Q561. In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following? 

A. Identification 

B. Authorization 

C. Authentication 

D. Multifactor authentication 

Answer:

Explanation: 

An authentication ticket, also known as a ticket-granting ticket (TGT), is a small amount of encrypted data that is issued by a server in the Kerberos authentication model to begin the authentication process. When the client receives an authentication ticket, the client sends the ticket back to the server along with additional information verifying the client's identity. The server then issues a service ticket and a session key (which includes a form of password), completing the authorization process for that session. In the Kerberos model, all tickets are time-stamped and have limited lifetimes. This minimizes the danger that hackers will be able to steal or crack the encrypted data and use it to compromise the system. Ideally, no authentication ticket remains valid for longer than the time an expert hacker would need to crack the encryption. Authentication tickets are session-specific, further improving the security of the system by ensuring that no authentication ticket remains valid after a given session is complete. 


Q562. A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal? 

A. Block port 23 on the L2 switch at each remote site 

B. Block port 23 on the network firewall 

C. Block port 25 on the L2 switch at each remote site 

D. Block port 25 on the network firewall 

Answer:

Explanation: 

Telnet is a terminal-emulation network application that supports remote connectivity for executing commands and running applications but doesn’t support transfer of fi les. Telnet uses TCP port 23. Because it’s a clear text protocol and service, it should be avoided and replaced with SSH. 


Q563. Which of the following firewall rules only denies DNS zone transfers? 

A. deny udp any any port 53 

B. deny ip any any 

C. deny tcp any any port 53 

D. deny all dns packets 

Answer:

Explanation: 

DNS operates over TCP and UDP port 53. TCP port 53 is used for zone transfers. 


Q564. A company uses PGP to ensure that sensitive email is protected. Which of the following types of cryptography is being used here for the key exchange? 

A. Symmetric 

B. Session-based 

C. Hashing 

D. Asymmetric 

Answer:

Explanation: 

PGP combines symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric encryption algorithm, which requires a symmetric key. Each symmetric key is used only once and is also called a session key. 


Q565. Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO). 

A. Disable the USB root hub within the OS. 

B. Install anti-virus software on the USB drives. 

C. Disable USB within the workstations BIOS. 

D. Apply the concept of least privilege to USB devices. 

E. Run spyware detection against all workstations. 

Answer: A,C 

Explanation: 

A: The USB root hub can be disabled from within the operating system. 

C: USB can also be configured and disabled in the system BIOS. 


Q566. Which of the following protocols is used to validate whether trust is in place and accurate by returning responses of either "good", "unknown", or "revoked"? 

A. CRL 

B. PKI 

C. OCSP 

D. RA 

Answer:

Explanation: 

The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate. An OCSP responder (a server typically run by the certificate issuer) may return a signed response signifying that the certificate specified in the request is 'good', 'revoked', or 'unknown'. If it cannot process the request, it may return an error code. 


Q567. Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model? 

A. WAF 

B. NIDS 

C. Routers 

D. Switches 

Answer:

Explanation: 

A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified. 

As the protocols used to access a web server (typically HTTP and HTTPS) run in layer 7 of the OSI model, then web application firewall (WAF) is the correct answer. 


Q568. Which of the following is built into the hardware of most laptops but is not setup for centralized management by default? 

A. Whole disk encryption 

B. TPM encryption 

C. USB encryption 

D. Individual file encryption 

Answer:

Explanation: 

Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system’s motherboard and is enabled or disable in BIOS. It helps with hash key generation and stores cryptographic keys, passwords, or certificates. 


Q569. A password history value of three means which of the following? 

A. Three different passwords are used before one can be reused. 

B. A password cannot be reused once changed for three years. 

C. After three hours a password must be re-entered to continue. 

D. The server stores passwords in the database for three days. 

Answer:

Explanation: 

Password History defines the number of unique new passwords a user must use before an old password can be reused. 


Q570. When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes. Which of the following design elements would be implemented to comply with the security administrator’s request? 

A. DMZ 

B. Cloud services 

C. Virtualization 

D. Sandboxing 

Answer:

Explanation: 

A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall.