100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

SECURITY+ CERTMASTER CE TEST 3 QUESTIONS WITH CORRECT DETAILED ANSWERS

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
12-02-2025
Escrito en
2024/2025

SECURITY+ CERTMASTER CE TEST 3 QUESTIONS WITH CORRECT DETAILED ANSWERS OCSP stapling -Answer-There are several ways to check on the status of an online certificate, but some introduce privacy concerns. Consider how each of the following is structured, and select the option with the best ability to hide the identity of the certificate status requestor. ***(NOT)Use certificate chaining*** -Answer-An independent penetration testing company is invited to test a company's legacy banking application developed for Android phones. It uses Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates. Penetration tests reveal the connections with clients were vulnerable to a Man-in-the-Middle (MITM) attack. How does the company prevent this from happening in the public Internet? Trust model -Answer-In a Public Key Infrastructure (PKI), which option best describes how users and multiple Certificate Authorities (CA) interact with each other in a large environment? Key escrow -Answer-A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use? Signature-based -Answer-An administrator deploys a basic network intrusion detection system (NIDS) device to identify known attacks. What detection method does this device use? -Block TCP ports -Allow network protocols -Answer-A network administrator set up a basic packet filtering firewall using an open-source application running on a Linux virtual machine. The immediate benefit to this deployment is the quick configuration of basic firewall rules. What other functionality would influence a decision to deploy a stateless, rather than stateful, firewall? (Select all that apply.) ACL -Answer-An administrator navigates to the Windows Firewall with Advanced Security. The inbound rules show a custom rule, which assigned the action, "Allow the connection" to all programs, all protocols, and all ports with a scope of 192.168.0.0/24. This is an example of what type of security setting? Use correct certificate path. -Answer-A company has two web servers using a load- balance configuration. Users report having periodic trust errors connecting to the website. Both servers are using web-server certificates and show the same path. Which of the following actions would most likely resolve the issue? openssl genrsa -aes256 -out 2048 -Answer-A public key infrastructure (PKI) is being set up for a logistics company, utilizing OpenSSL hosted on Red Hat Enterprise Linux. Which of the following commands can the team use, when setting up the PKI, to create an encrypted RSA private key? DNS Security Extensions -Answer-An authoritative Domain Name System (DNS) server for a zone creates a Resource Records Set (RRSet) signed with a zone signing key. What is the result of this action? S/MIME -Answer-The administrator in an Exchange Server needs to send digitally signed and encrypted messages. What should the administrator use? SRTP -Answer-An organization uses a Session Initiation Protocol (SIP) endpoint for establishing communications with remote branch offices. Which of the following protocols will provide encryption for streaming data during the call? LDAPS -Answer-A web server will utilize a directory protocol to enable users to authenticate with domain credentials. A certificate will be issued to the server to set up a secure tunnel. Which protocol is ideal for this situation? -Tunnel -Transport -Answer-A Transport Layer Security (TLS) Virtual Private Network (VPN) requires a remote access server listening on port 443 to encrypt traffic with a client machine. An IPSec (Internet Protocol Security) VPN can deliver traffic in two modes. One mode encrypts only the payload of the IP packet. The other mode encrypts the whole IP packet (header and payload). What are these two modes? (Select all that apply.) -Establish a guest zone -Upload files using SSH -Use configuration templates -Answer-Consider the principles of web server hardening and determine which actions a system administrator should take when deploying a new web server in a demilitarized zone (DMZ). (Select all that apply.) LDAPS -Answer-Which of the following protocols would secure a tunnel for credential exchange using port 636? Directory services -Answer-Implementing Lightweight Directory Access Protocol Secure (LDAPS) on a web server secures direct queries to which of the following?

Mostrar más Leer menos
Institución
SECURITY+ CERTMASTER CE
Grado
SECURITY+ CERTMASTER CE









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
SECURITY+ CERTMASTER CE
Grado
SECURITY+ CERTMASTER CE

Información del documento

Subido en
12 de febrero de 2025
Número de páginas
7
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SECURITY+ CERTMASTER CE TEST
3 QUESTIONS WITH CORRECT
DETAILED ANSWERS

OCSP stapling -Answer-There are several ways to check on the status of an online
certificate, but some introduce privacy concerns. Consider how each of the following is
structured, and select the option with the best ability to hide the identity of the certificate
status requestor.

