100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CERTMASTER CE SECURITY EXAM QUESTIONS WITH ALL CORRECT ANSWERS

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
14-01-2025
Escrito en
2024/2025

CERTMASTER CE SECURITY EXAM QUESTIONS WITH ALL CORRECT ANSWERS What are the benefits of using Wi-Fi heat maps for wireless networks? (Select all that apply.) -Answer-Survey a site for signal strength & Determine where to place access points A cyber analyst is drafting a memorandum on the impacts of exposures tied to successful attacks and route security. What are the vulnerabilities associated with route security? (Select all that apply.) -Answer-Source Routing & Route injection & Software exploits A network administrator set up a basic packet-filtering firewall using an open-source application running on a Linux virtual machine. The immediate benefit of this deployment is the quick configuration of basic firewall rules. What are the key functions that stateless and stateful firewalls provide to secure a network? (Select all that apply.) -Answer-Block TCP ports & Allow network protocols A new cloud service provider (CSP) leases resources to multiple organizations (or customers) around the world. Each customer is independent and does not share the same logical cloud storage resource. The customers use an on-demand payment plan. Which cloud model is the CSP most likely providing to its customers? -Answer-Public cloud In a Public Key Infrastructure (PKI), which option best describes how users and multiple Certificate Authorities (CA) interact with each other in a large environment? -Answer-Trust model A developer writes code for a new application, and wants to ensure protective countermeasures against the execution of SQL injection attacks. What secure coding technique will provide this? -Answer-Input validation An organization moves its data to the cloud. Engineers utilize regional replication to protect data. Review the descriptions and conclude which ones apply to this configuration. (Select all that apply.) -Answer-A solution that is known as zone-redundant storage. & Access is available if a single data center is destroyed. Which of the following protocols would secure a tunnel for credential exchange using port 636? -Answer-LDAPS Which certificate format allows the transfer of private keys and is password protected? -Answer-PFX When implementing a native-cloud firewall, which layer of the Open Systems Interconnection (OSI) model will require the most processing capacity to filter traffic based on content? -Answer-Layer 7 A public key infrastructure (PKI) is being set up for a logistics company, utilizing OpenSSL hosted on Red Hat Enterprise Linux. Which of the following commands can the team use, when setting up the PKI, to create an encrypted RSA private key? -Answer-openssl genrsa -aes256 -out 2048 A large firm requires better control over mobile users' access to business applications in the cloud. This will require single-sign on and support for different device types. What solution should the company consider using? -Answer-CASB A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust and communicate securely with public websites. Which type of certificates are the network administrator currently importing? -Answer-Root A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use? -Answer-Key escrow A web administrator notices a few security vulnerabilities that need to be addressed on the company Intranet site. The portal must force a secure browsing connection, mitigate script injection, and prevent caching on shared client devices. Determine the secure options to set on the web server's response headers. (Select all that apply.) -Answer-B.HTTP Strict Transport Security (HSTS) & C.Content Security Policy (CSP) & D.Cache-Control An organization uses a Session Initiation Protocol (SIP) endpoint for establishing communications with remote branch offices. Which of the following protocols will provide encryption for streaming data during the call? -Answer-SRTP Following a secure deployment methodology for custom applications, early code testing would run in which type of environment? -Answer-Development A cloud administrator deploys two cloud servers on the Amazon Web Services (AWS) platform, each in a separately defined virtual network. How does the administrator get both servers to communicate with each other without using an Internet gateway? -Answer-Configure VPC endpoint interface. Which aspect of certificate and key management should an administrator practice when trying to prevent the loss of private keys? -Answer-Storage A laptop arrives at the company technology lab with a pre-configured embedded private key. When this key is used in conjunction with the corresponding public key for encryption/decryption purposes, what primary security feature does this system likely provide? -Answer-Hardware root of trust A company has a two-level certificate authority (CA) hierarchy. One of the CA servers is offline, while the others are online. Which statements are TRUE of online and offline CAs? (Select all that apply.) -Answer-An online root is required to add an intermediate CA. & An online CA is needed in order to publish a CRL. Systems administrators want to set up a way to perform remote administration from home. Rather than installing a software agent, the solution should use an underlying technology that is available to an application, such as a web browser. Which option would best support these requirements? -Answer-HTML5 VPN

