1. A security analyst receives a notification from the IDS after working hours,indicating a spike in network traffic. Which of the following BEST describes this type of IDS?
A) Stateful
B) Signature-based
C) Anomaly-based
D) Host-based
2. A security administrator is configuring a new network segment,which contains devices that will be accessed by external users,such as web and FTP server. Which of the following represents the MOST secure way to configure the new network segment?
A) The segment should be placed in the existing internal VLAN to allow internal traffic only.
B) The segment should be placed on an extranet,and the firewall rules should be configured to allow both internal and external traffic.
C) The segment should be placed on an intranet,and the firewall rules should be configured to allow external traffic.
D) The segment should be placed on a separate VLAN,and the firewall rules should be configured to allow external traffic.
3. A small organization has implemented a rogue system detection solution. Which of the following BEST explains the organization - s intent?
A) To identify assets on the network that are subject to resource exhaustion
B) To identify end-of-life systems still in use on the network
C) To identify weak ciphers being used on the network
D) To identify assets that are not authorized for use on the network
4. A security guard has informed the Chief Information Security Officer that a person with a tablet has been walking around the building. The guard also noticed strange white markings in different areas of the parking lot. The person is attempting which of the following types of attacks?
A) Near field communication
B) Packet sniffing
C) War chalking
D) Jamming
5. A security administrator is investigating many recent incidents of credential theft for users accessing the company - s website,despite the hosting web server requiring HTTPS for access. The server - s logs show the website leverages the HTTP POST method for carrying user authentication details. Which of the following is the MOST likely reason for compromise?
A) The HTTP response is susceptible to sniffing.
B) The web server is running a vulnerable SSL configuration.
C) The company doesn - t support DNSSEC.
D) The HTTP POST method is not protected by HTTPS.
Write a public review