41. Disaster recovery plan is also called as business continuity plan
or business process continuity plan. A DRP should include information security,
asset security, and financial security plans.
42. Note that the divisions do not want the information to be made available to the group personnel only. A role based access control is suitable under this situation because it provides security, as well as flexibility. Here individual users are given privileges based on their respective roles in the organization rather than by name.
43. Kerberos require that the time sources are approximately in synchronization (with in 5 minutes) with each other. However, with recent revisions of Kerberos software, this rule has become flexible.
44. The process of securing a computer system is called Hardening. There are several things that one need to remember for hardening a PC. These include:
45. A properly managed tape backups should include the following:
46. The Layer 2 Tunnel Protocol (L2TP) is a standard that combines the
best features of: Cisco's Layer 2 Forwarding (L2F) and Microsoft's Point-to-Point
Tunneling Protocol (PPTP). L2TP does not provide information confidentiality
by itself. IPSec is normally used in combination with L2Tp for providing
confidentiality of communication.
PGP is used primarily for securing email communications.
47. Advantages of fiber optic cable over CAT5 cable include the following:
However, from security point of view, two chief advantages are a. difficulty
to tap, and b. immunity to external interference, which makes the communication
not easily interruptible.
48. A few techniques used by IDS (Intrusion Detection Systems) include the following:
Anomaly detection method establishes a baseline of normal usage patterns,
and anything that widely deviates from the baseline is investigated for
possible intrusion. An example of this would be if a user logs on and off
of a machine 10 times a day instead of the normal once or twice a day.
Signature detection uses specifically known patterns of unauthorized behavior to predict and detect subsequent similar attempts. These specific patterns are called signatures.
Target monitoring systems do not actively search for anomalies or misuse, but instead look for the modification of specified files.
49. In public key infrastructure:
A key is required to encode/decode a message, and the security of a message depends on the security of key.
A cipher text is the encoded message, and
A certificate is a digitally signed document by a trusted authority.
50. Staff training is the most effective tool for preventing attacks by social engineering.
51. A certificate revocation list (CRL) is a list of certificates, which have been revoked, and are no longer valid.
52. A back door is a program that allows access to the system without usual security checks. These are caused primarily due to poor programming practices.
The following are know back door programs:
53. There are primarily three types of backups:
1. Full backup: Here all the data gets backed up. It usually involves huge amounts of data for large systems, and may take hours to complete. A full backup is preferred instead of incremental or differential backups where it is feasible. However, when there is large amount of data, full backup is done once in a while and incremental or differential backups are done in between. A backup plan is usually put in place prior to taking backup of data.
2. Differential backup: A differential backup includes all the data that has changed since last full backup. The “differential backup” that was taken earlier (after the “full backup” but before the current “differential backup”) becomes redundant. This is because all changed data since last “full backup” gets backed up again.
3. Incremental backup: It includes all the data changed since last incremental backup. Note that for data restoration the full backup and all incremental backup tapes since last full backup are required. The archive bit is set after each incremental backup. Incremental backup is useful for backing up large amounts of data, as it backs up only the changes files since previous incremental backup.
54. There are primarily 5 classes of fire:
The first three classes are most common.
55. Nonrepudiation is used to ensure that a sender cannot refuse later that he had not sent the message. A digital signature on the message ensures that the sender is the original sender of the electronic message.
56. Honeypot is the correct answer. Honeypots are designed such that they appear to be real targets to hackers. That is a hacker can not distinguish between a real system and a decoy. This enables lawful action to be taken against the hacker, and securing the systems at the same time.
57. CHAP (Challenge Handshake Authentication Protocol) works on point to point connections. It uses a three step process for authentication (excluding making the connection itself). If making the connection is also involved, it would be a 4 step process.
58. Social Engineering: Social Engineering exploits human behaviour. Nonrepudiation ensures that the sender of a message or contract can not refuse having sent the message or signed the contract at a later date. This is done by mean of digital signature. Retrenchment is not the correct answer. Separation of duties ensures that the vital activities are bifurcated among several individuals. This ensures that one or two individuals can not perform a fraud.
59. Vulnerability testing is part of testing corporate assets for any particular vulnerability. These may include:
Vulnerability assessment is part of an organization’s security architecture.
60. VPN stands for Virtual Private Networking. PPTP (Point to Point Tunneling Protocol), and L2TP (Layer 2 Tunneling Protocol) are used for VPN.
Cert-Ex™ Exam Simulators, Cert-Ex™ Network Simulator, Cert-Ex™ Cheatsheets are written independently by CertExams.com and not affiliated or authorized by respective certification providers. Cert-Ex™ is a trade mark of CertExams.com or entity representing Certexams.com.Security+® is a trademark of CompTIA™ organization.