31
Chapter One: Mastering the Basics of Security McKinley Cybersecurity Team

Chapter One: Mastering the Basics of Security

  • Upload
    lavonn

  • View
    27

  • Download
    1

Embed Size (px)

DESCRIPTION

Chapter One: Mastering the Basics of Security. McKinley Cybersecurity Team. Question 1. - PowerPoint PPT Presentation

Citation preview

Page 1: Chapter One: Mastering the Basics of Security

Chapter One: Mastering the Basics of Security

McKinley Cybersecurity Team

Page 2: Chapter One: Mastering the Basics of Security

Question 1

As requested by your manager you purchase two servers to participate in a server cluster so that if one server fails, the other server will take over the workload. Which of the following goals of security has been met?A. Confidentiality

B. Accountability

C. Integrity

D. Availability

Page 3: Chapter One: Mastering the Basics of Security

Question 2

You have protected the contents of a highly sensitive file by encrypting the data using Windows EFS. Which of the following goals of security has been satisfied?

A. Confidentiality

B. Accountability

C. Integrity

D. Availability

Page 4: Chapter One: Mastering the Basics of Security

Question 3

You have managed the file permissions on a file so that unauthorized persons cannot make modifications to the file. What goal of security has been met?

A. Confidentiality

B. Accountability

C. Integrity

D. Availability

Page 5: Chapter One: Mastering the Basics of Security

Question 4

You have configured your network so that each person on the network must provide a username and password to gain access. Presenting a username is an example of what?

A. Authentication

B. Identification

C. Authorization

D. Confidentiality

Page 6: Chapter One: Mastering the Basics of Security

Question 5

You have configured the permissions on the accounting folder so that the Accounting group can create, modify, and delete content in the folder; the Managers group can read the contents of the folder; and all other users have been denied access. This is an example of which of the following?

A. Authentication

B. Identification

C. Authorization

D. Confidentiality

Page 7: Chapter One: Mastering the Basics of Security

Question 6

Which of the following are considered biometrics? (Select all that apply)

A. Username and password

B. Smartcard

C. PIN number

D. Fingerprint

E. Retina scan

Page 8: Chapter One: Mastering the Basics of Security

Question 7

Before an individual is authorized to access resources on the network, they are first ________ with the network.

A. Authenticated

B. Identified

C. Authorized

D. Encrypted

Page 9: Chapter One: Mastering the Basics of Security

Question 8

You want to ensure that data is only viewable by authorized users. What security principle are you trying to enforce?

A. Confidentiality

B. Integrity

C. Availability

D. Authentication

Page 10: Chapter One: Mastering the Basics of Security

Question 9

Of the following choices, what is the best way to protect the confidentiality of data?

A. Authentication

B. Encryption

C. Hashing

D. Checksums

Page 11: Chapter One: Mastering the Basics of Security

Question 10

An organization hosts several bays of servers used to support a large online ecommerce business. Which one of the following choices would increase the availability of this datacenter?

A. Encryption

B. Hashing

C. Generators

D. Integrity

Page 12: Chapter One: Mastering the Basics of Security

Question 11

You are planning to host a free online forum for users to share IT security-related information with each other. Any user can anonymously view data. Users can post messages after logging in but you do not want users to be able to modify other users’ posts. What levels of confidentiality, integrity & availability should you seek?

A. Low C, low I and low A

B. Medium C, low I and high A

C. High C, low I and low A

D. Low C, medium I and medium A

Page 13: Chapter One: Mastering the Basics of Security

Question 12

You are reviewing a firewall's ACL (Access Control List) and see the following statement: Drop All. What security principle does this enforce?

A. Least privilege

B. Integrity

C. Availability

D. Implicit Deny

Page 14: Chapter One: Mastering the Basics of Security

Question 13

What is the purpose of risk mitigation?

A. Reduce the chances that a threat will exploit a vulnerability

B. Reduce the chances that a vulnerability will exploit a threat

C. Eliminate risk

D. Eliminate threats

Page 15: Chapter One: Mastering the Basics of Security

Question 14

Your organization is addressing single points of failure (SPOF) as potential risks to security. What are they addressing?

