Which of the following can affect the confidentiality of documents stored on a server?
A server breach
Demetrice is a network consultant. She has been hired to design security for a network
that hosts 25 employees, many of whom need remote access. The client recently
opened another small office in a neighboring community and wants to be able to
routinely establish secure network connections between the two locations. The client
often deals with customer bank information and requires a particularly secure solution.
What is her response to these requirements?
Small office/home office (SOHO) virtual private network (VPN)
Nina is a corporate attorney for a San Francisco firm. The chief information and security
officer (CISO) told her that the firm's data center had been hacked 24 hours ago. The
personal information of more than 3 million users was accessed, including their full
names, addresses, and login credentials. Nina discusses the company's liability under
the law, including the requirement to implement and maintain reasonable security
procedures and practices. If it can be proven that the firm was negligent, it may need to
pay damages. Which of the following regulates this issue?
California Consumer Privacy Act (CCPA)
Tonya is redesigning her company's network infrastructure to accommodate rapid
growth. Several departments are highly specialized. Tonya needs to allow Network
News Transfer Protocol (NNTP) on some, but not all, subnets. Her budget is limited.
Which of the following is the best solution?
Place existing routers capable of packet filtering at each subnet.
A social networking website has been gathering a great deal of personal information on
its users for years. This presents the potential danger of exposure if the site is hacked.
In addition, the data could be sold by the social networking platform without the users'
knowledge or consent. What technology does the social media company most likely use
to gather data, such as users' buying preferences?
Data mining
Which of the following is a protocol that allows web servers to complete secure
transactions over the Internet?
Hypertext Transfer Protocol Secure (HTTPS)
Which of the following is a firewall implementation best practice?
Different firewall products should be used depending on firewall placement, such as
different products for border firewalls versus internal host firewalls.
,Which of the following records every connection outside the network on the Internet by
IP address and URL requested?
Proxy server
Chang is a network engineer. He is revising the company's firewall implementation
procedure. As part of this work, he is reviewing the procedural element requiring
placement of network firewalls at chokepoints and mapping out the network structure to
pinpoint the locations where firewalls are to be placed. Which of the following is he
focusing on?
Network design
Protecting computers, hard disks, databases, and other computer equipment attached
directly or indirectly to the Internet can be categorized as which kind of security?
Network security
What does a digital signature provide?
Nonrepudiation
In preserving the confidentiality of users on a corporate network, which party is
responsible for setting up security policies to guarantee users' privacy?
Administrator
The design of firewall placement and configuration in a network infrastructure has many
aspects. Which of the following concerns is most likely related to an upper management
decision that does NOT conform with existing security policy?
Political
A network infrastructure supervisor is designing a firewall placement strategy that will
protect the organization's Internet-facing web and email servers and the internal
network. Which design will best protect both?
Using two firewalls to create a demilitarized zone (DMZ); one firewall is placed between
the Internet and the servers, the other firewall is located behind the first firewall and the
servers protecting the internal network
Which of the following is closely associated with maintaining data integrity?
Hash
Hashing does not verify the integrity of messages. (T/F)?
False
Including photos of configuration screens in firewall procedures can speed up
restoration after a network incident. (T/F)?
True
Hypertext Transfer Protocol Secure (HTTPS) does NOT encrypt private transactions
made over the Internet. (T/F)?
, False
A firewall best practice is to document every action taken during troubleshooting. (T/F)?
True
You can check firewall connectivity using the ping and traceroute commands. (T/F)?
True
What is an example of security through obscurity?
Using a nonstandard operating system for workstations such as Free BSD.
Which operating system (OS) for a bastion host runs on most appliance firewalls as well
as many Internet service provider (ISP) connection devices?
Proprietary OS
What is an intrusion detection system/intrusion prevention system (IDS/IPS) that uses
patterns of known malicious activity similar to how antivirus applications work?
Database-based detection
Before an Internet user can access a demilitarized zone (DMZ), extranet, or private
network resource, it first encounters an entity that is sturdy enough to withstand any sort
of attack. What is this entity called?
Bastion host operating system
A filter pathway is designed to:
make it hard to bypass a network filtering system and force all traffic through one route
Jacob is a network technician who works for a publishing company. He is setting up a
new hire's access permissions. The new hire, Latisha, is an editor. She needs access to
books that have been accepted for publication but are in the review stage. Jacob gives
her access to the network drive containing only books in review, but not access to
administrative or human resources network drives. What principle is Jacob applying?
The principle of least privilege
Which of the following is described as an approach to network security in which each
administrator is given sufficient privileges only within a limited scope of responsibility?
Separation of duties
Rachel is the cybersecurity engineer for a company that fulfills government contracts on
Top Secret projects. She needs to find a way to send highly sensitive information by
email in a way that won't arouse the suspicion of malicious parties. If she encrypts the
emails, everyone will assume they contain confidential information. What is her
solution?
Hide messages in the company's logo within the email.