Just 20 free qusetions

An organization intends to deploy an appliance capable of enhancing its telecommuting capabilities. The device must be adept at managing a large number of secure, authenticated connections, ensuring data integrity and confidentiality. Which network appliance should be implemented to meet these demands most efficiently?.

Remote Access Server (RAS)

A Remote Access Server (RAS) is specifically designed to handle a significant number of secure, authenticated connections, which typically involve telecommuting scenarios. It provides a centralized solution for remote workers to access the corporate network, offering encryption and authentication to maintain data integrity and confidentiality. Despite being capable of various security functions, an Intrusion Detection and Prevention System (IDPS) primarily focuses on identifying and mitigating potential threats and breaches, rather than facilitating remote access. A Load Balancer excels at distributing networking or application traffic across multiple servers but does not inherently provide connectivity solutions for remote workers. 'Content Filtering Appliance' might seem like a viable option because it implies data protection, but it serves a different role — typically screening incoming web content for malware or policy violations — rather than enabling secure remote access.

An organization has experienced a security incident involving an advanced persistent threat (APT) that has bypassed existing security controls and established a foothold on the network. As part of the incident response activities, what is the MOST appropriate immediate action to take once the threat is confirmed?

Isolate the affected systems from the network to prevent the APT from further establishing its presence or causing additional damage.

The first and most appropriate immediate action following the confirmation of an advanced persistent threat is to contain the threat. This is to prevent any further spread or damage within the network. Containment strategies may vary depending on the characteristics of the incident but often include isolating affected systems, blocking malicious traffic, or temporarily shutting down services. Eradication and recovery steps only follow after containment is successfully achieved, and while documentation is critical, it does not take precedence over containing an active threat. In this scenario, as we are dealing with an APT, fast action is crucial to limit the threat.

A vulnerability that allows unauthorized code execution remotely

A company is about to enter into an agreement with a cloud service provider. Which of the following should the company primarily focus on to ensure timely and effective remediation of service interruptions?

Recovery Time Objective (RTO)

Which of the following physical security controls is designed to prevent unauthorized vehicles from entering a restricted area?

Bollards

When deploying a new fleet of servers, what is the BEST initial step to ensure that they adhere to the company's security policy?

Create and implement a documented security configuration baseline

The risk register only needs to be updated when a new risk is identified, not as part of a regular review process.

The statement is incorrect; the risk register requires updates during regular review processes as well as when new risks are identified.

A company is planning to integrate their authentication processes with a third-party service provider to allow employees to use a single set of credentials across both systems. To enhance the user experience and provide secure access to the services offered by the partner, which solution would be the BEST to implement?

Implementing a federated identity management system

The security team at XYZ Corporation is conducting a routine audit of the company's wireless technologies. They have identified the use of Bluetooth-enabled devices in several departments for sharing files and syncing personal devices with company laptops. Which of the following would be the MOST effective mitigation technique to reduce the risk of a potential security breach due to these Bluetooth connections?

Which of the following options is a network device that can use VLANs to reduce collisions and the size of broadcast domains?

A site fully equipped and operationally ready to take over functionality within minutes in the event of a system failure is classified as a warm site.

An organization is conducting a Business Impact Analysis. Which metric should be determined to establish the maximum time frame that a critical system can be disrupted before severe impact to business operations occurs?

Which of the following is the BEST method to protect credit card information in a database while still allowing for customer data analysis?

Unified Threat Management systems remain equally effective at threat mitigation even when their databases are not consistently updated with the latest threat intelligence.

When entering your company, you first enter a small area with a security desk where you must check-in with guard personnel before you are authorized access into the secure area. This area used for physical security is called what?

If an intruder smashes the back window of a house and gains entry, triggering an alarm due to motion detection, what category of security measure does the alarm system fall under?

During a scheduled change to implement a major software update, which of the following will BEST ensure that any unexpected issues can be remediated without affecting continued operations?

Implementing a gateway at the network perimeter is only effective for inbound traffic and cannot filter or control outbound traffic from the internal network to the internet.

Which of the following best describes an attack that is primarily motivated by disruption and chaos, rather than financial gain or data exfiltration?

During a review of system logs, a security analyst notices an increase in log entries off-hours for a service account. This account is associated with a third-party vendor's update process, which runs monthly maintenance. Which of the following actions should the analyst undertake FIRST to determine if these out-of-cycle log entries are of concern?

Last updated