Podcast
Questions and Answers
Lin's hardware manufacturer has stopped selling the model of device that Lin's organization uses and has also stopped providing security or other updates. What phase of the hardware life cycle is the device in?
Lin's hardware manufacturer has stopped selling the model of device that Lin's organization uses and has also stopped providing security or other updates. What phase of the hardware life cycle is the device in?
- Legacy (correct)
- End-of-life
- End-of-sales
- Senescence
Naomi has discovered the following TCP ports open on a system she wants to harden. Which ports are used for unsecure services and thus should be disabled to allow their secure equivalents to continue to be used?
Naomi has discovered the following TCP ports open on a system she wants to harden. Which ports are used for unsecure services and thus should be disabled to allow their secure equivalents to continue to be used?
- 21 and 80
- 21, 23, and 80 (correct)
- 22 and 443
- 21, 22, and 80
Frank's organization is preparing to deploy a data loss prevention (DLP) system. What key process should they undertake before they deploy it?
Frank's organization is preparing to deploy a data loss prevention (DLP) system. What key process should they undertake before they deploy it?
- Define data life cycles for all nonsensitive data.
- Encrypt all sensitive data.
- Implement and use a data classification scheme. (correct)
- Tag all data by creator or owner.
Oliver wants to store and manage secrets in his cloud service provider's environment. What type of solution should he look for as part of their offerings?
Oliver wants to store and manage secrets in his cloud service provider's environment. What type of solution should he look for as part of their offerings?
What is the key difference between EDR and XDR solutions?
What is the key difference between EDR and XDR solutions?
Michelle wants to prevent unauthorized applications from being installed on a Windows system. What type of tool can she use to stop applications from being installed?
Michelle wants to prevent unauthorized applications from being installed on a Windows system. What type of tool can she use to stop applications from being installed?
What term is used to describe tools focused on detecting and responding to suspicious activities occurring on endpoints like desktops, laptops, and mobile devices?
What term is used to describe tools focused on detecting and responding to suspicious activities occurring on endpoints like desktops, laptops, and mobile devices?
Fred has recently purchased a network router and is preparing to deploy it. Which of the following is a common step in deploying new routers?
Fred has recently purchased a network router and is preparing to deploy it. Which of the following is a common step in deploying new routers?
Charlene wants to prevent attacks against her system that leverage flaws in the services that it provides while still keeping the services accessible. What hardening technique should she use?
Charlene wants to prevent attacks against her system that leverage flaws in the services that it provides while still keeping the services accessible. What hardening technique should she use?
Allan is preparing to harden his organization's network switches. Which of the following is not a common hardening technique for network devices?
Allan is preparing to harden his organization's network switches. Which of the following is not a common hardening technique for network devices?
Helen's organization is planning to deploy IoT devices across their buildings as part of a HVAC system. Helen knows that the vendor for the IoT devices does not provide regular security updates to the device's web interfaces that are used to manage the devices. What security control should she recommend to help protect the devices on the network?
Helen's organization is planning to deploy IoT devices across their buildings as part of a HVAC system. Helen knows that the vendor for the IoT devices does not provide regular security updates to the device's web interfaces that are used to manage the devices. What security control should she recommend to help protect the devices on the network?
What is the primary reason to remove unnecessary software during hardening efforts?
What is the primary reason to remove unnecessary software during hardening efforts?
Brian has deployed a system that monitors sensors and uses that data to manage the power distribution for the power company that he works for. Which of the following terms is commonly used to describe this type of control and monitoring solution?
Brian has deployed a system that monitors sensors and uses that data to manage the power distribution for the power company that he works for. Which of the following terms is commonly used to describe this type of control and monitoring solution?
The organization that Lynn works for wants to deploy an embedded system that needs to process data as it comes in to the device without processing delays or other interruptions. What type of solution does Lynn's company need to deploy?
The organization that Lynn works for wants to deploy an embedded system that needs to process data as it comes in to the device without processing delays or other interruptions. What type of solution does Lynn's company need to deploy?
Which of the following is not a common constraint of an embedded system?
Which of the following is not a common constraint of an embedded system?
Jim configures a Windows machine with the built-in BitLocker full-disk encryption tool that uses a TPM chip. When is the machine least vulnerable to having data stolen from it?
Jim configures a Windows machine with the built-in BitLocker full-disk encryption tool that uses a TPM chip. When is the machine least vulnerable to having data stolen from it?
Olivia wants to install a host-based security package that can detect attacks against the system coming from the network, but she does not want to take the risk of blocking the attacks since she fears that she might inadvertently block legitimate traffic. What type of tool could she install that will meet this requirement?
Olivia wants to install a host-based security package that can detect attacks against the system coming from the network, but she does not want to take the risk of blocking the attacks since she fears that she might inadvertently block legitimate traffic. What type of tool could she install that will meet this requirement?
Anita wants to enforce security settings across her organization's Windows Active Directory domain. What tool can she use to do this?
Anita wants to enforce security settings across her organization's Windows Active Directory domain. What tool can she use to do this?
Chris wants systems that connect to his network to report their boot processes to a server where they can be validated before being permitted to join the network. What technology should he use to do this on the workstations?
Chris wants systems that connect to his network to report their boot processes to a server where they can be validated before being permitted to join the network. What technology should he use to do this on the workstations?
Elaine wants to securely erase the contents of a tape used for backups in her organization's tape library. What is the fastest secure erase method available to her that will allow the tape to be reused?
Elaine wants to securely erase the contents of a tape used for backups in her organization's tape library. What is the fastest secure erase method available to her that will allow the tape to be reused?
Flashcards
Capital of France (example flashcard)
Capital of France (example flashcard)
Paris