Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

NPower Security+ (Questions And Verified Solutions)

Beoordeling
-
Verkocht
-
Pagina's
37
Cijfer
A+
Geüpload op
13-10-2024
Geschreven in
2024/2025

NPower Security+ (Questions And Verified Solutions)

Instelling
Vak

Voorbeeld van de inhoud

NPower Security+ (Questions And Verified Solutions)

What are APIs? Right Ans - Application programming interfaces (APls) are
interfaces between clients and servers or applications and operating systems
that define how the client should ask for information from the server and how
the server will respond.

Explain active/active vs. active/passive load balancers. Right Ans -
Active/active load balancer designs distribute the load among multiple
systems that are online and in use at the same time. Active/passive load
balancer designs bring backup or secondary systems online when an active
system is removed or fails to respond properly to a health check.

What is a VPN? Right Ans - A virtual private network (VPN) is a way to
create a virtual network link across a public network that allows the
endpoints to act as though they are on the same network.

What documentation is created to demonstrate that forensic data and artifacts
were handled properly and that they were not modified or changed during the
forensic process? Right Ans - Chain-of-custody documentation.

What is the function of segmentation? Right Ans - It allows network
engineers to place systems of differing security levels and functions on
different network subnets.

Name at least five social engineering techniques. Right Ans - Phishing,
vishing, smishing, misinformation, disinformation, business email
compromise, pretexting, watering hole attack, impersonation, brand
impersonation, and typosquatting.

How do you calculate the impact score for a vulnerability under CVSS?
Right Ans - Impact score= the value of the scope metric* ISS

What are two different approaches to cloud access security broker (CASB)
solutions? Right Ans - Inline CASB solutions physically or logically reside in
the connection path between the user and the service and can see requests
before they are sent to the cloud service, allowing the CASB to block requests
that violate policy. APl-based CASB solutions do not interact directly with the
user but rather interact directly with the cloud provider through the

,provider's API. This approach provides direct access to the cloud service
without custom user device configuration.

What are three tools that can be used in the data obfuscation process?
Right Ans - Hashing uses a hash function to transform a value in our dataset to
a corresponding hash value. Tokenization replaces sensitive values with a
unique identifier using a lookup table. Data masking partially redacts sensitive
information by replacing some or all of sensitive fields with blank characters.

List five common ways to assert or claim an identity. Right Ans -
Usernames, certificates, tokens, SSH keys, and smart cards.

Why should a company establish key performance indicators (KPls)? Right
Ans - KPls quantitatively measure vendors' performance in order to ensure
that vendors are meeting the agreed-upon standards.

Name five common access control schemes. Right Ans - Attribute-based
access control (ABAC), role-based access control (RBAC), rule-based access
control (RBAC or RuBAC), mandatory access control (MAC), and discretionary
access control (DAC)

What are three phases of a baseline's life cycle? Right Ans - Establishing a
baseline, deploying the security baseline, and maintaining the baseline

What is SDN? Right Ans - Software-defined networking (SDN) uses
software-based network configuration to control networks. SDN designs rely
on controllers that manage network devices and configurations, centrally
managing the software-defined network.

List four types of factors in multifactor authentication and explain them.
Right Ans - Something you know, including passwords, PINs, or the answer to
a security question; something you have, like a smartcard or token; something
you are, which relies on a physical characteristic of the person who is
authenticating themselves; and somewhere you are, sometimes called a
location factor, is based on your current location. Location can be detected
with GPS technology or viewing IP address information.

Give some examples of weak configurations. Right Ans - The use of default
settings that pose a security risk; the presence of default credentials or

,unsecured accounts, including both normal user accounts and unsecured root
accounts with administrative privileges; open ports and services that are not
necessary to support normal system operations; and open permissions that
allow users access that violates the principle of least privilege.

What is RFID? Right Ans - RFID (Radio Frequency Identification) is a
relatively short range (from less than a foot of some passive tags to about 100
meters for active tags) wireless technology that uses a tag and a receiver to
exchange information.

What is a data protection officer (DPO)? Right Ans - The European Union's
General Data Protection Regulation (GDPR) requires that every data
controller designate a data protection officer (DPO) who bears overall
responsibility for carrying out the organization's data privacy efforts.

What do you call a document that provides mandatory requirements
describing how an organization will carry out its information security
policies? Right Ans - A Standard

What are four types of documents in the information security policy
framework? Right Ans - Policies, standards, procedures, and guidelines

What are three techniques to verify the authenticity of certificates and identify
revoked certificates? Right Ans - Certificate revocation lists (CRLs), Online
Certificate Status Protocol (OCSP), and certificate stapling

List and explain three major types of authentication in modern Wi-Fi
networks. Right Ans - Open networks do not require authentication or use
encryption and often use a captive portal to information from users.
Preshared keys (PSK) require that a passphrase or key is shared with anybody
who wants to use the network and provides encryption. Enterprise
authentication relies on a RADIUS server and utilizes an EAP protocol for
authentication.

How does FDE work? Right Ans - Full disk encryption (FDE) encrypts the
disk and requires that the bootloader or a hardware device provide a
decryption key and software or hardware to decrypt the drive for use.

, What term describes the means that an attacker uses to gain access to a
system? Right Ans - Threat vectors are the means that threat actors use to
obtain access to a system.

List at least five connectivity methods. Right Ans - Cellular, Wi-Fi,
Bluetooth, NFC, RFID, Infrared, GPS, USB

What are the three major components of a security assessment? Right Ans
- Security tests, security assessments, and security audits

What are two distinct goals of digital signature infrastructure? Right Ans -
Digitally signed messages assure the recipient that the message truly came
from the claimed sender. They enforce nonrepudiation. Digitally signed
messages assure the recipient that the message was not altered while in
transit between the sender and recipient. This protects against both malicious
modification and unintentional modification.

List and explain two principles we need to apply in application resilience.
Right Ans - Scalability says that applications should be designed so that
computing resources they require may be incrementally added to support
increasing demand; elasticity goes a step further than scalability and says that
applications should be able to automatically provision resources to scale
when necessary and then automatically deprovision those resources to reduce
capacity (and cost) when it is no longer needed.

What is ransomware? Right Ans - Ransomware is malware that takes over
a computer then demands a ransom or payment.

How do organizations determine where to place access points to handle poor
coverage areas? Right Ans - They conduct site surveys and create heat
maps showing where coverage is relative to existing access points.

What provides cybersecurity professionals with insight into the traffic on
their virtual networks? Right Ans - Software-defined visibility (SDV).

Who are the typical team members in an incident response team? Right
Ans - Members of management or organizational leadership, technical
experts, communications and public relations staff, legal and human relations
staff, law enforcement

Geschreven voor

Vak

Documentinformatie

Geüpload op
13 oktober 2024
Aantal pagina's
37
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$25.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LeCrae Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2085
Lid sinds
4 jaar
Aantal volgers
1409
Documenten
22042
Laatst verkocht
4 dagen geleden
Valuable Notes, Secure Learning

Welcome to ScholarVault—your ultimate destination for premium study materials and academic resources designed to unlock your full potential. As a passionate student myself, I understand how critical it is to have the right tools to excel in your studies. That's why I've curated a collection of high-quality notes, guides, and exam preparation materials that are tailored to help you achieve academic success. At ScholarVault, I believe that knowledge is power, but access to the right knowledge is key. My mission is to provide you with organized, comprehensive, and easy-to-understand study resources that make your learning journey smoother and more effective. Whether you're preparing for exams, reviewing class notes, or tackling tough concepts, you can count on me to deliver valuable, well-crafted content that aligns with your academic goals. Each resource has been carefully created with the intention to simplify complex topics, boost your confidence, and save you time. I aim to provide not just notes, but tools that truly make a difference in how you approach your studies. Explore the vault and discover everything you need to succeed—whether it’s detailed notes, in-depth study guides, or concise exam tips, everything is stored here for your academic growth. Thank you for trusting ScholarVault to be part of your learning experience. I’m excited to help you unlock your academic potential and achieve the success you deserve.

Lees meer Lees minder
4.0

441 beoordelingen

5
206
4
108
3
70
2
17
1
40

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen