Dumpspdf

Thursday 25 July 2013

practice exams

QUESTION NO: 1
A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?
A. The request needs to be sent to the incident management team.
B. The request needs to be approved through the incident management process.
C. The request needs to be approved through the change management process.
D. The request needs to be sent to the change management team.
Answer: C

QUESTION NO: 2
An administrator might choose to implement a honeypot in order to:
A. provide load balancing for network switches.
B. distract potential intruders away from critical systems.
C. establish a redundant server in case of a disaster.
D. monitor any incoming connections from the Internet.
Answer: B

QUESTION NO: 3
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).
A. 10.4.4.125
B. 10.4.4.158
C. 10.4.4.165
D. 10.4.4.189
E. 10.4.4.199
Answer: C,D

QUESTION NO: 4
Which of the following encompasses application patch management?
A. Configuration management
B. Policy management
C. Cross-site request forgery
D. Fuzzing
Answer: A

QUESTION NO: 5
A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?
A. LDAP
B. RADIUS
C. Kerberos
D. XTACACS
Answer: C

QUESTION NO: 6
How would a technician secure a router configuration if placed in an unsecured closet?
A. Mount the router into an immovable rack.
B. Enable SSH for maintenance of the router.
C. Disable the console port on the router.
D. Label the router with contact information.
Answer: C

QUESTION NO: 7
Which of the following can be used to discover if a security attack is occurring on a web server?
A. Creating a new baseline
B. Disable unused accounts
C. Implementing full disk encryption
D. Monitoring access logs
Answer: D

QUESTION NO: 8

Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?
A. TCP 23
B. UDP 69
C. TCP 22
D. TCP 21
Answer: C

No comments:

Post a Comment