11 Questions
What would be the best method for mitigating the threat of someone using a password cracker on computers in a company to attempt common passwords?
Account lockout policies
Which XML-based open standard is best for exchanging authentication information?
SAML
To effectively stop session hijacking, which authentication protocol would be the best choice?
CHAP
How could Greg ensure that networked devices at a remote location with an IP-based streaming security camera system can be managed securely as if they are local devices?
An always-on IPSec VPN
What does the OPAL standard specify?
Self-encrypting drives
What does Unified Extensible Firmware Interface (UEFI) Secure Boot do?
It validates a signature for each binary loaded during boot
In which scenario would using a shared account pose the least security risk?
For accounts with few privileges
What did Mike's manager ask him to validate regarding the production website's certificate chain?
That users can verify site and CAs in the chain are trustworthy
Maria wants to implement a device authentication process in her company. What would be her best choice?
802.1X
Which wireless standard uses CCMP for encryption of network traffic?
WPA2
Charles, a CISO, wants to secure the protocol attackers used to enumerate network devices in an organization. Which protocol should he focus on?
SNMP
Test your knowledge on IT security best practices and certificate validation in an information technology setting with these multiple-choice questions. Evaluate scenarios involving shared accounts and certificate chain verification.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free