Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?
A. Updating the company vulnerability scanner and conducting a new scan
B. Adding a buffer overflow rule to the intrusion detection system
C. Reconfiguring the firewall
D. Installing a system update
At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?
A. Determining the number of security associations
B. Negotiating the authentication method
C. Determining the network identification number
D. Negotiating the version of IP to be used
A security breach has occurred in which a third party was able to obtain and misuse legitimate authentication information. After investigation, you determined that the specific cause for the breach was that end users have been placing their passwords underneath their keyboards. Which step will best help you resolve this problem?
A. Discipline specific end users as object lessons to the rest of the staff and reset passwords on all systems immediately.
B. Change all passwords on the company servers immediately and inform end users that their passwords will be changing on a regular basis.
C. Set passwords to expire at specific intervals and establish mandatory continual training sessions.
D. Inform end users that their passwords will be changing on a regular basis and require more complex passwords.
Which of the following errors most commonly occurs when responding to a security breach?
A. Shutting down network access using the firewall, rather than the network router
B. Adhering to the company policy rather than determining actions based on the IT manager's input
C. Making snap judgments based on emotions, as opposed to company policy
D. Taking too much time to document the attack
You have implemented a service on a Linux system that allows a user to read and edit resources. What is the function of this service?
A. Authentication
B. Data integrity
C. Access control
D. Intrusion detection
You want to create a certificate for use in a Secure Sockets Layer (SSL) session. Which of the following is responsible for verifying the identity of an individual and also issuing the certificate?
A. Kerberos server
B. Certificate authority
C. Certificate revocation entity
D. Certificate repository
Which algorithm can use a 128-bit key, and has been adopted as a standard by various governments and corporations?
A. MARS
B. RC2
C. Advanced Encryption Standard (AES)
D. International Data Encryption Algorithm (IDEA)
A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?
A. Deny all use of UDP above Port 1024.
B. Configure the firewall to provide VPN access.
C. Configure a second network connection directly to the video conferencing device.
D. Allow all use of UDP below Port 1024.
Which of the following activities is the most effective at keeping the actions of nae end users from putting the company's physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the company's physical and logical resources at risk?
A. Configuring network intrusion-detection software to monitor end user activity
B. Conducting a training session at the time of hire
C. Reconfiguring the network firewall
D. Assembling a team of security professionals to monitor the network
What is the primary strength of symmetric-key encryption?
A. It allows easy and secure exchange of the secret key.
B. It creates aash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.
C. It can encrypt large amounts of data very quickly.
D. It provides non-repudiation services more efficiently than asymmetric-key encryption.