Bank 1 Flashcards
(65 cards)
A security administrator is reviewing the event logs for a company server. There are numerous entries for attempts to log into the telnet service with an account names “root.” After further review of the access to the server, the security administrator determines there is a business need for another server in the company to connect via telnet to the server under review. Which of the following tasks should the security administrator perform to improve the security posture of the server?
A. Change the timeout values on the telnet service
B. Allow the telnet access to the server through the firewall
C. Configure the telnet service to only accept traffic from the other server
D. Configure the telnet service to log at the debug level
E. Disable root access within the telnet service
F. Set the telnet service to enforce password changes every 90 days
C. Configure the telnet service to only accept traffic from the other server
E. Disable root access within the telnet service
A security administrator has defined a new policy that requires all users to have complex passwords. Which of the following is this policy designed to help mitigate. A. Man-in-the-middle attack B. Phishing C. Session hijacking D. Dictionary Attack
D. Dictionary Attack
In order to establish a connection to a server using secure LDAP, which of the following MUST be installed on the client? A. Server public key B. Subject alternative name certificate C. CA anchor of trust D. Certificate signing request
A. Server public key
A CA is attempting to publicize the acceptable parameters for certificate signing requests. Which of the following should a server administrator use to fulfill the requirements of the CA? A. Interconnection security agreement B. Certificate templates C. Client-side certificate D. Software token
B. Certificate templates
The first responder to an incident has been asked to provide an after action report. Which of the following incident response procedures does this support? A. Incident Identification B. Mitigation C. Lessons Learned D. Escalation/Notification
C. Lessons Learned
A web server at an organization has been the target of distributed denial of service attacks. Which of the following, it correctly configured, would BEST mitigate these and future attacks? A. SYN cookies B. Implicit deny C. Blacklisting D. URL filter
A. SYN cookies
A finance manager is responsible for approving wire transfers and processing the transfers using the software provided by the company’s bank. A number of discrepancies have been found related to the wires in a recent financial audit and the wires appeared to be fraudulent. Which of the following controls should be implemented to reduce the likelihood of fraud related to the use of wire transfers? A. Separation of duties B. Least privilege C. Qualitative auditing D. Acceptable use policy
A. Separation of duties
A company has implemented a public-facing authentication system that uses PKI and extended attributes to allow third-party, web-based application integration. Which of the following is this an example of? (Select THREE) A. Federation B. Two-factor authentication C. Transitive Trust D. Trusted OS E. Single sign-on F. TOTP G. MAC
A. Federation
C. Transitive Trust
E. Single sign-on
A company is providing mobile devices to all employees. The system administrator has been tasked with providing input for the company’s new mobile device policy. Which of the following are valid security concepts that the system administrator should include when offering feedback to management? (select TWO) A. Transitive trust B. Asset tracking C. Remote wiping D. HSM E. Key management
B. Asset tracking
C. Remote wiping
An employee connects to a public wireless hotspot during a business trip. The employee attempts to go to a secure website but instead connects to an attacker who is performing a man-in-the-middle attack. Which of the following should the employee do to mitigate the vulnerability described in the scenario?
A. Connect to a VPN when using public wireless networks
B. Only connect to WPA2 networks regardless of whether the network is public or private
C. Ensure a host-based firewall is installed and running when using public wireless networks
D. Check the address in the web browser before entering credentials
A. Connect to a VPN when using public wireless networks
Which of the following remote authentication methods uses a reliable transport layer protocol for communication? A. RADIUS B. LDAP C. TACACS+ D. SAML
C. TACACS+
A company has a proprietary device that requires access to the network be disabled. Only authorized users should have access to the device. To further protect the device from unauthorized access, which of the following would also need to be implemented?
A. Install NIPS within the company to protect all assets
B. Block port 80 and 443 on the firewall
C. Install a cable lock to prevent theft of the device
D. Install software to encrypt access to the hard drive
D. Install software to encrypt access to the hard drive
A security administrator suspects that an employee has altered some fields within a noSQL database. Which of the following should the security administrator do to confirm the suspicion and identify the employee?
A. Review the video of the employee’s workstation
B. Review the database access log files
C. Capture a system image of the entire server
D. Generate file hashes of the database to compare to the last version
B. Review the database access log files.
A recent audit has revealed that a large percentage of laptop computers on the internal network are missing critical operating system updates. Which of the following will MOST effectively reduce the likelihood that these machines will become compromised by unknown malware? A. Access control lists B. Antivirus software C. Patch management D. Behavior-based IPS
C. Patch management
A project manager is working with a data owner to review information security classification requirements for a new system the organization is deploying to customers requiring five-nines uptime. Which of the following classifications would be MOST appropriate for the data owner to establish for the data contained in the system? A. Integrity B. Permanency C. Confidentiality D. Availability
D. Availability
The network administrator wants to assign VLANs based on which user is logging into the network.Which of the following should the administrator use to accomplish this? (Select TWO) A.MAC filtering B.RADIUS C. 802.3af D. 802.11ac E. 802.1x F. 802.3q
B. RADIUS
E. 802.1x
A PKI architect is implementing a corporate enterprise solution. The solution will incorporate key escrow and recovery agents, as well as a tiered architecture. Which of the following is required in order to implement the architecture correctly? A. Certification revocation list B. Strong ciphers C. Intermediate authorities D. IPSec between CAs
C. Intermediate authorities
Ann, a security administrator, needs to implement a transport encryption solution that will enable her to detect attempts to sniff packets off the wire. Which of the following could be implemented? A. Elliptic curve algorithms B. Ephemeral keys C. Quantum cryptography D. Steganography
C. Quantum cryptography
An organization that uses cloud infrastructure to present a payment portal is using: A. Software as a service (Saas) B. Platform as a service (Paas) C. Monitoring as a service (Maas) D. Infrastructure as a service (Iaas)
A. Software as a service (Saas)
A data center has suffered repeated burglaries that led to equipment theft and arson. In the past, the thieves have demonstrated a determination to bypass any installed safeguards. After mantraps have been installed to prevent tailgating, the thieves crashed through the wall of the data center with a vehicle after normal business hours. Which of the following options could further improve the physical safety and security of the data center? (Select TWO) A.Cipher locks B. CCTV C. Escape routes D. K-rated fencing E. FM200 fire suppression
D. K-rated fencing
E. FM200 fire suppression
Several computers in an organization are running below the normal performance baseline. A security administrator inspects the computers and finds the following pieces of information:
- Several users have uninstalled the antivirus software
- Some users have installed unauthorized software
- Several users have installed pirated software
- Some computers have had automatic updating disabled after being deployed
- Users have experienced slow responsiveness when using the internet browser
- Users have complete control over critical system properties
Which of the following solutions would have prevented these issues from occurring? (Select TWO)
A. Using snapshots to revert unwanted user changes
B. Using an IPS instead of an antivirus
C. Placing users in appropriate security groups
D. Disabling unnecessary services
E. Utilizing an application whitelist
F. Utilizing an application blacklist
C. Placing users in appropriate security groups
E. Utilizing an application whitelist
A security analyst is investigating an incident involving an internal host in the finance department that has been communicating with a C&C server. The security analyst is having a difficulty determining the identity of the endpoint. Upon investigation, the analyst is informed that the flow of traffic from the finance department to the C&C server takes the following path: Switch A, Proxy A, Switch B, Router A. Multiple departments also follow the same flow of traffic. The security analyst sees one RFC 1918 address arriving at Router A. Which of the following administrators should be contacted FIRST in order to help aid in determining the identification of the compromised host? A. Router A network administrator B. Proxy A network administrator C. Switch A network administrator D. Switch B network administrator
B. Proxy A network administrator
A network administrator discovers that telnet was enabled on the company’s Human Resources (HR) payroll server and that someone outside of the HR subnet has been attempting to log into the server. The network administrator has disabled telnet on the payroll server. Which of the following is a method of tracking attempts to log onto telnet without exposing company data? A. Banner grabbing B. Active port numbers C. Honeypot D. Passive IPS
C. Honeypot
A recent policy change at an organization requires that all remote access connections to and from file servers at remote locations must be encrypted. Which of the following protocols would accomplish this new directive? (Select TWO) A. TFTP B. SSH C. FTP D. RDP E. HTTP
B. SSH
D. RDP