310 likes | 471 Views
Chapter One: Mastering the Basics of Security. McKinley Cybersecurity Team. Question 1.
E N D
Chapter One: Mastering the Basics of Security McKinley Cybersecurity Team
Question 1 As requested by your manager you purchase two servers to participate in a server cluster so that if one server fails, the other server will take over the workload. Which of the following goals of security has been met?A. Confidentiality B. Accountability C. Integrity D. Availability
Question 2 You have protected the contents of a highly sensitive file by encrypting the data using Windows EFS. Which of the following goals of security has been satisfied? • Confidentiality • Accountability • Integrity • Availability
Question 3 You have managed the file permissions on a file so that unauthorized persons cannot make modifications to the file. What goal of security has been met? • Confidentiality • Accountability • Integrity • Availability
Question 4 You have configured your network so that each person on the network must provide a username and password to gain access. Presenting a username is an example of what? • Authentication • Identification • Authorization • Confidentiality
Question 5 You have configured the permissions on the accounting folder so that the Accounting group can create, modify, and delete content in the folder; the Managers group can read the contents of the folder; and all other users have been denied access. This is an example of which of the following? • Authentication • Identification • Authorization • Confidentiality
Question 6 Which of the following are considered biometrics? (Select all that apply) • Username and password • Smartcard • PIN number • Fingerprint • Retina scan
Question 7 Before an individual is authorized to access resources on the network, they are first ________ with the network. • Authenticated • Identified • Authorized • Encrypted
Question 8 You want to ensure that data is only viewable by authorized users. What security principle are you trying to enforce? • Confidentiality • Integrity • Availability • Authentication
Question 9 Of the following choices, what is the best way to protect the confidentiality of data? • Authentication • Encryption • Hashing • Checksums
Question 10 An organization hosts several bays of servers used to support a large online ecommerce business. Which one of the following choices would increase the availability of this datacenter? • Encryption • Hashing • Generators • Integrity
Question 11 You are planning to host a free online forum for users to share IT security-related information with each other. Any user can anonymously view data. Users can post messages after logging in but you do not want users to be able to modify other users’ posts. What levels of confidentiality, integrity & availability should you seek? • Low C, low I and low A • Medium C, low I and high A • High C, low I and low A • Low C, medium I and medium A
Question 12 You are reviewing a firewall's ACL (Access Control List) and see the following statement: Drop All. What security principle does this enforce? • Least privilege • Integrity • Availability • Implicit Deny
Question 13 What is the purpose of risk mitigation? • Reduce the chances that a threat will exploit a vulnerability • Reduce the chances that a vulnerability will exploit a threat • Eliminate risk • Eliminate threats
Question 14 Your organization is addressing single points of failure (SPOF) as potential risks to security. What are they addressing? • Confidentiality • Integrity • Availability • Authentication
Question 15 An organization hosts several bays of servers used to support a large online eCommerce business. They want to ensure that customer data hosted within the data center is protected and they implement several access controls including an HVAC (Heating/Ventilation/Air Conditioning) system. What does the HVAC system protect? • Access • Availability • Confidentiality • Integrity
Question 16 A database administrator is tasked with increasing the retail prices of all products in a database by 10%. The administrator writes a script performing a bulk update of the database and executes it. However, all retail prices are doubled increased by 100% instead of 10%). What has been lost? • Confidentiality • Integrity • Hashing • Authentication
Question 17 Your security administrator has told you that he’s implementing a new security policy that includes two-factor authentication. What is two-factor authentication? • Your authentication must contain two pieces of information. • Your password must contain at least two types of characters, such as upper-case characters, lower-case characters, numbers, and non-alphanumeric characters. • Before you can access a resource, you must login correctly twice in a row. • Your password is encrypted twice before it is stored on an authentication server.
Question 18 The network security team at your organization is enhancing your login process through the use of two-factor authentication. Which of these methods would NOT be an example of two-factor authentication? • Fingerprint scanner • Smart card • Pseudo-random token generator • Extended-length passwords that include special characters
Question 19 What is completed when a user’s password has been verified? • Identification • Authentication • Authorization • Access Verification
Question 20 Which of the following formulas represent the complexity of a password policy that requires users to use only upper and lower case letters with a length of eight characters? • 52^8 • 26^8 • 8^52 • 8^26
Question 21 Of the following choices, what password has a dissimilar key space that the others? • Secru1tyIsFun • Passw0rd • ILOve$ecurity • 4uBetutaOn
Question 22 Robert lets you know that he is using his username as his password since it’s easy to remember. You decide to inform the user that this isn’t a secure password. What explanation would you include? • The password wouldn’t meet account lockout requirements • The password is too hard to remember • The password is not long enough • The password is not complex
Question 23 Your organization has implemented a self-service password reset system. What does this provide? • Password policy • Certificate reset • Password recovery • Previous logon notification
Question 24 A user issued a token with a number displayed in an LCD. What does this provide? • A rolling password for one-time use • Multifactor authentication • CAC • PIV
Question 25 Which of the following includes a photo and can be used as identification? (Choose all that apply) • CAC • MAC • DAC • PIV
Question 26 Which of the following is an example of multifactor authentication? • Smart card and token • Smart card and PIN • Thumbprint and voice recognition • Password and PIN
Question 27 What is used for authentication in a Microsoft Active Directory domain? • RADIUS • TACACS+ • Kerberos • NIDS
Question 28 Which of the following best describes the purpose of LDAP? • A central point for user management • Biometric authentication • Prevent loss of confidentiality • Prevent loss of integrity
Question 29 A federated user database is used to provide central authentication via a web portal. What service does this database provide? • SSO • Multifactor authentication • CAC • DAC
Question 30 Which of the following AAA protocols uses multiple challenges and responses? • CHAPS • RADIUS • XTACACS • TACACS+