CompTIA JK0-022 Security Cryptography Certification Exam Set 4

Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile device?


Options are :

  • Diffie-Hellman algorithm
  • Elliptical curve cryptography (Correct)
  • Stream cipher
  • Block cipher

Answer : Elliptical curve cryptography

A Human Resources user is issued a virtual desktop typically assigned to Accounting employees. A system administrator wants to disable certain services and remove the local accounting groups installed by default on this virtual machine. The system administrator is adhering to which of the following security best practices?


Options are :

  • Operating System hardening (Correct)
  • Black listing applications
  • Mandatory Access Control
  • Patch Management

Answer : Operating System hardening

Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?


Options are :

  • Content inspection
  • Malware inspection
  • Spam filter
  • URL filter (Correct)

Answer : URL filter

Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?


Options are :

  • HIPS
  • Protocol analyzer (Correct)
  • Firewall
  • Router

Answer : Protocol analyzer

Failure to validate the size of a variable before writing it to memory could result in which of the following application attacks?


Options are :

  • Buffer overflow (Correct)
  • SQL injection
  • Malicious logic
  • Cross-site scripting

Answer : Buffer overflow

A system administrator is setting up a file transfer server. The goal is to encrypt the user authentication and the files the user is sending using only a user ID and a key pair. Which of the following methods would achieve this goal?


Options are :

  • IPSec
  • AES
  • PGP
  • SSH (Correct)

Answer : SSH

An organizations' security policy requires that users change passwords every 30 days. After a security audit, it was determined that users were recycling previously used passwords. Which of the following password enforcement policies would have mitigated this issue?


Options are :

  • Password length
  • Password expiration
  • Password history (Correct)
  • Password complexity

Answer : Password history

Joe, a user, wants to protect sensitive information stored on his hard drive. He uses a program that encrypted the whole hard drive. Once the hard drive is fully encrypted, he uses the same program to create a hidden volume within the encrypted hard drive and stores the sensitive information within the hidden volume. This is an example of which of the following? (Select TWO).


Options are :

  • Plausible deniability (Correct)
  • Trust models
  • Transitive encryption
  • Steganography (Correct)
  • Multi-pass encryption
  • Transport encryption

Answer : Plausible deniability Steganography

Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent penetration test reveals vulnerabilities on the network. Which of the following has been reported by the vulnerability scan?


Options are :

  • False positive
  • False negative (Correct)
  • Active scan
  • Passive scan

Answer : False negative

A security administrator has deployed all laptops with Self Encrypting Drives (SED) and enforces key encryption. Which of the following represents the greatest threat to maintaining data confidentiality with these devices?


Options are :

  • If the laptop does not use a Secure Boot BIOS, the SED hardware is not enabled allowing full data access.
  • Laptops that are placed in a sleep mode allow full data access when powered back on. (Correct)
  • A malicious employee can gain the SED encryption keys through software extraction allowing access to other laptops.
  • Full data access can be obtained by connecting the drive to a SATA or USB adapter bypassing the SED hardware.

Answer : Laptops that are placed in a sleep mode allow full data access when powered back on.

A security administrator must implement a secure key exchange protocol that will allow company clients to autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the following MUST be implemented?


Options are :

  • Diffie-Hellman (Correct)
  • SHA-256
  • AES
  • 3DES

Answer : Diffie-Hellman

A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion. Which of the following technologies would BEST be suited to accomplish this?


Options are :

  • Stream Encryption
  • Transport Encryption
  • Steganography (Correct)
  • Digital Signature

Answer : Steganography

A business has set up a Customer Service kiosk within a shopping mall. The location will be staffed by an employee using a laptop during the mall business hours, but there are still concerns regarding the physical safety of the equipment while it is not in use. Which of the following controls would BEST address this security concern?


Options are :

  • Host-based firewall
  • Locking cabinets (Correct)
  • Surveillance video
  • Cable locks

Answer : Locking cabinets

Which of the following is a penetration testing method?


Options are :

  • Calling the target's helpdesk, requesting a password reset (Correct)
  • Running a port scanner against the target's network
  • Searching the WHOIS database for administrator contact information
  • War driving from a target's parking lot to footprint the wireless network

Answer : Calling the target's helpdesk, requesting a password reset

A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration. Which of the following should be implemented to secure the devices without risking availability?


Options are :

  • Honeypot
  • Host-based firewall
  • IDS (Correct)
  • IPS

Answer : IDS

A security administrator must implement a system that will support and enforce the following file system access control model: Employees.doc Confidential Salary.xls Confidential OfficePhones.xls Unclassified PersonalPhones.xls Restricted Which of the following should the security administrator implement?


Options are :

  • SCADA system
  • Trusted OS (Correct)
  • White and black listing
  • Version control

Answer : Trusted OS

A large bank has moved back office operations offshore to another country with lower wage costs in an attempt to improve profit and productivity. Which of the following would be a customer concern if the offshore staff had direct access to their data?


