Home
6.
Vincent is responding to a security incident that compromised one of his organization’s web servers. He does not believe that the attackers modified or stole any information, but they did disrupt access to the organization’s website. What cybersecurity objective did this attack violate?
  • A.
    Confidentiality
  • B.
    Nonrepudiation
  • C.
    Integrity
  • D.
    Availability
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
In an availability attack, the attacker disrupts access to information or a service by legitimate users. In this attack, the attacker disrupted access to the organization’s website, violating the principle of availability.
Report
Name Email  
7.
Which one of the following is an example of an operational security control?
  • A.
    Encryption software
  • B.
    Network firewall
  • C.
    Antivirus software
  • D.
    Penetration tests
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Penetration tests are an example of an operational security control. Encryption software, network firewalls, and antivirus software are all examples of technical security controls.
Report
Name Email  
8.
Paul recently completed a risk assessment and determined that his network was vulnerable to hackers connecting to open ports on servers. He implemented a network firewall to reduce the likelihood of a successful attack. What risk management strategy did Paul choose to pursue?
  • A.
    Risk mitigation
  • B.
    Risk avoidance
  • C.
    Risk transference
  • D.
    Risk acceptance
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Any action that an organization takes to reduce the likelihood or impact of a risk is an example of risk mitigation. In this case, Paul chose to implement a technical control—a network firewall—to mitigate the likelihood of a successful attack.
Report
Name Email  
9.
Robert’s organization has a Bring Your Own Device (BYOD) policy, and he would like to ensure that devices connected to the network under this policy have current antivirus software. What technology can best assist him with this goal?
  • A.
    Network firewall
  • B.
    Network access control
  • C.
    Network segmentation
  • D.
    Virtual private network
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Network access control (NAC) solutions are able to verify the security status of devices before granting them access to the organization’s network. Devices not meeting minimum security standards may be placed on a quarantine network until they are remediated.
Report
Name Email  
10.
When performing 802.1x authentication, what protocol does the authenticator use to communicate with the authentication server?
  • A.
    802.11g
  • B.
    EAP
  • C.
    PEAP
  • D.
    RADIUS
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
The Remote Access Dial-In User Service (RADIUS) is an authentication protocol used for communications between authenticators and the authentication server during the 802.1x authentication process.
Report
Name Email