Answered step by step
Verified Expert Solution
Question
1 Approved Answer
1 . A security analyst performed a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase
A security analyst performed a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members evaluate and provide critical feedback of other developer's code. Which of the following assessment techniques is BEST described in the analyst's report?
A Peer evaluation
B Baseline reporting
C Software testing
D Peer review
The Account Policies under the Local Group Policy Editor includes all the following except
a password policy
b security options
c account lockout policy
d Kerberos policy
The is a utility for analyzing and comparing sets of Group Policy Objects GPOs
a LGPO tool
b Policy Analyzer
c Security audit tool
d Security compliance toolkit
What type of offsite location allows for a business to be fully up and running after a major disaster? This includes a place for the workers, equipment, and all major portions of the business functions to operate
a Cold
b Hot
c Colo
d branch
A business needs to implement PKI. The network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the engineers recommend is lieu of an OCSP?
a CSR
b CRL
c CA
d OID
You can download the security baselines from the
a NIST
b Microsoft Download Center
c ISACA
d ISO.org
A team of software developer needs to share information between two remote servers, using encryption to protect it One of the team members suggests developing a new encryption protocol, arguing possibly using an unknown protocol with secure existing cryptographic algorithm libraries. This would provide the ability to have strong encryption without being susceptible to attacks on other known protocols. Which of the following summarizes the BEST response to the developer's proposal?
A The obscurity value of unproven protocols against attacks often outweighs the potential for introducing new vulnerabilities.
B New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries.
C The newly developed protocol will only be as secure as the underlying cryptographic algorithms used.
D A programmer should have specialized training in protocol development before attempting to design a new encryption protocol.
To edit a new Group Policy object, you must access
a Active Directory Users and Computers
b Group Policy Objects Links
c Define this policy setting
d Select service startup mode
Which of the following strategies should a systems architect use to minimize availability risks due to insufficient storage capacity?
A High availability
B Scalability
C Distributive allocation
D Server balancing
To grant the appropriate permissions to user accounts and groups under the click the startup mode option you want, then click OK
A Active Directory Users and Computers
B Group Policy Objects Links
C Define this policy setting
D Select service startup mode
An organization is moving its their HR system to a cloud service provider. The company plans to continue using internal usernames and passwords with the service provider, but the security manager doesnt want the service provider to have a company of the passwords. Which of the following options meet all of these requirements?
A Multifactor authentication
B Account and password synchronization
C Smartcards
D Federated authentication
A security manager wants to actively test the security posture of a system. The system is not yet in production and has no uptime requirement or active user base as of yet. Which of the following methods will produce a report showing vulnerabilities that can be exploited?
A Peer review
B Penetration testing
C Component testing
D Vulnerability boxing
Setting up a new secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPAPSK
A DES
B AES
C MD
D WEP
Which of the following is commonly used for federated identity management across multiple organizations?
A SAML
B Active Directory
C Kerberos
D LDAP
In modern organizations, the is constantly evolving, and IT professionals and policymakers must keep up with security threats and make required changes to Windows security settings to help mitigate these threats.
A security infrastructure
B network infrastructure
C security technology
D security landscape
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started