When choosing a hashing algorithm for storing passwords in a web server database, which of the following is the BEST explanation for choosing HMAC-MD5 over simple MD5?
When choosing a hashing algorithm for storing passwords in a web server database, which of the following is the BEST explanation for choosing HMAC-MD5 over simple MD5?A . HMAC provides hardware acceleration thus speeding up authenticationB . HMAC adds a transport layer handshake which improves authenticationC . HMAC-MD5 can be...
Which of the following would be the MOST secure setup that conforms to the organization’s requirements?
An organization wants to set up a wireless network in the most secure way. Budget is not a major consideration, and the organization is willing to accept some complexity when clients are connecting. It is also willing to deny wireless connectivity for clients who cannot be connected in the most...
Which of the following is a component of multifactor authentication?
Which of the following is a component of multifactor authentication?A . RADIUSB . SSOC . Transitive trustD . OTPView AnswerAnswer: A
Which of the following security concepts is this an example of?
A security administrator has created a new group policy object that utilizes the trusted platform module to compute a hash of system files and compare the value to a known-good value. Which of the following security concepts is this an example of?A . Integrity measurementB . Secure baselineC . SandboxingD...
Which of the following should configure to enforce the use for client-site certificates?
A technician wants to implement PKI-based authentication on an enterprise wireless network. Which of the following should configure to enforce the use for client-site certificates?A . 802.1X with PEAPB . WPA2-PSKC . EAP-TLSD . RADIUS FederationView AnswerAnswer: B
A Security analyst has received an alert about PII being sent via email. The analyst’s Chief Information Security Officer (CISO) has made it clear that PII must be handled with extreme care. From which of the following did the alert MOST likely originate?
A Security analyst has received an alert about PII being sent via email. The analyst’s Chief Information Security Officer (CISO) has made it clear that PII must be handled with extreme care. From which of the following did the alert MOST likely originate?A . S/MIMEB . DLPC . IMAPD ....
Which of the following command line tools should the analyst use to perform the Initial assessment?
A security analyst is asked to check the configuration of the company's DNS service on the server. Which of the following command line tools should the analyst use to perform the Initial assessment?A . nslookup/dlgB . tracertC . ipconfig/ifconfigD . tcpdumpView AnswerAnswer: B
Which of the following types of malware was executed?
Ann, a new employee, received an email from an unknown source indicating she needed to click on the provided link to update her company's profile. Once Ann clicked the link, a command prompt appeared with the following output: Which of the following types of malware was executed?A . RansomwareB ....
Which of the following is the security threat a hiring manager is trying to prevent by performing a background screening of a job candidate?
Which of the following is the security threat a hiring manager is trying to prevent by performing a background screening of a job candidate?A . PlagiansmB . Open-source intelligenceC . Malicious insiderD . Social engineeringE . HacktivtsmView AnswerAnswer: C
Which of the following would be MOST appropriate to mitigate the attack?
A security engineer is concerned about susceptibility to HTTP downgrade attacks because the current customer portal redirects users from port 80 to the secure site on port 443. Which of the following would be MOST appropriate to mitigate the attack?A . DNSSECB . HSTSC . Certificate pinningD . OCSPView AnswerAnswer:...