An insecure wireless connection may expose users to which of the following?
Correct Answer: C
An insecure wireless connection, such as one that lacks encryption, can allow unauthorized individuals within range to intercept the data being transmitted. This interception is known as eavesdropping. It is a common security risk associated with wireless networks where attackers can capture sensitive information without being detected.
Question 22
Which of the following is the PRIMARY goal of implementing a change management process?
Correct Answer: B
Change management processes are designed to ensure that changes are introduced in a controlled and coordinated manner. The main objective is to minimize the impact of changes on the business and its operations. This involves careful planning, testing, communication, and implementation to ensure that business processes continue to operate smoothly during and after the transition.
Question 23
Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?
Correct Answer: C
The correct answer is C. SSH. SSH stands for Secure Shell, a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon. SSH allows users to remotely access and execute commands on a server without exposing their credentials or data to eavesdropping, tampering or replay attacks. SSH also supports secure file transfer protocols such as SFTP and SCP1. VPN stands for Virtual Private Network, a technology that creates a secure, encrypted tunnel between two or more devices over a public network such as the Internet. VPN allows users to access resources on a remote network as if they were physically connected to it, while protecting their privacy and identity2. IPsec stands for Internet Protocol Security, a set of protocols that provides security at the network layer of the Internet. IPsec supports two modes: transport mode and tunnel mode. Transport mode encrypts only the payload of each packet, while tunnel mode encrypts the entire packet, including the header. IPsec can be used to secure VPN connections, as well as other applications that require data confidentiality, integrity and authentication3. SFTP stands for Secure File Transfer Protocol, a protocol that uses SSH to securely transfer files between a client and a server over a network. SFTP provides encryption, authentication and compression features to ensure the security and reliability of file transfers. 1: SSH (Secure Shell) 2: What is a VPN? How It Works, Types of VPN | Kaspersky 3: IPsec - Wikipedia : [SFTP - Wikipedia]
Question 24
in key protection/management, access should be aligned with which of the following?
Correct Answer: B
In key protection/management, access should be aligned with the principle of least privilege. This means that users should only have the minimum level of access required to perform their tasks and no more. This reduces the risk of unauthorized access, misuse, or compromise of sensitive data or systems.
Question 25
What is the MAIN objective of an intrusion detection system (IDS) policy?
Correct Answer: B
The main objective of an intrusion detection system (IDS) policy is to establish the criteria for what constitutes an intrusion event and the reporting requirements once such an event is detected. This includes defining what activities are considered anomalies, ensuring that security breaches are identified, and specifying how and to whom these incidents should be reported. The policy sets the foundation for how intrusions are detected, assessed, and managed within an organization's network infrastructure1.