Which authentication factor can use an authentication method based on information extracted from a
packet header?
Something you have
Something you are
Something you know
Somewhere you are
Question 2
Data destruction can be accomplished with all the following EXCEPT:
Pulping
Burying
Burning
Shredding
Question 3
As a part of data center planning you have leased rack space in offsite datacenters: one in the US, as the
site used for offsite backups and recovery, and the other in Mexico, as the failover and alternative
processing site. You will maintain the datacenter at HO in US. All sites are at a distance of 1,500 miles
from each other. You receive notice from legal that due to the recent award of a DOD contract, no
technical specifications, nor the required encryption technology can leave the country. Which geographic
consideration is properly planned for in this situation?
Location selection
Distance
Legal implications
offsite backups
Question 4
A user reports that they have received an e-mail from their credit card. The e-mail states there is a
problem with their account. The e-mail provides a link to follow to correct the issue; however, upon
further inspection, the user notices the URL looks suspicious. Of which of the following is this MOST
likely an example?
, Adware
Pharming attack
Phishing attack
ARP Poisoning attack
Question 5
You need to implement biometric access controls to a high security location in your office. Which
biometric factor would be considered the least accurate?
Voice recognition
Facial recognition
Fingerprints
Iris pattern
Question 6
You are the Network professional for a small boutique hedge fund in lower Manhattan. You depend on
your servers to manage transactions at the average rate of $7,000,000 daily. Your industry is being
targeted by Ransomware, which has increased the likelihood of an incident occurring over the course of
a year to 40%. A successful attack will keep your servers offline for two hours. Assuming a seven-hour
workday what is the ALE?
$80,000
$500,000
$50,000
$800,000
Question 7
Various systems in your network environment use consistent settings. You want to be able to check the
settings are accurate. What should you do?
Have automated configuration validation
Apply master images to the various systems
Provide continuous monitoring through automation
Use a template with the configuration settings
, Question 8
The system administrator at a small corporation is in the process of upgrading the network intrusion
detection system but doesn't have time to build an extensive threat database or establish a threat
threshold from scratch. Rather, the administrator chooses to rely on the cumulative data compiled by
various trusted security vendors regarding known network security threats to guard against. Which
monitoring methodology would be most likely to report false negatives under these circumstances?
Heuristic monitoring
Signature-based monitoring
Behavior or anomaly-based monitoring
Rule-based monitoring
Question 9
You have implemented the use of request verification tokens associated with user sessions for a web
server. Which type of attack will this help prevent?
IP spoofing
XSRF
Privilege escalation
Zero-day
Question 10
A user is preforming a search using a popular search engine. They come across a website where they can
win a sum of money by clicking on a link. When the user clicks on the link they are taken to a blank
page. Later they notice that several posts have been made to their social media site containing adds.
Which of the follow attacks being described?
URL hijacking
Typo squatting
Session hijacking
Clickjacking
Question 11
Which of the following is a definition of “Circuit-level proxy”?
Enables one proxy per service
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LEARNEXAMS. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $30.49. You're not tied to anything after your purchase.