1. A security engineer must install the same x.509 certificate on three different servers. The client application that connects to the server performs a check to ensure the certificate matches the host name. Which of the following should the security engineer use?
A) Wildcard certificate B) Extended validation certificate C) Certificate chaining D) Certificate utilizing the SAN file
2. A security analyst is investigating a security breach. Upon inspection of the audit an access logs,the analyst notices the host was accessed and the /etc/passwd file was modified with a new entry for username - gotcha and user ID of 0. Which of the following are the MOST likely attack vector and tool the analyst should use to determine if the attack is still ongoing? (Select TWO)(Select 2answers)
A) Keylogger B) Tracert C) Logic bomb D) Netstat E) Ping F) Backdoor
3. A procedure differs from a policy in that it:
A) describes adverse actions when violations occur. B) is a high-level statement regarding the company's position on a topic. C) provides step-by-step instructions for performing a task. D) sets a minimum expected baseline of behavior.
4. A security analyst is hardening a WiFi infrastructure. The primary requirements are the following: The infrastructure must allow staff to authenticate using the most secure method. The infrastructure must allow guests to use an 'open' WiFi network that logs valid email addresses before granting access to the Internet. Given these requirements,which of the following statements BEST represents what the analyst should recommend and configure?
A) Configure a captive portal for guests and WPS for staff. B) Configure a captive portal for staff and WEP for guests. C) Configure a captive portal for guest and WPA2 Enterprise for staff D) Configure a captive portal for staff and WPA for guests.
5. A security consultant is setting up a new electronic messaging platform and wants to ensure the platform supports message integrity validation. Which of the following protocols should the consultant recommend?
A) DNSSEC B) S/MIME C) RADIUS D) 802.11x
1. Right Answer: D Explanation: SAN = Subject Alternate Names
Leave a comment