30 Questions
What is the purpose of a Wi-Fi Protected Setup (WPS) attack?
To discover an access point WPS PIN by guessing PIN numbers
Which type of privileges is the BEST choice for simplifying account administration in a high turnover department?
Group-based privileges
What do Mobile Device Management (MDM) applications do with endpoint devices?
Assign unique digital identifiers
What is the main function of a virtual desktop infrastructure (VDI)?
Provide a virtual desktop to users
Which of the following is NOT a valid administration practice according to the text?
User-assigned privileges
What does a WPS attack attempt to guess?
Access point WPS PINs
What is the best method to add a second authentication factor for users launching the gcga application?
Push notifications
Which control can detect malicious traffic after it enters a network?
An intrusion detection system (IDS)
How does an authentication application differ from push notifications in terms of user-friendliness?
An authentication application requires smartphone login and code entry.
What can a Trusted Platform Module (TPM) provide for regarding data security?
Implementing full disk encryption
Which hardware device can generate and store RSA keys used with servers?
Hardware Security Module (HSM)
Why can't an intrusion detection system (IDS) deter attacks according to the text?
Attackers are unaware of the presence of an IDS in a system.
What does remote wipe do to a lost device?
Sends a signal to erase data
Why won't geolocation technologies protect data on a lost device?
They are ineffective in locating lost devices
What does an air gap provide in terms of system isolation?
Physical isolation with a gap of air between systems
What does a screened subnet provide in network security?
Connection to both internal network and Internet
What is the purpose of a Network Access Control (NAC) in a BYOD policy implementation?
Health monitoring for security compliance
What type of detection does a Host-based Intrusion Detection System (HIDS) use for known issues?
Signature-based detection
Which method ensures that 2FA passwords expire after 30 seconds?
TOTP
What is the main advantage of removing all shared accounts?
Simplifies administration
Why shouldn't generic accounts be used?
They provide individual accountability
What is the primary purpose of role-based privileges?
To simplify administration tasks
What does a sandbox primarily provide for testing updates?
Isolated testing environment
What characteristic defines a single sign-on (SSO) solution?
Logging in once for access to multiple resources
Which solution is recommended to protect laptop drives against data theft without user interaction?
DLP
What type of attack attempts to discover the passphrase by targeting the initialization vector?
IV attack
In a VPN setup, which mode encrypts all traffic after the user connects to the VPN?
Full tunnel
What is the main purpose of a split tunnel in a VPN configuration?
Encrypt only traffic for private network
Which type of attack attempts to access information on Bluetooth devices?
Bluesnarfing attack
What is the best solution to implement for protecting against data theft according to the text?
SED
Test your knowledge on two-factor authentication (2FA) password expiry options with this quiz. Choose the best option for ensuring that 2FA passwords expire after 30 seconds.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free