



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A collection of questions and answers related to the nsa (national security agency) exam scheduled for 2024. The questions cover a wide range of topics, including encryption, network security, virtualization, network protocols, firewall configuration, and intrusion detection systems. The answers provided are marked as correct, indicating that this document is likely a study guide or practice material for the upcoming nsa exam. The level of detail and the technical nature of the questions suggest that this document would be most useful for university students or professionals preparing for the nsa exam or related security certifications.
Typology: Exams
1 / 5
This page cannot be seen from the preview
Don't miss anything!
You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solution? - ✔✔Encrypt it before sending. APU managers network devices in his store and maintains copies of the configuration files for all the managed router and switches. On a weekly basis, he creates hashes for these files and compares them with hashes he created on the same files the previous week. Which of the following uses cases is he MOST likely using?` - ✔✔Supporting Integrity Louie hid several plaintext documents within an image file. He then sent the image file to Tony. Which of the following BEST describes the purpose of his action? - ✔✔To support Obfuscation Management has mandated the use of digital signatures by all personnel within your organization. Which of the following uses cases does this primarily support? - ✔✔Supporting non-repudiation As the CTO, Marge is implementing a security program. She has included security controls to address confidentiality and availability. Of the following choices, what else should she include? - ✔✔Ensure systems are not susceptible to unauthorized changes.. Your organization wants to reduce the amount of money it is losing due to thefts. Which of the following is the BEST example of an equipment theft deterrent? - ✔✔Cable locks Your organization is considering virtualization solutions. Management wants to ensure that any solution provides the best ROI. Which of the following situations indicates that virtualization would provide the best ROI? - ✔✔Most Physical servers within the organization are currently underutilized. You are preparing to deploy a new application on a virtual server. The virtual server hosts another server application that employees routinely access. Which of the following is the BEST method to use when deploying the new application? - ✔✔Take a snapshot of the VM before deploying the new application.
Ned is not able to access any network resources from his Linux-based computer. Which of the following commands would he use to view the network configuration of his system? - ✔✔ifconfig Administrators frequently create VMs for testing. They sometimes leave these running without using them again after they complete their tests. Which of the following does this describe? - ✔✔VM Sprawl Users within your organization access virtual desktops hosted on remote servers. This is describes which of the following? - ✔✔Virtual Desktop Environment (VDE) users access virtual desktops hosted on remote servers. Your organization has implemented a Virtual Desktop Infrastructure (VDI) for most users. When a user logs off, the desktop reverts to its original state without saving any changes made by the user. Which of the following BEST describes this behavior? - ✔✔Non-Persistence Which type of virtualization allows a computer's operating system kernel to run multiple isolated instances of a guest virtual machine, with each guest sharing the kernel? - ✔✔Container Virtualization You are considering rebooting a database server and want to identify if it has any active network connections. Which of the following commands will list active network connections? - ✔✔netstat You have configured a firewall in your network to block ICMP traffic. You want to verify that it is blocking this traffic. Which of the following commands would you use? - ✔✔ping Your organization's security policy requires that PII data-in-transit must be encrypted. Which of the following protocols would BEST meet this requirement? - ✔✔Secure Shell (SSH) Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to protect the confidentiality of credentials used to connect to these devices. Which of the following protocols would BEST meet this need? - ✔✔Simple Network Management Protocol version 3 (SNMPv3) Lisa is enabling The Network Time Protocol(NTP) on some servers within the DMZ. Which of the following uses cases is she MOST likely supporting with this action? - ✔✔Time Synchronization
permit IP any any eq 443 deny IP any any - ✔✔Firewall Your organization hosts a web server and wants to increase its security. You need to separate all web- facing traffic from internal network traffic. Which of the following provides the BEST solution? - ✔✔A demilitarized zone (DMZ): is a buffer zone between a private network and the Internet, and it will separate the web server's web-facing traffic from the internal network. Management at your organization wants to prevent employees from accessing social media sites using company-owned computers. Which of the following devices would you implement? - ✔✔A "Nontransparent proxy" includes the ability to to filter traffic based on the URL and is the best choice. You need to configure a Unified Threat Management(UTM) security appliance to restrict traffic going to social media sites. Which of the following are you MOST likely to configure? - ✔✔URL filter, this would block access to the sites based on their URL. Your organization recently purchased a sophisticated security appliance that includes a DDoS mitigator. Where should you place this device? - ✔✔At the border of the network, between the private network and the Internet. You are preparing to deploy a heuristic-based detection system to monitor network activity. Which of the following would you create first? - ✔✔Baseline Attackers have recently launched several attacks against servers in your organization's DMZ. You are tasked with identifying a solution that will have the best chance at preventing these attacks in the future. Which of the following is the BEST choice? - ✔✔An in-band IPS Lisa oversees and monitors processes at a water treatment plant using SCADA systems. Administrators recently discovered malware on her system that was connecting to the SCADA systems. Although they removed the malware, management is still concerned. Lisa needs to continue using her system and it's not possible to update the SCADA systems. Which of the following can mitigate this risk? - ✔✔Install a NIPS on the border of the SCADA network. Which of the following BEST describes a false negative?
An IDS falsely indicates a buffer overflow attack occurred. Antivirus software reports that a valid application is malware. A heuristic-based IDS detects a previously unknown attack An IDS does not detect a buffer overflow attack. - ✔✔An IDS does not detect a buffer overflow attack.