Book Review Questions Flashcards
Review questions provided in the Third Edition Study Guide Exam (242 cards)
After running an nmap scan of the system, you recieve scan data that indicates the following three ports are open: 22/TCP; 443/TCP; 1521/TCP. What services commonly run on these ports?
SSH, HTTPS, Oracle
What type of system allows attackers to believe they have succeeded with their attack, thus providing defenders with information about their attack methods and tools?
Honeypot
What cybersecurity objective could be achieved by running your organization’s web servers in redundant, geographically separate datacentres?
Availability
Which of the following vulnerability scanning methods will provide the most accurate detail during a scan?
Authenticated
Security researchers recently discovered a flaw in the Chakra JavaScript scripting engine in Microsoft’s Edge browser that could allow remote execution or denial of service via a specifically crafted webiste. The CVSS 3.1 score for this vulnerability reads: CVSS: 3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H what is the attack vector and the impact to integrity based on this rating?
Network, High
Alice is a security engineer tasked with performing vulnerability scans for her organization. She encounters a false positive error in one of her scans. What should she do about this?
Verify that it is a false positive, and then document the exception.
Which phase of the incident response process is most likely to include gathering additional evidence such as information that would support legal action?
Containment, Eradication, and Recovery
Which of the following descriptions explains an integrity loss?
Sensitive or proprietary information was changed or deleted
Hui’s incident response program uses metrics to determine if their subscription to and use of IoC feeds is meeting the organization’s requirements. Which of the following incident response metrics is most useful if Hui wants to assess their use of IoC feeds?
Mean time to detect metrics
Abdul’s monitoring detects regular traffic sent from a system that is suspected to be comprimised and participating in a botnet to a set of remote IP addresses. What is it called?
Beaconing
What industry standard is used to describe risk scores?
CVSS
What term is used to describe the retention of data and information related to pending or active litigation?
Legal hold
During a forensic investigation Maria discovers evidence that a crime has been committed. What do organizations typically do to ensure that law enforcement can use data to prosecute a crime?
Document a chain of custody for the forensic data
Oscar’s manager has asked him to ensure that a compromised system has been completely purged since the compromise. What is Oscar’s best course of action?
Wipe and rebuild the system
Which of the following actions is not a common activity during the recovery phase of an incident response process
Reviewing accounts and adding new privilages
A statement like “windows workstations must have the current security configuration template applied to them before being deployed” is most likely to be part of which document?
Standards
A firewall is an example of what type of control?
Preventative
Cathy wants to collect network based indicators of compromise as part of her security monitoring practice. Which of the following is not a common network related IoC?
Scheduled updates
Nick wants to analyze a potentially malicious software package using an open source, locally hosted tool. Which of the following tools is best suited to his need if he wants to run the tool as part of the process?
Cuckoo sandbox
which software development life cycle model uses linear development concepts in an iterative, four phase process?
Spiral
Naomi wants to make her applications portable and easy to move to new environments without the overhead of a full operating system. What type of solution should she select?
Containerization
Bharath wants to make changes to the Windows Registry. What tool should he select?
Regedit
Tom wants to set an appropriate logging level for his Cisco networking equipment while he’s troubleshooting. What log level should he set?
7
Which of the following is not a common use of network segmentation?
Reducing availability