Everything Flashcards
All in one spot cause I got tired of sorting them by sections.
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.
n
Used in conjunction, which of the following are PII? (Select TWO).
A. Marital status B. Favorite movie C. Pet's name D. Birthday E. Full name
n
In a disaster recovery situation, operations are to be moved to an alternate site. Computers and network connectivity are already present; however, production backups are several days out-of- date. Which of the following site types is being described?
A. Cold site
B. High availability site
C. Warm site
D. Hot site
n
Which of the following malware types is an antivirus scanner MOST unlikely to discover? (Select TWO).
A. Trojan B. Pharming C. Worms D. Virus E. Logic bomb
n
Which of the following threats corresponds with an attacker targeting specific employees of a company?
A. Spear phishing
B. Phishing
C. Pharming
D. Man-in-the-middle
n
Which of the following attacks would password masking help mitigate?
A. Shoulder surfing
B. Brute force
C. Tailgating
D. Impersonation
n
If cookies with non-random sequence numbers are issued upon authentication, which of the following attack types can occur?
A. Directory traversal
B. Session hijacking
C. Cross-site scripting
D. SQL injection
n
Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
A. System A fails open. System B fails closed.
B. System A and System B both fail closed.
C. System A and System B both fail open.
D. System A fails closed. System B fails open.
n
An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application’s security posture?
A. Baseline reporting
B. Protocol analysis
C. Threat modeling
D. Functional testing
n
A security firm has been engaged to assess a software application. A production-like test environment, login details, production documentation and source code have been provided. Which of the following types of testing is being described?
A. White box
B. Gray box
C. Black box
D. Red teaming
n
A user has forgotten their account password. Which of the following is the BEST recovery strategy?
A. Upgrade the authentication system to use biometrics instead.
B. Temporarily disable password complexity requirements.
C. Set a temporary password that expires upon first use.
D. Retrieve the user password from the credentials database.
n
All of the following are valid cryptographic hash functions EXCEPT:
A. RIPEMD.
B. RC4.
C. SHA-512.
D. MD4.
n
When a certificate issuer is not recognized by a web browser, which of the following is the MOST common reason?
A. Lack of key escrow
B. Self-signed certificate
C. Weak certificate pass-phrase
D. Weak certificate cipher
n
Which of the following PKI components identifies certificates that can no longer be trusted?
A. CRL
B. CA public key
C. Escrow
D. Recovery agent
n
Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack?
A. 802.1x
B. DHCP
C. 802.1q
D. NIPS
n
MAC filtering is a form of which of the following?
A. Virtualization
B. Network Access Control
C. Virtual Private Networking
D. Network Address Translation
n
Which of the following authentication protocols forces centralized wireless authentication?
A. WPA2-Personal
B. WPA2-Enterprise
C. WPA2-CCMP
D. WPA2-TKIP
n
A company that purchases insurance to reduce risk is an example of which of the following?
A. Risk deterrence
B. Risk acceptance
C. Risk avoidance
D. Risk transference
n
Which of the following is a method to prevent ad-hoc configuration mistakes?
A. Implement an auditing strategy
B. Implement an incident management strategy
C. Implement a patch management strategy
D. Implement a change management strategy
n
Which of the following risks may result from improper use of social networking and P2P software?
A. Shoulder surfing
B. Denial of service
C. Information disclosure
D. Data loss prevention
n
Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?
A. Botnet
B. Rootkit
C. Logic bomb
D. Virus
n
A computer is put into a restricted VLAN until the computer’s virus definitions are up-to-date. Which of the following BEST describes this system type?
A. NAT
B. NIPS
C. NAC
D. DMZ
n
Which of the following would be used for secure remote terminal access?
A. SSH
B. TFTP
C. SCP
D. SFTP
n
Without validating user input, an application becomes vulnerable to all of the following EXCEPT:
A. buffer overflow.
B. command injection.
C. spear phishing.
D. SQL injection.
n