Test - C5-C6 - Xem lại lần làm thử - UTEx
Test - C5-C6 - Xem lại lần làm thử - UTEx
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 1/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A system administrator has noticed that users change their password many times to cycle back to the
1 original password when their passwords expire. Which of the following would BEST prevent this behavior?
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Enforce a minimum A minimum password age policy defines the period that a password
password age policy. must be used for before it can be changed.
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 2/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A recent online password audit has identified that stale accounts are at risk to brute force attacks. Which
2 the following controls would best mitigate this risk?
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Password complexity
b. Account lockouts
c. Account disablement
d. Password length
Câu hỏi Which of the following is a best practice when securing a switch from physical access?
3
Đúng
Select one:
c. Disable Disabling unused switch ports a simple method many network administrators use
unused to help secure their network from unauthorized access.
ports
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 3/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to
4 that AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue
and still provide coverage where needed? (Select TWO).
Đúng
The correct answers are: Enable MAC filtering, Disable SSID broadcast
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 4/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT group, to edit a
5 file. Currently, the file has the following permissions:
Ann: read/write
Đúng
Sales Group: read
Đạt điểm 1,00
trên 1,00
IT Group: no access
If a discretionary access control list is in place for the files owned by Ann, which of the following would be
the BEST way to share the file with Joe?
Select one:
a. Have the system administrator give Joe full access to the file.
b. Remove Joe from the IT group and add him to the Sales group.
c. Give Joe the Joe needs access to only one file. He also needs to ‘edit’ that file. Editing
appropriate a file requires Read and Write access to the file. The best way to provide
access to the file Joe with the minimum required
directly. permissions to edit the file would be to give Joe the appropriate access to
the file directly.
The correct answer is: Give Joe the appropriate access to the file directly.
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 5/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A security Operations Center was scanning a subnet for infections and found a contaminated machine. One
6 of the administrators disabled the switch port that the machine was connected to, and informed a local
technician of the infection. Which of the following steps did the administrator perform?
Đúng một phần
b. Identification
c. Preparation
d. Quarantine
e. Notification
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 6/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A security administrator must implement all requirements in the following corporate policy: Passwords
7 shall be protected against offline password brute force attacks. Passwords shall be protected against online
password brute force attacks. Which of the following technical controls must be implemented to enforce
Đúng một phần
the corporate policy? (Select THREE).
Đạt điểm 0,67
trên 1,00
Select one or more:
a. Password complexity
c. Screen locks
d. Account lockout
e. Account expiration
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 7/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 8/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Which of the following types of access control uses fences, security policies, security awareness training, and
9 antivirus software to stop an unwanted or unauthorized activity from occurring?
Đúng
b. Detective
c. Preventive A preventive access control helps stop an unwanted or unauthorized activity from
occurring. Detective controls discover the activity after it has occurred, and
corrective controls attempt to reverse any problems caused by the activity.
Authoritative isn’t a valid type of access control.
d. Authoritative
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 9/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi At an organization, unauthorized users have been accessing network resources via unused network wall
10 jacks. Which of the following would be used to stop unauthorized access?
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Configure an access list.
c. Configure Port security in IT can mean several things. It can mean the physical control of all
port connection points, such as RJ-45 wall jacks or device ports, so that no
security. unauthorized users or unauthorized devices can attempt to connect into an open
port. This can be accomplished by locking down the wiring closet and server vaults
and then disconnecting the workstation run from the patch panel (or punch-down
block) that leads to a room’s wall jack. Any unneeded or unused wall jacks can
(and should) be physically disabled in this manner. Another option is to use a
smart patch panel that can monitor the MAC address of any device connected to
each and every wall port across a building and detect not just when a new device is
connected to an empty port, but also when a valid device is disconnected or
replaced by an invalid device.
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 10/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi An auditing team has found that passwords do not meet best business practices. Which of the following will
11 MOST increase the security of the passwords? (Select TWO).
b. Password Length
c. Password Age
d. Password Expiration
e. Password History
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 11/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Connections using point-to-point protocol authenticate using which of the following? (Select TWO).
12
Select one or more:
Đúng
c. RIPEMD
d. CHAP CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to
validate the identity of remote clients. CHAP periodically verifies the identity of the
client by
using a three-way handshake.
e. Kerberos
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 12/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi The internal audit group discovered that unauthorized users are making unapproved changes to various
13 system configuration settings. This issue occurs when previously authorized users transfer from one
department to another and maintain the same credentials. Which of the following controls can be
Sai
implemented to prevent such unauthorized changes in the future?
Đạt điểm 0,00
trên 1,00
Select one:
a. Least privilege
b. Account lockout
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 13/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Which of the following would be used to allow a subset of traffic from a wireless network to an internal
14 network?
Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Load balancers
c. 802.1X
d. Port security
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 14/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A company requires that a user’s credentials include providing something they know and something they
15 are in order to gain access to the network. Which of the following types of authentication is being
described?
Đúng
b. Token
c. Kerberos
d. Biometrics
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 15/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Which of the following controls would allow a company to reduce the exposure of sensitive systems from
16 unmanaged devices on internal networks?
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Password strength
b. BGP
c. 802.1x
d. Data encryption
c. Logon banners
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 16/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A company determines a need for additional protection from rogue devices plugging into physical ports
18 around the building. Which of the following provides the highest degree of protection from unauthorized
wired network access?
Đúng
b. MAC filtering
c. 802.1x
d. Flood guards
Câu hỏi A user ID and password together provide which of the following?
19
Đúng
Select one:
c. Identification
d. Auditing
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 17/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Which of the following best practices makes a wireless network more difficult to find?
20
Select one:
Đúng
c. UseWPA2-PSK
Câu hỏi XYZ Company has a database containing personally identifiable information for all its customers. Which of
21 the following options would BEST ensure employees are only viewing information associated to the
Đúng
customers they support?
b. Auditing
c. Access Control
d. Data ownership
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 18/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
b. RADIUS server
c. AAA server
d. Authenticator
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 19/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall
23 application but does not have all the details. Jane needs to review the software before it is released to
production. Which of the following reviews should Jane conduct?
Đúng
b. Gray Gray box testing, also called gray box analysis, is a strategy for software debugging in
Box which the tester has limited knowledge of the internal details of the program.
Testing
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 20/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Which of the following would allow users from outside of an organization to have access to internal
24 resources?
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. VLANS
b. VPN
c. NAC
d. NAT
Câu hỏi An incident occurred when an outside attacker was able to gain access to network resources. During the
25 incident response, investigation security logs indicated multiple failed login attempts for a network
administrator. Which of the following controls, if in place could have BEST prevented this successful attack?
Sai
b. Account lockout
c. Account expiration
d. Password history
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 21/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi What is the end device that sends credentials for 802.1x called?
26
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. RADIUS server
b. Supplicant The end device that sends credentials is called the supplicant. The supplicant is a
piece of software in the operating system that supplies the credentials for AAA
authentication.
c. Authenticator
d. AAA server
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 22/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Users require access to a certain server depending on their job function. Which of the following would be
27 the MOST appropriate strategy for securing the server?
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Discretionary access control
b. Role Role-based Access Control is basically based on a user’s job description. When a
based user is assigned a specific role in an environment, that user’s access to objects is
access granted based on the required tasks of that role.
control
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 23/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A customer has provided an email address and password to a website as part of the login process. Which of
28 the following BEST describes the email address?
Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Identification
b. Access control
c. Authorization
d. Authentication
Câu hỏi A quality assurance analyst is reviewing a new software product for security, and has complete access to
29 the code and data structures used by the developers. This is an example of which of the following types of
testing?
Sai
b. Penetration
c. Black box
d. White box
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 24/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A password history value of three means which of the following?
30
Select one:
Đúng
Đạt điểm 1,00 a. After three hours a password must be re-entered to continue
trên 1,00
b. A password cannot be reused once changed for three years.
c. Three different passwords are Password History defines the number of unique new
used before one can be passwords a user must use before an old password can be
reused. reused.
The correct answer is: Three different passwords are used before one can be reused.
Câu hỏi During the information gathering stage of a deploying role-based access control model, which of the
31 following information is MOST likely required?
Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Conditional rules under which certain systems may be accessed
The correct answer is: Matrix of job titles with required access privileges
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 25/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A process in which the functionality of an application is tested without any knowledge of the internal
32 mechanisms of the application is known as:
Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Gray box testing
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 26/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Internet banking customers currently use an account number and password to access their online accounts.
33 The bank wants to improve security on high value transfers by implementing a system which call users back
on a mobile phone to authenticate the transaction with voice verification. Which of the following
Sai
authentication factors are being used by the bank?
Đạt điểm 0,00
trên 1,00
Select one:
a. Something you have, something you are, and something you know
c. Something you know, something you do, and something you have
d. Something you do, somewhere you are, and something you have
The correct answer is: Something you are, something you do and something you know
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 27/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Which of the following is the BEST reason to provide user awareness and training programs for
34 organizational staff?
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. To detail business impact analyses
c. To reduce Ideally, a security awareness training program for the entire organization
organizational should cover the following areas:
IT risk Importance of security
Responsibilities of people in the organization
Policies and procedures
Usage policies
Account and password-selection criteria
Social engineering prevention
You can accomplish this training either by using internal staff or by hiring
outside trainers. This type of training will significantly reduce the
organizational IT risk.
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 28/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A company wants to ensure that all credentials for various systems are saved within a central database so
35 that users only have to login once for access to all systems. Which of the following would accomplish this?
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Same Sign-On
c. Multi-factor authentication
d. Single Single sign-on means that once a user (or other subject) is authenticated into a realm,
Sign- re-authentication is not required for access to resources on any realm entity. Single
On sign-on is
able to internally translate and store credentials for the various mechanisms, from the
credential used for original authentication.
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 29/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi The method to provide end users of IT systems and applications with requirements related to acceptable
36 use, privacy, new threats and trends, and use of social networking is:
Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Legal compliance training.
Câu hỏi After a production outage, which of the following documents contains detailed information on the order in
37 which the system should be restored to service?
Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Succession planning
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 30/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi Which technology will give selective access to the network based upon
38 authentication?
Sai
b. ACLs
c. Firewall
d. 802.1Q
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 31/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx
Câu hỏi A penetration tester was able to obtain elevated privileges on a client workstation and multiple servers
39 using the credentials of an employee. Which of the following controls would mitigate these issues? (Select
TWO)
Đúng một phần
b. Separation of duties
c. Least privilege
d. Password history
f. Account expiration
https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 32/32