Bank 4 Flashcards

(43 cards)

1
Q
A security guard notices a vehicle parked beside the trash bins at the loading dock and an unknown individual opening trash bags. The security guard notifies the local authorities so they can investigate. Which of the following is potentially being conducted?
A. Impersonation 
B. Spear phishing
C. Dumpster diving 
D. Intimidation
A

C. Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following threat factors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?
A. Competitor
B. Hacktivist
C. Insider
D. Organized crime
A

A. Competitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following BEST describes the impact of an unremediated session timeout vulnerability?
A. The credentials of a legitimate user could be intercepted and reused to log in when the legitimate user is offline
B. An attacker has more time to attempt brute-force password cracking
C. More than one user may be allowed to concurrently connect to a system, and an attacker can use one of those concurrent connection
D. An attacker could use an existing session that has been initiated by a legitimate user

A

D. An attacker could use an existing session that has been initiated by a legitimate user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security engineer is making changes to a corporate network to facilitate the expansion of corporate connectivity to guest users. The security engineer is concerned with unauthorized users accessing sensitive systems that also require network connectivity. Given the engineer’s requirements, which of the following is the BEST method of securing the sensitive systems?
A. Place the sensitive systems in an isolated VLAN
B. Place an air gap around the sensitive systems
C. Virtualize the guest wireless infrastructure
D. Place the guest WAPs on a honeynet

A

A. Place the sensitive systems in an isolated VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A security administrator wants to install an AAA server to centralize the management of network devices, such as routers and switches. The server must reauthorize each individual command executed on a network device. Which of the following should be implemented?
A. RADUIS
B. Kerberos
C. SAML
D. TACACS+
A

D. TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile devices prior to providing the user with a captive portal login. Which of the following should the systems administrator configure?
A. L2TP with MAC filtering
B. EAP-TTLS
C. WPA2-CCMP with PSK
D. RADIUS federation
A

C. WPA2-CCMP with PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following could help detect trespassers in a secure facility? (SELECT TWO)
A. Faraday cages
B. Motion-detection sensors
C. Tall, chain-link fencing
D. Security guards 
E. Smart cards
A

B. Motion-detection sensors

D. Security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server. Which of the following methods is the penetration tester MOST likely using?
A. Escalation of privilege
B. SQL injection
C. Active reconnaissance 
D. Proxy server
A

C. Active reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A company performing an analysis of the corporate enterprise network with the intent of identifying what will cause losses in revenue, referrals, and/or reputation when out of commission. Which of the following is an element of a BIA that is being addressed?
A. Mission-essential function
B. Single point of failure
C. Backup and restoration plans
D. Identification of critical systems
A

D. Identification of critical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A security specialist must confirm a backup matches the original copy. Which of the following should the security specialist use to accomplish the objective?
A. AES 
B. 3DES
C. MD5
D. RSA
A

C. MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
When developing an application, executing a preconfigured set of instructions is known as:
A. a code library
B. code signing
C. a stored procedure
D. infrastructure as code
A

C. a stored procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user receives an email from an ISP indicating malicious traffic coming from the user’s home network is detected. The traffic appears to be Linux-based, and it is targeting a website that was recently featured on the news as being taken offline by an Internet attack. The only Linux device on the network is a home surveillance camera system. Which of the following BEST describes what is happening?
A. The camera system is infected with a bot
B. The camera system is infected with a RAT
C. The camera system is infected with a Trojan
D. The camera system is infected with a backdoor

A

A. The camera system is infected with a bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Finance department employees are reporting slow network connectivity and SSL/TLS certificate errors when they access secure websites. A security administrator suspects a computer in the finance VLAN may have been compromised and is impersonating the router’s IP address using an MITM attack. Which of the following commands should the security administrator use to verify this finding?
A. arp 
B. route
C. tracert
D. nmap
E. nslookup
A

A. arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message? (SELECT TWO)
A. Hash the message
B. Encrypt the message
C. Digitally sign the message
D. Label the email as “Confidential”
E. Perform a key exchange with the recipient

A

B. Encrypt the message

C. Digitally sign the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which trying to manage a firewall’s ACL, a security administrator (User3) receives an “Access Denied” error. The manager reviews the following information:

Security_admins:User1, User2 
Firewall access:
       ACL Read: Security_admins 
       ACL Writes: Security_admins 
       Reboot: Managers 
       Audit:User3 
Which of the following is preventing the administrator from managing the firewall? 
A. Mandatory access control
B. Rule-based access control 
C. Group-based access control
D. Attribute-based access control
A

D. Attribute-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented if the administrator does not want to provide the wireless password of certificate to the employees?
A. WPS
B. 802.1X
C. WPA2-PSK 
D. TKIP
A

A. WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Hacktivists are more commonly motivated by:
A. curiosity
B. notoriety
C. financial gain
D. political cause
A

D. political cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following scenarios BEST describes an implementation of non-repudiation?
A. A user logs into a domain workstation and accesses network file shares for another department
B. A user remotely logs into the mail server with another user’s credentials
C. A user sends a digitally signed email to the entire finance department about an upcoming meeting
D. A user accesses the workstation registry to make unauthorized changes to enable functionality within an application

A

C. A user sends a digitally signed email to the entire finance department about an upcoming meeting

19
Q
A systems administrator found a suspicious file in the root of the file system. The file contains URL’s, usernames, passwords, and text from other documents being edited on the system. Which of the following types of malware would generate such a file?
A. Keylogger
B. Rootkit
C. Bot
D. RAT
20
Q

A company has noticed multiple instances of proprietary information on public websites. It has also observed an increase in the number of email messages sent to random employees containing malicious links and PDFs. Which of the following changes should the company make to reduce the risks associated with phishing attacks: (SELECT TWO)
A. Install an additional firewall
B. Implement a redundant email server
C. Block access to personal email on corporate systems
D. Update the X 509 certificates on the corporate email server
E. Update corporate policy to prohibit access to social media websites
F. Review access violations on the file server

A

C. Block access to personal email on corporate systems

E. Update corporate policy to prohibit access to social media websites

21
Q
An organization employee resigns without giving adequate notice. The following day, it is determined that the employee is still in possession of several company-owned mobile devices. Which of the following could have reduced the risk of this occurring? (SELECT TWO)
A. Proper off boarding  procedures 
B. Acceptable use policies
C. Non-disclosure agreements
D. Exit interviews
E. Background Checks
F. Separation of Duties
A

A. Proper off boarding procedures
B. Acceptable use policies
D. Exit interviews

22
Q

A company is allowing a BYOD policy for its staff. Which of the following is a best practice that can decrease the risk of users jailbreaking mobile devices?
A. Install a corporately monitored mobile antivirus on the devices
B. Prevent the installation of applications from a third-party application store
C. Build a custom ROM that can prevent jailbreaking
D. Require applications to be digitally signed

A

A. Install a corporately monitored mobile antivirus on the devices

23
Q

Joe, a user, wants to send a document electronically to Ann, another user, and ensure non-repudiation, confidentiality, and integrity. Which of the following should Joe do? (SELECT TWO)
A. Encrypt the document with Ann’s private key
B. Encrypt the document with Joe’s public key
C. Sign the document with Joe’s private key
D. Sign the document with Ann’s private key
E. Sign the document with Joe’s public key
F. Encrypt the document with Ann’s public key

A

C. Sign the document with Joe’s private key

F. Encrypt the document with Ann’s public key

24
Q

Security administrators attempted corrective action after a phishing attack. Users are still experiencing trouble logging in, as well as an increase in account lockouts. Users’ email contacts are reporting an increase in spam and social networking requests. Due to the large number of affected accounts, remediation must be accomplished quickly. Which of the following actions should be taken FIRST?
(SELECT TWO)
A. Disable the compromised accounts
B. Update WAF rules to block social networks
C. Remove the compromised accounts from all AD groups
D. Change the compromised accounts’ passwords
E. Disable the open relay on the email server
F. Enable sender policy framework

