1.
The fundamental information security principals include confidentiality, availability and which of the following?
A. 
The ability to secure data against unauthorized disclosure to external sources
B. 
The capacity of a system to resist unauthorized changes to stored information
C. 
The confidence with which a system can attest to the identity of a user
D. 
The characteristic of a system to provide uninterrupted service to authorized users
2.
Which of the following is the MOST likely cause of users being unable to verify a single user’s email signature and that user being unable to decrypt sent messages?
A. 
B. 
C. 
D. 
3.
Full disk encryption is MOST effective against which of the following threats?
A. 
Denial of service by data destruction
B. 
C. 
D. 
4.
Which of the following may cause Jane, the security administrator, to seek an ACL work around?
A. 
B. 
C. 
D. 
5.
In order to use a two-way trust model the security administrator MUST implement which of the following?
A. 
B. 
C. 
D. 
6.
Which of the following would a security administrator use to verify the integrity of a file?
A. 
B. 
C. 
D. 
7.
Which of the following is a best practice when securing a switch from physical access?
A. 
Disable unnecessary accounts
B. 
Print baseline configuration
C. 
D. 
8.
A security administrator needs to image a large hard drive for forensic analysis. Which of the following will allow for faster imaging to a second hard drive?
A. 
Cp /dev/sda /dev/sdb bs=8k
B. 
Tail -f /dev/sda > /dev/sdb bs=8k
C. 
Dd in=/dev/sda out=/dev/sdb bs=4k
D. 
Locate /dev/sda /dev/sdb bs=4k
9.
Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and corporate data is stolen. Which of the following would BEST prevent this from occurring again?
A. 
Disable the wireless access and implement strict router ACLs.
B. 
Reduce restrictions on the corporate web security gateway.
C. 
Security policy and threat awareness training.
D. 
Perform user rights and permissions reviews.
10.
Which of the following can be implemented if a security administrator wants only certain devices connecting to the wireless network?
A. 
B. 
C. 
D. 
Lowering power levels on the AP
11.
Which of the following malware types typically allows an attacker to monitor a user’s computer, is characterized by a drive-by download, and requires no user interaction?
A. 
B. 
C. 
D. 
12.
Which of the following malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-ups based on browsing habits?
A. 
B. 
C. 
D. 
13.
Which of the following is characterized by an attack against a mobile device?
A. 
B. 
C. 
D. 
14.
Which of the following application attacks is used against a corporate directory service where there are unknown servers on the network?
A. 
B. 
C. 
D. 
15.
Which of the following protocols allows for the LARGEST address space?
A. 
B. 
C. 
D. 
16.
Who should be contacted FIRST in the event of a security breach?
A. 
B. 
C. 
D. 
17.
A security administrator examines a network session to a compromised database server with a packet analyzer. Within the session there is a repeated series of the hex character 90 (x90). Which of the following attack types has occurred?
A. 
B. 
C. 
D. 
18.
Which of the following is an example of a false negative?
A. 
The IDS does not identify a buffer overflow.
B. 
Anti-virus identifies a benign application as malware.
C. 
Anti-virus protection interferes with the normal operation of an application
D. 
A user account is locked out after the user mistypes the password too many times.
19.
Which of the following access controls enforces permissions based on data labeling at specific levels?
A. 
B. 
Separation of duties access control
C. 
Discretionary access control
D. 
Role based access control
20.
Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days’ hashes. Which of the following security concepts is Sara using?
A. 
B. 
C. 
D. 
21.
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
A. 
B. 
C. 
D. 
22.
Which of the following authentication services uses a ticket granting system to provide access?
A. 
B. 
C. 
D. 
23.
Matt, a security administrator, wants to configure all the switches and routers in the network in order to securely monitor their status. Which of the following protocols would he need to configure on each device?
A. 
B. 
C. 
D. 
24.
Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue and still provide coverage where needed? (Select TWO).
A. 
B. 
Use channels 1, 4 and 7 only
C. 
D. 
E. 
Switch from 802.11a to 802.11b
25.
The public key is used to perform which of the following? (Select THREE).
A. 
B. 
Validate the identity of an email sender
C. 
D. 
E. 
F.