1.
QUESTION NO: 1
All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:
Correct Answer
C. L2TP
Explanation
L2TP (Layer 2 Tunneling Protocol) does not provide confidentiality protection as part of the underlying protocol. SSL (Secure Sockets Layer), SSH (Secure Shell), and IPSeC (Internet Protocol Security) all have mechanisms in place to ensure confidentiality of data transmitted over the network. However, L2TP is primarily used for creating virtual private networks (VPNs) and does not include built-in encryption for data confidentiality.
2.
QUESTION NO: 2
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?
Correct Answer
A. SteganograpHy
Explanation
Steganography is a technique that allows an attacker to hide data within files by using the least significant bit(s) of the file. This means that the attacker can manipulate the files in such a way that the changes are not easily detectable by the naked eye. By embedding data in this manner, the attacker can secretly transmit information without arousing suspicion. Unlike worms, Trojan horses, and viruses, which are all malicious software, steganography is a method used to hide data rather than directly causing harm to a system.
3.
QUESTION NO: 3
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?
Correct Answer
B. TCP/IP hijacking
Explanation
TCP/IP hijacking is a type of attack where an attacker intercepts and manipulates TCP/IP packets to gain unauthorized access to a network. In this scenario, the attacker can capture HTTP requests and send back a spoofed page to the victim. This allows the attacker to deceive the victim into believing that they are interacting with a legitimate website or service, leading to potential data theft or other malicious activities.
4.
QUESTION NO: 4
How should a company test the integrity of its backup data?
Correct Answer
C. By restoring part of the backup
Explanation
To test the integrity of its backup data, a company should restore part of the backup. This involves actually retrieving and accessing the data from the backup to ensure that it is complete and can be successfully restored. This test helps to verify that the backup system is functioning properly and that the data can be recovered in the event of a disaster or data loss. Conducting another backup, using software to recover deleted files, and reviewing written procedures are all important steps in data backup and recovery, but they do not specifically test the integrity of the backup data.
5.
QUESTION NO: 5
Which of following can BEST be used to determine the topology of a network and discover unknown devices?
Correct Answer
D. Networkmapper
Explanation
A networkmapper is the best tool to determine the topology of a network and discover unknown devices. A networkmapper is specifically designed to scan and map a network, providing information about the devices connected to it and their relationships. It can detect devices that may not be visible through other means, such as firewalls or network monitoring tools. By analyzing the network's structure and connections, a networkmapper can provide valuable insights into the network's topology and help identify any unknown or unauthorized devices.
6.
QUESTION NO: 6
When should a technician perform penetration testing?
Correct Answer
C. When the technician has permission from the owner of the network
Explanation
Penetration testing should only be performed when the technician has permission from the owner of the network. This is because penetration testing involves actively attempting to exploit vulnerabilities in a network to identify potential security weaknesses. Without proper authorization, performing penetration testing can be considered illegal and unethical. Therefore, it is crucial for the technician to obtain permission from the owner of the network before conducting any penetration testing activities.
7.
QUESTION NO: 7An administrator has implemented a new SMTP service on a server. A public IP address translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the servers public IP address is now reported in a spam real-time block list.Which of the following is wrong with the server?
Correct Answer
A. SMTP open relaying is enabled
Explanation
The correct answer is "SMTP open relaying is enabled". This means that the server is allowing anyone to use it as a relay to send emails, which can be exploited by spammers to send spam emails. This is why the server's public IP address is reported in a spam real-time block list.
8.
QUESTION NO: 8
Which of the following is MOST efficient for encrypting large amounts of data?
Correct Answer
B. Symmetric key algorithms
Explanation
Symmetric key algorithms are the most efficient for encrypting large amounts of data because they use the same key for both encryption and decryption. This eliminates the need for complex mathematical operations and reduces the processing time. Additionally, symmetric key algorithms are faster than asymmetric key algorithms because they do not require the use of large key sizes. Hashing algorithms are not suitable for encrypting large amounts of data as they are one-way functions used for verifying data integrity, while ECC algorithms are efficient for encryption but are not specifically designed for large amounts of data.
9.
QUESTION NO: 9
Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?
Correct Answer
B. War driving
Explanation
Disabling the SSID broadcast of wireless access points is a recommended security measure to prevent war driving. War driving is the act of searching for and mapping out wireless networks by driving around with a wireless device. By disabling the SSID broadcast, the company can make their wireless network less visible and harder to detect, thereby reducing the risk of unauthorized access.
10.
QUESTION NO: 10
Which of the following BEST describes ARP?
Correct Answer
C. Discovering the MAC address of a device from the IP address
Explanation
ARP (Address Resolution Protocol) is a protocol used to discover the MAC address of a device from its IP address. It is commonly used in local area networks to map an IP address to its corresponding MAC address. This mapping is necessary for devices to communicate with each other on the network. By sending an ARP request, a device can determine the MAC address of another device on the same network, allowing for successful communication between them.
11.
QUESTION NO: 11
Which of the following would be BEST to use to apply corporate security settings to a device?
Correct Answer
D. A security template
Explanation
A security template would be the best option to apply corporate security settings to a device. A security template is a predefined configuration file that contains security settings for various aspects of the operating system and applications. It allows administrators to easily apply consistent security settings across multiple devices, ensuring compliance with corporate security policies. Security patches, security hotfixes, and OS service packs are typically used to address specific vulnerabilities or fix bugs, rather than applying comprehensive security settings.
12.
QUESTION NO: 12
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If the anti-malware software is purchased, which of the following is the expected net savings?
Correct Answer
B. $2,290
Explanation
By purchasing the anti-malware software for $5,000 per year, the call center can prevent workstations from being compromised with a 90% probability. If workstations are compromised, it will take three hours to restore services for the 30 staff, resulting in a cost of $90 per hour per staff member. Without the software, there is a 10% chance of workstations being compromised, which would result in a cost of $90 per hour per staff member for three hours. Therefore, the expected net savings from purchasing the software can be calculated as follows: (0.9 * 0) - (0.1 * 30 * 3 * 90) = $2,290.
13.
QUESTION NO: 13
Which of the following is the main objective of steganography?
Correct Answer
C. Hide information
Explanation
The main objective of steganography is to hide information. Steganography is the practice of concealing messages or information within other non-secret data in order to prevent detection. This can be done by embedding the hidden information within digital images, audio files, or other types of media. The purpose of steganography is to ensure that the hidden information remains confidential and is only accessible to the intended recipient, while appearing as innocent or unimportant to anyone else who may come across it.
14.
QUESTION NO: 14
Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?
Correct Answer
C. DH-ECC
Explanation
DH-ECC (Diffie-Hellman Elliptic Curve Cryptography) would allow for secure key exchange over an unsecured network without a pre-shared key. DH-ECC is a cryptographic algorithm that allows two parties to establish a shared secret key over an insecure channel. It uses the mathematics of elliptic curves to provide a high level of security. Unlike 3DES, AES, and MD5, which are encryption algorithms, DH-ECC specifically addresses the secure exchange of keys.
15.
QUESTION NO: 15
Which of the following improves security in a wireless system?
Correct Answer
B. MAC filtering
Explanation
MAC filtering improves security in a wireless system by allowing or denying access to the network based on the MAC address of the device. This prevents unauthorized devices from connecting to the network, as only devices with approved MAC addresses are allowed access.
16.
QUESTION NO: 16
A user wants to implement secure LDAP on the network. Which of the following port numbers secure LDAP use by default?
Correct Answer
D. 636
Explanation
Secure LDAP (LDAPS) uses port number 636 by default. LDAPS is a protocol that provides secure communication between clients and directory servers. It uses SSL/TLS encryption to protect the data transmitted over the network. By default, LDAPS uses port 636 instead of the standard LDAP port (389) to ensure that the communication is encrypted. This helps to prevent unauthorized access and protect sensitive information, such as user credentials, from being intercepted or tampered with during transmission.
17.
QUESTION NO: 17
On which of the following is a security technician MOST likely to find usernames?
Correct Answer
B. Application logs
Explanation
A security technician is most likely to find usernames on application logs. Application logs record information about the activities and events that occur within an application, including user interactions. Usernames are often logged as part of the authentication process when users log in or access certain features within an application. By reviewing the application logs, a security technician can track and monitor user activities, identify any suspicious or unauthorized access, and investigate any security incidents or breaches.
18.
QUESTION NO: 18
How many keys are utilized with asymmetric cryptography?
Correct Answer
B. Two
Explanation
Asymmetric cryptography, also known as public-key cryptography, uses two different keys: a public key and a private key. The public key is used to encrypt data and can be shared with others, while the private key is kept secret and used to decrypt the encrypted data. This two-key system ensures secure communication and authentication between parties. Therefore, the correct answer is "Two".
19.
QUESTION NO: 19
During a risk assessment it is discovered that only one system administrator is assigned several tasks critical to continuity of operations. It is recommended to cross train other system administrators to perform these tasks and mitigate which of the following risks?
Correct Answer
D. Single point of failure
Explanation
The risk being mitigated by cross training other system administrators is the risk of a single point of failure. By having only one system administrator responsible for critical tasks, if that person is unavailable or leaves the organization, there would be no one else capable of performing those tasks. Cross training other system administrators ensures that there are multiple individuals who can step in and maintain continuity of operations, reducing the risk of a single point of failure.
20.
QUESTION NO: 20
Which of the following network filtering devices will rely on signature updates to be effective?
Correct Answer
C. NIDS
Explanation
A Network Intrusion Detection System (NIDS) relies on signature updates to be effective. NIDS monitors network traffic for suspicious activity and compares it against a database of known attack signatures. By regularly updating the signature database, the NIDS can detect and alert on new or emerging threats. This ensures that the NIDS can keep up with the latest attack techniques and provide effective protection for the network.
21.
QUESTION NO: 21
Which of the following is a single server that is setup in the DMZ or outer perimeter in order to distract attackers?
Correct Answer
C. Honeypot
Explanation
A honeypot is a single server that is intentionally set up in the DMZ or outer perimeter of a network to attract and distract attackers. It is designed to look like a legitimate target and contains fake or decoy data, systems, or services. The purpose of a honeypot is to gather information about the tactics, techniques, and tools used by attackers, as well as to divert their attention away from the actual valuable assets of the network.
22.
QUESTION NO: 22
Which of the following encryption algorithms is decrypted in the LEAST amount of time?
Correct Answer
B. AES
Explanation
AES (Advanced Encryption Standard) is decrypted in the least amount of time compared to the other encryption algorithms listed. AES is a symmetric encryption algorithm that uses a fixed key length of 128, 192, or 256 bits. It is widely used and considered to be highly secure and efficient. RSA (Rivest-Shamir-Adleman) is an asymmetric encryption algorithm that involves complex mathematical calculations, making it slower to decrypt. 3DES (Triple Data Encryption Standard) is a symmetric encryption algorithm that applies the DES algorithm three times, making it slower than AES. L2TP (Layer 2 Tunneling Protocol) is a network protocol, not an encryption algorithm, so it is not applicable to this question.
23.
QUESTION NO: 23
An administrator is trying to secure a network from threats originating outside the network. Which of the following devices provides protection for the DMZ from attacks launched from the Internet?
Correct Answer
C. Firewall
Explanation
A firewall is a device that acts as a barrier between a private internal network and the public Internet. It monitors incoming and outgoing network traffic and allows or blocks specific traffic based on predetermined security rules. In the context of securing a network from threats originating outside the network, a firewall is the most appropriate device. It can prevent unauthorized access to the DMZ (Demilitarized Zone), which is a network segment that separates the internal network from the Internet. By filtering and controlling the traffic, a firewall helps protect the DMZ from attacks launched from the Internet.
24.
QUESTION NO: 24
Which of the following is a way to manage operating system updates?
Correct Answer
D. Change management
Explanation
Change management is a way to manage operating system updates. It involves a systematic approach to implementing changes in an organization's IT infrastructure, including updates to the operating system. Change management ensures that updates are planned, tested, and implemented in a controlled manner to minimize disruption and ensure the stability and security of the system. It includes processes for assessing the impact of changes, obtaining approvals, and communicating and coordinating with stakeholders.
25.
QUESTION NO: 25
Which of the following is a list of discrete entries that are known to be benign?
Correct Answer
A. Whitelist
Explanation
A whitelist is a list of discrete entries that are known to be benign. It is used to allow only specific, trusted entities or actions while blocking all others. Unlike a blacklist, which contains entries that are known to be malicious or unwanted, a whitelist only includes entries that are considered safe and authorized. By using a whitelist, organizations can enhance security by restricting access to only known and trusted sources, reducing the risk of unauthorized access or malicious activities.
26.
QUESTION NO: 26
Which of the following increases the collision resistance of a hash?
Correct Answer
A. Salt
Explanation
Salt increases the collision resistance of a hash by adding a random value to the input before hashing. This ensures that even if two inputs are identical, their hash values will be different due to the added salt. This makes it more difficult for attackers to precompute hashes or use rainbow tables to reverse engineer the original input. Increasing the input length, using a larger key space, and rainbow tables can also contribute to collision resistance, but salt specifically addresses the issue of identical inputs producing the same hash value.
27.
QUESTION NO: 27
A programmer has decided to alter the server variable in the coding of an authentication function for a proprietary sales application. Before implementing the new routine on the production application server, which of the following processes should be followed?
Correct Answer
A. Change management
Explanation
Change management should be followed before implementing the new routine on the production application server. Change management is a process that ensures any changes made to an IT system, such as altering the server variable in this case, are properly planned, tested, approved, and documented. This process helps to minimize the risk of introducing errors or disruptions to the system and ensures that changes are implemented in a controlled and organized manner. By following change management, the programmer can ensure that the alteration to the server variable is properly reviewed, approved, and implemented in a way that aligns with the organization's policies and procedures.
28.
QUESTION NO: 28
When deploying 50 new workstations on the network, which of following should be completed FIRST?
Correct Answer
C. Apply the baseline configuration
Explanation
The first step when deploying new workstations on the network should be to apply the baseline configuration. This ensures that all workstations have a consistent and standardized setup, including settings, software, and security measures. By applying the baseline configuration first, it establishes a solid foundation for the deployment of the workstations and ensures that they are ready for further tasks such as installing a word processor, running spyware, and running OS updates.
29.
QUESTION NO: 29
Which of the following should be implemented to have all workstations and servers isolated in their own broadcast domains?
Correct Answer
A. VLANs
Explanation
To have all workstations and servers isolated in their own broadcast domains, VLANs (Virtual Local Area Networks) should be implemented. VLANs allow for the creation of separate broadcast domains within a single physical network infrastructure. By dividing the network into different VLANs, each with its own unique broadcast domain, communication and traffic can be isolated and restricted between different VLANs, ensuring better network performance, security, and management. NAT (Network Address Translation) is used to translate private IP addresses to public IP addresses, access lists are used for filtering network traffic, and an intranet is a private network accessible only to an organization's members.
30.
QUESTION NO: 30
End users are complaining about receiving a lot of email from online vendors and pharmacies. Which of the following is this an example of?
Correct Answer
B. Spam
Explanation
The given scenario describes a situation where end users are receiving a large volume of unwanted email from online vendors and pharmacies. This is a classic example of spam. Spam refers to unsolicited and often irrelevant or inappropriate messages sent in bulk to a large number of recipients. In this case, the emails are not requested by the users and are likely causing inconvenience and annoyance.
31.
QUESTION NO: 31
Which of the following BEST describes a private key in regards to asymmetric encryption?
Correct Answer
A. The key owner has exclusive access to the private key.
Explanation
A private key in regards to asymmetric encryption is a key that is exclusively owned and accessible by the key owner. It is not accessible to anyone else, including the certificate authority (CA) or recipients of encrypted emails. The private key is used for decrypting data that has been encrypted using the corresponding public key.
32.
QUESTION NO: 32
Which of the following logs might reveal the IP address and MAC address of a rogue device within the local network?
Correct Answer
B. DHCP logs
Explanation
DHCP logs might reveal the IP address and MAC address of a rogue device within the local network. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. By analyzing the DHCP logs, network administrators can identify any unauthorized devices that have obtained an IP address from the DHCP server. The logs will contain information about the IP address and MAC address of each device that has requested an IP address, allowing the identification of any rogue device present on the network.
33.
QUESTION NO: 33
Which of the following is commonly used in a distributed denial of service (DDOS) attack?
Correct Answer
C. Botnet
Explanation
A botnet is commonly used in a distributed denial of service (DDoS) attack. A botnet is a network of compromised computers or devices that are controlled by a single attacker. In a DDoS attack, the attacker uses the botnet to flood a target server or network with a massive amount of traffic, overwhelming its resources and causing it to become unavailable to legitimate users. By using a botnet, the attacker can amplify the impact of the attack and make it more difficult to mitigate.
34.
QUESTION NO: 35
Which of the following is a best practice for coding applications in a secure manner?
Correct Answer
A. Input validation
Explanation
Input validation is a best practice for coding applications in a secure manner because it ensures that any user input is properly validated and sanitized before it is processed by the application. This helps to prevent various types of attacks, such as SQL injection and cross-site scripting, which can exploit vulnerabilities in the application and compromise its security. By validating and sanitizing input, developers can ensure that only expected and safe data is accepted by the application, reducing the risk of security breaches.
35.
QUESTION NO: 36
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?
Correct Answer
D. Cloning
Explanation
Cloning can be used as a means to isolate a host OS from some types of security threats. Cloning involves creating an exact copy or replica of the host OS, which can be used as a backup or for testing purposes. By isolating the host OS in this way, any security threats or vulnerabilities that may exist in the original OS can be mitigated or avoided altogether. This can help to ensure the integrity and security of the host OS, protecting it from potential attacks or compromises.
36.
QUESTION NO: 37
Which of the following network tools would provide the information on what an attacker is doing to compromise a system?
Correct Answer
D. Firewall
Explanation
A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the Internet. By examining network packets, a firewall can detect and block suspicious or malicious activity, including attempts by attackers to compromise a system. Therefore, a firewall can provide information on what an attacker is doing to compromise a system by identifying and blocking their malicious actions.
37.
QUESTION NO: 38
Assigning proper security permissions to files and folders is the primary method of mitigating which of the following?
Correct Answer
C. Trojan
Explanation
Assigning proper security permissions to files and folders is the primary method of mitigating Trojan attacks. By setting appropriate permissions, access to sensitive files and folders can be restricted, preventing unauthorized individuals or malware from tampering with or stealing important data. This helps to protect against Trojan horses, which are malicious programs that appear harmless but can exploit security vulnerabilities to gain unauthorized access and cause damage to a system.
38.
QUESTION NO: 39
Which of the following logical access controls would be MOST appropriate to use when creating an account for a temporary worker?
Correct Answer
B. Account expiration
Explanation
Account expiration would be the most appropriate logical access control to use when creating an account for a temporary worker. This control allows the account to automatically expire after a set period of time, ensuring that the temporary worker's access is limited to the duration of their employment. This helps to mitigate the risk of unauthorized access or misuse of the account after the worker's assignment is completed.
39.
QUESTION NO: 40
Which of the following may be an indication of a possible system compromise?
Correct Answer
B. A performance monitor indicates a recent and ongoing drop in speed, disk space or memory
utilization from the baseline
Explanation
A recent and ongoing drop in speed, disk space or memory utilization from the baseline can be an indication of a possible system compromise. This could be caused by malware or unauthorized processes running on the system, which can consume resources and slow down the system's performance. It is important to investigate and address this issue promptly to prevent further compromise and potential damage to the system.
40.
QUESTION NO: 41
An administrator suspects that files are being copied to a remote location during off hours. The file server does not have logging enabled. Which of the following logs would be the BEST place to look for information?
Correct Answer
B. Firewall logs
Explanation
Firewall logs would be the best place to look for information in this scenario because they record all incoming and outgoing network traffic. By analyzing the firewall logs, the administrator can determine if any files were transferred to a remote location during off hours. The logs will provide information about the source and destination IP addresses, as well as the protocols and ports used for the transfer. This will help the administrator identify any suspicious or unauthorized activity.
41.
QUESTION NO: 42
Which of the following access control methods gives the owner control over providing permissions?
Correct Answer
D. Discretionary Access Control (DAC)
Explanation
Discretionary Access Control (DAC) is the access control method that gives the owner control over providing permissions. In DAC, the owner of a resource has the authority to determine who can access that resource and what level of access they have. The owner can grant or revoke permissions for other users or groups, giving them the discretion to control access to their resources. This is in contrast to other access control methods like Role-Based Access Control (RBAC), where access is determined based on predefined roles, and Mandatory Access Control (MAC), where access is determined by system administrators or security policies.
42.
QUESTION NO: 43
Which of the following access control methods grants permissions based on the users position in the company?
