Q151. In order to securely communicate using PGP, the sender of an email must do which of the following when sending an email to a recipient for the first time? 

A. Import the recipient’s public key 

B. Import the recipient’s private key 

C. Export the sender’s private key 

D. Export the sender’s public key 

Answer:

Explanation: 

See step 4 below. 

1.

 When a user encrypts plaintext with PGP, PGP first compresses the plaintext. 

2.

 PGP then creates a session key, which is a one-time-only secret key. 

3.

 This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext. 

4.

 Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient. 


Q152. A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer will have very different job requirements and use unique tools and applications in their job. Which of the following is MOST appropriate to use? 

A. Role-based privileges 

B. Credential management 

C. User assigned privileges 

D. User access 

Answer:

Explanation: 


Q153. The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following? 

A. Rainbow tables attacks 

B. Brute force attacks 

C. Birthday attacks 

D. Cognitive passwords attacks 

Answer:

Explanation: 

Social Networking Dangers are ‘amplified’ in that social media networks are designed to mass distribute personal messages. If an employee reveals too much personal information it would be easy for miscreants to use the messages containing the personal information to work out possible passwords. 


Q154. An information bank has been established to store contacts, phone numbers and other records. 

An application running on UNIX would like to connect to this index server using port 88. Which of the following authentication services would this use this port by default? 

A. Kerberos 

B. TACACS+ 

C. Radius 

D. LDAP 

Answer:

Explanation: Kerberos makes use of port 88. 


Q155. Which of the following is a notification that an unusual condition exists and should be investigated? 

A. Alert 

B. Trend 

C. Alarm 

D. Trap 

Answer:

Explanation: 

We need to look carefully at the wording of the question to determine the answer. This question is asking about an “unusual condition” that should be investigated. There are different levels of alerts from Critical to Warning to Information only. An Alarm would be triggered by a serious definite problem that needs resolving urgently. An “unusual condition” probably wouldn’t trigger an alarm; it is more likely to trigger an Alert. 


Q156. Which of the following is the primary security concern when deploying a mobile device on a network? 

A. Strong authentication 

B. Interoperability 

C. Data security 

D. Cloud storage technique 

Answer:

Explanation: 

Mobile devices, such as laptops, tablet computers, and smartphones, provide security challenges above those of desktop workstations, servers, and such in that they leave the office and this increases the odds of their theft which makes data security a real concern. At a bare minimum, the following security measures should be in place on mobile devices: Screen lock, Strong password, Device encryption, Remote Wipe or Sanitation, voice encryption, GPS tracking, Application control, storage segmentation, asses tracking and device access control. 


Q157. Digital Signatures provide which of the following? 

A. Confidentiality 

B. Authorization 

C. Integrity 

D. Authentication 

E. Availability 

Answer:

Explanation: 

A digital signature is similar in function to a standard signature on a document. It validates the integrity of the message and the sender. 


Q158. Which of the following would Jane, an administrator, use to detect an unknown security vulnerability? 

A. Patch management 

B. Application fuzzing 

C. ID badge 

D. Application configuration baseline 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks. 


Q159. A security administrator wants to deploy security controls to mitigate the threat of company employees’ personal information being captured online. Which of the following would BEST serve this purpose? 

A. Anti-spyware 

B. Antivirus 

C. Host-based firewall 

D. Web content filter 

Answer:

Explanation: 

Spyware monitors a user’s activity and uses network protocols to reports it to a third party without the user’s knowledge. This is usually accomplished using a tracking cookie. 


Q160. Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective? 

A. CHAP 

B. SAML 

C. Kerberos 

D. Diameter 

Answer:

Explanation: 

Diameter is an authentication, authorization, and accounting protocol that replaces the RADIUS protocol. Diameter Applications extend the base protocol by including new commands and/or attributes, such as those for use of the Extensible Authentication Protocol (EAP).