1. Every morning,a systems administrator monitors failed login attempts on the company's log management server. The administrator notices the DBAdmin account has five failed username and/or password alerts during a ten-minute window. The systems administrator determines the user account is a dummy account used to attract attackers. Which of the following techniques should the systems administrator implement?
A) Role-based access control
B) Honeypot
C) Password cracker
D) Rule-based access control
2. A website administrator has received an alert from an application designed to check the integrity of the company's website. The alert indicated that the hash value for a particular MPEG file has changed. Upon further investigation,the media appears to be the same as it was before the alert. Which of the following methods has MOST likely been used?
A) Covert timing
B) Time of check/time of use
C) Steganography
D) Man in the middle
E) Cryptography
3. In an effort to reduce data storage requirements,some company devices to hash every file and eliminate duplicates. The data processing routines are time sensitive so the hashing algorithm is fast and supported on a wide range of systems. Which of the following algorithms is BEST suited for this purpose?
A) RIPEMD
B) SHA
C) AES
D) MD5
4. In terms of encrypting data,which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?
A) Using salt
B) Using hash algorithms
C) Implementing PKI
D) Implementing elliptical curve
5. A systems administrator found a suspicious file in the root of the file system. The file contains URLs,usernames,passwords,and text from other documents being edited on the system. Which of the following types of malware would generate such a file?
A) Rootkit
B) Bot
C) RAT
D) Keylogger
Write a public review