Q111. An administrator notices that former temporary employees’ accounts are still active on a domain. 

Which of the following can be implemented to increase security and prevent this from happening? 

A. Implement a password expiration policy. 

B. Implement an account expiration date for permanent employees. 

C. Implement time of day restrictions for all temporary employees. 

D. Run a last logon script to look for inactive accounts. 

Answer:

Explanation: 

You can run a script to return a list of all accounts that haven’t been used for a number of days, for example 30 days. If an account hasn’t been logged into for 30 days, it’s a safe bet that the user the account belonged to is no longer with the company. You can then disable all the accounts that the script returns. A disabled account cannot be used to log in to a system. This is a good security measure. As soon as an employee leaves the company, the employees account should always be disabled. 


Q112. Which of the following will help prevent smurf attacks? 

A. Allowing necessary UDP packets in and out of the network 

B. Disabling directed broadcast on border routers 

C. Disabling unused services on the gateway firewall 

D. Flash the BIOS with the latest firmware 

Answer:

Explanation: 


Q113. Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT group, to edit a file. Currently, the file has the following permissions: Ann: read/write 

Sales Group: read 

IT Group: no access 

If a discretionary access control list is in place for the files owned by Ann, which of the following would be the BEST way to share the file with Joe? 

A. Add Joe to the Sales group. 

B. Have the system administrator give Joe full access to the file. 

C. Give Joe the appropriate access to the file directly. 

D. Remove Joe from the IT group and add him to the Sales group. 

Answer:

Explanation: 


Q114. Joe, a user, reports to the system administrator that he is receiving an error stating his certificate has been revoked. Which of the following is the name of the database repository for these certificates? 

A. CSR 

B. OCSP 

C. CA 

D. CRL 

Answer:

Explanation: 

A certificate revocation list (CRL) is created and distributed to all CAs to revoke a certificate or key. 


Q115. A company’s business model was changed to provide more web presence and now its ERM software is no longer able to support the security needs of the company. The current data center will continue to provide network and security services. Which of the following network elements would be used to support the new business model? 

A. Software as a Service 

B. DMZ 

C. Remote access support 

D. Infrastructure as a Service 

Answer:

Explanation: 

Software as a Service (SaaS) allows for on-demand online access to specific software applications or suites without having to install it locally. This will allow the data center to continue providing network and security services. 


Q116. Joe, an employee is taking a taxi through a busy city and starts to receive unsolicited files sent to his Smartphone. Which of the following is this an example of? 

A. Vishing 

B. Bluejacking 

C. War Driving 

D. SPIM 

E. Bluesnarfing 

Answer:

Explanation: 

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (Class 1) transmitters. Bluejacking is usually harmless, but because bluejacked people generally don't know what has happened, they may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in guerrilla marketing campaigns to promote advergames. 


Q117. An insurance company requires an account recovery process so that information created by an employee can be accessed after that employee is no longer with the firm. Which of the following is the BEST approach to implement this process? 

A. Employee is required to share their password with authorized staff prior to leaving the firm 

B. Passwords are stored in a reversible form so that they can be recovered when needed 

C. Authorized employees have the ability to reset passwords so that the data is accessible 

D. All employee data is exported and imported by the employee prior to them leaving the firm 

Answer:

Explanation: 

Since a user’s password isn’t stored on most operating systems (only a hash value is kept), most operating systems allow the administrator (or authorized person in this case) to change the value then the information/files/documents can be accessed. This is the safest way of recovery by an authorized person and is not dependent on those who leave the firm. 


Q118. Which of the following protocols is MOST likely to be leveraged by users who need additional information about another user? 

A. LDAP 

B. RADIUS 

C. Kerberos 

D. TACACS+ 

Answer:

Explanation: 


Q119. A security technician is attempting to improve the overall security posture of an internal mail server. Which of the following actions would BEST accomplish this goal? 

A. Monitoring event logs daily 

B. Disabling unnecessary services 

C. Deploying a content filter on the network 

D. Deploy an IDS on the network 

Answer:

Explanation: 

One of the most basic practices for reducing the attack surface of a specific host is to disable unnecessary services. Services running on a host, especially network services provide an avenue through which the system can be attacked. If a service is not being used, disable it. 


Q120. Methods to test the responses of software and web applications to unusual or unexpected inputs are known as: 

A. Brute force. 

B. HTML encoding. 

C. Web crawling. 

D. Fuzzing. 

Answer:

Explanation: 

Fuzzing is a software testing technique that involves providing invalid, unexpected, or random data to as inputs to a computer program. The program is then monitored for exceptions such as crashes, or failed validation, or memory leaks.