Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of
communication?
A.
113
B.
69
C.
123
D.
161
123
Abel, a cloud architect, uses container technology to deploy applications/software including
all its dependencies, such as libraries and configuration files, binaries, and other resources
that run independently from other processes in the cloud environment. For the
containerization of applications, he follows the five-tier container technology architecture.
Currently. Abel is verifying and validating image contents, signing images, and sending
them to the registries. Which of the following tiers of the container technology architecture
Is Abel currently working in?
A.
Tier-1: Developer machines
B.
Tier-4: Orchestrators
C.
Tier-3: Registries
D.
Tier-2: Testing and accreditation systems
Tier-2: Testing and accreditation systems
Explanation: The official management decision given by a senior agency official to
authorize operation of an information system and to explicitly accept the risk to agency
operations (including mission, functions, image, or reputation), agency assets, or
individuals, based on the implementation of an agreed-upon set of security controls.
formal declaration by a designated accrediting authority (DAA) or principal accrediting
authority (PAA) that an information system is approved to operate at an acceptable level of
risk, based on the implementation of an approved set of technical, managerial, and
procedural safeguards. See authorization to operate (ATO). Rationale: The Risk
Management Framework uses a new term to refer to this concept, and it is called
authorization.
Identifies the information resources covered by an accreditation decision, as distinguished
from separately accredited information resources that are interconnected or with which
information is exchanged via messaging. Synonymous with Security Perimeter.
For the purposes of identifying the Protection Level for confidentiality of a system to be
accredited, the system has a conceptual boundary that extends to all intended users of the
system, both directly and indirectly connected, who receive output from the system. See
authorization boundary. Rationale: The Risk Management Framework uses a new term to
refer to the concept of accreditation, and it is called authorization. Extrapolating, the
accreditation boundary would then be referred to as the authorization boundary.
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?
A.
Copy the system files from a known good system
B.
Perform a trap and trace
C.
Delete the files and try to determine the source
D.
Reload from a previous backup
E.
Reload from known good media
Reload from known good media
in an attempt to increase the security of your network, you Implement a solution that will
help keep your wireless network undiscoverable and accessible only to those that know It.
How do you accomplish this?
A.
Delete the wireless network
B.
Remove all passwords
C.
Lock all users
D.
Disable SSID broadcasting
Disable SSID broadcasting
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy
servers, and Intrusion Detection Systems (IDS) on the network of an organization that has
experienced a possible breach of security. When the investigator attempts to correlate the
information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
A.
The network devices are not all synchronized.
B.
Proper chain of custody was not observed while collecting the logs.
C.
The attacker altered or erased events from the logs.
D.
The security breach was a false positive.
The network devices are not all synchronized.
Page 8 out of 104 Pages |
Previous |