A security administrator wants to check user password complexity.

 A security administrator wants to check user password complexity.


362. Which of the following is a hardware based encryption device?

·        

A. EFS
B. TrueCrypt
C. TPM
D. SLE

·         TPM (Trusted Platform Module)

 

361. Certificates are used for: (Select TWO)

·        

A. Client authentication.
B. WEP encryption.
C. Access control lists.
D. Code signing.
E. Password hashing.

·         Client authentication.
D. Code signing.

 

360. A security administrator wants to check user password complexity. Which of the following is the
BEST tool to use?

·        

A. Password history
B. Password logging
C. Password cracker
D. Password hashing

·         C. Password cracker

 

CompTIA:

An organization hires you to test an application that you have limited knowledge of. You are given a login to the application but do not have access to the source code. What type of test are you running?

·        

A. White-box
B. Black-box
C. SDLC
D. Graybox

·         D. Graybox

 

359. Which of the following can be used by a security administrator to successfully recover a user's
forgotten password on a password protected file?

·        

A. Cognitive password
B. Password sniffing
C. Brute force
D. Social engineering

·         C. Brute force

 

358. Which of the following application security testing techniques is implemented when an automated
system generates random input data?

·        

A. Fuzzing
B. XSRF
C. Hardening
D. Input validation

·         Fuzzing

 

357. Which of the following devices would MOST likely have a DMZ interface?

·        

A. Firewall
B. Switch
C. Load balancer
D. Proxy

·         Firewall

 

356. Employee badges are encoded with a private encryption key and specific personal information.
The encoding is then used to provide access to the network. Which of the following describes this
access control type?

·        

A. Smartcard
B. Token
C. Discretionary access control
D. Mandatory access control

·         Smartcard

 

355. Which of the following MUST be updated immediately when an employee is terminated to prevent
unauthorized access?

·        

A. Registration
B. CA
C. CRL
D. Recovery agent

·         C. CRL (Certificate Revocation List)

 

354. A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?

·        

A. Firewall
B. Application
C. IDS
D. Security

·         D. Security

 

353. Which of the following would be used when a higher level of security is desired for encryption key
storage?

·        

A. TACACS+
B. L2TP
C. LDAP
D. TPM

·         D. TPM (Trusted Platform Module)

 

352. In regards to secure coding practices, why is input validation important?

·        

A. It mitigates buffer overflow attacks.
B. It makes the code more readable.
C. It provides an application configuration baseline.
D. It meets gray box testing standards.

·         It mitigates buffer overflow attacks.

 

Answer Detail

Get This Answer

Invite Tutor