being used in this email?

A. Intimidation
B. Urgency
C. Consensus
D. Trust

Question 23:

Which of the following is a best practice that should be followed when scheduling
vulnerability scans of an organization's data center?

A. Schedule scans to be conducted evenly throughout the day


B. Schedule scans to run during periods of low activity
C. Schedule scans to begin at the same time every day
D. Schedule scans to run during peak times to simulate performance under load

Question 24:

Your company is making a significant investment in infrastructure-as-a-service (IaaS)


hosting to replace its data centers. Which of the following techniques should be used to
mitigate the risk of data remanence when moving virtual hosts from one server to another
in the cloud?

A. Zero-wipe drives before moving systems


B. Use full-disk encryption
C. Use data masking
D. Span multiple virtual disks to fragment data

Question 25:

Which of the following is a common attack model of an APT attack?

A. Involves sophisticated DDoS attacks


B. Quietly gathers information from compromised systems
C. Relies on worms to spread laterally
D. Holds an organization's data hostage using encryption
Question 26:

Which of the following types of attacks are usually used as part of a man-in-the-middle
attack?

A. Brute force
B. Spoofing
C. DDOS
D. Tailgating

Question 27:

What technique is an attacker using if they review data and publicly available information
to gather intelligence about the target organization without scanning or other technical
information-gathering activities?

A. Passive reconnaissance
B. Active scanning
C. Vulnerability scanning
D. Patch management

Question 28:

You just received a notification that your company's email servers have been blacklisted
due to reports of spam originating from your domain. What information do you need to
start investigating the source of the spam emails?

A. Firewall logs showing the SMTP connections


B. The SMTP audit log from his company's email server
C. The full email header from one of the spam messages
D. Network flows for the DMZ containing the email servers
Question 29:
While conducting a penetration test of an organization's web applications, you attempt to
insert the following script into the search form on the company's web site:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

<script>alert("This site is vulnerable to an attack!")</script>

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Then, you clicked the search button, and a pop-up box appears on your screen showing the
following text, "This site is vulnerable to an attack!" Based on this response, what
vulnerability have you uncovered in the web application?

A. Buffer overflow
B. Cross-site request forgery
C. Distributed denial of service
D. Cross-site scripting

Question 30:

While investigating a data breach, you discover that the account credentials used belonged
to an employee who was fired several months ago for misusing company IT systems.
Apparently, the IT department never deactivated the employee's account upon their
termination. Which of the following categories would this breach be classified as?

A. Insider Threat
B. Zero-day
C. Known threat
D. Advanced persistent threat
Question 31:

You are conducting threat hunting for an online retailer. Upon analyzing their web server,
you identified that a single HTML response returned as 45 MB in size, but an average
response is normally only 275 KB. Which of the following categories of potential indicators
of compromise would you classify this as?

A. Beaconing
B. Data exfiltration
C. Introduction of new accounts
D. Unauthorized privilege

Question 32:

Which of the following is NOT considered part of the Internet of Things?

A. SCADA
B. ICS
C. Smart television
D. Laptop

Question 33:

You have been asked to develop a solution for one of your customers. The customer is a
software development company, and they need to be able to test a wide variety of operating
systems to test the software applications their company is developing internally. The
company doesn't want to buy a bunch of computers to install all of these operating systems
for testing. Which of the following solutions would BEST meet the company's Start
requirements?

A. Purchase a high-end computer that has a lot of CPU cores and RAM, install a
hypervisor, and configure a virtual machine for each operating system that will be
used to test the applications being developed
B. Purchase multiple inexpensive workstations and install one operating system that
will be used to test the applications being developed on each workstation
C. Purchase multiple workstations, install a VM on each one, then install one
operating system that will be used to test the applications being developed in each
VM
D. Purchase one computer, install an operating system on it, create an image of the
system, then reformat it, install the next operating system, create another image,
and reimage the machine each time you need to test a different application
Question 34:

Dion Training has set up a lab consisting of 12 laptops for students to use outside of normal
classroom hours. The instructor is worried that a student may try to steal one of the
laptops. Which of the following physical security measures should be used to ensure the
laptop is not stolen or moved out of the lab environment?

a. USB locks
b. Entry control roster
c. Cable locks
d. Biometric locks

Question 35:
(Sample Simulation – On the real exam for this type of question, you would receive 3-5
pictures and be asked to drag and drop them into place next to the correct term.)
Larger image

How would you appropriately categorize the authentication method being displayed here?

A. Biometric authentication
B. One-time password authentication
C. Multifactor authentication
D. PAP authentication
Question 36:

Which of the following protocols could be used inside a virtual system to manage and
monitor the network?