Correct Answer
D. Role-Based Access Control (RBAC)
Explanation
Role-Based Access Control (RBAC) is an access control method that grants permissions based on the users' position in the company. In RBAC, access rights are assigned to roles, and users are then assigned to those roles based on their position or responsibilities within the organization. This allows for a more structured and efficient way of managing access permissions, as it aligns with the organization's hierarchical structure. With RBAC, permissions can be easily managed and updated by simply modifying the roles assigned to users, rather than individually assigning permissions to each user.
43.
QUESTION NO: 44
Which of the following access control methods includes switching work assignments at preset intervals?
Correct Answer
A. Job rotation
Explanation
Job rotation is a method of access control that involves switching work assignments at preset intervals. This approach helps to minimize the risk of fraud or unauthorized activities by ensuring that no single individual has continuous access to sensitive information or critical tasks. By periodically rotating employees to different roles or departments, organizations can reduce the likelihood of collusion, increase accountability, and detect any irregularities or misconduct. Job rotation also provides employees with opportunities for skill development, cross-training, and a broader understanding of the organization's operations.
44.
QUESTION NO: 45
Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?
Correct Answer
D. Kerberos
Explanation
Kerberos is a network authentication protocol that uses tickets to verify the identities of users and services. It employs a timestamp and a session key to prevent replay attacks. By using timestamps, Kerberos ensures that each ticket is only valid for a specific period of time, making it difficult for an attacker to capture and reuse the authentication data. This makes Kerberos the most likely authentication method to prevent a replay attack.
45.
QUESTION NO: 46
Which of the following would an attacker use to footprint a system?
Correct Answer
C. Port scanner
Explanation
An attacker would use a port scanner to footprint a system. A port scanner is a tool that scans a target system for open ports, allowing the attacker to identify potential vulnerabilities and services running on the system. By scanning the ports, the attacker can gather information about the system's network configuration and potentially exploit any weaknesses found. This information can be used to plan further attacks or gain unauthorized access to the system.
46.
QUESTION NO: 47
Which of the following ensures a user cannot deny having sent a message?
Correct Answer
C. Non-repudiation
Explanation
Non-repudiation ensures that a user cannot deny having sent a message. This means that the sender's identity is verified and authenticated, and there is evidence to prove that the message was indeed sent by that user. Non-repudiation is important in situations where legal or financial accountability is necessary, as it prevents users from falsely denying their actions or responsibilities.
47.
QUESTION NO: 48
Which of the following allows an attacker to embed a rootkit into a picture?
Correct Answer
C. SteganograpHy
Explanation
Steganography is the technique of hiding information within another file or medium, such as embedding data within a picture. In this case, an attacker can use steganography to hide a rootkit within a picture, making it difficult to detect. A rootkit is a malicious software that provides unauthorized access to a computer system, allowing the attacker to control it remotely. By using steganography, the attacker can hide the rootkit within the picture file, making it appear harmless while still gaining control over the targeted system.
48.
QUESTION NO: 49
Which of the following is a publication of inactivated user certificates?
Correct Answer
A. Certificate revocation list
Explanation
A certificate revocation list is a publication of inactivated user certificates. It is a list that contains the serial numbers of certificates that have been revoked by the certificate authority. This list is used to inform users and systems that a particular certificate is no longer valid and should not be trusted. By checking the certificate revocation list, users can ensure that they are not relying on a compromised or revoked certificate for secure communication.
49.
QUESTION NO: 50
Which of the following is a method of encrypting email?
Correct Answer
A. S/MIME
Explanation
S/MIME is a method of encrypting email. S/MIME stands for Secure/Multipurpose Internet Mail Extensions and it is a widely used protocol for securing email communications. It provides end-to-end encryption, digital signatures, and message integrity checks. S/MIME uses public key cryptography to encrypt and decrypt email messages, ensuring that only the intended recipient can read the message. It also allows for the verification of the sender's identity through the use of digital certificates. SMTP, L2TP, and VPN are not methods of encrypting email.
50.
QUESTION NO: 34
Which of the following practices is MOST relevant to protecting against operating system security flaws?
Correct Answer
B. Patch management
Explanation
Patch management is the most relevant practice for protecting against operating system security flaws. Patch management involves regularly updating and applying patches and updates to the operating system. These patches often include security fixes that address known vulnerabilities and weaknesses in the system. By keeping the operating system up to date with the latest patches, organizations can mitigate the risk of exploitation by attackers and ensure that their systems are secure against known security flaws.