Which of the following includes all hardware and software necessary to secure data, such as firewalls and antivirus software?
Physical security
Which impact of vulnerabilities occurs when an attacker uses information gained from a data breach to commit fraud by doing things like opening new accounts with the victim's information?
Identity theft
What is the recommended humidity level for server rooms?
50%
Which of the following describes a configuration baseline?
3
Which of the following fire extinguisher types is best used for the electrical fires that might result when working with computer components?
Class C
By definition, which security concept uses the ability to prove that a sender undeniably sent an encrypted message?
Non-repudiation
Which of the following are examples of social engineering attacks? (Select three.)
Impersonation, Shoulder surfing, Keylogging
Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network to set up remote access or backdoor access.
Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.)
Place your networking equipment in a room that requires key card entry, Place your networking equipment in a locked cage.
Which type of update should be prioritized even outside of a normal patching window?
Critical updates
How long are IPv4 addresses?
32 bits long
Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user.
In this example, which protection does the hashing activity provide?
Integrity
A wireless access point configured to use Wired Equivalent Privacy (WEP) is an example of which kind of vulnerability?
Weak security configurations
You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following:
When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office manager sits.
The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the server closet.
She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media.
You notice the organization's network switch is kept in the server closet.
You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks.
The office manager informs you that her desktop system no longer boots and asks you to repair or replace it, recovering as much data as possible in the process. You take the workstation back to your office to work on it.
Which security-related recommendations should you make to this client?
Implement a hardware checkout policy.
FTPS uses which mechanism to provide security for authentication and data transfer?
SSL
What is the value of these bits
11011011
(20 seconds)
219
The Policies, Procedures, and Awareness layer of the security model includes which of the following? (Select two.)
Employee onboarding, User education
Which of the following are characteristics of a rootkit? (Select two.)
Resides below regular antivirus software detection, Requires administrator-level privileges for installation.
You want to use CCTV to increase your physical security, and you want the ability to remotely control the camera position. Which camera type should you choose?
PTZ
You have recently been hired as the new network administrator for a startup company. The company's network was implemented prior to your arrival. One of the first tasks you need to complete in your new position is to develop a manageable network plan for the network.
You have already completed the first and second milestones, in which documentation procedures were identified and the network was mapped. You are now working on the third milestone, which is identifying ways to protect the network.
Which tasks should you complete as a part of this milestone? (Select two.)
Physically secure high-value systems, Identify and document each user on the network.
Which of the following fire extinguisher type is best used for wood, paper, cloth and plastic fires?
Class A
The Application layer of the security model includes which of the following? (Select two.)
User management, Web application security
You have installed antivirus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day.
What else should you do to protect your systems from malware? (Select two.)
Schedule regular full-system scans, Educate users about malware.
Which device is often employed by power companies to protect cabling infrastructure from having cables added or removed and to prevent emissions from being retrieved from the air?
PDS
You have placed a File Transfer Protocol (FTP) server in your DMZ behind your firewall. The FTP server is to be used to distribute software updates and demonstration versions of your products. However, users report that they are unable to access the FTP server.
What should you do to enable access?
Open ports 20 and 21 for inbound and outbound connections.
Which of the following fire extinguisher type is best used for Sodium and potassium?
Class D