Options are :

  • Service level agreements
  • Interoperability agreements
  • Data ownership
  • Privacy considerations (Correct)

Answer : Privacy considerations

An overseas branch office within a company has many more technical and non-technical security incidents than other parts of the company. Which of the following management controls should be introduced to the branch office to improve their state of security?


Options are :

  • Initial baseline configuration snapshots
  • Event log analysis and incident response
  • Continuous security monitoring processes (Correct)
  • Firewall, IPS and network segmentation

Answer : Continuous security monitoring processes

Which of the following attacks impact the availability of a system? (Select TWO).


Options are :

  • Spoofing
  • DDoS (Correct)
  • Spim
  • Phishing
  • Smurf (Correct)

Answer : DDoS Smurf

A customer has provided an email address and password to a website as part of the login process. Which of the following BEST describes the email address?


Options are :

  • Identification (Correct)
  • Authorization
  • Access control
  • Authentication

Answer : Identification

A company is concerned that a compromised certificate may result in a man-in-the-middle attack against backend financial servers. In order to minimize the amount of time a compromised certificate would be accepted by other servers, the company decides to add another validation step to SSL/TLS connections. Which of the following technologies provides the FASTEST revocation capability?


Options are :

  • Certificate Revocation Lists (CRL)
  • Intermediate Certificate Authority (CA)
  • Online Certificate Status Protocol (OCSP) (Correct)
  • Public Key Cryptography (PKI)

Answer : Online Certificate Status Protocol (OCSP)

A Windows-based computer is infected with malware and is running too slowly to boot and run a malware scanner. Which of the following is the BEST way to run the malware scanner?


Options are :

  • Boot from CD/USB (Correct)
  • Enable the firewall
  • Disable the network connection
  • Kill all system processes

Answer : Boot from CD/USB

A security administrator wants to implement a solution which will allow some applications to run under the user's home directory and only have access to files stored within the same user's folder, while other applications have access to shared folders. Which of the following BEST addresses these requirements if the environment is concurrently shared by multiple users?


Options are :

  • Process sandboxing (Correct)
  • OS Virtualization
  • Trusted OS
  • File permission

Answer : Process sandboxing

Which of the following devices is used for the transparent security inspection of network traffic by redirecting user packets prior to sending the packets to the intended destination?


Options are :

  • Load balancers
  • Proxies (Correct)
  • VPN concentrator
  • Protocol analyzer

Answer : Proxies

During a disaster recovery planning session, a security administrator has been tasked with determining which threats and vulnerabilities pose a risk to the organization. Which of the following should the administrator rate as having the HIGHEST frequency of risk to the organization?


Options are :

  • Corporate espionage
  • Malware and viruses (Correct)
  • Large scale natural disasters
  • Hostile takeovers

Answer : Malware and viruses

company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need access to sales. Which of the following should be implemented to give the appropriate access while enforcing least privilege?


Options are :

  • Assign individual permissions to users 1 and 2 for payroll. Assign individual permissions to users 4 and 5 for sales. Make user 3 an administrator.
  • Create a sales group with users 3, 4 and 5. Create a payroll group with users 1, 2 and 3. (Correct)
  • Make all users administrators and then restrict users 1 and 2 from sales. Then restrict users 4 and 5 from payroll.
  • Create two additional generic accounts, one for payroll and one for sales that users utilize.

Answer : Create a sales group with users 3, 4 and 5. Create a payroll group with users 1, 2 and 3.

The Chief Executive Officer (CEO) receives a suspicious voice mail warning of credit card fraud. No one else received the voice mail. Which of the following BEST describes this attack?


Options are :

  • Whaling (Correct)
  • Vishing
  • Impersonation
  • Spear phishing

Answer : Whaling

A company administrator has a firewall with an outside interface connected to the Internet and an inside interface connected to the corporate network. Which of the following should the administrator configure to redirect traffic destined for the default HTTP port on the outside interface to an internal server listening on port 8080?


Options are :

  • Create a dynamic PAT from port 80 on the outside interface to the internal interface on port 8080
  • Create a dynamic NAT from port 8080 on the outside interface to the server IP address on port 80
  • Create a static PAT from port 8080 on the outside interface to the server IP address on port 80
  • Create a static PAT from port 80 on the outside interface to the internal interface on port 8080 (Correct)

Answer : Create a static PAT from port 80 on the outside interface to the internal interface on port 8080

An administrator was asked to review user accounts. Which of the following has the potential to cause the MOST amount of damage if the account was compromised?


Options are :

  • A user account with administrative rights (Correct)
  • A password that has not changed in 180 days
  • A single account shared by multiple users
  • An account that has not been logged into since creation

Answer : A user account with administrative rights

An application developer has tested some of the known exploits within a new application. Which of the following should the administrator utilize to test for unidentified faults or memory leaks?


Options are :

  • Input Validations
  • SQL Injections
  • XSRF Attacks
  • Fuzzing (Correct)

Answer : Fuzzing

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions