6.
Vincent is responding to a security incident that
compromised one of his organization’s web servers. He does
not believe that the attackers modified or stole any information,
but they did disrupt access to the organization’s website. What
cybersecurity objective did this attack violate?
- A.Confidentiality
- B.Nonrepudiation
- C.Integrity
- D.Availability
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
In an availability attack, the attacker disrupts access to information or a service by legitimate users. In this attack, the attacker disrupted access to the organization’s website, violating the principle of availability. |
7.
Which one of the following is an example of an operational
security control?
- A.Encryption software
- B.Network firewall
- C.Antivirus software
- D.Penetration tests
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Penetration tests are an example of an operational security control. Encryption software, network firewalls, and antivirus software are all examples of technical security controls. |
8.
Paul recently completed a risk assessment and determined
that his network was vulnerable to hackers connecting to open
ports on servers. He implemented a network firewall to reduce
the likelihood of a successful attack. What risk management
strategy did Paul choose to pursue?
- A.Risk mitigation
- B.Risk avoidance
- C.Risk transference
- D.Risk acceptance
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Any action that an organization takes to reduce the likelihood or impact of a risk is an example of risk mitigation. In this case, Paul chose to implement a technical control—a network firewall—to mitigate the likelihood of a successful attack. |
9.
Robert’s organization has a Bring Your Own Device (BYOD)
policy, and he would like to ensure that devices connected to
the network under this policy have current antivirus software.
What technology can best assist him with this goal?
- A.Network firewall
- B.Network access control
- C.Network segmentation
- D.Virtual private network
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Network access control (NAC) solutions are able to verify the security status of devices before granting them access to the organization’s network. Devices not meeting minimum security standards may be placed on a quarantine network until they are remediated. |
10.
When performing 802.1x authentication, what protocol does
the authenticator use to communicate with the authentication
server?
- A.802.11g
- B.EAP
- C.PEAP
- D.RADIUS
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
The Remote Access Dial-In User Service (RADIUS) is an authentication protocol used for communications between authenticators and the authentication server during the 802.1x authentication process. |