Tag: security

Questions Related to security

  1. On the network perimeter, to alert the network administrator of all attack attempts

  2. On network segments with business-critical systems

  3. At the network operations center (NOC)

  4. At an external service provider


Correct Option: B
  1. Fiber optics provides higher bandwidth.

  2. Fiber optics are more difficult to wiretap.

  3. Fiber optics are immune to wiretap.

  4. None — the two are equivalent; network security is independent from the physical layer.


Correct Option: B
  1. Using an obscure SSID to confuse and distract an attacker

  2. Not using any SSID at all to prevent an attacker from connecting to the network

  3. Not broadcasting an SSID to make it harder to detect the WLAN

  4. None of the above


Correct Option: D
  1. Users using peer-to-peer file-sharing networks for breaches of intellectual property

  2. PCs connected permanently to the Internet are prone to receive more spam mails, thereby increasing the risk for the user to become infected with viruses and Trojans.

  3. PCs will become infected with dialers on DSL lines (run over telephony lines), thereby exposing the user to almost limitless financial risk

  4. Home computers that are not securely configured or maintained and are permanently connected to the Internet become easy prey for attackers


Correct Option: D
  1. Lack of authentication of servers, and thereby authenticity of records

  2. Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed

  3. The fact that it is a simple, distributed, hierarchical database instead of a singular, relational one, thereby giving rise to the possibility of inconsistencies going undetected for a certain amount of time

  4. The fact that addresses in e-mail can be spoofed without checking their validity in DNS, caused by the fact that DNS addresses are not digitally signed


Correct Option: A
  1. All configuration information should be documented

  2. The end users are not normally a part of the process.

  3. Configuration decisions have security implications.

  4. Documentation should be placed under secure version control


Correct Option: C
  1. Social engineering

  2. Weak authentication controls

  3. Ticket-granting server authorization

  4. Voice recognition software


Correct Option: A
  1. Data entry

  2. Database administration

  3. Change management

  4. Network management


Correct Option: C
  1. Single point of failure

  2. Asymmetric key compromise

  3. Use of dynamic passwords

  4. Limited lifetimes for authentication credentials


Correct Option: A
  1. Establishes personal accountability

  2. Enables continuous improvement

  3. Reduces cross-training requirements

  4. Reduces departmental turf battles


Correct Option: C
Explanation:

To solve this question, the user needs to know the benefits of setting clear security roles.

Option A: Establishes personal accountability. This option is a benefit of setting clear security roles. When roles are clearly defined, it is easier to identify who is responsible for specific tasks, which leads to personal accountability.

Option B: Enables continuous improvement. This option is also a benefit of setting clear security roles. When roles are clearly defined, it is easier to identify areas that need improvement and implement measures to address them, which leads to continuous improvement.

Option C: Reduces cross-training requirements. This option is not a benefit of setting clear security roles. In fact, having clear security roles may lead to an increase in cross-training requirements, as it allows for better coordination and collaboration between team members with different roles.

Option D: Reduces departmental turf battles. This option is a benefit of setting clear security roles. When roles are clearly defined, it reduces the likelihood of conflicts arising from overlapping responsibilities and reduces departmental turf battles.

Therefore, the correct answer is:

The Answer is: C. Reduces cross-training requirements.