Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following does Temporal Key Integrity Protocol (TKIP) support?

A.

Multicast and broadcast messages

B.

Coordination of IEEE 802.11 protocols

C.

Wired Equivalent Privacy (WEP) systems

D.

Synchronization of multiple devices

Which of the following would be the FIRST step to take when implementing a patch management program?

A.

Perform automatic deployment of patches.

B.

Monitor for vulnerabilities and threats.

C.

Prioritize vulnerability remediation.

D.

Create a system inventory.

Which of the following is a method used to prevent Structured Query Language (SQL) injection attacks?

A.

Data compression

B.

Data classification

C.

Data warehousing

D.

Data validation

What would be the PRIMARY concern when designing and coordinating a security assessment for an Automatic Teller Machine (ATM) system?

A.

Physical access to the electronic hardware

B.

Regularly scheduled maintenance process

C.

Availability of the network connection

D.

Processing delays

Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?

A.

Physical

B.

Session

C.

Transport

D.

Data-Link

From a security perspective, which of the following assumptions MUST be made about input to an

application?

A.

It is tested

B.

It is logged

C.

It is verified

D.

It is untrusted

A company receives an email threat informing of an Imminent Distributed Denial of Service (DDoS) attack

targeting its web application, unless ransom is paid. Which of the following techniques BEST addresses that threat?

A.

Deploying load balancers to distribute inbound traffic across multiple data centers

B.

Set Up Web Application Firewalls (WAFs) to filter out malicious traffic

C.

Implementing reverse web-proxies to validate each new inbound connection

D.

Coordinate with and utilize capabilities within Internet Service Provider (ISP)

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to

production programs?

A.

Modifying source code without approval

B.

Promoting programs to production without approval

C.

Developers checking out source code without approval

D.

Developers using Rapid Application Development (RAD) methodologies without approval

In an organization where Network Access Control (NAC) has been deployed, a device trying to connect to the network is being placed into an isolated domain. What could be done on this device in order to obtain proper

connectivity?

A.

Connect the device to another network jack

B.

Apply remediation’s according to security requirements

C.

Apply Operating System (OS) patches

D.

Change the Message Authentication Code (MAC) address of the network interface

What is the PRIMARY goal of fault tolerance?

A.

Elimination of single point of failure

B.

Isolation using a sandbox

C.

Single point of repair

D.

Containment to prevent propagation

An organization has outsourced its financial transaction processing to a Cloud Service Provider (CSP) who will provide them with Software as a Service (SaaS). If there was a data breach who is responsible for monetary losses?

A.

The Data Protection Authority (DPA)

B.

The Cloud Service Provider (CSP)

C.

The application developers

D.

The data owner

What is the BEST location in a network to place Virtual Private Network (VPN) devices when an internal review reveals network design flaws in remote access?

A.

In a dedicated Demilitarized Zone (DMZ)

B.

In its own separate Virtual Local Area Network (VLAN)

C.

At the Internet Service Provider (ISP)

D.

Outside the external firewall

“Stateful” differs from “Static” packet filtering firewalls by being aware of which of the following?

A.

Difference between a new and an established connection

B.

Originating network location

C.

Difference between a malicious and a benign packet payload

D.

Originating application session

Which of the following is part of a Trusted Platform Module (TPM)?

A.

A non-volatile tamper-resistant storage for storing both data and signing keys in a secure fashion

B.

A protected Pre-Basic Input/Output System (BIOS) which specifies a method or a metric for “measuring”

the state of a computing platform

C.

A secure processor targeted at managing digital keys and accelerating digital signing

D.

A platform-independent software interface for accessing computer functions

An organization recently conducted a review of the security of its network applications. One of the

vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?

A.

Diffle-Hellman (DH) algorithm

B.

Elliptic Curve Cryptography (ECC) algorithm

C.

Digital Signature algorithm (DSA)

D.

Rivest-Shamir-Adleman (RSA) algorithm