A. SNMP
B. SMTP
C. BGP
D. EIGRP

Question 37:

Dion Training uses an authentication protocol to connect a network client to a networked


file server by providing its authentication credentials. The file server then uses the
authentication credentials to issue an authentication request to the server running this
protocol. The server can then exchange authentication messages with the file server on
behalf of the client. Throughout this process, a shared secret is used to protect the
communication. Which of the following technologies relies upon the shared secret?

A. RADIUS
B. Kerberos
C. PKI
D. LDAP

Question 38:

Which of the following tools could be used to detect unexpected output from an application
being managed or monitored?

A. A log analysis tool


B. A behavior-based analysis tool
C. A signature-based detection tool
D. Manual analysis

Question 39:
Which of the following types of access control provides the strongest level of protection?

A. RBAC
B. MAC
C. DAC
D. ABAC
Question 40:

What type of wireless security measure can easily be defeated by a hacker by spoofing the
hardware address of their network interface card?

A. MAC filtering
B. WEP
C. Disable SSID broadcast
D. WPS

Question 41:

Your firewall is blocking outbound email traffic that is attempting to be sent. Which port
should you verify is set to ALLOW in the firewall to ensure your emails are being sent?

A. 22
B. 25
C. 80
D. 143
Question 42:
(Sample Simulation – On the real exam for this type of question, you would have to fill in
the blanks by dragging and dropping them into place.)
Larger image

Using the image provided, select four security features that you should use with a
smartphone provided through a COPE policy in your organization?

A. Remote wipe, Location tracking, Host-based firewall, Cable lock


B. Cellular data, Remote wipe, Location tracking, MDM
C. Cable lock, Network sniffer, Cellular data, Remote wipe
D. MDM, Location tracking, Host-based firewall, Remote wipe

Question 43:

Which of the following functions is not provided by a TPM?

A. Random number generation


B. Secure generation of cryptographic keys
C. Remote attestation
D. Binding
E. Sealing
F. User authentication
Question 44:

Your company is adopting a new BYOD policy for tablets and smartphones. Which of the
following would allow the company to secure the sensitive information on personally owned
devices and the ability to remote wipe corporate information without the user's affecting
personal data?

A. Face ID
B. Long and complex passwords
C. Touch ID
D. Containerization

Question 45:

A user reports that every time they try to access https://www.diontraining.com, they
receive an error stating "Invalid or Expired Security Certificate." The technician attempts
to connect to the same site from other computers on the network, and no errors or issues
are observed. Which of the following settings needs to be changed on the user's workstation
to fix the "Invalid or Expired Security Certificate" error?

A. Logon times
B. Date and time
C. User access control
D. UEFI boot mode

Question 46:

A company needs to implement stronger authentication by adding an authentication factor


to its wireless system. The wireless system only supports WPA with pre-shared keys, but
the backend authentication system supports EAP and TTLS. What should the network
administrator implement?

A. PKI with user authentication


B. 802.1x using EAP with MSCHAPv2
C. WPA2 with a complex shared key
D. MAC address filtering with IP filtering
Question 47:

A software assurance test analyst performs a dynamic assessment on an application by


automatically generating random data sets and inputting them in an attempt to cause an
error or failure condition. Which technique is the analyst utilizing?

A. Fuzzing
B. Sequential data sets
C. Static code analysis
D. Known bad data injection

Question 48:

Your organization has recently suffered a data breach due to a server being exploited. As a
part of the remediation efforts, the company wants to ensure that the default administrator
password on each of the 1250 workstations on the network is changed. What is the easiest
way to perform this password change requirement?

A. Deploy a new group policy


B. Create a new security group
C. Utilize the key escrow process
D. Revoke the digital certificate

Question 49:

Which of the following protocols is considered insecure and should never be used in your
networks?

A. Telnet
B. SSH
C. SFTP
D. HTTPS
Question 50:

Which of the following access control methods provides the most detailed and explicit type
of access control over a resource?

A. MAC
B. RBAC
C. DAC
D. ABAC

Question 51:

During a penetration test of your company’s network, the assessor came across a
spreadsheet with the passwords being used for several of the servers. Four of the passwords
recovered are listed below. Which one is the weakest password and should be changed
FIRST to increase the password’s complexity?

A. P@$$w0rd
B. Pa55w0rd
C. P@$$W0RD
D. pa55word

Question 52:

You are installing a new wireless network in your office building and want to ensure it is
secure. Which of the following configurations would create the MOST secure wireless
network?

