Q591. Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to restore those services? 

A. Hot site 

B. Warm site 

C. Cold site 

D. Mobile site 

Answer:

Explanation: 

Not having a dedicated site means that the mobile site can fill the role of either being a hot, warm or cold site as a disaster recovery measure. 


Q592. Ann, a security analyst, is preparing for an upcoming security audit. To ensure that she identifies unapplied security controls and patches without attacking or compromising the system, Ann would use which of the following? 

A. Vulnerability scanning 

B. SQL injection 

C. Penetration testing 

D. Antivirus update 

Answer:

Explanation: 

A vulnerability scan is the process of scanning the network and/or I.T. infrastructure for threats and vulnerabilities. The threats and vulnerabilities are then evaluated in a risk assessment and the necessary actions taken to resolve and vulnerabilities. A vulnerability scan scans for known weaknesses such as missing patches or security updates. 

A vulnerability scan is the automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers. Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network's security. 


Q593. A security administrator must implement a system that will support and enforce the following file system access control model: FILE NAME SECURITY LABEL Employees.doc Confidential Salary.xls Confidential 

OfficePhones.xls Unclassified 

PersonalPhones.xls Restricted 

Which of the following should the security administrator implement? 

A. White and black listing 

B. SCADA system 

C. Trusted OS 

D. Version control 

Answer:

Explanation: 


Q594. Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks? 

A. Malicious code on the local system 

B. Shoulder surfing 

C. Brute force certificate cracking 

D. Distributed dictionary attacks 

Answer:

Explanation: 

Once a user authenticates to a remote server, malicious code on the user’s workstation could then infect the server. 


Q595. Key elements of a business impact analysis should include which of the following tasks? 

A. Develop recovery strategies, prioritize recovery, create test plans, post-test evaluation, and update processes. 

B. Identify institutional and regulatory reporting requirements, develop response teams and communication trees, and develop press release templates. 

C. Employ regular preventive measures such as patch management, change management, antivirus and vulnerability scans, and reports to management. 

D. Identify critical assets systems and functions, identify dependencies, determine critical downtime limit, define scenarios by type and scope of impact, and quantify loss potential. 

Answer:

Explanation: 

The key components of a Business impact analysis (BIA) include: Identifying Critical Functions Prioritizing Critical Business Functions Calculating a Timeframe for Critical Systems Loss Estimating the Tangible and Intangible Impact on the Organization 


Q596. While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make sure that only devices authorized to access the network would be permitted to login and utilize resources. Which of the following should the administrator implement to ensure this happens? 

A. Log Analysis 

B. VLAN Management 

C. Network separation 

D. 802.1x 

Answer:

Explanation: 

802.1x is a port-based authentication mechanism. It’s based on Extensible Authentication Protocol (EAP) and is commonly used in closed-environment wireless networks. 802.1x was initially used to compensate for the weaknesses of Wired Equivalent Privacy (WEP), but today it’s often used as a component in more complex authentication and connection-management systems, including Remote Authentication Dial-In User Service (RADIUS), Diameter, Cisco System’s Terminal Access Controller Access-Control System Plus (TACACS+), and Network Access Control (NAC). 


Q597. Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization? 

A. It should be enforced on the client side only. 

B. It must be protected by SSL encryption. 

C. It must rely on the user’s knowledge of the application. 

D. It should be performed on the server side. 

Answer:

Explanation: 

Client-side validation should only be used to improve user experience, never for security purposes. A client-side input validation check can improve application performance by catching malformed input on the client and, therefore, saving a roundtrip to the server. However, client side validation can be easily bypassed and should never be used for security purposes. Always use server-side validation to protect your application from malicious attacks. 


Q598. Which of the following security strategies allows a company to limit damage to internal systems and provides loss control? 

A. Restoration and recovery strategies 

B. Deterrent strategies 

C. Containment strategies 

D. Detection strategies 

Answer:

Explanation: 

Containment strategies is used to limit damages, contain a loss so that it may be controlled, much like quarantine, and loss incident isolation. 


Q599. Users are encouraged to click on a link in an email to obtain exclusive access to the newest version of a popular Smartphone. This is an example of. 

A. Scarcity 

B. Familiarity 

C. Intimidation 

D. Trust 

Answer:

Explanation: 

Scarcity, in the area of social psychology, works much like scarcity in the area of economics. Simply put, humans place a higher value on an object that is scarce, and a lower value on those that are abundant. The thought that we, as humans, want something we cannot have drives us to desire the object even more. This idea is deeply embedded in the intensely popular, “Black Friday” shopping extravaganza that U.S. consumers participate in every year on the day after Thanksgiving. More than getting a bargain on a hot gift idea, shoppers thrive on the competition itself, in obtaining the scarce product. 

In this question, people want the brand new latest version of a smartphone. The temptation of being one of the first to get the new phone will tempt people into clicking the link in the email. 


Q600. An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement? 

A. Implement IIS hardening by restricting service accounts. 

B. Implement database hardening by applying vendor guidelines. 

C. Implement perimeter firewall rules to restrict access. 

D. Implement OS hardening by applying GPOs. 

Answer:

Explanation: Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing or disabling unnecessary functions and features, removing or disabling unnecessary user accounts, disabling unnecessary protocols and ports, and disabling unnecessary services. This can be implemented using the native security features of an operating system, such as Group Policy Objects (GPOs).