Mostrar más Leer menos
Institución
CERTMASTER CE SECURITY
Grado
CERTMASTER CE SECURITY









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CERTMASTER CE SECURITY
Grado
CERTMASTER CE SECURITY

Información del documento

Subido en
14 de enero de 2025
Número de páginas
7
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CERTMASTER CE SECURITY EXAM
QUESTIONS WITH ALL CORRECT
ANSWERS

What are the benefits of using Wi-Fi heat maps for wireless networks? (Select all that
apply.) -Answer-Survey a site for signal strength
&
Determine where to place access points

A cyber analyst is drafting a memorandum on the impacts of exposures tied to
successful attacks and route security. What are the vulnerabilities associated with route
security? (Select all that apply.) -Answer-Source Routing
&
Route injection
&
Software exploits

A network administrator set up a basic packet-filtering firewall using an open-source
application running on a Linux virtual machine. The immediate benefit of this
deployment is the quick configuration of basic firewall rules. What are the key functions
that stateless and stateful firewalls provide to secure a network? (Select all that apply.) -
Answer-Block TCP ports
&
Allow network protocols

A new cloud service provider (CSP) leases resources to multiple organizations (or
customers) around the world. Each customer is independent and does not share the
same logical cloud storage resource. The customers use an on-demand payment plan.
Which cloud model is the CSP most likely providing to its customers? -Answer-Public
cloud

In a Public Key Infrastructure (PKI), which option best describes how users and multiple
Certificate Authorities (CA) interact with each other in a large environment? -Answer-
Trust model

A developer writes code for a new application, and wants to ensure protective
countermeasures against the execution of SQL injection attacks. What secure coding
technique will provide this? -Answer-Input validation

An organization moves its data to the cloud. Engineers utilize regional replication to
protect data. Review the descriptions and conclude which ones apply to this

, configuration. (Select all that apply.) -Answer-A solution that is known as zone-
redundant storage.
&
Access is available if a single data center is destroyed.

Which of the following protocols would secure a tunnel for credential exchange using
port 636? -Answer-LDAPS

Which certificate format allows the transfer of private keys and is password protected? -
Answer-PFX

When implementing a native-cloud firewall, which layer of the Open Systems
Interconnection (OSI) model will require the most processing capacity to filter traffic
based on content? -Answer-Layer 7

A public key infrastructure (PKI) is being set up for a logistics company, utilizing
OpenSSL hosted on Red Hat Enterprise Linux. Which of the following commands can
the team use, when setting up the PKI, to create an encrypted RSA private key? -
Answer-openssl genrsa -aes256 -out server.key 2048

A large firm requires better control over mobile users' access to business applications in
the cloud. This will require single-sign on and support for different device types. What
solution should the company consider using? -Answer-CASB

A network administrator is importing a list of certificates from an online source, so that
employees can use a chain of trust and communicate securely with public websites.
Which type of certificates are the network administrator currently importing? -Answer-
Root

A company with archived and encrypted data looks to archive the associated private
keys needed for decryption. The keys should be externally archived and heavily
guarded. Which option should the company use? -Answer-Key escrow

A web administrator notices a few security vulnerabilities that need to be addressed on
the company Intranet site. The portal must force a secure browsing connection, mitigate
script injection, and prevent caching on shared client devices. Determine the secure
options to set on the web server's response headers. (Select all that apply.) -Answer-
B.HTTP Strict Transport Security (HSTS)
&
C.Content Security Policy (CSP)
&
D.Cache-Control

An organization uses a Session Initiation Protocol (SIP) endpoint for establishing
communications with remote branch offices. Which of the following protocols will
provide encryption for streaming data during the call? -Answer-SRTP

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
victoryguide stuvia
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
22
Miembro desde
1 año
Número de seguidores
1
Documentos
2821
Última venta
1 semana hace

3.7

7 reseñas

5
4
4
0
3
1
2
1
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes