PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following solutions is BEST suited for this scenario?

Company XYZ provides cable television service to several regional areas. They are currently
installing fiber-to-the-home in many areas with hopes of also providing telephone and Internet
services. The telephone and Internet services portions of the company will each be separate
subsidiaries of the parent company. The board of directors wishes to keep the subsidiaries
separate from the parent company. However all three companies must share customer data for

the purposes of accounting, billing, and customer authentication. The solution must use open
standards, and be simple and seamless for customers, while only sharing minimal data between
the companies. Which of the following solutions is BEST suited for this scenario?

Which of the following restrictions is the MOST likely cause?

Warehouse users are reporting performance issues at the end of each month when trying to
access cloud applications to complete their end of the month financial reports. They have no
problem accessing those applications at the beginning of the month.
Network information:
DMZ network – 192.168.5.0/24
VPN network – 192.168.1.0/24
Datacenter – 192.168.2.0/24
User network – 192.168.3.0/24
HR network – 192.168.4.0/24
Warehouse network – 192.168.6.0/24
Finance network 192.168.7.0/24
Traffic shaper configuration:
VLAN Bandwidth limit (Mbps)
VPN50
User175

HR220
Finance230
Warehouse75
Guest50
External firewall allows all networks to access the Internet.
Internal Firewall Rules:
ActionSourceDestination
Permit192.168.1.0/24192.168.2.0/24
Permit192.168.1.0/24192.168.3.0/24
Permit192.168.1.0/24192.168.5.0/24
Permit192.168.2.0/24192.168.1.0/24
Permit192.168.3.0/24192.168.1.0/24
Permit192.168.5.0/24192.168.1.0/24
Permit192.168.4.0/24192.168.7.0/24
Permit192.168.7.0/24192.168.4.0/24
Permit192.168.7.0/24any
Deny192.168.4.0/24any
Deny192.168.1.0/24192.168.4.0/24
Denyanyany
Which of the following restrictions is the MOST likely cause?

Which of the following risk responses would MOST likely be used to reduce the risk of network outages and fina

A university Chief Information Security Officer is analyzing various solutions for a new project
involving the upgrade of the network infrastructure within the campus. The campus has several
dorms (two-four person rooms) and administrative buildings. The network is currently setup to
provide only two network ports in each dorm room and ten network ports per classroom. Only
administrative buildings provide 2.4 GHz wireless coverage.
The following three goals must be met after the new implementation:
1. Provide all users (including students in their dorms) connections to the Internet.
2. Provide IT department with the ability to make changes to the network environment to improve
performance.
3. Provide high speed connections wherever possible all throughout campus including sporting
event areas.
Which of the following risk responses would MOST likely be used to reduce the risk of network
outages and financial expenditures while still meeting each of the goals stated above?

which fix should be implemented by the developer?

A developer has implemented a piece of client-side JavaScript code to sanitize a user’s provided
input to a web page login screen. The code ensures that only the upper case and lower case
letters are entered in the username field, and that only a 6-digit PIN is entered in the password
field. A security administrator is concerned with the following web server log:
10.235.62.11 – – [02/Mar/2014:06:13:04] “GET
/site/script.php?user=admin&pass=pass%20or%201=1 HTTP/1.1” 200 5724
Given this log, which of the following is the security administrator concerned with and which fix
should be implemented by the developer?

Which of the following should the security administrator implement as part of the network and proxy designR

The security administrator of a large enterprise is tasked with installing and configuring a solution
that will allow the company to inspect HTTPS traffic for signs of hidden malware and to detect data
exfiltration over encrypted channels. After installing a transparent proxy server, the administrator is
ready to configure the HTTPS traffic inspection engine and related network equipment. Which of
the following should the security administrator implement as part of the network and proxy design
to ensure the browser will not display any certificate errors when browsing HTTPS sites? (Select

THREE).

Which of the following BEST describes the scenario presented and the document the ISO is reviewing?

The Information Security Officer (ISO) is reviewing a summary of the findings from the last COOP
tabletop exercise. The Chief Information Officer (CIO) wants to determine which additional controls

must be implemented to reduce the risk of an extended customer service outage due to the VoIP
system being unavailable. Which of the following BEST describes the scenario presented and the
document the ISO is reviewing?

Which of the following describes the findings the senior security engineer should report to the ISO and the BE

The Information Security Officer (ISO) believes that the company has been targeted by
cybercriminals and it is under a cyber attack. Internal services that are normally available to the
public via the Internet are inaccessible, and employees in the office are unable to browse the
Internet. The senior security engineer starts by reviewing the bandwidth at the border router, and
notices that the incoming bandwidth on the router’s external interface is maxed out. The security
engineer then inspects the following piece of log to try and determine the reason for the downtime,
focusing on the company’s external router’s IP which is 128.20.176.19:
11:16:22.110343 IP 90.237.31.27.19 > 128.20.176.19.19: UDP, length 1400
11:16:22.110351 IP 23.27.112.200.19 > 128.20.176.19.19: UDP, length 1400
11:16:22.110358 IP 192.200.132.213.19 > 128.20.176.19.19: UDP, length 1400
11:16:22.110402 IP 70.192.2.55.19 > 128.20.176.19.19: UDP, length 1400
11:16:22.110406 IP 112.201.7.39.19 > 128.20.176.19.19: UDP, length 1400
Which of the following describes the findings the senior security engineer should report to the ISO
and the BEST solution for service restoration?