Technologies and Tools (2) Flashcards

1
Q

You are concerned about an attacker enumerating all of your network. What protocol might help at least mitigate this issue?

HTTPS

IPSec

LDAPS

A

LDAPS

Lightweight Directory Access Protocol Secure (LDAPS) would at least mitigate the risk. LDAP is a directory of the network (computers, users, etc.). Securing that would help mitigate network enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have been asked to implement a secure protocol for transferring files that uses digital certificates. Which protocol would be the best choice?

FTP

SFTP

FTPS

A

FTPS

FTPS is File Transfer Protocol with SSL/TLS and uses digital certificates to secure file transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ahmed is responsible for VoIP at his company. He has been directed to ensure that all VoIP calls have the option to be encrypted. What protocol is best suited for security VoIP calls?

SIP

TLS

SRTP

A

SRTP

Secure Real-Time Transport Protocol (SRTP) is used to encrypt and secure RTP. RTP is the protocol for transmitting VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of screen locks on mobile devices?

To encrypt the device

To limit access to the device

To load a specific user’s apps

A

To limit access to the device

A screen lock limits access to users who know the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maria is a security engineer with a large bank. Her CIO has asked her to investigate the use of context-aware authentication for online banking. Which of the following best describes context-aware authentication?

In addition to username and password, authentication is based on the entire context (location, time of day, action being attempted, etc.).

Without a username or password, authentication is based on the entire context (location, time of day, action being attempted, etc.).

Authentication that requires a username and password, but in the context of a token or digital certificate

A

In addition to username and password, authentication is based on the entire context (location, time of day, action being attempted, etc.).

Context-aware authentication does still require a username and password, but in addition to those criteria, it examines the user’s location, time of day they are logging in, computer they are logging in from, what they are trying to do, and so forth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does application management accomplish for mobile devices?

Only allows applications from the iTunes store to be installed

Ensures the company has a list of all applications on the devices

Ensures only approved applications are installed on the devices

A

Ensures only approved applications are installed on the devices

Application management is primarily concerned with ensuring only authorized and approved applications are installed on mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dominick is responsible for security at a medium-sized insurance company. He is very concerned about detecting intrusions. The IDS he has purchased states that he must have an IDS on each network segment. What type of IDS is this?

IPS

Passive

Inline

A

Inline

An inline IDS is actually in the traffic line (i.e., on the network segment where traffic is)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Remote employees at your company frequently need to connect to both the secure company network via VPN and open public websites, simultaneously. What technology would best support this?

Split tunnel

IPSec

Full tunnel

A

Split tunnel

Split tunneling allows a mobile user to access dissimilar security domains like a public network (e.g., the Internet) and a local LAN or WAN at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denish is looking for a solution that will allow his network to retrieve information from a wide range of web resources, while all traffic passes through a proxy. What would be the best solution?

Forward proxy

Reverse proxy

SPI

A

Forward proxy

A forward proxy is a single location that provides access to a wide range of web sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Someone has been rummaging through your company’s trash bins seeking to find documents, diagrams, or other sensitive information that has been thrown out. What is this called?

Dumpster diving

Trash diving

Social engineering

A

Dumpster diving

This is the term for rummaging through the waste/trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Derrick is responsible for a web server cluster at his company. The cluster uses various load-balancing protocols. Derrick wants to ensure that clients connecting from Europe are directed to a specific server in the cluster. What would be the best solution to his problem?

Affinity

Binding

Load balancing

A

Affinity

Affinity load balancing ties certain users or groups of users to a specific server so they will be routed to that server if possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Teresa is responsible for WiFi security in her company. Her main concern is that there are many other offices in the building her company occupies and that someone could easily attempt to breach their WiFi from one of these locations. What technique would be best in alleviating her concern?

Using thin WAPs

Geofencing

WAP placement

A

WAP placement

Placing the WAPs carefully so as to provide the best coverage for the company, with minimum overlap outside the company, will be the best way to keep those in adjacent offices from attempting to breach the WiFi. When placing WAPs for the best coverage, one needs to focus on signal strength to ensure there is no gaps between WPAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Juan is responsible for the SIEM in his company. The SIEM aggregates logs from 12 servers. In the event that a breach is discovered, which of the following would be Juan’s most important concern?

Event duplication

Impact assessment

Correlation

A

Correlation

Correlating the events from the servers related to the breach would be the most important issue to address for the SIEM manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When you are considering an NIDS or NIPS, what are your two most important concerns?

Cost and false positives

False positives and false negatives

Power consumption and cost

A

False positives and false negatives

The total number of erroneous reports (i.e., false positives and false negatives) is the biggest concern because this determines effectiveness of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shelly is very concerned about unauthorized users connecting to the company routers. She would like to prevent spoofing. What is the most essential antispoofing technique for routers?

ACL

Logon

NIPS

A

ACL

Access control lists are Cisco’s primary recommendation to prevent spoofing on routers. ACLs limit access to the router and its functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Farès has implemented a flood guard. What type of attack is this most likely to defend against?

SYN attack

DNS poisoning

MAC spoofing

A

SYN attack

A SYN attack is a type of flooding attack that is a denial of service. Flood guards are either stand-alone or, more often, part of a firewall, and they prevent flooding attacks

17
Q

Terrance is trying to get all of his users to connect to a certificate server on his network. However, some of the users are using machines that are incompatible with the certificate server, and changing those machines is not an option. Which of the following would be the best solution for Terrance?

Use an application proxy for the certificate server.

Use NAT with the certificate server.

Change the server.

A

Use an application proxy for the certificate server.

An application proxy server is often used when the client and the server are incompatible for direct connection with the server

18
Q

John is implementing virtual IP load-balancing. He thinks this might alleviate network slowdowns, and perhaps even mitigate some of the impact of a denial-of-service attack. What is the drawback of virtual IP load-balancing?

It is resource-intensive.

Most servers don’t support it.

It is connection-based, not load-based.

A

It is connection-based, not load-based.

Virtual IP load balancing does not take the load of each interface into account and assumes all loads are essentially similar

19
Q

There has been a breach of the ACME network. John manages the SIEM at ACME. Part of the attack disrupted NTP; what SIEM issue would this most likely impact?

Time synchronization

Correlation

Event duplication

A

Time synchronization

If Network Time Protocol (NTP) is disrupted, then the various servers that forward logs to the SIEM might not have the same time. This could lead to events that actually took place at the same time appearing to have occurred at different times

20
Q

You are a security officer for a large law firm. You are concerned about data loss prevention. You have limited the use of USBs and other portable media, you use an IDS to look for large volumes of outbound data, and a guard searches all personnel and bags before they leave the building. What is a key step in DLP that you have missed?

Portable drives

Email

Bluetooth

A

Email

An insider could send out data as an email attachment

21
Q

Which of the following email security measures would have the most impact on phishing emails?

Email encryption

Digitally signing email

Spam filter

A

Spam filter

Phishing emails are often sent out to masses of people and a spam filter would block at least some of that, thus reducing the phishing email attacks

22
Q

Joanne has implemented TLS for communication with many of her networks servers. She wants to ensure that the traffic cannot be sniffed. However, users now complain that this is slowing down connectivity. Which of the following is the best solution?

Increase RAM on servers.

Change routers to give more bandwidth to traffic to these servers.

Implement TLS accelerators.

A

Implement TLS accelerators.

A TLS accelerator is a processor that handles processing, specifically processor-intensive public-key encryption for Transport Layer Security (TLS). This should significantly improve server responsiveness

23
Q

Olivia has discovered steganography tools on an employee’s computer. What is the greatest concern regarding employees having steganography tools?

Password cracking

Data exfiltration

Hiding network traffic

A

Data exfiltration

An employee could hide sensitive data in files using steganography and then exfiltrate that data

24
Q

John has discovered that an attacker is trying to get network passwords by using software that attempts a number of passwords from a list of common passwords. What type of attack is this?

Dictionary

Rainbow table

Brute force

A

Dictionary

This is an example of a dictionary attack. The attacker uses a list of words that are believed to be likely passwords

25
Q

Isabella has found netcat installed on an employee’s computer. That employee is not authorized to have netcat. What security concern might this utility present?

It is a password cracker.

It is a packet sniffer.

It is a network communication utility.

A

It is a network communication utility.

Netcat is a tool widely used by network administrators to establish communication between two machines. Having netcat on a machine could indicate an intruder has compromised that machine and installed netcat as a backdoor, or that the employee is setting up covert communication channels

26
Q

Omar is a network administrator for ACME Company. He is responsible for the certificate authorities within the corporate network. The CAs publish their CRLs once per week. What, if any, security issue might this present?

Revoked certificates still being used

Invalid certificates being issued

Certificates with weak keys

A

Revoked certificates still being used

The certificate revocation list designates certificates that have been revoked for some reason. Those certificates should no longer be used. But if the CRL is published only once per week, then a revoked certificate could potentially be used for up to a week after being revoked

27
Q

Hans is a network administrator for a large bank. He is concerned about employees violating software licenses. What would be the first step in addressing this issue?

Performing software audits

Scanning the network for installed applications

Establishing clear policies

A

Establishing clear policies

A clear security policy must be created that explains software licensing and the company processes for software licensing. Without clear policies, any other countermeasures will be less effective

28
Q

You are responsible for authentication methods at your company. You have implemented fingerprint scanners to enter server rooms. Frequently people are being denied access to the server room, even though they are authorized. What problem is this?

FAR

FRR

CER

A

FRR

The false rejection rate (FRR) is the rate at which authentication attempts are rejected when they should have succeeded. When you are getting a high number of authorized individuals being denied access, that is due to an FRR that is too high

29
Q

John is responsible for network security at a very small company. Due to both budget constraints and space constraints, John can select only one security device. What should he select?

Antivirus

IDS

UTM

A

UTM

Unified threat management (UTM) combines multiple security services into one device. It is common for a UTM to have firewall, antivirus, and IDS services all in one device