Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

** Please with an explanation if possible ** *Please answers all or leave it to another expert* Question #:1 A systems administrator just issued the

** Please with an explanation if possible **

*Please answers all or leave it to another expert*

Question #:1

A systems administrator just issued the ssh-keygen -t rsa command on a Linux terminal Which of the following BEST describes what the rsa portion of the command represents?

A key generation algorithm

A hashing algorithm

A public key infrastructure type

A certificate authority type

-------------------------------------------------------------------------------------------------------------

Question #:2

A company is deploying MFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?

Sensitive scanned materials being saved on the local hard drive

Faulty printer drivers causing PC performance degradation

Improperly configured NIC settings interfering with network security

Excessive disk space consumption due to storing large documents

-------------------------------------------------------------------------------------------------------------

Question #:3

A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation?

Network tap

Honeypot

Aggregation

Port mirror

------------------------------------------------------------------------------------------------------------- Question #:4 A Chief Executive Officer (CEO) is staying at a hotel during a business trip. The hotel's wireless network does not show a lock symbol. Which of the following precautions should the CEO take? (Select TWO).

Change the connection type to WPA2.

Change TKIP to CCMR

Use a VPN. Tether to a mobile phone.

Create a tunnel connection with EAP-TTLS.

-------------------------------------------------------------------------------------------------------------

Question #:5

A security analyst is performing a BIA. The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use backup data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?

A maximum MTTR of 30 minutes

A maximum MTBF of 30 minutes

A maximum RTO of 60 minutes

A maximum RPO of 60 minutes

An SLA guarantee of 60 minutes

------------------------------------------------------------------------------------------------------------- Question #:6

A company has migrated to two-factor authentication for accessing the corporate network, VPN, and SSO. Several legacy applications cannot support multifactor authentication and must continue to use usernames and passwords. Which of the following should be implemented to ensure the legacy applications are as secure as possible while ensuring functionality? (Select TWO).

Privileged accounts

Password reuse restrictions

Password complexity requirements

Password recovery

Account disablement

-------------------------------------------------------------------------------------------------------------

Question #:7

A government organization recently contacted three different vendors to obtain cost quotes for a desktop PC refresh. The quote from one of the vendors was significantly lower than the other two and was selected for the purchase. When the PCs arrived, a technician determined some NICs had been tampered with. Which of the following MOST accurately describes the security risk presented in this situation?

Hardware root of trust

UEFI

Supply chain

TPM

Crypto-malware

ARP poisoning

------------------------------------------------------------------------------------------------------------- Question #:8

Which of the following BEST explains likelihood of occurrence'?

The chance that an event will happen regardless of how much damage it may cause

The overall impact to the organization once all factors have been considered

The potential for a system to have a weakness or aw that might be exploited

The probability that a threat actor will target and attempt to exploit an organization's systems

------------------------------------------------------------------------------------------------------------- Question #:9

A systems administrator is receiving multiple alerts from the company NIPS. A review of the NIPS logs shows the following:

reset both: 70.32.200.2:3194 > 10.4.100.4:80 buffer overflow attempt reset both: 70.32.200.2:3230 > 10.4.100.4:80 directory traversal attack reset client: 70.32.200.2:4019 > 10.4.100.4:80 Blind SQL injection attack Which of the following should the systems administrator report back to management?

A. The company web server was attacked by an external source, and the NIPS blocked the attack.

B. The company web and SQL servers suffered a DoS caused by a misconfiguration of the NIPS.

C. An external attacker was able to compromise the SQL server using a vulnerable web application.

D. The NIPS should move from an inline mode to an out-of-band mode to reduce network latency.

------------------------------------------------------------------------------------------------------------- Question #:10

A security specialist is notified about a certificate warning that users receive when using a new internal website. After being given the URL from one of the users and seeing the warning, the security specialist inspects the certificate and realizes it has been issued to the IP address, which is how the developers reach the site. Which of the following would BEST resolve the issue?

A. OSCP

B. OID

C. PEM

D. SAN

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database In Depth Relational Theory For Practitioners

Authors: C.J. Date

1st Edition

0596100124, 978-0596100124

More Books

Students also viewed these Databases questions

Question

Explain the various methods of job evaluation

Answered: 1 week ago

Question

Differentiate Personnel Management and Human Resource Management

Answered: 1 week ago

Question

Describe the functions of Human resource management

Answered: 1 week ago

Question

3. Are our bosses always right? If not, what should we do?

Answered: 1 week ago

Question

2. What, according to Sergey, was strange at this meeting?

Answered: 1 week ago