Which of the following is true about the recovery agent? A.It can decrypt messages of users who lost their private key. B.It can recover both the private and public key of federated users. C.It can recover and provide users with their lost or private key. D.It can recover and provide users with their lost public […]
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
Which of the following is the BEST approach to perform risk mitigation of user access controlrights? A.Conduct surveys and rank the results. B.Perform routine user permission reviews. C.Implement periodic vulnerability scanning. D.Disable user accounts that have not been used within the last two weeks. Show Answer
Which of the following devices is BEST suited for servers that need to store private keys? A.Hardware security module B.Hardened network firewall C.Solid state disk drive D.Hardened host firewall Show Answer
Which of the following MOST specifically defines the procedures to follow when scheduled system patching fails
Which of the following MOST specifically defines the procedures to follow when scheduled systempatching fails resulting in system outages? A.Risk transference B.Change management C.Configuration management D.Access control revalidation Show Answer
All of the following are valid cryptographic hash functions EXCEPT: A.RIPEMD. B.RC4. C.SHA-512. D.MD4. Show Answer
A review of the company’s network traffic shows that most of the malware infections are caused byusers visiting gambling and gaming websites. The security manager wants to implement a solutionthat will block these websites, scan all web traffic for signs of malware, and block the malwarebefore it enters the company network. Which of the following […]
In regards to secure coding practices, why is input validation important? A.It mitigates buffer overflow attacks. B.It makes the code more readable. C.It provides an application configuration baseline. D.It meets gray box testing standards. Show Answer
Which of the following would the security engineer set as the subnet mask for the servers below to utilize hos
Which of the following would the security engineer set as the subnet mask for the servers below toutilize host addresses on separate broadcast domains?Server 1: 192.168.100.6Server 2: 192.168.100.9Server 3: 220.127.116.11 A./24 B./27 C./28 D./29 E./30 Show Answer
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following would be used when a higher level of security is desired for encryption keystorage? A.TACACS+ B.L2TP C.LDAP D.TPM Show Answer
A security administrator needs to determine which system a particular user is trying to login to atvarious times of the day. Which of the following log types would the administrator check? A.Firewall B.Application C.IDS D.Security Show Answer