***(NOT)Use certificate chaining*** -Answer-An independent penetration testing
company is invited to test a company's legacy banking application developed for
Android phones. It uses Secure Sockets Layer/Transport Layer Security (SSL/TLS)
certificates. Penetration tests reveal the connections with clients were vulnerable to a
Man-in-the-Middle (MITM) attack. How does the company prevent this from happening
in the public Internet?

Trust model -Answer-In a Public Key Infrastructure (PKI), which option best describes
how users and multiple Certificate Authorities (CA) interact with each other in a large
environment?

Key escrow -Answer-A company with archived and encrypted data looks to archive the
associated private keys needed for decryption. The keys should be externally archived
and heavily guarded. Which option should the company use?

Signature-based -Answer-An administrator deploys a basic network intrusion detection
system (NIDS) device to identify known attacks. What detection method does this
device use?

-Block TCP ports
-Allow network protocols -Answer-A network administrator set up a basic packet filtering
firewall using an open-source application running on a Linux virtual machine. The
immediate benefit to this deployment is the quick configuration of basic firewall rules.
What other functionality would influence a decision to deploy a stateless, rather than
stateful, firewall? (Select all that apply.)

ACL -Answer-An administrator navigates to the Windows Firewall with Advanced
Security. The inbound rules show a custom rule, which assigned the action, "Allow the
connection" to all programs, all protocols, and all ports with a scope of 192.168.0.0/24.
This is an example of what type of security setting?

, Use correct certificate path. -Answer-A company has two web servers using a load-
balance configuration. Users report having periodic trust errors connecting to the
website. Both servers are using web-server certificates and show the same path. Which
of the following actions would most likely resolve the issue?

openssl genrsa -aes256 -out server.key 2048 -Answer-A public key infrastructure (PKI)
is being set up for a logistics company, utilizing OpenSSL hosted on Red Hat Enterprise
Linux. Which of the following commands can the team use, when setting up the PKI, to
create an encrypted RSA private key?

DNS Security Extensions -Answer-An authoritative Domain Name System (DNS) server
for a zone creates a Resource Records Set (RRSet) signed with a zone signing key.
What is the result of this action?

S/MIME -Answer-The administrator in an Exchange Server needs to send digitally
signed and encrypted messages. What should the administrator use?

SRTP -Answer-An organization uses a Session Initiation Protocol (SIP) endpoint for
establishing communications with remote branch offices. Which of the following
protocols will provide encryption for streaming data during the call?

LDAPS -Answer-A web server will utilize a directory protocol to enable users to
authenticate with domain credentials. A certificate will be issued to the server to set up a
secure tunnel. Which protocol is ideal for this situation?

-Tunnel
-Transport -Answer-A Transport Layer Security (TLS) Virtual Private Network (VPN)
requires a remote access server listening on port 443 to encrypt traffic with a client
machine. An IPSec (Internet Protocol Security) VPN can deliver traffic in two modes.
One mode encrypts only the payload of the IP packet. The other mode encrypts the
whole IP packet (header and payload). What are these two modes? (Select all that
apply.)

-Establish a guest zone
-Upload files using SSH
-Use configuration templates -Answer-Consider the principles of web server hardening
and determine which actions a system administrator should take when deploying a new
web server in a demilitarized zone (DMZ). (Select all that apply.)

LDAPS -Answer-Which of the following protocols would secure a tunnel for credential
exchange using port 636?

Directory services -Answer-Implementing Lightweight Directory Access Protocol Secure
(LDAPS) on a web server secures direct queries to which of the following?
$14.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
Mindscholars

Conoce al vendedor

Seller avatar
Mindscholars Chamberlain College Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
10 meses
Número de seguidores
0
Documentos
74
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes