1. A security administrator is tasked with conducting an assessment made to establish the baseline security posture of the corporate IT infrastructure. The assessment must report actual flaws and weaknesses in the infrastructure. Due to the expense of hiring outside consultants,the testing must be performed using in-house or cheaply available resource. There cannot be a possibility of any requirement being damaged in the test. Which of the following has the administrator been tasked to perform?
A) Vulnerability assessment B) Threat assessment C) Penetration test D) Risk transference
2. A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list. Which of the following BEST describes this type of IDS?
A) Behavior-based B) Anomaly-based C) Heuristic D) Signature based
3. A security analyst is mitigating a pass-the-hash vulnerability on a Windows infrastructure. Given the requirement,which of the following should the security analyst do to MINIMIZE the risk?
A) Disable NTLM B) Enable Kerebos C) Enable CHAP D) Disable PAP
4. A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: All access must be correlated to a user account. All user accounts must be assigned to a single individual. User access to the PHI data must be recorded. Anomalies in PHI data access must be reported. Logs and records cannot be deleted or modified. Which of the following should the administrator implement to meet the above requirements? (Select three.)(Select 3answers)
A) Create a standard naming convention for accounts. B) Eliminate shared accounts. C) Enable account lockout thresholds. D) Copy logs in real time to a secured WORM drive. E) Implement usage auditing and review. F) Implement time-of-day restrictions.
5. A security administrator suspects that data on a server has been exhilarated as a result of un- authorized remote access. Which of the following would assist the administrator in con-firming the suspicions? (Select TWO)(Select 2answers)
A) File integrity monitoring B) Log analysis C) DLP alerts D) Networking access control E) Host firewall rules
Leave a comment