Q391. Which of the following devices is MOST likely being used when processing the following? 

1 PERMIT IP ANY ANY EQ 80 

2 DENY IP ANY ANY 

A. Firewall 

B. NIPS 

C. Load balancer 

D. URL filter 

Answer:

Explanation: 


Q392. Which of the following techniques enables a highly secured organization to assess security weaknesses in real time? 

A. Access control lists 

B. Continuous monitoring 

C. Video surveillance 

D. Baseline reporting 

Answer:

Explanation: 

Continuous monitoring point toward the never-ending review of what resources a user actually accesses, which is critical for preventing insider threats. Because the process is never-ending, assessments happen in real time. 

Topic 6, Cryptography 


Q393. Which of the following is a concern when encrypting wireless data with WEP? 

A. WEP displays the plain text entire key when wireless packet captures are reassembled 

B. WEP implements weak initialization vectors for key transmission 

C. WEP uses a very weak encryption algorithm 

D. WEP allows for only four pre-shared keys to be configured 

Answer:

Explanation: 

The initialization vector (IV) that WEP uses for encryption is 24-bit, which is quite weak and means that IVs are reused with the same key. By examining the repeating result, it was easy for attackers to crack the WEP secret key. This is known as an IV attack. 


Q394. A security administrator must implement a firewall rule to allow remote employees to VPN onto the company network. The VPN concentrator implements SSL VPN over the standard HTTPS port. Which of the following is the MOST secure ACL to implement at the company's gateway firewall? 

A. PERMIT TCP FROM ANY 443 TO 199.70.5.25 443 

B. PERMIT TCP FROM ANY ANY TO 199.70.5.23 ANY 

C. PERMIT TCP FROM 199.70.5.23 ANY TO ANY ANY 

D. PERMIT TCP FROM ANY 1024-65535 TO 199.70.5.23 443 

Answer:

Explanation: 


Q395. Which of the following can be performed when an element of the company policy cannot be enforced by technical means? 

A. Develop a set of standards 

B. Separation of duties 

C. Develop a privacy policy 

D. User training 

Answer:

Explanation: 

User training is an important aspect of maintaining safety and security. It helps improve users’ security awareness in terms of prevention, enforcement, and threats. It is of critical importance when element of the company policy cannot be enforced by technical means. 


Q396. A security technician wishes to gather and analyze all Web traffic during a particular time period. 

Which of the following represents the BEST approach to gathering the required data? 

A. Configure a VPN concentrator to log all traffic destined for ports 80 and 443. 

B. Configure a proxy server to log all traffic destined for ports 80 and 443. 

C. Configure a switch to log all traffic destined for ports 80 and 443. 

D. Configure a NIDS to log all traffic destined for ports 80 and 443. 

Answer:

Explanation: 

A proxy server is in essence a device that acts on behalf of others and in security terms all internal user interaction with the Internet should be controlled through a proxy server. This makes a proxy server the best tool to gather the required data. 


Q397. Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario? 

A. Application Firewall 

B. Anomaly Based IDS 

C. Proxy Firewall 

D. Signature IDS 

Answer:

Explanation: 

Anomaly-based detection watches the ongoing activity in the environment and looks for abnormal occurrences. An anomaly-based monitoring or detection method relies on definitions of all valid forms of activity. This database of known valid activity allows the tool to detect any and all anomalies. Anomaly-based detection is commonly used for protocols. Because all the valid and legal forms of a protocol are known and can be defined, any variations from those known valid constructions are seen as anomalies. 


Q398. After a recent security breach, the network administrator has been tasked to update and backup all router and switch configurations. The security administrator has been tasked to enforce stricter security policies. All users were forced to undergo additional user awareness training. All of these actions are due to which of the following types of risk mitigation strategies? 

A. Change management 

B. Implementing policies to prevent data loss 

C. User rights and permissions review 

D. Lessons learned 

Answer:

Explanation: 

Incident response procedures involves: Preparation; Incident identification; Escalation and notification; Mitigation steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation (Quarantine; Device removal); Data breach; Damage and loss control. Described in the question is a situation where a security breach had occurred and its response which shows that lessons have been learned and used to put in place measures that will prevent any future security breaches of the same kind. 


Q399. A company's Chief Information Officer realizes the company cannot continue to operate after a disaster. Which of the following describes the disaster? 

A. Risk 

B. Asset 

C. Threat 

D. Vulnerability 

Answer:

Explanation: 


Q400. DRAG DROP 

A security administrator is given the security and availability profiles for servers that are being deployed. 

1) Match each RAID type with the correct configuration and MINIMUM number of drives. 

2) Review the server profiles and match them with the appropriate RAID type based on integrity, availability, I/O, storage requirements. Instructions: 

. All drive definitions can be dragged as many times as necessary 

. Not all placeholders may be filled in the RAID configuration boxes 

. If parity is required, please select the appropriate number of parity checkboxes 

. Server profiles may be dragged only once 

If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue. 

Answer: