Chapter 1
Chapter 2
Chapter 3
Chapter 4
Bonus
100

Which of the following includes all hardware and software necessary to secure data, such as firewalls and antivirus software?

 Physical security

100

Which impact of vulnerabilities occurs when an attacker uses information gained from a data breach to commit fraud by doing things like opening new accounts with the victim's information?

Identity theft

100

What is the recommended humidity level for server rooms?

50%

100

Which of the following describes a configuration baseline?

3

100

Which of the following fire extinguisher types is best used for the electrical fires that might result when working with computer components?

Class C

200

By definition, which security concept uses the ability to prove that a sender undeniably sent an encrypted message?

Non-repudiation

200

Which of the following are examples of social engineering attacks? (Select three.)

Impersonation, Shoulder surfing, Keylogging

200

Your networking closet contains your network routers, switches, bridges, and some servers. You want to make sure an attacker is not able to gain physical access to the equipment in the networking closet. You also want to prevent anyone from reconfiguring the network to set up remote access or backdoor access.


Which of the following measures are the best ways to secure your networking equipment from unauthorized physical access? (Select two. Each measure is part of a complete solution.)

Place your networking equipment in a room that requires key card entry, Place your networking equipment in a locked cage.

200

Which type of update should be prioritized even outside of a normal patching window?

Critical updates

200

How long are IPv4 addresses? 

32 bits long

300

Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user.


In this example, which protection does the hashing activity provide?

Integrity 

300

A wireless access point configured to use Wired Equivalent Privacy (WEP) is an example of which kind of vulnerability?

Weak security configurations

300

You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following:

When you enter the facility, a receptionist greets you and escorts you through a locked door to the work area where the office manager sits.

The office manager informs you that the organization's servers are kept in a locked closet. An access card is required to enter the server closet.

She informs you that server backups are configured to run each night. A rotation of tapes are used as the backup media.

You notice the organization's network switch is kept in the server closet.

You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks.

The office manager informs you that her desktop system no longer boots and asks you to repair or replace it, recovering as much data as possible in the process. You take the workstation back to your office to work on it.

Which security-related recommendations should you make to this client?

Implement a hardware checkout policy.

300

FTPS uses which mechanism to provide security for authentication and data transfer?

SSL

300

What is the value of these bits

11011011
(20 seconds)

219

400

The Policies, Procedures, and Awareness layer of the security model includes which of the following? (Select two.)

Employee onboarding, User education

400

Which of the following are characteristics of a rootkit? (Select two.)

Resides below regular antivirus software detection, Requires administrator-level privileges for installation.

400

You want to use CCTV to increase your physical security, and you want the ability to remotely control the camera position. Which camera type should you choose?

PTZ

400

You have recently been hired as the new network administrator for a startup company. The company's network was implemented prior to your arrival. One of the first tasks you need to complete in your new position is to develop a manageable network plan for the network.

You have already completed the first and second milestones, in which documentation procedures were identified and the network was mapped. You are now working on the third milestone, which is identifying ways to protect the network.

Which tasks should you complete as a part of this milestone? (Select two.)

Physically secure high-value systems, Identify and document each user on the network. 

400

Which of the following fire extinguisher type is best used for wood, paper, cloth and plastic fires?

Class A

500

The Application layer of the security model includes which of the following? (Select two.)

User management, Web application security

500

You have installed antivirus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day.


What else should you do to protect your systems from malware? (Select two.)

Schedule regular full-system scans, Educate users about malware.

500

Which device is often employed by power companies to protect cabling infrastructure from having cables added or removed and to prevent emissions from being retrieved from the air?

PDS

500

You have placed a File Transfer Protocol (FTP) server in your DMZ behind your firewall. The FTP server is to be used to distribute software updates and demonstration versions of your products. However, users report that they are unable to access the FTP server.


What should you do to enable access?

Open ports 20 and 21 for inbound and outbound connections.

500

Which of the following fire extinguisher type is best used for Sodium and potassium?

Class D

M
e
n
u