1. A malicious system continuously sends an extremely large number of SYN packets to a server. Which of the following BEST describes the resulting effect?
A) The server will crash when trying to reassemble all the fragmented packets B) The server's firewall will be unable to effectively filter traffic due to the amount of data transmitted C) The server will exhaust its memory maintaining half-open connections D) The server will be unable to server clients due to lack of bandwidth
2. A company - s IT staff is given the task of securely disposing of 100 server HDDs. The security team informs the IT staff that the data must not be accessible by a third party after disposal. Which of the following is the MOST time-efficient method to achieve this goal?
A) Use software to zero fill all of the hard drives. B) Remove the platters from the HDDs and shred them. C) Use a degausser to sanitize the drives. D) Perform a quick format of the HDD drives.
3. A Chief Information Security Officer (CISO) has tasked a security analyst with assessing the security posture of an organization and which internal factors would contribute to a security compromise. The analyst performs a walk-through of the organization and discovers there are multiple instances of unlabeled optical media on office desks. Employees in the vicinity either do not claim ownership or disavow any knowledge concerning who owns the media. Which of the following is the MOST immediate action to be taken?
A) Confiscate the media and wait for the owner to claim it. If it is not claimed within one month,shred it. B) Confiscate the media,insert it into a computer,make a copy of the disc,and then return the original to where it was found. C) Confiscate the media,insert it into a computer,find out what is on the disc,and then label it and return it to where it was found. D) Confiscate the media and dispose of it in a secure manner as per company policy.
4. An administrator intends to configure an IPSec solution that provides ESP with integrity protection,but not confidentiality protection. Which of the following AES modes of operation would meet this integrity-only requirement?
A) HMAC B) CBC C) GCM D) PCBC E) CFB
5. A company is developing a new system that will unlock a computer automatically when an authorized user sits in front of it,and then lock the computer when the user leaves. The user does not have to perform any action for this process to occur. Which of the following technologies provides this capability?
A) Motion detector B) Facial recognition C) Fingerprint scanner D) Smart cards
Leave a comment