Security+ Practice Questions Multiple organizations operating in the same vertical want to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?ShibbolethRADIUS federationSAMLOAuthOpenID connect Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?SustainabilityHomogeneityResiliencyConfigurability In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?ElasticityScalabilityHigh availabilityRedundancy A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format?PFXPEMDERCER Which of the following attacks specifically impact data availability?DDoSTrojanMITMRootkit Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?CompetitorHacktivistInsiderOrganized crime. A penetration tester is crawling a target website that is available to the public. Which of the following represents the actions the penetration tester is performing?URL hijackingReconnaissanceWhite box testingEscalation of privilege Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Choose two.)Rainbow table attacks greatly reduce compute cycles at attack time.Rainbow tables must include precomputed hashes.Rainbow table attacks do not require access to hashed passwords.Rainbow table attacks must be performed on the network.Rainbow table attacks bypass maximum failed login restrictions A security analyst wishes to increase the security of an FTP server. Currently, all traffic to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modern FTP client software. The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of the following would BEST accomplish these goals?Require the SFTP protocol to connect to the file serverUse implicit TLS on the FTP serverUse explicit FTPS for connectionsUse SSH tunneling to encrypt the FTP traffic. Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?The recipient can verify integrity of the software patch.. The recipient can verify the authenticity of the site used to download the patch.The recipient can request future updates to the software using the published MD5 value.The recipient can successfully activate the new software patch. An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified?RTORPOMTBFMTTR Which of the following types of keys is found in a key escrow?PublicPrivateSharedSession Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Choose two.)Password expirationPassword lengthPassword complexityPassword historyPassword lockout A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?Transferring the riskAccepting the riskAvoiding the riskMigrating the risk Users report the following message appears when browsing to the company’s secure site: This website cannot be trusted. Which of the following actions should a security analyst take to resolve these messages? (Choose two.)Verify the certificate has not expired on the serverEnsure the certificate has a .pfx extension on the serverUpdate the root certificate into the client computer certificate store.Install the updated private key on the web server.Have users clear their browsing history and relaunch the session. When trying to log onto a company’s new ticketing system, some employees receive the following message: Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with only the recommended hardware specifications. Which of the following is the MOST likely cause for this error message?Network resources have been exceeded.The software is out of licenses.The VM does not have enough processing powerThe firewall is misconfigured. Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were unable to find the application in the app stores. Which of the following allowed Joe to install the application? (Choose two.)Near-field communicationRooting/jailbreakingAd-hoc connectionsTetheringSideloading Which of the following implements two-factor authentication?A phone system requiring a PIN to make a callAn ATM requiring a credit card and PINA computer requiring username and passwordA datacenter mantrap requiring fingerprint and iris scan Which of the following encryption methods does PKI typically use to securely protect keys?Elliptic curveDigital signaturesAsymmetricObfuscation An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?False negativeTrue negativeFalse positiveTrue positive A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring?Time-of-day restrictionsPermission auditing and reviewOffboardingAccount expiration As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technical must ensure the OS settings are hardened. Which of the following is the BEST way to do this?Use a vulnerability scannerUse a configuration compliance scannerUse a passive, in-line scanner.Use a protocol analyzer A user has attempted to access data at a higher classification level than the user’s account is currently authorized to access. Which of the following access control models has been applied to this user’s account?MACDACRBACABAC An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?Create multiple application accounts for each userProvide secure tokensImplement SSO.Utilize role-based access control When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Choose two.)USB-attached hard diskSwap/pagefileMounted network storageROMRAM Ann, a security administrator, has been instructed to perform fuzz-based testing on the company's applications. Which of the following best describes what she will do?Enter random or invalid data into the application in an attempt to cause it to faultWork with the developers to eliminate horizontal privilege escalation opportunitiesTest the applications for the existence of built-in- back doors left by the developers. Hash the application to verify it won't cause a false positive on the HIPS An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents. Which of the following would assist Company.com with its goal?Certificate pinningCertificate staplingCertificate chainingCertificate with extended validation A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using?Shared accountGuest accountService accountUser account When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?DESAESMD5WEP When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?OwnerSystemAdministratorUser A company is terminating an employee for misbehavior. Which of the following steps is MOST important in the process of disengagement from this employee?Obtain a list of passwords used by the employeeGenerate a report on outstanding projects the employee handled.Have the employee surrender company identificationHave the employee sign an NDA before departing. A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?A perimeter firewall and IDSAn air gapped computer networkA honeypot residing in a DMZAn ad hoc network with NATA bastion host Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?Roll back changes in the test environmentVerify the hashes of filesArchive and compress the filesUpdate the secure baseline A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company’s email filter, website filter, or antivirus. Which of the following describes what occurred?The user’s account was over-privileged.Improper error handling triggered a false negative in all three controls.The email originated from a private email server with no malware protection.The virus was a zero-day attack. An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment of DNSSEC at the organization?LDAPTPMTLSSSLPKI An administrator is replacing a wireless router. The configuration of the old wireless router was not documented before it stopped functioning. The equipment connecting to the wireless network uses older legacy equipment that was manufactured prior to the release of the 802.11i standard. Which of the following configuration options should the administrator select for the new wireless router?WPA+CCMPWPA2+CCMPWPA+TKIPWPA2+TKIP An application team is performing a load-balancing test for a critical application during off-hours and has requested access to the load balancer to review which servers are up without having the administrator on call. The security analyst is hesitant to give the application team full access due to other critical applications running on the load balancer. Which of the following is the BEST solution for security analyst to process the request?Give the application team administrator access during off-hoursDisable other critical applications before granting the team access.Give the application team read-only access.Share the account with the application team. Which of the following cryptographic attacks would salting of passwords render ineffective?Brute forceDictionaryRainbow tablesBirthday A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?LDAP servicesKerberos servicesNTLM servicesCHAP services Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Which of the following should be used to sign the user’s certificates?RACACRLCSR Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser?Buffer OverflowMITMXSSSQLi An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?Capture and document necessary information to assist in the response.Request the user capture and provide a screenshot or recording of the symptoms.Use a remote desktop client to collect and analyze the malware in real time.Ask the user to back up files for later recovery. When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:system sprawlend-of-life systemsresource exhaustiona default configuration Time is Up!