Question
** Please with an explanation if possible ** *Please answers all or leave it to another expert* Question #:1 A systems administrator just issued the
** Please with an explanation if possible **
*Please answers all or leave it to another expert*
Question #:1
A systems administrator just issued the ssh-keygen -t rsa command on a Linux terminal Which of the following BEST describes what the rsa portion of the command represents?
A key generation algorithm
A hashing algorithm
A public key infrastructure type
A certificate authority type
-------------------------------------------------------------------------------------------------------------
Question #:2
A company is deploying MFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
Sensitive scanned materials being saved on the local hard drive
Faulty printer drivers causing PC performance degradation
Improperly configured NIC settings interfering with network security
Excessive disk space consumption due to storing large documents
-------------------------------------------------------------------------------------------------------------
Question #:3
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation?
Network tap
Honeypot
Aggregation
Port mirror
------------------------------------------------------------------------------------------------------------- Question #:4 A Chief Executive Officer (CEO) is staying at a hotel during a business trip. The hotel's wireless network does not show a lock symbol. Which of the following precautions should the CEO take? (Select TWO).
Change the connection type to WPA2.
Change TKIP to CCMR
Use a VPN. Tether to a mobile phone.
Create a tunnel connection with EAP-TTLS.
-------------------------------------------------------------------------------------------------------------
Question #:5
A security analyst is performing a BIA. The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use backup data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?
A maximum MTTR of 30 minutes
A maximum MTBF of 30 minutes
A maximum RTO of 60 minutes
A maximum RPO of 60 minutes
An SLA guarantee of 60 minutes
------------------------------------------------------------------------------------------------------------- Question #:6
A company has migrated to two-factor authentication for accessing the corporate network, VPN, and SSO. Several legacy applications cannot support multifactor authentication and must continue to use usernames and passwords. Which of the following should be implemented to ensure the legacy applications are as secure as possible while ensuring functionality? (Select TWO).
Privileged accounts
Password reuse restrictions
Password complexity requirements
Password recovery
Account disablement
-------------------------------------------------------------------------------------------------------------
Question #:7
A government organization recently contacted three different vendors to obtain cost quotes for a desktop PC refresh. The quote from one of the vendors was significantly lower than the other two and was selected for the purchase. When the PCs arrived, a technician determined some NICs had been tampered with. Which of the following MOST accurately describes the security risk presented in this situation?
Hardware root of trust
UEFI
Supply chain
TPM
Crypto-malware
ARP poisoning
------------------------------------------------------------------------------------------------------------- Question #:8
Which of the following BEST explains likelihood of occurrence'?
The chance that an event will happen regardless of how much damage it may cause
The overall impact to the organization once all factors have been considered
The potential for a system to have a weakness or aw that might be exploited
The probability that a threat actor will target and attempt to exploit an organization's systems
------------------------------------------------------------------------------------------------------------- Question #:9
A systems administrator is receiving multiple alerts from the company NIPS. A review of the NIPS logs shows the following:
reset both: 70.32.200.2:3194 > 10.4.100.4:80 buffer overflow attempt reset both: 70.32.200.2:3230 > 10.4.100.4:80 directory traversal attack reset client: 70.32.200.2:4019 > 10.4.100.4:80 Blind SQL injection attack Which of the following should the systems administrator report back to management?
A. The company web server was attacked by an external source, and the NIPS blocked the attack.
B. The company web and SQL servers suffered a DoS caused by a misconfiguration of the NIPS.
C. An external attacker was able to compromise the SQL server using a vulnerable web application.
D. The NIPS should move from an inline mode to an out-of-band mode to reduce network latency.
------------------------------------------------------------------------------------------------------------- Question #:10
A security specialist is notified about a certificate warning that users receive when using a new internal website. After being given the URL from one of the users and seeing the warning, the security specialist inspects the certificate and realizes it has been issued to the IP address, which is how the developers reach the site. Which of the following would BEST resolve the issue?
A. OSCP
B. OID
C. PEM
D. SAN
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started