Domain 2.3 Given a scenario, troubleshoot common security issues. Flashcards

1
Q

Syslog server

A

a centralized server that aggregates the log files from the devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

where would you check for a revoked certificate

A

a CRL (Certificate Revokation List) which is updated only when you get to it or OCSP ( Online Certificate Status Protocol) which is realtime/immediate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

test question “blah blah, you need to revoke a certificate, now blah blah.”

A

only available correct answer on the test is CRL (Certificate Revocation List).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data exfiltration

A

Data leaving this network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baseline Deviation

A

Any changes to the default baseline by anyone other than an administrator is a baseline deviation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Baseline

A

build out one computer exactly how you want each future computer setup. Create an image and apply that image/baseline to other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a content filter mechanism that can reduce the possibility of malicious executable code being accepted as input?

A. Checking the length
B. Blocking hex characters
C. Escaping metacharacters
D. Filtering on known patterns of malicious content

A

C. Escaping metacharacters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are called to a investigate an incident on the network where a user has installed unauthorized software which resulting in a RAT being installed. Of the following which is true? (Select Two)

A. Nothing is wrong since a RAT is not a concern.
B. Unauthorized software installation would have been prevented with an application whitelist.
C. The user should have scanned the file prior to installing it.
D. Users privileges should be reviewed.

A

B. Unauthorized software installation would have been prevented with an application whitelist.

D. Users privileges should be reviewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly