100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CERTMASTER CE SECURITY EXAM QUESTIONS WITH ALL CORRECT ANSWERS

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
14-01-2025
Written in
2024/2025

CERTMASTER CE SECURITY EXAM QUESTIONS WITH ALL CORRECT ANSWERS What are the benefits of using Wi-Fi heat maps for wireless networks? (Select all that apply.) -Answer-Survey a site for signal strength & Determine where to place access points A cyber analyst is drafting a memorandum on the impacts of exposures tied to successful attacks and route security. What are the vulnerabilities associated with route security? (Select all that apply.) -Answer-Source Routing & Route injection & Software exploits A network administrator set up a basic packet-filtering firewall using an open-source application running on a Linux virtual machine. The immediate benefit of this deployment is the quick configuration of basic firewall rules. What are the key functions that stateless and stateful firewalls provide to secure a network? (Select all that apply.) -Answer-Block TCP ports & Allow network protocols A new cloud service provider (CSP) leases resources to multiple organizations (or customers) around the world. Each customer is independent and does not share the same logical cloud storage resource. The customers use an on-demand payment plan. Which cloud model is the CSP most likely providing to its customers? -Answer-Public cloud In a Public Key Infrastructure (PKI), which option best describes how users and multiple Certificate Authorities (CA) interact with each other in a large environment? -Answer-Trust model A developer writes code for a new application, and wants to ensure protective countermeasures against the execution of SQL injection attacks. What secure coding technique will provide this? -Answer-Input validation An organization moves its data to the cloud. Engineers utilize regional replication to protect data. Review the descriptions and conclude which ones apply to this configuration. (Select all that apply.) -Answer-A solution that is known as zone-redundant storage. & Access is available if a single data center is destroyed. Which of the following protocols would secure a tunnel for credential exchange using port 636? -Answer-LDAPS Which certificate format allows the transfer of private keys and is password protected? -Answer-PFX When implementing a native-cloud firewall, which layer of the Open Systems Interconnection (OSI) model will require the most processing capacity to filter traffic based on content? -Answer-Layer 7 A public key infrastructure (PKI) is being set up for a logistics company, utilizing OpenSSL hosted on Red Hat Enterprise Linux. Which of the following commands can the team use, when setting up the PKI, to create an encrypted RSA private key? -Answer-openssl genrsa -aes256 -out 2048 A large firm requires better control over mobile users' access to business applications in the cloud. This will require single-sign on and support for different device types. What solution should the company consider using? -Answer-CASB A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust and communicate securely with public websites. Which type of certificates are the network administrator currently importing? -Answer-Root A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use? -Answer-Key escrow A web administrator notices a few security vulnerabilities that need to be addressed on the company Intranet site. The portal must force a secure browsing connection, mitigate script injection, and prevent caching on shared client devices. Determine the secure options to set on the web server's response headers. (Select all that apply.) -Answer-B.HTTP Strict Transport Security (HSTS) & C.Content Security Policy (CSP) & D.Cache-Control An organization uses a Session Initiation Protocol (SIP) endpoint for establishing communications with remote branch offices. Which of the following protocols will provide encryption for streaming data during the call? -Answer-SRTP Following a secure deployment methodology for custom applications, early code testing would run in which type of environment? -Answer-Development A cloud administrator deploys two cloud servers on the Amazon Web Services (AWS) platform, each in a separately defined virtual network. How does the administrator get both servers to communicate with each other without using an Internet gateway? -Answer-Configure VPC endpoint interface. Which aspect of certificate and key management should an administrator practice when trying to prevent the loss of private keys? -Answer-Storage A laptop arrives at the company technology lab with a pre-configured embedded private key. When this key is used in conjunction with the corresponding public key for encryption/decryption purposes, what primary security feature does this system likely provide? -Answer-Hardware root of trust A company has a two-level certificate authority (CA) hierarchy. One of the CA servers is offline, while the others are online. Which statements are TRUE of online and offline CAs? (Select all that apply.) -Answer-An online root is required to add an intermediate CA. & An online CA is needed in order to publish a CRL. Systems administrators want to set up a way to perform remote administration from home. Rather than installing a software agent, the solution should use an underlying technology that is available to an application, such as a web browser. Which option would best support these requirements? -Answer-HTML5 VPN

Show more Read less
Institution
CERTMASTER CE SECURITY
Course
CERTMASTER CE SECURITY









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CERTMASTER CE SECURITY
Course
CERTMASTER CE SECURITY

Document information

Uploaded on
January 14, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CERTMASTER CE SECURITY EXAM
QUESTIONS WITH ALL CORRECT
ANSWERS

What are the benefits of using Wi-Fi heat maps for wireless networks? (Select all that
apply.) -Answer-Survey a site for signal strength
&
Determine where to place access points

A cyber analyst is drafting a memorandum on the impacts of exposures tied to
successful attacks and route security. What are the vulnerabilities associated with route
security? (Select all that apply.) -Answer-Source Routing
&
Route injection
&
Software exploits

A network administrator set up a basic packet-filtering firewall using an open-source
application running on a Linux virtual machine. The immediate benefit of this
deployment is the quick configuration of basic firewall rules. What are the key functions
that stateless and stateful firewalls provide to secure a network? (Select all that apply.) -
Answer-Block TCP ports
&
Allow network protocols

A new cloud service provider (CSP) leases resources to multiple organizations (or
customers) around the world. Each customer is independent and does not share the
same logical cloud storage resource. The customers use an on-demand payment plan.
Which cloud model is the CSP most likely providing to its customers? -Answer-Public
cloud

In a Public Key Infrastructure (PKI), which option best describes how users and multiple
Certificate Authorities (CA) interact with each other in a large environment? -Answer-
Trust model

A developer writes code for a new application, and wants to ensure protective
countermeasures against the execution of SQL injection attacks. What secure coding
technique will provide this? -Answer-Input validation

An organization moves its data to the cloud. Engineers utilize regional replication to
protect data. Review the descriptions and conclude which ones apply to this

, configuration. (Select all that apply.) -Answer-A solution that is known as zone-
redundant storage.
&
Access is available if a single data center is destroyed.

Which of the following protocols would secure a tunnel for credential exchange using
port 636? -Answer-LDAPS

Which certificate format allows the transfer of private keys and is password protected? -
Answer-PFX

When implementing a native-cloud firewall, which layer of the Open Systems
Interconnection (OSI) model will require the most processing capacity to filter traffic
based on content? -Answer-Layer 7

A public key infrastructure (PKI) is being set up for a logistics company, utilizing
OpenSSL hosted on Red Hat Enterprise Linux. Which of the following commands can
the team use, when setting up the PKI, to create an encrypted RSA private key? -
Answer-openssl genrsa -aes256 -out server.key 2048

A large firm requires better control over mobile users' access to business applications in
the cloud. This will require single-sign on and support for different device types. What
solution should the company consider using? -Answer-CASB

A network administrator is importing a list of certificates from an online source, so that
employees can use a chain of trust and communicate securely with public websites.
Which type of certificates are the network administrator currently importing? -Answer-
Root

A company with archived and encrypted data looks to archive the associated private
keys needed for decryption. The keys should be externally archived and heavily
guarded. Which option should the company use? -Answer-Key escrow

A web administrator notices a few security vulnerabilities that need to be addressed on
the company Intranet site. The portal must force a secure browsing connection, mitigate
script injection, and prevent caching on shared client devices. Determine the secure
options to set on the web server's response headers. (Select all that apply.) -Answer-
B.HTTP Strict Transport Security (HSTS)
&
C.Content Security Policy (CSP)
&
D.Cache-Control

An organization uses a Session Initiation Protocol (SIP) endpoint for establishing
communications with remote branch offices. Which of the following protocols will
provide encryption for streaming data during the call? -Answer-SRTP

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
victoryguide stuvia
View profile
Follow You need to be logged in order to follow users or courses
Sold
22
Member since
1 year
Number of followers
1
Documents
2821
Last sold
1 week ago

3.7

7 reviews

5
4
4
0
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions