EnsurepassQUESTION 481 A security technician is working with the network firewall team to implement access controls at the company's demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond?   A. Rule based access control B. Role based access control C. Discretionary access control D. Mandatory Read more [...]
EnsurepassQUESTION 471 Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. Which of the following should Sara do to address the risk?   A. Accept the risk saving $10,000. B. Ignore the risk saving $5,000. C. Mitigate the risk saving $10,000. D. Transfer Read more [...]
EnsurepassQUESTION 461 Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane's company?   A. Vulnerability scanner B. Honeynet C. Protocol analyzer D. Port scanner   Correct Answer: B     QUESTION 462 Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from Read more [...]
EnsurepassQUESTION 451 Which of the following should Jane, a security administrator, perform before a hard drive is analyzed with forensics tools?   A. Identify user habits B. Disconnect system from network C. Capture system image D. Interview witnesses   Correct Answer: C     QUESTION 452 Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying Read more [...]
EnsurepassQUESTION 441 A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?   A. 20 B. 21 C. 22 D. 23   Correct Answer: B     QUESTION 442 Which of the following could cause a browser to display the message below?   "The security certificate presented by this website was issued for a different website's address."   A. The website certificate was issued Read more [...]
EnsurepassQUESTION 431 Several bins are located throughout a building for secure disposal of sensitive information. Which of the following does this prevent?   A. Dumpster diving B. War driving C. Tailgating D. War chalking   Correct Answer: A     QUESTION 432 Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?   A. Application Read more [...]
EnsurepassQUESTION 421 Which of the following devices will help prevent a laptop from being removed from a certain location?   A. Device encryption B. Cable locks C. GPS tracking D. Remote data wipes   Correct Answer: B     QUESTION 422 Which of the following is the MOST secure protocol to transfer files?   A. FTP B. FTPS C. SSH D. TELNET   Correct Answer: B               QUESTION 423 Suspicious traffic without a specific signature Read more [...]
EnsurepassQUESTION 411 Which of the following is used to certify intermediate authorities in a large PKI deployment?   A. Root CA B. Recovery agent C. Root user D. Key escrow   Correct Answer: A     QUESTION 412 Which of the following components MUST be trusted by all parties in PKI?   A. Key escrow B. CA C. Private key D. Recovery key   Correct Answer: B     QUESTION 413 Which of the following should Matt, a security administrator, Read more [...]
EnsurepassQUESTION 401 Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?   A. Design reviews B. Baseline reporting C. Vulnerability scan D. Code review   Correct Answer: C     QUESTION 402 Which of the following is an example of a false positive?   A. Anti-virus identifies a benign application as malware. B. A biometric iris scanner rejects an authorized user wearing a new Read more [...]
EnsurepassQUESTION 391 Which of the following IP addresses would be hosts on the same subnet given the subnet mask (Select TWO).   A. B. C. D. E.   Correct Answer: CD     QUESTION 392 Which of the following algorithms has well documented collisions? (Select TWO).   A. AES B. MD5 C. SHA D. SHA-256 E. RSA   Correct Answer: BC     QUESTION 393 Which of Read more [...]
EnsurepassQUESTION 381 Separation of duties is often implemented between developers and administrators in order to separate which of the following?   A. More experienced employees from less experienced employees B. Changes to program code and the ability to deploy to production C. Upper level management users from standard development employees D. The network access layer from the application access layer   Correct Answer: B     QUESTION 382 A security administrator Read more [...]