A

A. Disable the compromised accounts

D. Change the compromised accounts’ passwords

25
An incident response manager has started to gather all the facts related to a SIEM alert showing multiple systems may have been compromised. The manager has gathered these facts: The breach is currently indicated on six user PCs. One service account is potentially compromised. Executive management has been notified. ``` In which of the following phases of the IRP is the manager currently working? A. Recovery B. Eradication C. Containment D. Identification ```
D. Identification
26
An external auditor visits the human resources department and performs a physical security assessment. The auditor observes documents on printers that are unclaimed. A closer look at these documents reveals employee names, addresses, ages, and types of medical and dental coverage options each employee has selected. Which of the following is the MOST appropriate action to take? A. Flip the documents face down so no one knows these documents are PII sensitive B. Shred the documents and let the owner print a new set C. Retrieve the documents, label them with a PII cover sheet, and return them to the printer D. Report to the human resources manager that their personnel are violating a privacy policy
D. Report to the human resources manager that their personnel are violating a privacy policy
27
``` A company wishes to deploy a wireless network. Management insists that each individual users should have to authenticate with a unique username and password before being able to associate with the wireless access points. Which of the following wireless features would be the MOST appropriate to achieve this objective? A. WPA2 PSK B. WEP C. WPA Enterprise D. 802.11r E. Captive portal ```
C. WPA Enterprise | E. Captive portal
28
``` After attempting to harden a web server, a security analyst needs to determine if an application remains vulnerable to SQL injection attacks. Which of the following would BEST assist the analyst in making this determination? A. tracert B. Fuzzer C. nslookup D. Nmap E. netcat ```
B. Fuzzer
29
``` The Chief Information Security Officer (CISO) of a university is concerned about potential transmission of usernames and passwords in clear text when authenticating a directory server. Which of the following would BEST mitigate the CISO’s concerns? A. SFTP B. SNMPv3 C. LDAPS D. SMB ```
C. LDAPS
30
``` After a security incident, management is meeting with involved employees to document the incident and its aftermath. Which of the following BEST describes this phase of the incident response process? A. Lessons learned B. Recovery C. Identification D. Preparation ```
A. Lessons learned
31
``` A member of the IR team has identified an infected computer. Which of the following IR phases should the team member conduct NEXT? A. Eradication B. Recovery C. Lessons learned D. Containment ```
D. Containment
32
``` . A user needs to send sensitive information to a colleague using PKI. Which of the following concepts apply when a sender encrypts the message hash with the sender’s private key? (SELECT TWO) A. Non-repudiation B. Email content encryption C. Steganography D. Transport security E. Message integrity ```
A. Non-repudiation | E. Message integrity
33
``` A security analyst is acquiring data from a potential network incident. Which of the following evidence is the analyst MOST likely to obtain to determine the incident? A. Volatile memory capture B. Traffic and logs C. Screenshots D. System image capture ```
B. Traffic and logs
34
``` Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (SELECT TWO) A. Password expiration B. Password length C. Password complexity D. Password history E. Password lockout ```
C. Password complexity | D. Password history
35
Due to regulatory requirements, servers in a global organization must use time synchronization. Which of the following represents the MOST secure method of time synchronization? A. The servers should connect to external Stratum 0 NTP servers for synchronization B. The servers should connect to internal Stratum 0 NTP servers for synchronization C. The servers should connect to external Stratum 1 NTP servers for synchronization D. The servers should connect to internal Stratum 1 NTP servers for synchronization
B. The servers should connect to internal Stratum 0 NTP servers for synchronization
36
A security analyst is attempting to solve compatibility issues between the company’s ERP software and application whitelisting to ensure only tested and approved applications are able to run within the organization. In the current configuration, only executables installed in C:\program files\ are able to be executed by the user. The following information is logged by the ERP software: ERP Corp Application v1.2 Date: 1/22/2017 5:00 AM Running scheduled task processdata1\ copying file C:\program files\ERPCorp\processdata.exe to C:\temp\processdata-1-22-2017-0500.exe Error: could not execute C:\temp\processdata-1-22-2017-0500.exe – Access Denied Fault in application 0x00f4bc01.- Shutting Down Which of the following would BEST resolve the issue without allowing for any potential untested or unapproved software to be executed? A. Create a path rule that permits C:\temp\processdata-1-22-2017-0500.exe to be executed B. Create a hash rule that permits the application processdata.exe to be executed C. Create a path rule that permits C:\temp\*.exe to be executed D. Create a rule that allows all software digitally signed by ERP Corp to be executed E. Contact the software’s publisher and request a patch be made to change the behavior of the software
D. Create a rule that allows all software digitally signed by ERP Corp to be executed
37
``` A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring? A. Time-of-day restrictions B. Permission auditing and review C. Offboarding D. Account expiration ```
A. Time-of-day restrictions
38
A security analyst is securing smartphones and laptops for a highly mobile workforce. Priorities include: ``` Remote wipe capabilities Geolocation services Patch management and reporting Mandatory screen locks Ability to require passcodes and pins Ability to require encryption ``` Which of the following would BEST meet these requirements? A. Implementing MDM software B. Deploying relevant group policies to the devices C. Installing full device encryption D. Removing administrative rights to the devices
A. Implementing MDM software
39
``` A systems administrator is deploying a new mission-essential server into a virtual environment. Which of the following is BEST mitigated by the environment’s rapid elasticity characteristic? A. Data confidentiality breaches B. VM escape attacks C. Lack of redundancy D. Denial of service ```
C. Lack of redundancy
40
``` A security consultation is gathering information about the frequency of a security threat’s impact to an organization. Which of the following should the consultant use to label the number of times an attack can be expected to impact the organization in a 365-day period? A. ARO B. MTBF C. ALE D. MTTR E. SLA ```
A. ARO
41
A security analyst is securing a CA server. One of the requirements is network isolation with no access to the internet or networked computers. Given this scenario, which of the following should the analyst implement to BEST address the requirement? A. Set up a firewall rule blocking ports 80 and 443 B. Set up an air-gapped environment C. Set up a router and configure an ACL D. Set up a segmented VLAN
B. Set up an air-gapped environment
42
``` . An organization’s Chief Information Officer (CIO) recently received an email from human resources that contained sensitive information. The CIO noticed the email was sent via unsecure means. A policy has since been put into place stating all emails must be transmitted using secure technologies. Which of the following should be implemented to address the new policy? A. HTTPS B. SMTP C. TLS D. SFTP ```
C. TLS
43
A dumpster diver recovers several hard drives from a company and is able to obtain confidential data from one of the hard drives. The company then discovers its information is posted online. Which of the following methods would have MOST likely prevented the data from being exposed? A. Removing the hard drive from its enclosure B. Using software to repeatedly rewrite over the disc space C. Using Blowfish encryption on the hard drives D. Using magnetic fields to erase the data
D. Using magnetic fields to erase the data