A. Confidentiality

B. Integrity

C. Availability

D. Authentication

Page 16: Chapter One: Mastering the Basics of Security

Question 15

An organization hosts several bays of servers used to support a large online eCommerce business. They want to ensure that customer data hosted within the data center is protected and they implement several access controls including an HVAC (Heating/Ventilation/Air Conditioning) system. What does the HVAC system protect?

A. Access

B. Availability

C. Confidentiality

D. Integrity

Page 17: Chapter One: Mastering the Basics of Security

Question 16

A database administrator is tasked with increasing the retail prices of all products in a database by 10%. The administrator writes a script performing a bulk update of the database and executes it. However, all retail prices are doubled increased by 100% instead of 10%). What has been lost?

A. Confidentiality

B. Integrity

C. Hashing

D. Authentication

Page 18: Chapter One: Mastering the Basics of Security

Question 17Your security administrator has told you that he’s implementing a new security policy that includes two-factor authentication. What is two-factor authentication?

A. Your authentication must contain two pieces of information.

B. Your password must contain at least two types of characters, such as upper-case characters, lower-case characters, numbers, and non-alphanumeric characters.

C. Before you can access a resource, you must login correctly twice in a row.

D. Your password is encrypted twice before it is stored on an authentication server.

Page 19: Chapter One: Mastering the Basics of Security

Question 18The network security team at your organization is enhancing your login process through the use of two-factor authentication. Which of these methods would NOT be an example of two-factor authentication?

A. Fingerprint scanner

B. Smart card

C. Pseudo-random token generator

D. Extended-length passwords that include special characters

Page 20: Chapter One: Mastering the Basics of Security

Question 19What is completed when a user’s password has been verified?

A. Identification

B. Authentication

C. Authorization

D. Access Verification

Page 21: Chapter One: Mastering the Basics of Security

Question 20Which of the following formulas represent the complexity of a password policy that requires users to use only upper and lower case letters with a length of eight characters?

A. 52^8

B. 26^8

C. 8^52

D. 8^26

Page 22: Chapter One: Mastering the Basics of Security

Question 21Of the following choices, what password has a dissimilar key space that the others?

A. Secru1tyIsFun

B. Passw0rd

C. ILOve$ecurity

D. 4uBetutaOn

Page 23: Chapter One: Mastering the Basics of Security

Question 22Robert lets you know that he is using his username as his password since it’s easy to remember. You decide to inform the user that this isn’t a secure password. What explanation would you include?

A. The password wouldn’t meet account lockout requirements

B. The password is too hard to remember

C. The password is not long enough

D. The password is not complex

Page 24: Chapter One: Mastering the Basics of Security

Question 23Your organization has implemented a self-service password reset system. What does this provide?

A. Password policy

B. Certificate reset

C. Password recovery

D. Previous logon notification

Page 25: Chapter One: Mastering the Basics of Security

Question 24A user issued a token with a number displayed in an LCD. What does this provide?

A. A rolling password for one-time use

B. Multifactor authentication

C. CAC

D. PIV

Page 26: Chapter One: Mastering the Basics of Security

Question 25Which of the following includes a photo and can be used as identification? (Choose all that apply)

A. CAC

B. MAC

C. DAC

D. PIV

Page 27: Chapter One: Mastering the Basics of Security

Question 26Which of the following is an example of multifactor authentication?

A. Smart card and token

B. Smart card and PIN

C. Thumbprint and voice recognition

D. Password and PIN

Page 28: Chapter One: Mastering the Basics of Security

Question 27What is used for authentication in a Microsoft Active Directory domain?

A. RADIUS

B. TACACS+

C. Kerberos

D. NIDS

Page 29: Chapter One: Mastering the Basics of Security

Question 28Which of the following best describes the purpose of LDAP?

A. A central point for user management

B. Biometric authentication

C. Prevent loss of confidentiality

D. Prevent loss of integrity

Page 30: Chapter One: Mastering the Basics of Security

Question 29A federated user database is used to provide central authentication via a web portal. What service does this database provide?

A. SSO

B. Multifactor authentication

C. CAC

D. DAC

Page 31: Chapter One: Mastering the Basics of Security

Question 30Which of the following AAA protocols uses multiple challenges and responses?

A. CHAPS

B. RADIUS

C. XTACACS

D. TACACS+