Certmaster Security Exam Study Questions with
100% Correct Answers
Which scenario best illustrates effective use of industrial camouflage as a security
control? - ✔✔Entry control measure for a secure facility begin inside a main entry
point, rather than outside the building.
Basically you are protecting the important things, not things outside.
The US department of defense awards an IT contract to a company to perform server
maintenance, they are located at a third party location, what type of agreement do they
enter into? - ✔✔Interconnection Security Agreement (ISA)
ISA sets out a security risk awareness process and commits the agency and supplier top
implementing security controls.
A guard station deploys a new security device to use to access a classified data station. It
is sensitive to speed and pressure, what type of behavioral technology is this testing for?
- ✔✔Signature recognition
Consider the PKI Trusty Model, what best protects against compromise? -
✔✔Intermediate CA
Intermediate - in the middle of others
Cross Signed by a root CA or another intermediate CA, therefor, not a single point of
failure. Since it is signed by others it is safer than things signed by themselves.
, Possible network breach on a linux system; using command line tools to collect routing
data, you discover UDP communications are not working right, what tool would you
have issues with? - ✔✔traceroute - performs route discovery in linux
Which event is not conducted during data aggregation in SIEM - ✔✔Link observables
into a meaningful indicator if risk, or indicator of compromise
(data aggregation means collection of data and expressed into a summary form)
A user attempts to use a smart card for kerberos authentication, if the user is
successfully authenticated, how does the authentication server respond? - ✔✔A
session key is issued
A network engineer sets up a secure wireless network, and decides to use EAP-FAST,
what authentication protocol does the engineer implement? - ✔✔Protected Access
Credential (PAC) instead of a certificate.
An organization hires a pen tester, the tester achieves a connection to a perimeter
server, which technique allows the tester to bypass a network boundary from this
advantage? - ✔✔Pivoting
What sensor type would you use to monitor specific systems via a switch? - ✔✔SPAN
(Switched Port Analyzer)
Mirror - Pretty much the same thing
A engineer configures a virtual private cloud. While trying to create a public subnet, the
engineer experiences difficulties. The issue is that the subnet remains private, when
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.