After downloading a file from a website, you hash the file and compare the hash to the hash of the file
posted on the website. What BEST describes the purpose of your actions? - correct answers To support
integrity
You need to send an email with a list of employee names and their social security numbers. What is the
BEST choice to maintain confidentiality? - correct answers Encrypt the data
A circumstance or event that could negatively impact confidentiality, integrity, or availability - correct
answers threat
This is NOT an example of non-repudiation. - correct answers hashing
If a student graduates and does not sign up to take more classes, their email accounts are disabled.
What security control is this an example of? - correct answers preventive control
Which of the following commands does NOT show the network configuration of your computer? -
correct answers tracert
Most physical servers in an organization are currently underutilized. Management wants a better return
on investment (ROI). What is a solution that will provide the best ROI? - correct answers Run many
virtual servers on a few physical machines
What are port numbers used for? - correct answers to identify a specific service on a computer
What protocol is used to synchronize time on network devices? - correct answers NTP
What is the BEST device to prevent PII data from being sent in an email to a person outside the
organization? - correct answers mail gateway
, Which authentication service provides a SSO solution for different environments using a federated
identity management system? - correct answers Shibboleth
Which authentication service is NOT a SSO solution? - correct answers Kerberos
What is stored in the /etc/passwd file in Linux? - correct answers information about user accounts on
the system
Steganography without encryption provides what goal? - correct answers obfuscation
Russian hackers in Russia are sending messages from Russia to their collaborators in the USA. What is a
security algorithm that they might be using for encrypting their messages? - correct answersRijndael-
128, CBC
The steghide command in Linux does what? - correct answers hides and encrypts one file inside a
second file
Instead of creating access control settings based on each student, the system administrator created a
Student group that has the access control settings for a generic student. When students create an
account online, their account is automatically updated with the same access control settings as the
Student group. What type of access control is this? - correct answers RBAC
You live on Oahu, but telecommute to an IT job in California for the higher salary. You are able to work
at home; however, when you meet several of your Oahu co-workers at Starbucks to collaborate face-to-
face, you and your co-workers are unable to connect to the company's network. What is the MOST likely
reason that y'all cannot access the company's network? - correct answer location-based policy
You are setting up an access control system that uses different security levels. For example, Top Secret
Level, Secret Level, Confidential Level, and Official Use Level. What type of access control is this? -
correct answers MAC
You are setting up an access control system that considers the subject, object, action, and environment
for authorization. For example, employees are only allowed to access the company printers when they