A. WPA2 and AES


B. WPA and MAC filtering
C. WEP and TKIP
D. WPA2 and RC4
Question 53:

Why would a company want to utilize a wildcard certificate for their servers?

a. To secure the certificate's private key


b. To increase the certificate's encryption key length
c. To reduce the certificate management burden
d. To extend the renewal date of the certificate

Question 54:

You are trying to select the best device to install to detect an outside attacker trying to
reach into your internal network. The device should log the event, but it should not take
any action to stop it. Which of the following devices would be the BEST for you to select?

A. Proxy server
B. Authentication server
C. IPS
D. IDS

Question 55:

William would like to use full-disk encryption on his laptop. He is worried about slow
performance, though, so he has requested that the laptop have an onboard hardware-based
cryptographic processor. Based on this requirement, what should William ensure the
laptop contains?

A. AES
B. FDE
C. PAM
D. TPM
Question 56:

You have discovered that an employee has been conducting illegal activities using his
workplace computer. You have taken possession of the employee's laptop according to your
company's procedures and are waiting to give it to law enforcement authorities. What
should you do when turning over the laptop to the police?

A. Preserve the evidence


B. Maintain the chain of custody
C. Document the changes
D. Quarantine the system

Question 57:

Your coworker is creating a script to run on a Windows server using PowerShell. Which of
the following file formats should the file be in?

A. .bat
B. .sh
C. .py
D. .ps1

Question 58:

Which of the following is required for evidence to be admissible in a court of law?

A. Order of volatility
B. Legal hold
C. Chain of custody
D. Right to audit
Question 59:

You are the first forensic analyst to arrive on the scene of a data breach. You have been
asked to begin evidence collection on the server while waiting for the rest of your team to
arrive. Which of the following evidence should you capture first?

A. Image of the server's SSD


B. L3 cache
C. Backup tapes
D. ARP cache

Question 60:

You are conducting an incident response and want to determine if any account-based
indicators of compromise (IoC) exist on a compromised server. Which of the following
would you NOT search for on the server?

A. Off-hours usage
B. Malicious processes
C. Unauthorized sessions
D. Failed logins

Question 61:

What popular open-source port scanning tool is commonly used for host discovery and
service identification?

A. nmap
B. dd
C. services.msc
D. Nessus
Question 62:

Dion Consulting Group has recently been awarded a contract to provide cybersecurity
services for a major hospital chain in 48 cities across the United States. You are conducting
a vulnerability scan of the hospital's enterprise network when you detect several devices
that could be vulnerable to a buffer overflow attack. Upon further investigation, you
determine that these devices are PLCs used to control the hospital's elevators.
Unfortunately, there is not an update available from the elevator manufacturer for these
devices. Which of the following mitigations do you recommend?

A. Recommend immediate replacement of the PLCs with ones that are not
vulnerable to this type of attack
B. Recommend isolation of the elevator control system from the rest of the
production network through the change control process
C. Conduct a penetration test of the elevator control system to prove that the
possibility of this kind of attack exists
D. Recommend immediate disconnection of the elevator's control system from the
enterprise network

Question 63:

Due to a worldwide pandemic in 2020 caused by the COVID-19 virus, Dion Training
Solutions instituted teleworking for all of its employees. This was part of a preplanned
response so that the company's students could continue to learn and receive support
throughout the pandemic. Which of the following plans should contain the company's
pandemic response plan?

A. Incident response plan


B. Disaster recovery plan
C. Business continuity plan
D. Rollback plan

Question 64:

Which security tool is used to facilitate incident response, threat hunting, and security
configuration by orchestrating automated runbooks and delivering data enrichment?

A. SIEM
B. SOAR
C. MDM
D. DLP
Question 65:

Your company is required to remain compliant with PCI-DSS due to the type of
information processed by your systems. If there was a breach of this data, which type of
disclosure would you be required to provide during your incident response efforts?

a. Notification to local law enforcement


b. Notification to your credit card processor
c. Notification to federal law enforcement
d. Notification to Visa and Mastercard

Question 66:

You have been hired to investigate a possible insider threat from a user named Terri.
Which command would you use to review all sudo commands ever issued by Terri (whose
login account is terri and UID=1003) on a Linux system? (Select the MOST efficient
command)

a. journalctl _UID=1003 | grep sudo


b. journalctl _UID=1003 | grep -e 1003 | grep sudo
c. journalctl _UID=1003 | grep -e [Tt]erri | grep sudo
d. journalctl _UID=1003 | grep -e [Tt]erri | grep -e 1003 | grep sudo

Question 67:

Which of the following tools is useful for capturing Windows memory data for forensic
analysis?

a. dd
b. Memdump
c. Wireshark
d. Nessus
Question 68:

Vulnerability scans must be conducted continuously to meet regulatory compliance


requirements for the storage of PHI. During the last vulnerability scan, a cybersecurity
analyst received a report of 2,592 possible vulnerabilities and was asked by the Chief
Information Security Officer (CISO) for a plan to remediate all the known issues. Which of
the following should the analyst do next?

