Q551. Encryption used by RADIUS is BEST described as: 

A. Quantum 

B. Elliptical curve 

C. Asymmetric 

D. Symmetric 

Answer:

Explanation: 

The RADIUS server uses a symmetric encryption method. 

Note: Symmetric algorithms require both ends of an encrypted message to have the same key and 

processing algorithms. Symmetric algorithms generate a secret key that must be protected. 


Q552. Environmental control measures include which of the following? 

A. Access list 

B. Lighting 

C. Motion detection 

D. EMI shielding 

Answer:

Explanation: 

Environmental controls include HVAC, Fire Suppression, EMI Shielding, Hot and Cold Aisles, Environmental monitoring as well as Temperature and Humidity controls. 


Q553. Which of the following application security principles involves inputting random data into a program? 

A. Brute force attack 

B. Sniffing 

C. Fuzzing 

D. Buffer overflow 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Q554. A security administrator is responsible for performing periodic reviews of user permission settings due to high turnover and internal transfers at a corporation. Which of the following BEST describes the procedure and security rationale for performing such reviews? 

A. Review all user permissions and group memberships to ensure only the minimum set of permissions required to perform a job is assigned. 

B. Review the permissions of all transferred users to ensure new permissions are granted so the employee can work effectively. 

C. Ensure all users have adequate permissions and appropriate group memberships, so the volume of help desk calls is reduced. 

D. Ensure former employee accounts have no permissions so that they cannot access any network file stores and resources. 

Answer:

Explanation: 

Reviewing user permissions and group memberships form part of a privilege audit is used to determine that all groups, users, and other accounts have the appropriate privileges assigned according to the policies of the corporation. 


Q555. A technician has just installed a new firewall onto the network. Users are reporting that they cannot reach any website. Upon further investigation, the technician determines that websites can be reached by entering their IP addresses. Which of the following ports may have been closed to cause this issue? 

A. HTTP 

B. DHCP 

C. DNS 

D. NetBIOS 

Answer:

Explanation: 

DNS links IP addresses and human-friendly fully qualified domain names (FQDNs), which are made up of the Top-level domain (TLD), the registered domain name, and the Subdomain or hostname. 

Therefore, if the DNS ports are blocked websites will not be reachable. 


Q556. Which of the following network design elements allows for many internal devices to share one public IP address? 

A. DNAT 

B. PAT 

C. DNS 

D. DMZ 

Answer:

Explanation: 

Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses. 

Most home networks use PAT. In such a scenario, the Internet Service Provider (ISP) assigns a single IP address to the home network's router. When Computer X logs on the Internet, the router assigns the client a port number, which is appended to the internal IP address. This, in effect, gives Computer X a unique address. If Computer Z logs on the Internet at the same time, the router assigns it the same local IP address with a different port number. Although both computers are sharing the same public IP address and accessing the Internet at the same time, the router knows exactly which computer to send specific packets to because each computer has a unique internal address. 


Q557. Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking Pete’s access to this site? 

A. Internet content filter 

B. Firewall 

C. Proxy server 

D. Protocol analyzer 

Answer:

Explanation: 

Web filtering software is designed to restrict or control the content a reader is authorised to access, especially when utilised to restrict material delivered over the Internet via the Web, e-mail, or other means. 


Q558. An organization recently switched from a cloud-based email solution to an in-house email server. The firewall needs to be modified to allow for sending and receiving email. Which of the following ports should be open on the firewall to allow for email traffic? (Select THREE). 

A. TCP 22 

B. TCP 23 

C. TCP 25 

D. TCP 53 

E. TCP 110 

F. TCP 143 

G. TCP 445 

Answer: C,E,F 

Explanation: 


Q559. Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network? 

A. Near field communication 

B. IV attack 

C. Evil twin 

D. Replay attack 

Answer:

Explanation: 

An initialization vector is a random number used in combination with a secret key as a means to encrypt data. This number is sometimes referred to as a nonce, or “number occurring once,” as an encryption program uses it only once per session. An initialization vector is used to avoid repetition during the data encryption process, making it impossible for hackers who use dictionary attack to decrypt the exchanged encrypted message by discovering a pattern. This is known as an IV attack. A particular binary sequence may be repeated more than once in a message, and the more it appears, the more the encryption method is discoverable. For example if a one-letter word exists in a message, it may be either “a” or “I” but it can’t be “e” because the word “e” is non-sensical in English, while “a” has a meaning and “I” has a meaning. Repeating the words and letters makes it possible for software to apply a dictionary and discover the binary sequence corresponding to 

each letter. 

Using an initialization vector changes the binary sequence corresponding to each letter, enabling 

the letter “a” to be represented by a particular sequence in the first instance, and then represented 

by a completely different binary sequence in the second instance. 

WEP (Wireless Equivalent Privacy) is vulnerable to an IV attack. Because RC4 is a stream cipher, 

the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain 

text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy 

network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there 

is a 50% probability the same IV will repeat after 5000 packets. 


Q560. HOTSPOT 

The security administrator has installed a new firewall which implements an implicit DENY policy by default Click on the firewall and configure it to allow ONLY the following communication. 

1. The Accounting workstation can ONLY access the web server on the public network over the default HTTPS port. The accounting workstation should not access other networks. 

2. The HR workstation should be restricted to communicate with the Financial server ONLY, over the default SCP port 

3. The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port. 

Instructions: The firewall will process the rules in a top-down manner in order as a first match The port number must be typed in and only one port number can be entered per rule Type ANY for all ports. The original firewall configuration can be reset at any time by pressing the reset button. Once you have met the simulation requirements, click save and then Done to submit. 

Answer: