Chapter One: Mastering the Basics of Security McKinley Cybersecurity Team.

31
Chapter One: Mastering the Basics of Security McKinley Cybersecurity Team

Transcript of Chapter One: Mastering the Basics of Security McKinley Cybersecurity Team.

Chapter One: Mastering the Basics of Security

McKinley Cybersecurity Team

Question 1

As requested by your manager you purchase two servers to participate in a server cluster so that if one server fails, the other server will take over the workload. Which of the following goals of security has been met?A. Confidentiality

B. Accountability

C. Integrity

D. Availability

Question 2

You have protected the contents of a highly sensitive file by encrypting the data using Windows EFS. Which of the following goals of security has been satisfied?

A. Confidentiality

B. Accountability

C. Integrity

D. Availability

Question 3

You have managed the file permissions on a file so that unauthorized persons cannot make modifications to the file. What goal of security has been met?

A. Confidentiality

B. Accountability

C. Integrity

D. Availability

Question 4

You have configured your network so that each person on the network must provide a username and password to gain access. Presenting a username is an example of what?

A. Authentication

B. Identification

C. Authorization

D. Confidentiality

Question 5

You have configured the permissions on the accounting folder so that the Accounting group can create, modify, and delete content in the folder; the Managers group can read the contents of the folder; and all other users have been denied access. This is an example of which of the following?

A. Authentication

B. Identification

C. Authorization

D. Confidentiality

Question 6

Which of the following are considered biometrics? (Select all that apply)

A. Username and password

B. Smartcard

C. PIN number

D. Fingerprint

E. Retina scan

Question 7

Before an individual is authorized to access resources on the network, they are first ________ with the network.

A. Authenticated

B. Identified

C. Authorized

D. Encrypted

Question 8

You want to ensure that data is only viewable by authorized users. What security principle are you trying to enforce?

A. Confidentiality

B. Integrity

C. Availability

D. Authentication

Question 9

Of the following choices, what is the best way to protect the confidentiality of data?

A. Authentication

B. Encryption

C. Hashing

D. Checksums

Question 10

An organization hosts several bays of servers used to support a large online ecommerce business. Which one of the following choices would increase the availability of this datacenter?

A. Encryption

B. Hashing

C. Generators

D. Integrity

Question 11

You are planning to host a free online forum for users to share IT security-related information with each other. Any user can anonymously view data. Users can post messages after logging in but you do not want users to be able to modify other users’ posts. What levels of confidentiality, integrity & availability should you seek?

A. Low C, low I and low A

B. Medium C, low I and high A

C. High C, low I and low A

D. Low C, medium I and medium A

Question 12

You are reviewing a firewall's ACL (Access Control List) and see the following statement: Drop All. What security principle does this enforce?

A. Least privilege

B. Integrity

C. Availability

D. Implicit Deny

Question 13

What is the purpose of risk mitigation?

A. Reduce the chances that a threat will exploit a vulnerability

B. Reduce the chances that a vulnerability will exploit a threat

C. Eliminate risk

D. Eliminate threats

Question 14

Your organization is addressing single points of failure (SPOF) as potential risks to security. What are they addressing?

A. Confidentiality

B. Integrity

C. Availability

D. Authentication

Question 15

An organization hosts several bays of servers used to support a large online eCommerce business. They want to ensure that customer data hosted within the data center is protected and they implement several access controls including an HVAC (Heating/Ventilation/Air Conditioning) system. What does the HVAC system protect?

A. Access

B. Availability

C. Confidentiality

D. Integrity

Question 16

A database administrator is tasked with increasing the retail prices of all products in a database by 10%. The administrator writes a script performing a bulk update of the database and executes it. However, all retail prices are doubled increased by 100% instead of 10%). What has been lost?

A. Confidentiality

B. Integrity

C. Hashing

D. Authentication

Question 17Your security administrator has told you that he’s implementing a new security policy that includes two-factor authentication. What is two-factor authentication?

A. Your authentication must contain two pieces of information.

B. Your password must contain at least two types of characters, such as upper-case characters, lower-case characters, numbers, and non-alphanumeric characters.

C. Before you can access a resource, you must login correctly twice in a row.

D. Your password is encrypted twice before it is stored on an authentication server.

Question 18The network security team at your organization is enhancing your login process through the use of two-factor authentication. Which of these methods would NOT be an example of two-factor authentication?

A. Fingerprint scanner

B. Smart card

C. Pseudo-random token generator

D. Extended-length passwords that include special characters

Question 19What is completed when a user’s password has been verified?

A. Identification

B. Authentication

C. Authorization

D. Access Verification

Question 20Which of the following formulas represent the complexity of a password policy that requires users to use only upper and lower case letters with a length of eight characters?

A. 52^8

B. 26^8

C. 8^52

D. 8^26

Question 21Of the following choices, what password has a dissimilar key space that the others?

A. Secru1tyIsFun

B. Passw0rd

C. ILOve$ecurity

D. 4uBetutaOn

Question 22Robert lets you know that he is using his username as his password since it’s easy to remember. You decide to inform the user that this isn’t a secure password. What explanation would you include?

A. The password wouldn’t meet account lockout requirements

B. The password is too hard to remember

C. The password is not long enough

D. The password is not complex

Question 23Your organization has implemented a self-service password reset system. What does this provide?

A. Password policy

B. Certificate reset

C. Password recovery

D. Previous logon notification

Question 24A user issued a token with a number displayed in an LCD. What does this provide?

A. A rolling password for one-time use

B. Multifactor authentication

C. CAC

D. PIV

Question 25Which of the following includes a photo and can be used as identification? (Choose all that apply)

A. CAC

B. MAC

C. DAC

D. PIV

Question 26Which of the following is an example of multifactor authentication?

A. Smart card and token

B. Smart card and PIN

C. Thumbprint and voice recognition

D. Password and PIN

Question 27What is used for authentication in a Microsoft Active Directory domain?

A. RADIUS

B. TACACS+

C. Kerberos

D. NIDS

Question 28Which of the following best describes the purpose of LDAP?

A. A central point for user management

B. Biometric authentication

C. Prevent loss of confidentiality

D. Prevent loss of integrity

Question 29A federated user database is used to provide central authentication via a web portal. What service does this database provide?

A. SSO

B. Multifactor authentication

C. CAC

D. DAC

Question 30Which of the following AAA protocols uses multiple challenges and responses?

A. CHAPS

B. RADIUS

C. XTACACS

D. TACACS+