A. Attempt to identify all the false positives and exceptions, then resolve any
remaining items
B. Wait to perform any additional scanning until the current list of vulnerabilities
have been remediated fully
C. Place any assets that contain PHI in a sandbox environment and then remediate all
the vulnerabilities
D. Filter the scan results to include only those items listed as critical in the asset
inventory and remediate those vulnerabilities first

Question 69:

During an assessment of the POS terminals that accept credit cards, a cybersecurity
analyst notices a recent Windows operating system vulnerability exists on every terminal.
Since these systems are all embedded and require a manufacturer update, the analyst
cannot install Microsoft's regular patch. Which of the following options would be best to
ensure the system remains protected and are compliant with the rules outlined by the PCI
DSS?

A. Replace the Windows POS terminals with standard Windows systems


B. Build a custom OS image that includes the patch
C. Identify, implement, and document compensating controls
D. Remove the POS terminals from the network until the vendor releases a patch

Question 70:

Dion Training has performed an assessment as part of their disaster recovery planning.
The assessment found that their file server has crashed twice in the last two years. The
most recent time was in August, and the time before that was 15 months before. Which of
the following metrics would best represent this 15 month time period?

A. RTO
B. RPO
C. MTTR
D. MTBF
Question 71:

What is the biggest disadvantage of using single sign-on (SSO) for authentication?

A. It introduces a single point of failure


B. Users need to authenticate with each server as they log on
C. Systems must be configured to utilize the federation
D. The identity provider issues the authorization

Question 72:

Dion Training has performed an assessment as part of their disaster recovery planning.
The assessment found that the organization can only tolerate a maximum of 30 minutes of
downtime for their public-facing webserver. Which of the following metrics would best
represent this time period?

A. RTO
B. RPO
C. MTBF
D. MTTR

Question 73:

Which of the following agreements is used between companies and employees, between
companies and contractors, and between two companies to protect information assets?

A. ISA
B. NDA
C. SLA
D. DSUA

Question 74:

Your company is expanding its operations in the European Union and is concerned about
additional governmental regulations that may apply. Which of the following regulations
applies when processing personal data within the European Union?

A. PHI
B. PCI
C. GDPR
D. PII
Question 75:

Janet, a defense contractor for the military, performs an analysis of their enterprise
network to identify what type of work the Army would be unable to perform if the network
were down for more than a few days. Which of the following was Janet trying to identify?

A. Single point of failure


B. Mission essential function
C. Backup and restoration plan
D. Critical systems

Question 76:

Which of the following methods is used to replace all or part of a data field with a
randomly generated number used to reference the original value stored in another vault or
database?

A. Data masking
B. Anonymization
C. Tokenization
D. Data minimization

Question 77:

A cybersecurity analyst is analyzing what they believe to be an active intrusion into their
network. The indicator of compromise maps to suspected nation-state group that has
strong financial motives, APT 38. Unfortunately, the analyst finds their data correlation
lacking and cannot determine which assets have been affected, so they begin to review the
list of network assets online. The following servers are currently online: PAYROLL_DB,
DEV_SERVER7, FIREFLY, DEATHSTAR, THOR, and DION. Which of the following
actions should the analyst conduct first?

A. Hardening the DEV_SERVER7 server


B. Conduct a Nessus scan of the FIREFLY server
C. Conduct a data criticality and prioritization analysis
D. Logically isolate the PAYROLL_DB server from the production networ
Question 78:

Dion Training is currently undergoing an audit of its information systems. The auditor
wants to understand better how the PII data from a particular database is used within
business operations. Which of the following employees should the auditor interview?

A. Data owner
B. Data steward
C. Data controller
D. Data privacy officer

Question 79:

A recent vulnerability scan found several vulnerabilities on an organization’s public-facing


IP addresses. To reduce the risk of a breach, which of the following vulnerabilities should
be prioritized for remediation?

A. A cryptographically weak encryption cipher


B. A website utilizing a self-signed SSL certificate
C. A buffer overflow that is known to allow remote code execution
D. An HTTP response that reveals an internal IP address

Question 80:

Which of the following authentication mechanisms involves receiving a one-time use shared
secret password, usually through a token-based key fob or smartphone app, that does not
expire?

A. HOTP
B. Smart card
C. TOTP
D. EAP

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy