Practice Test 9 – Solution

1. Prior to creating policies, companies should look at all regulations and frameworks to ensure that they comply with them.

2. COBIT and ITIL are non-regulatory and not legally enforceable as they are both good practice frameworks.

3. Purchasing broadband from two different companies provides vendor diversity, therefore, if one company fails, then the other still provides broadband.

4. The boundary layer between the LAN and the WAN is called the DMZ; it hosts the extranet web server that is normally used for suppliers and needs credentials to access it.

5. If a laptop had sensitive information such as research and development data, the IT team could isolate it from the network by air gapping it so nobody could connect to it.

6. When full disk encryption such as BitLocker is used on a laptop, the laptop needs to have either a TPM chip or an HSM to store the encryption keys.

7. An IT security team would roll out a honeypot when they want to observe the attack methods being used by an attacker. The benefits would be to enable them to defend against such an attack.

8. A network administrator would use a load balancer to balance the website traffic so that each request would go to the least utilized host, but would use a firewall to prevent the DDoS traffic from entering the company network.

9. A site-to-site VPN is a solution that can connect two different locations as long as it is set to always on; this is a much cheaper solution that a leased line.

10. Port mirroring or a tap can capture traffic going to a port on a switch and display it on another device for analysis.

11. The role of the VPN concentrator is to set up a secure session.

12. If I am using full disk encryption, the trust model being used is known as a hardware root of trust.

13. Standard operating procedures are the step-by-step instructions on how to carry out a task.

14. The company would set this laptop up so that it is air gapped—that would isolate it from the network.

15. You would create four VLANs and put each company in its own VLAN, therefore, isolating them from each other. This would give control to each VLAN and reduce the broadcast domains.

16. If an application will not run or install, it is simply because it has not been added to the whitelist; it does not necessarily need to be on the blacklist. The blacklist is for applications that will never be installed as they are banned.

17. The most common threat to printers and multifunction devices would be the network interface as most devices are now fully connected.

18. Sandboxing is where an isolated virtual machine can be used for patching, testing, or isolation of a dangerous application, therefore, the research and development department would put it in a sandbox.

19. The temperature rise is due to the additional increase in computers but it looks like they have not set up the hot aisles and cold aisles to regulate the temperature.

20. The professor has failed to change the default username or the default password of each of these devices, leaving himself vulnerable to attack.

21. A refrigerator comes under the category of IoT and the defibrillator comes under the category SoC.

22. Errors that are customer-facing should be bland, giving away very little information, whereas the errors for the IT team should be as long and detailed as possible. Errors should not cause a system to stop.

23. Both the black box and white box penetration testers use fuzzing, a technique that puts random information into an application to see what random output it provides. The white box tester is doing this with newly developed applications so that they are secure before moving into production.

24. The first technique to mask data would be obfuscation as it obscures the data; the second technique for embedding data would be steganography as it hides data inside other data.

25. The best method for preventing a SQL injection attack would be to use a stored procedure where a sealed script is created and run by using the script name. The secondary way to prevent SQL injection would be input validation where the input is controlled.

26. A zero-day virus cannot be detected by any monitoring system or antivirus solution; it can only be detected by using a baseline where an earlier baseline is compared to the current baseline.

27. The benefit of using a machine template or an imaging package such as a ghost to image a computer is that it produces a consistent baseline.

28. An immutable system is where the complete components are replaced rather than updated, therefore, it would never be patched as it would be fully replaced.

29. The only cloud model that allows you to host bespoke systems in the cloud and maintain them is Platform as a service (PaaS). An example would be Azure.

30. Software as a service is where a vendor writes an application and then leases it but customization is forbidden. Examples would be Spotify or Office 365.

31. Type I hypervisors are bare metal and require no operating system, whereas a Type II hypervisor sits on top of an operating system, for example, Oracle's VirtualBox.

32. If the US Army decided to move all of their systems to the cloud, they would adopt a private cloud where they would own the whole environment and be isolated from everyone else due to security.

33. If an IT training company needed an environment for a word-processing course, they would lease little resources from the cloud provider but if they required a Skype or SharePoint environment, they could lease high-end servers—all they have to do is to send the image to the cloud provider, who would roll it out.

34. The company needs to put version control on each document and have a master list on the intranet as to what is the latest version. That way, older versions could be destroyed.

35. The staging phase in SDLC is where the application is tested with production data.

36. Waterfall is where one stage must be completed fully before the next stage commences. Agile can start all phases at the same time; its main aim is customer satisfaction. It is very similar to scrum.

37. A camera is a physical device that can capture both pictures and video, therefore, capturing motion and providing non-repudiation as the person is captured on film.

38. A Faraday cage can be built over a WLAN, preventing emissions from escaping and blocking incoming wireless communications.

39. The company is adopting key management where they ensure that all keys are accounted for and do not leave the premises so keys cannot be cut.

40. Protected distribution or conduits can be used to house cabling and prevent them from being attacked by rodents.

41. VM escape is where an attacker launches an attack from a vulnerable virtual machine and attacks the host housing all of the virtual machines.

42. VM sprawl is where an unmanaged virtual machine has been added to your virtual network, as it is not known, it will not be regularly patched and will become vulnerable to attack.

43. A NAT hides the internal network and protects it from attack by a third party.

44. DNSSEC can be used to encrypt all DNS traffic and prevent DNS poisoning and it produces RRSIG records.

45. DHCP snooping can prevent IP addresses from rogue access points from operating in your network. It prevents those addresses from being offered to client computers.

46. The company owns the equipment in a CYOD environment, therefore, when someone leaves the company, there can be no argument over who owns the data, whereas, in a BYOD environment, problems relating to data ownership could arise.

47. Near Field Communication (NFC) is used for contactless card payments.

48. I could insert an SD card or similar card to keep my business data separate from my personal data; this is known as containerization or storage segmentation.

49. When a network load balancer is set to affinity, it sends the client request to the same web server and does not balance it across all of the hosts.

50. If I don't have a load balancer, I can use DNS round robin to rotate the incoming requests to each web server by going to each of the DNS records in turn.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset