Q631. NO: 104 

A UNIX administrator would like to use native commands to provide a secure way of connecting to other devices remotely and to securely transfer files. Which of the following protocols could be utilized? (Select TWO). 

A. RDP 

B. SNMP 

C. FTP 

D. SCP 

E. SSH 

Answer: D,E 

Explanation: 

SSH is used to establish a command-line, text-only interface connection with a server, router, 

switch, or similar device over any distance. 

Secure Copy Protocol (SCP) is a secure file-transfer facility based on SSH and Remote Copy 

Protocol (RCP). SCP is commonly used on Linux and Unix platforms. 


Q632. When a new network drop was installed, the cable was run across several fluorescent lights. The users of the new network drop experience intermittent connectivity. Which of the following environmental controls was MOST likely overlooked during installation? 

A. Humidity sensors 

B. EMI shielding 

C. Channel interference 

D. Cable kinking 

Answer:

Explanation: 

Shielding refers to the process of preventing electronic emissions from your computer systems from being used to gather intelligence and preventing outside electronic emissions from disrupting your information-processing abilities. In this case you are experiencing intermittent connectivity since Electro Magnetic Interference (EMI) was not taken into account when running the cables over fluorescent lighting. 


Q633. A computer security officer has investigated a possible data breach and has found it credible. The officer notifies the data center manager and the Chief Information Security Officer (CISO). This is an example of: 

A. escalation and notification. 

B. first responder. 

C. incident identification. 

D. incident mitigation. 

Answer:

Explanation: 


Q634. Ann, a technician, is attempting to establish a remote terminal session to an end user’s computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Ann ensure is open? 

A. 22 

B. 139 

C. 443 

D. 3389 

Answer:

Explanation: 

Remote Desktop Protocol (RDP) uses TCP port 3389. 


Q635. A datacenter requires that staff be able to identify whether or not items have been removed from the facility. Which of the following controls will allow the organization to provide automated notification of item removal? 

A. CCTV 

B. Environmental monitoring 

C. RFID 

D. EMI shielding 

Answer:

Explanation: 

RFID is radio frequency identification that works with readers that work with 13.56 MHz smart cards and 125 kHz proximity cards and can open turnstiles, gates, and any other physical security safeguards once the signal is read. Fitting out the equipment with RFID will allow you to provide automated notification of item removal in the event of any of the equipped items is taken off the premises. 


Q636. A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue? 

A. The SSID broadcast is disabled. 

B. The company is using the wrong antenna type. 

C. The MAC filtering is disabled on the access point. 

D. The company is not using strong enough encryption. 

Answer:

Explanation: 

When the SSID is broadcast, any device with an automatic detect and connect feature is able to see the network and can initiate a connection with it. The fact that they cannot access the network means that they are unable to see it. 


Q637. An organization recently switched from a cloud-based email solution to an in-house email server. The firewall needs to be modified to allow for sending and receiving email. Which of the following ports should be open on the firewall to allow for email traffic? (Select THREE). 

A. TCP 22 

B. TCP 23 

C. TCP 25 

D. TCP 53 

E. TCP 110 

F. TCP 143 

G. TCP 445 

Answer: C,E,F 

Explanation: 


Q638. A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost or stolen? 

A. Application control 

B. Remote wiping 

C. GPS 

D. Screen-locks 

Answer:

Explanation: 

Remote wipe is the process of deleting data on a device in the event that the device is stolen. This is performed over remote connections such as the mobile phone service or the internet connection and helps ensure that sensitive data is not accessed by unauthorized people. 


Q639. Protecting the confidentiality of a message is accomplished by encrypting the message with which of the following? 

A. Sender's private key 

B. Recipient's public key 

C. Sender's public key 

D. Recipient's private key 

Answer:

Explanation: 


Q640. After working on his doctoral dissertation for two years, Joe, a user, is unable to open his dissertation file. The screen shows a warning that the dissertation file is corrupted because it is infected with a backdoor, and can only be recovered by upgrading the antivirus software from the free version to the commercial version. Which of the following types of malware is the laptop MOST likely infected with? 

A. Ransomware 

B. Trojan 

C. Backdoor 

D. Armored virus 

Answer:

Explanation: