Question 6 of 36

Zion belongs to a category of employees who are responsible for implementing and managing the physical security equipment installed around the facility. He was instructed by the management to check the functionality of equipment related to physical security.

Identify the designation of Zion.

    Correct Answer: D

    Zion's responsibility of implementing and managing the physical security equipment installed around the facility aligns with the role of a Safety officer. Safety officers are typically tasked with ensuring that physical security measures such as alarms, surveillance systems, and other equipment are functional and properly maintained. Therefore, the designation of Zion is Safety officer.

Question 7 of 36

In an organization, all the servers and database systems are guarded in a sealed room with a single entry point. The entrance is protected with a physical lock system that requires typing a sequence of numbers and letters by using a rotating dial that intermingles with several other rotating discs.

Which of the following types of physical locks is used by the organization in the above scenario?

    Correct Answer: B

    In the scenario described, the entry point is secured with a system that requires typing a sequence of numbers and letters using a rotating dial intermingled with several other rotating discs. This description matches the functioning of combination locks, which use such a mechanism for security. Digital locks, mechanical locks, and electromagnetic locks do not match this description as accurately as combination locks do.

Question 8 of 36

Lorenzo, a security professional in an MNC, was instructed to establish centralized authentication, authorization, and accounting for remote-access servers. For this purpose, he implemented a protocol that is based on the client-server model and works at the transport layer of the OSI model.

Identify the remote authentication protocol employed by Lorenzo in the above scenario.

    Correct Answer: B

    The protocol that Lorenzo implemented is RADIUS (Remote Authentication Dial-In User Service). This protocol is designed to provide centralized authentication, authorization, and accounting (AAA) for users who connect and use network services. RADIUS works based on the client-server model and operates at the transport layer of the OSI model, making it the most suitable choice in this scenario.

Question 9 of 36

Malachi, a security professional, implemented a firewall in his organization to trace incoming and outgoing traffic. He deployed a firewall that works at the session layer of the OSI model and monitors the TCP handshake between hosts to determine whether a requested session is legitimate.

Identify the firewall technology implemented by Malachi in the above scenario.

    Correct Answer: B

    A circuit-level gateway is a type of firewall technology that operates at the session layer (Layer 5) of the OSI model. It monitors the TCP handshake to ensure that the session is legitimate, which matches the specific scenario described. This type of firewall focuses on the state and attributes of the connection, rather than the content of the packets, ensuring the validity of the session before allowing data to pass through.

Question 10 of 36

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.

Identify the detection method employed by the IDS solution in the above scenario.

    Correct Answer: D

    The detection method described involves first creating models of possible intrusions and then comparing these models with incoming events to make detection decisions. This corresponds to Signature Recognition, which uses predefined attack patterns to identify potential intrusions. Signature-based detection relies on these predefined models or signatures, making it suitable for identifying known threats based on specific patterns of past attacks.