1. Which of the following encryption algorithms is used primarily to secure data at rest?
A) TLS B) AES C) SSL D) RSA
2. Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?
A) Archive and compress the files B) Update the secure baseline C) Roll back changes in the test environment D) Verify the hashes of files
3. When designing a web based client server application with single application server and database cluster backend,input validation should be performed:
A) Using HTTPS B) Using database stored procedures C) On the application server D) On the client
4. Students at a residence hall are reporting Internet connectivity issues. The university - s network administrator configured the residence hall - s network to provide public IP addresses to all connected devices,but many student devices are receiving private IP addresses due to rogue devices. The network administrator verifies the residence hall - s network is correctly configured and contacts the security administrator for help. Which of the following configurations should the security administrator suggest for implementation?
A) DHCP snooping B) Router ACLs C) Flood guard D) BPDU guard
5. Which of the following enables sniffing attacks against a switched network?
A) ARP poisoning B) IGMP snooping C) SYN flooding D) IP spoofing
Leave a comment