Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 . A security analyst performed a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase

1. A security analyst performed a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members evaluate and provide critical feedback of other developer's code. Which of the following assessment techniques is BEST described in the analyst's report?
A. Peer evaluation
B. Baseline reporting
C. Software testing
D. Peer review
2. The Account Policies under the Local Group Policy Editor includes all the following except ________.
a. password policy
b. security options
c. account lockout policy
d. Kerberos policy
3. The ________ is a utility for analyzing and comparing sets of Group Policy Objects (GPOs).
a. LGPO tool
b. Policy Analyzer
c. Security audit tool
d. Security compliance toolkit
4. What type of off-site location allows for a business to be fully up and running after a major disaster? This includes a place for the workers, equipment, and all major portions of the business functions to operate
a. Cold
b. Hot
c. Colo
d. branch
5. A business needs to implement PKI. The network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the engineers recommend is lieu of an OCSP?
a. CSR
b. CRL
c. CA
d. OID
6. You can download the security baselines from the ________.
a. NIST
b. Microsoft Download Center
c. ISACA
d. ISO.org
7. A team of software developer needs to share information between two remote servers, using encryption to protect it. One of the team members suggests developing a new encryption protocol, arguing possibly using an unknown protocol with secure, existing cryptographic algorithm libraries. This would provide the ability to have strong encryption without being susceptible to attacks on other known protocols. Which of the following summarizes the BEST response to the developer's proposal?
A. The obscurity value of unproven protocols against attacks often outweighs the potential for introducing new vulnerabilities.
B. New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries.
C. The newly developed protocol will only be as secure as the underlying cryptographic algorithms used.
D. A programmer should have specialized training in protocol development before attempting to design a new encryption protocol.
8. To edit a new Group Policy object, you must access ________.
a. Active Directory Users and Computers
b. Group Policy Objects Links
c. Define this policy setting
d. Select service startup mode
9. Which of the following strategies should a systems architect use to minimize availability risks due to insufficient storage capacity?
A. High availability
B. Scalability
C. Distributive allocation
D. Server balancing
10. To grant the appropriate permissions to user accounts and groups under the ________, click the startup mode option you want, then click OK.
A. Active Directory Users and Computers
B. Group Policy Objects Links
C. Define this policy setting
D. Select service startup mode
11. An organization is moving its their HR system to a cloud service provider. The company plans to continue using internal usernames and passwords with the service provider, but the security manager doesnt want the service provider to have a company of the passwords. Which of the following options meet all of these requirements?
A. Multi-factor authentication
B. Account and password synchronization
C. Smartcards
D. Federated authentication
12. A security manager wants to actively test the security posture of a system. The system is not yet in production and has no uptime requirement or active user base as of yet. Which of the following methods will produce a report showing vulnerabilities that can be exploited?
A. Peer review
B. Penetration testing
C. Component testing
D. Vulnerability boxing
13. Setting up a new secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
A. DES
B. AES
C. MD5
D. WEP
14. Which of the following is commonly used for federated identity management across multiple organizations?
A. SAML
B. Active Directory
C. Kerberos
D. LDAP
15. In modern organizations, the ________ is constantly evolving, and IT professionals and policymakers must keep up with security threats and make required changes to Windows security settings to help mitigate these threats.
A. security infrastructure
B. network infrastructure
C. security technology
D. security landscape

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2010 Barcelona Spain September 2010 Proceedings Part 2 Lnai 6322

Authors: Jose L. Balcazar ,Francesco Bonchi ,Aristides Gionis ,Michele Sebag

2010th Edition

364215882X, 978-3642158827

More Books

Students also viewed these Databases questions