Lisa Test Prep Questions
Lisa Test Prep Questions A security analyst wishes to increase the security of an FTP server. Currently, all trails to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modem FTP client software. The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of the following would BEST accomplish these goals? - Use explicit FTPS for the connections. A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords, The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will occur when users try to authenticate to the portal? - -The portal will request an authentication ticket from each network that is transitively trusted -he back-end networks will function as an identity provider and issue an authentication assertion Which of the following would a security specialist be able to determine upon examination of a server's certificate? - CA public key A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system While attempting to determine if an unauthorized user is togged into the home network, the user reviews the wireless router, which shows the following table for systems that are currently on the home network. Which of the following should be the NEXT step to determine if there is an unauthorized user on the network? - Deny the "unknown" host because the hostname is not known and MAC filtering is not applied to this host. A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation? - An attacker can access and change the printer configuration. A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select TWO). - - Generate an X 509-complaint certificate that is signed by a trusted CA. -Ensure port 636 is open between the clients and the servers using the communication. A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS attack News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to the website that crashed. To which of the following categories does the refrigerator belong? - IoT A user has attempted to access data at a higher classification level than the user's account is currency authorized to access. Which of the following access control models has been applied to this user's account? - MAC A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing? - Transferring the risk An organization has determined it can tolerate a maximum
Geschreven voor
- Instelling
- Lisa
- Vak
- Lisa
Documentinformatie
- Geüpload op
- 27 mei 2024
- Aantal pagina's
- 20
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
lisa test prep questions