CompTIA Security Practice Test #1
For a customer, you're analyzing cryptographic algorithms. The customer has a specific requirement for shared secret encryption. To meet the requirement, you must offer an encryption algorithm. Which algorithm do you think is the best?
Correct answer: Symmetric key algorithm
A shared secret is required for a symmetric key algorithm. The shared secret, which permits encryption and decryption, is held by each communication party. A shared key isn't used by the other algorithms.
A cryptographic hardware component capable of securely storing data such as passwords and keys is referred to by which of the following acronyms?
Correct answer: TPM
The Trusted Platform Module (TPM) is a chip that is integrated in the motherboard of a device. TPMs allow devices to store essential artifacts such as passwords and cryptographic keys in a secure manner.
________ is a suite of security extensions for an Internet service that converts domain names to IP addresses.
Correct answer: DNSSEC
A suite of security extensions for an Internet service that translates domain names into IP addresses is known as DNSSEC.
Microsoft Office Communications Server 2007 R2 servers, unified communications clients, and unified communications applications have been implemented at Company ABC. They are presently in the process of moving from solution to support.
What is the name of this project phase?
Correct answer: Operations
The operations phase is when you manage your Microsoft Office Communications Server 2007 R2 servers, unified communications clients, and unified communications applications.
During an IT meeting, your colleague Karylle proposes that the only load balancer in place for the company's website ordering system has a single point of failure. She recommends configuring two load balancers, with only one in use at any one moment. What kind of load balancing setup does Karylle recommend?
Correct answer: Active-passive
Two load balancers are used in active-passive configurations, one of which is active. The second load balancer takes over when the active load balancer becomes unresponsive. The answers a, c, and d are incorrect. Load balancing algorithms such as round robin and least connections are not connected to fault tolerance when using multiple load balancers. Both load balancers are active at the same time and work cooperatively to distribute incoming traffic to back-end nodes in an active-active configuration. As a result, the right answer is b.
Company A has recently developed a custom airline ticketing system. When a freelance coding specialist examines it for security flaws, what do you call it?
Correct answer: Regression testing
If a freelance coding specialist tests it for security flaws, it is called regression testing.
Your organization is going over backups of important data. Some data has not been backed up, according to the report. An current firm policy, on the other hand, mandates that all data be backed up. You must have a backup of your data. Which of the following individuals should be in charge of the backup?
Correct answer: Data custodian
The data custodian is in charge of handling data on a day-to-day basis, including backups. The data custodian should back up the data in this scenario, while the data owner should determine the data's requirements.
A junior security professional on your team is attempting to export and share a public certificate with a colleague outside of the IT department. They want to know if they should utilize CER or PFX. What is the best format to use?
Correct answer: CER
It's fine to share a.CER file containing a public certificate. A.PFX file (also known as a PKCS 12 archive) is different since it contains the private key, which should never be shared!
Which of the following is a cryptographic network protocol used for secure data communication, remote command-line login, remote command execution, and other secure network services?
Correct answer: SSH
SSH refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services.