0% found this document useful (0 votes)
174 views4 pages

Question 204

The document contains multiple choice questions and answers about technical IT and security topics such as encryption, threats, attacks, risk analysis, data handling, infrastructure architecture, and change management procedures.

Uploaded by

exams6055
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views4 pages

Question 204

The document contains multiple choice questions and answers about technical IT and security topics such as encryption, threats, attacks, risk analysis, data handling, infrastructure architecture, and change management procedures.

Uploaded by

exams6055
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Question 204

A systems administrator uses a key to encrypt a message being sent to a peer in a different branch office. The peer
then uses the same key to decrypt the message. Which of the following describes this example?

A. Symmetric
B. Asymmetric
C. Hashing
D. Salting

Answer: A

Question 205
Which of the following threat actors is the most likely to be motivated by profit?

A. Hacktivist
B. Insider threat
C. Organized crime
D. Shadow IT

Answer: C

Question 206
A network administrator is working on a project to deploy a load balancer in the company's cloud environment. Which
of the following fundamental security requirements does this project fulfil?

A. Privacy
B. Integrity
C. Confidentiality
D. Availability

Answer: D
Question 207
A systems administrator is advised that an external web server is not functioning property. The administrator reviews
the following firewall logs containing traffic going to the web server:

Which of the following attacks is likely occurring?

A. DDoS
B. Directory traversal
C. Brute-force
D. HTTPS downgrade

Answer: A

Question 208
Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than
the impact of the risk?

A. ARO
B. RTO
C. RPO
D. ALE
E. SLE
Answer: D

Question 209
A security administrator is reissuing a former employee's laptop. Which of the following is the best combination of
data handling activities for the administrator to perform? (Choose two.)

A. Data retention
B. Certification
C. Destruction
D. Classification
E. Sanitization
F. Enumeration

Answer: BE

Question 210
A company is redesigning its infrastructure and wants to reduce the number of physical servers in use. Which of the
following architectures is best suited for this goal?

A. Serverless
B. Segmentation
C. Virtualization
D. Microservices

Answer: C

Question 211
A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the
following should be configured on the existing network infrastructure to best prevent this activity?
A. Port security
B. Web application firewall
C. Transport layer security
D. Virtual private network

Answer: A

Question 212
A systems administrator would like to deploy a change to a production system. Which of the following must the
administrator submit to demonstrate that the system can be restored to a working state in the event of a performance
issue?

A. Backout plan
B. Impact analysis
C. Test procedure
D. Approval procedure

Answer: A

You might also like