Bank 3 Flashcards
(74 cards)
A security specialist is notified about a certificate warning that users receive when using a new internal website.After being given the URL from one of the users and seeing the warning, the security specialist insects the certificate and realizes it has been issued to the IP address, which is how the developers reach the site. Which of the following would BEST resolve the issue? A. OSCP B. OID C. PEM D. SAN
D. SAN
Which of the following is a random value appended to a credential that makes the credential less susceptible to compromise when hashed? A. Nonce B. Salt C. OTP D. Block cipher E. IV3
B. Salt
A systems administrator has created network file shares for each department with associated security groups for each role within the organization. Which of the following security concepts is the systems administrator implementing? A. Separation of duties B. Permission auditing C. Least privilege D. Standard naming convention
C. Least privilege
Data center employees have been battling alarms in a data center that has been experiencing hotter than normal temperatures. The server racks are designed so all 48 rack units are in use, and servers are installed in any manner in which the technician can get them installed. Which of the following practices would BEST alleviate the heat issues and keep costs low? A. Utilize exhaust fan B. Use hot and cold aisles C. Air gap the racks D. Use a secondary AC unit
B. Use hot and cold aisles
A company has just completed a vulnerability scan of its servers. A legacy application that monitors the HVAC system in the data center presents several challenges, as the application vendor is no longer in business. Which of the following secure network architecture concepts would BEST protect the other company servers if the legacy server were to be exploited? A. Virtualization B. Air gap C. VLAN D. Extranet
C. VLAN
A company recently experienced data exfiltration via the corporate network. In response to the breach, a security analyst recommends deploying an out-of-band IDS solution. The analyst says the solution can be implemented without purchasing any additional network hardware. Which of the following solutions will be used to deploy the IDS? A. Network tap B. Network proxy C. Honeypot D. Port mirroring
D. Port mirroring
A security consultant is setting up a new electronic messaging platform and wants to ensure the platform supports message integrity validation. Which of the following protocols should the consultant recommend? A. S/MIME B. DNSSEC C. RADIUS D. 802.11x
A. S/MIME
Joe, a contractor, is hired by a firm to perform a penetration test against the firm’s infrastructure. When conducting the scan, he receives only the network diagram and the network list to scan against the network. Which of the following scan types is Joe performing? A. Authentication B. White box C. Automated D. Gray box
D. Gray box
A technician has discovered the crypto-virus infection on a workstation that has access to sensitive remote resources. Which of the following is the immediate NEXT step the technician should take?
A. Determine the source of the virus that has infected the workstation
B. Sanitize the workstation’s internal drive
C. Reimage the workstation for normal operation
D. Disable the network connections on the workstation
D. Disable the network connections on the workstation
Which of the following access management concepts is MOST closely associated with the use of a password or PIN? A. Authorization B. Authentication C. Accounting D. Identification
B. Authentication
A company has a team of [penetration testers. This team has located a file on the company file server that they believe contains clear text usernames followed by a hash. Which of the following tools should the penetration testers use to learn more about the content of this file? A. Exploitation framework B. Vulnerability scanner C. Netcat D. Password cracker
D. Password cracker
Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (SELECT TWO)
A. An attacker could potentially perform a downgrade attack
B. The connection is vulnerable to resource exhaustion
C. The integrity of the data could be at risk
D. The VPN concentrator could revert to L2TP
E. The IPSec payload is reverted to 16-bit sequence numbers
C. The integrity of the data could be at risk
A security administrator is configuring a RADIUS server for wireless authentication. The configuration must ensure client credentials are encrypted end-to-end between the client and the authenticator. Which of the following protocols should be configured on the RADUIS server? (SELECT TWO) A. PAP B. MSCHAP C. PEAP D. NTLM E. SAML
B. MSCHAP
C. PEAP
A company wishes to move all of its services and application to a cloud provider but wants to maintain full control of the deployment, access, and provisions of its services to its users. Which of the following BEST represents the required cloud deployment model? A. SaaS B. IaaS C. MaaS D.Hybrid E.Private
B. IaaS
Ann is the IS manager for several new systems in which the classifications of the systems’ data are being decided.Ashe is trying to determine the sensitivity level of the data being processed. Which of the following people should she consult to determine the data classification? A. Steward B. Custodian C. User D. Owner
D. Owner
A new Chief Information Officer (CIO) has been reviewing the badge procedures and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy? A. Physical B. Corrective C. Technical D. Administrative
D. Administrative
An incident response analyst at a large corporation is reviewing proxy log data. The analyst believes a malware infection may have occurred. Upon further review, the analyst determines the computer responsible for the suspicious network traffic is used by the Chief Executive Officer (CEO). Which of the following is the best NEXT step for the analyst to take?
A. Call the CEO directly to ensure awareness of the event
B. Run a malware scan on the CEO’s workstation
C. Reimage the CEO’s workstation
D. Disconnect the CEO’s workstation from the network
D. Disconnect the CEO’s workstation from the network
A security analyst monitors the syslog server and notices the following:
pinging 10.25.27.31 with 65500 bytes of data
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Which of the following attacks is occurring? A. Memory leak B. Buffer overflow C. Null pointed deference D. Integer overflow
B. Buffer overflow
Hacktivist are most commonly motivated by: A. curiosity B. notoriety C. financial gain D. political cause
D. political cause
A security analyst identified an SQL injection attack. Which of the following is the FIRST step in remediating the vulnerability? A. Implement stored procedures B. Implement input validations C. Implement proper error handling D. Implement a WAF
B. Implement input validations
A company is performing an analysis of the corporate enterprise network with the intent of identifying any one system, person, function, or service that, when neutralized, will cause or cascade disproportionate damage to the company’s revenue, referrals, and reputation. Which of the following is an element of the BIA that this action is addressing? A. Identification of critical systems B. Single point of failure C. Value assessment D. Risk register
B. Single point of failure
A stock trading company had the budget for enhancing its secondary data center approved. Since the main site is in a hurricane-affected area and the disaster recovery site is 100mi (161kn) away, the company wants to ensure its business is always operational with the least amount of man hours needed. Which of the following types of disaster recovery sites should the company implement? A. Hot site B. Warm site C. Cold site D. Cloud-based site
A. Hot site
Which of the following is the BEST way for home users to mitigate vulnerabilities associated with loT devices on their home networks?
A. Power off the devices when they are not in use
B. Prevent loT devices from contacting the Internet directly
C. Apply firmware and software updates upon availability
D. Deploy a bastion host on the home network
C. Apply firmware and software updates upon availability
A security administrator wants to implement a logon script that will prevent MITM attacks on the local LAN. Whichof the following commands should the security administrator implement within the script to accomplish this task?
A. arp –s 192.168.1.1 00-3a-d1-fa-b1-06
B. dig –x @192.168.1.1 mypc.comptia.com
C. nmap –A _T4 192.168.1.1
D. tcpdump –lnv host 192.168.1.1 or either 00:3a:d1:fa:b1:06
A. arp –s 192.168.1.1 00-3a-d1-fa-b1-06