1. The process of applying a salt and cryptographic hash to a password then repeating the process many times is known as which of the following?
A) Brute force attack B) Rainbow table C) Key stretching D) Collision resistance
2. Which of the following is a compensating control that will BEST reduce the risk of weak passwords?
A) Increasing password history retention count B) Disabling user accounts after exceeding maximum attempts C) Setting expiration of user passwords to a shorter time D) Requiring the use of one-time tokens
3. The IT department is deploying new computers. To ease the transition,users will be allowed to access their old and new systems. The help desk is receiving reports that users are experiencing the following error when attempting to log in to their previous system: Logon Failure: Access Denied Which of the following can cause this issue?
A) Permission issues B) Misconfigured devices C) Access violations D) Certificate issues
4. The IT department needs to prevent users from installing untested applications. Which of the following would provide the BEST solution?
A) Least privilege B) Account lockout C) Job rotation D) Antivirus
5. When identifying a company - s most valuable assets as part of a BIA,which of the following should be the FIRST priority?
A) Public reputation B) Intellectual property C) Life D) Sensitive data
Leave a comment