Bank 2 Flashcards
(68 cards)
A company has a data classification system with definitions for “Private” and “Public.” The company’s
security outlines how data should be protected based on type. The company recently added the data
type “Proprietary.” Which of the following is the MOST likely reason the company added this data type?
A. Reduced Cost
B. More searchable data
C. Better data classification
D. Expanded authority of the privacy officer
C. Better data classification
An external attacker can modify the ARP cache of an internal computer. Which of the following types of attacks is described? A. Replay B. Spoofing C. DNS poisoning D. Client-side attack
B. Spoofing
A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The main culprit is the antivirus program. Which of the following issues is left unresolved? (Select TWO) A. MITM attack B. DoS attack C. DLL injection D. Buffer overflow E. Resource Exhaustion
B. DoS attack
E. Resource Exhaustion
A help desk technician receives a phone call from an individual claiming to be an employee of the
organization and requesting assistance to access a locked account. The help desk technician asks the
individual to provide proof of identity before access can be granted. Which of the following types of
attack is the caller performing?
A. Phishing
B. Shoulder surfing
C. Impersonation
D. Dumpster diving
C. Impersonation
A security analyst conducts a manual scan on a known hardened host that identifies many non-compliant
configuration items. Which of the following BEST describes why this has occurred?
(Select TWO)
A. Privileged-user credentials were used to scan the host
B. Non-applicable plugins were selected in the scan policy (Maybe)
C. The incorrect audit file was used
D. The output of the report contains false positives
E. The target host has been compromised
A. Privileged-user credentials were used to scan the host
D. The output of the report contains false positives
Two users must encrypt and transmit large amounts of data between them. Which of the following
should they use to encrypt and transmit the data?
A. Symmetric algorithm
B. Hash function
C. Digital signature
D. Obfuscation
A. Symmetric algorithm
A company was recently audited by a third party. The audit revealed the company’s network devices
were transferring files in the clear. Which of the following protocols should the company use to transfer
files?
A. HTTPS
B. LDAPS
C. SCP
D. SNMPv3
D. SNMPv3
A technician is investigating a potentially compromised device with the following symptoms: • Browser slowness • Frequent browser crashes • Hourglass stuck • New search toolbar • Increased memory consumption Which of the following types of malware has infected the system? A. Man-in-the-browser B. Spoofer C. Spyware D. Adware
D. Adware
A penetration tester has written an application that performs a bit-by-bit XOR 0xFF operation on
binaries prior to transmission over untrusted media. Which of the following BEST describes the action
performed by this type of application?
A. Hashing
B. Key exchange
C. Encryption
D. Obfuscation
D. Obfuscation
A new Chief Information Officer (CIO) has been reviewing the badging procedures and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy? A. Physical B. Corrective C. Technical D. Administrative
D. Administrative
Which of the following MUST the sender use after hashing a message to complete the digital signature process? A. Private key B. Public key C. Secret key D. Session key E. Shared key
A. Private key
Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS? A. Privilege escalation B. Pivoting C. Process affinity D. Buffer overflow
A. Privilege escalation
A computer resource center issued smartphones to all first-level and above managers. The managers
have the ability to install mobile tools. Which of the following tools should be implemented to control
the types of tools managers install?
A. Download manager
B. Content manager
C. Segmentation manager
D. Application manager
D. Application manager
When sending messages using symmetric encryption, which of the following must happen FIRST? A. Exchange encryption keys B. Establish digital signatures C. Agree on an encryption method D. Install digital certificates
C. Agree on an encryption method
Which of the following is used to validate the integrity of data? A. CBC B. Blowfish C. MD5 D. RSA
C. MD5
An audit report has identified a weakness that could allow unauthorized personnel access to the facility
at its mail entrance and from there gain access to the network. Which of the following would BEST
resolve the vulnerability?
A. Faraday cage
B. Air gap
C. Mantrap
D. Bollards
C. Mantrap
A security administrator receives an alert from a third-party vendor that indicates a certificate that was
installed in the browser has been hijacked at the root of a small public CA. The security administrator
knows there are at least four different browsers in use on more than a thousand computers in the
domain worldwide. Which of the following solutions would be BEST for the security administrator to
implement to most efficiently assist with this issue?
A. SLL
B. CRL
C. PKI
D. ACL
B. CRL
The helpdesk received a call after hours from an employee who was attempting to log into the payroll
server remotely. When the help desk returned the call the next morning, the employee was able to log
into the server remotely without incident. However, the incident occurred again the next evening.
Which of the following BEST described the cause of the issue?
A. The password expired on the account and needed to be reset.
B. The employee does not have the rights needed to access the database remotely.
C. Time-of-day restrictions prevented the account from logging in.
D. The employee’s account was locked out and needed to be unlocked.
C. Time-of-day restrictions prevented the account from logging in.
A security administrator installed a new network scanner that identifies new host systems on the
network. Which of the following did the security administrator install?
A. Vulnerability scanner
B. Network-based IDS
C. Rogue system detection
D. Configuration compliance scanner
B. Network-based IDS
A company wants to ensure confidential data from storage media is sanitized in such a way that the
drive cannot be reused. Which of the following methods should the technician use?
A. Shredding
B. Wiping
C. Low-level formatting
D. Repartitioning
E. Overwriting
A. Shredding
A network administrator needs to allocate a new network for the R&D group. The network must not be
accessible from the internet, regardless of the network firewall or other external misconfigurations.
Which of the following settings should the network administrator implement to accomplish this?
A. Configure the OS default TTL to 1.
B. Use NAT on the R&D network.
C. Implement a router ACL
D. Enable protected ports on the switch.
B. Use NAT on the R&D network.
Which of the following would provide additional security by adding another factor to a smart card? A. Token B. Proximity badge C. Physical key D. PIN
D. Pin
An application was recently compromised after some malformed data come in via web form. Which of
the following would MOST likely have prevented this?
A. Input validation
B. Proxy server
C. Stress testing
D. Encoding
A. Input validation
In determining when it may be necessary to perform a credentialed scan against a system instead of a
non-credentialed scan, which of the following requirements is MOST likely to influence this decision?
A. The scanner must be able to enumerate the host OS of devices scanned.
B. The scanner must be able to footprint the network.
C. The scanner must be able to check for open ports with listening services.
D. The scanner must be able to audit file system permissions.
D. The scanner must be able to audit file system permissions.