1. An organization wants to implement a solution that allows for automated logical controls for network defense. An engineer plans to select an appropriate network security component,which automates response actions based on security threats to the network. Which of the following would be MOST appropriate based on the engineer - s requirements?
A) NIPS B) HIDS C) Web proxy D) Elastic load balancer E) NAC
2. An organization wants to utilize a common,Internet-based third-party provider for authorization and authentication. The provider uses a technology based on OAuth 2.0 to provide required services. To which of the following technologies is the provider referring?
A) Open ID Connect B) SAML C) XACML D) LDAP
3. A number of employees report that parts of an ERP application are not working. The systems administrator reviews the following information from one of the employee workstations: Execute permission denied: financemodule.dll Execute permission denied: generalledger.dll Which of the following should the administrator implement to BEST resolve this issue while minimizing risk and attack exposure?
A) Update the application blacklist B) Verify the DLL - s file integrity C) Whitelist the affected libraries D) Place the affected employees in the local administrator - s group
4. A penetration tester finds that a company - s login credentials for the email client were being sent in clear text. Which of the following should be done to provide encrypted logins to the email server?
A) Enable IPSec and configure SMTP. B) Enable SSH and LDAP credentials. C) Enable MIME services and POP3. D) Enable an SSL certificate for IMAP services.
5. A penetration tester has written an application that performs a bit-by-bit XOR 0xFF operation on binaries prior to transmission over untrusted media. Which of the following BEST describes the action performed by this type of application?
A) Hashing B) Key exchange C) Encryption D) Obfusication
Leave a comment