1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following are often identified as the three main goals of security? (Select three.)
- Confidentiality
- Integrity
- Availability
You are a security manager for a mid-sized company and are considering using a third-party certificate authority (CA) to manage your company's certificates.
Which of the following would be the MOST significant benefit of using a third-party CA?
It would allow your company to set up different certificate policies through intermediate CAs.
Which of the following encryption mechanisms offers the least security because of weak keys?
DES
The success of asymmetric encryption is MOST dependent upon which of the following?
The secrecy of the key.
Which of the following BEST describes compensating controls?
Partial control solution that is implemented when a control cannot fully meet a requirement.
There are several block cipher modes of operation that can be utilized depending on the application or use.
Which of the following block cipher modes of operation uses a nonce combined with a counter that is encrypted?
Counter Mode (CTR)
What is a nonce?
A random string that is used for all blocks during the encryption process.
After encountering a cyber attack, an organization uses a monitoring solution that automatically restarts services after it has detected the system has crashed.
What type of functional security control is the company implementing?
Corrective
Which of the following is the weakest symmetric encryption method?
DES
Which of the following BEST describes the domain controller component of Active Directory?
A domain controller is a server that holds a copy of the Active Directory database that can be written to and is responsible for copying changes to Active Directory between the domain controllers.
What is an Active Directory (AD)?
is a database and set of services that connect users with the network resources they need to get their work done.
A newly launched online store wants to secure transactions between the store and customers. The store must guarantee the authenticity of transactions, provide confidentiality, and ensure that only authorized recipients can access the purchase details.
Which cryptographic technique would best meet these requirements?
Asymmetric encryption
As a network administrator, you are asked to recommend a secure method for transferring data between hosts on a network.
Which of the following protocols would you recommend? (Select two.)
- Secure File Transfer Protocol (SFTP)
- Secure Copy Protocol (SCP)
Which of the following statements accurately describes the root of trust model in a public key infrastructure (PKI)?
The root of trust model defines how users and different CAs can trust one another, with each CA (Certificate Authority) issuing itself a root certificate.
As part of enhancing its data protection strategy, a corporation's IT manager aims to ensure defense-in-depth by integrating a technical control alongside existing managerial and operational controls.
Which measure BEST exemplifies a technical security control according to the classification scheme?
Setting up a network intrusion detection system.
You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files.
What should you do?
Implement BitLocker with a TPM.
What is BitLocker?
A Windows security feature that protects your data by encrypting your drives.
What is a Trusted Platform Module (TPM)?
A dedicated chip on a computer's motherboard that securely stores cryptographic keys and other security-related data.
A company transmits data across a network, ensuring the non-repudiation security principle.
What is the key benefit this provides to both the sender and the recipient of the data?
Neither party can deny the authenticity of the data.
What is a non-repudiation security principle?
A a security principle that ensures data originated from a verified sender and reached the intended recipient. This process means neither party can deny the authenticity of the data.
Hashing is the process of converting one value into another using a mathematical algorithm like MD5 or SHA. This fixed length of data is called the hash.
Which of the following are true statements about hashing? (Select two.)
- A hash cannot be decrypted
- Hashing is used on data that does not need to be decrypted, such as a password.
When two different messages produce the same hash value, what has occurred?
Collision
A network administrator responsible for managing the encryption keys used in the organization's secure communications had a new key management policy implemented by the organization, which included a provision for key escrow.
The administrator understands the role of key escrows in relation to private keys.
Which of the following BEST describes the purpose of key escrow in the context of private keys?
Key escrow involves securely storing a copy of the private key with a trusted third party for recovery purposes, ensuring availability in case of key loss or compromise.
Which of the following is a limitation of using a DNS sinkhole as a cybersecurity measure?
DNS sinkholes are ineffective if the malware uses a public DNS server or its own DNS server.
An organization frequently implements changes, reconfigurations, and patches to enhance its IT infrastructure's security and efficiency. The cybersecurity analyst must carefully analyze dependencies between services, applications, and interfaces to avoid unintended outages and disruptions during service restarts or downtime events.
How does understanding dependencies impact the change management process? (Select the three best options.)
- Supports the development of post-change performance monitoring to validate system functionality and quickly detect issues.
- Helps avoid unintended outages and disruptions during service restarts or downtime events.
- Guides the development of effective backout plans and downtime contingencies.