Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONSec 4.4, 4.5

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Sec 4.4, 4.5

Description:
Sec 4.4, 4.5

Author:
BA
(Other tests from this author)

Creation Date:
08/06/2018

Category:
Others

Number of questions: 30
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
You're looking for patterns. Doesn’t fit a “need to know” principle. PII should be removed because you don't even know whats in there. What is this referring to? Big data ARP poisoning DNS poisoning SQL injection.
Data Loss Prevention (DLP) techniques should be used to protect what?.
What is the technology called that provides full disk encryption for laptops?.
Key fields in a database should always be encrypted. True False.
Individual files and removable media encryption is ____ managed.
Mobile devices cannot encrypt, by default. False True.
Specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication and full disk encryption. .
TPM and HSM are modules used for encryption. TPM HSM.
Data at Rest Only authorized users can access the data. What would this be associated with? ACL TLS IPSec DLP.
What would you associate the following with? • Bob can read files • Fred can access the network • James can access network 192.168.1.0/24 using tcp ports 80, 443, and 8088.
During retirement of hardware or employee offboarding, what is a common practice of removing whatever is on the hard drive?.
Intravenous drip-rate meter, water treatment plant controls, time clocks, etc are examples of what?.
In static environments, what is likely the only thing that you'd ever have to update?.
A system of software and hardware elements that allows industrial organizations to: • Control industrial processes locally or at remote locations • Monitor, gather, and process real-time data • Directly interact with devices such as sensors, valves, pumps, motors, and more through human-machine interface (HMI) software • Record events into a log file What is this?.
Which of the below would have an event data recorder “black box”? In-Vehicle computing system SCADA Multifunction Device Smart TV.
Which has a more open app distribution system, and is thus more of a security concern? Apple iOS Android.
Which of the following would you have security concerns associated with JavaScript, HTML5, Java, etc? Smart TV CCTV SCADA In-Vehicle Computing System.
What would you associate the following with? • Very reliable and redundant • Attacks tend to be from the inside • Very specialized, attacking specific data sources.
Rooting or jailbreaking are problems associate with? Game consoles Mainframes Smart TVs SCADA.
Firewall rules, based on zones or IP address ranges could be used to provide what? Network segmentation Layered security Version control Stateful monitoring.
Which of the following can Pete, a security administrator, use to distribute the processing effort when generating hashes for a password cracking program? RAID Clustering Redundancy Virtualization.
Which of the following concepts allows an organization to group large numbers of servers together in order to deliver a common service? Clustering RAID Backup Redundancy Cold site.
An online store wants to protect user credentials and credit card information so that customers can store their credit card information and use their card for multiple separate transactions. Which of the following database designs provides the BEST security for the online store? Use encryption for the credential fields and hash the credit card field Encrypt the username and hash the password Hash the credential fields and use encryption for the credit card field Hash both the credential fields and the credit card field.
Several departments within a company have a business need to send high volumes of confidential information to customers via email. Which of the following is the BEST solution to mitigate unintentional exposure of confidential information? Employ encryption on all outbound emails containing confidential information. Employ exact data matching and prevent inbound emails with Data Loss Prevention. Employ hashing on all outbound emails containing confidential information. Employ exact data matching and encrypt inbound e-mails with Data Loss Prevention.
After recovering from a data breach in which customer data was lost, the legal team meets with the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data. Which of the following controls support this goal? Encryption and stronger access control Contingency planning Hashing and non-repudiation Redundancy and fault tolerance.
A software developer wants to prevent stored passwords from being easily decrypted. When the password is stored by the application, additional text is added to each password before the password is hashed. This technique is known as: Symmetric cryptography. Private key cryptography. Salting. Rainbow tables.
Hashing is a one-way transformation and cannot be reversed. True False.
An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-to-peer network that cannot connect to the Internet. The ISSO can update the antivirus definitions manually, but which of the following steps is MOST important? The signatures must have a hash value equal to what is displayed on the vendor site. A full scan must be run on the network after the DAT file is installed The definition file must be updated within seven days. All users must be logged off of the network prior to the installation of the definition file.
Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message is 160-bits long. Which of the following hashing methods would Matt have to use to obtain this digital fingerprint? SHA1 MD2 MD4 MD5.
Digital signatures verify what? Integrity Availability Confidentiality Redundancy.
Report abuse Consent Terms of use