Exam F Flashcards
(221 cards)
Which attack is commonly associated with C and C++ programming languages?
A. cross-site scriptingwrong
B. DDoS
C. buffer overflow
D. water holing
buffer overflow
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
A. SMTPwrong
B. pxGrid
C. STIX
D. XMPP
STIX
Which two preventive measures are used to control cross-site scripting? (Choose two)
A. Disable cookie inspection in the HTML inspection engine.wrong
B. Incorporate contextual output encoding/escaping
C. Enable client-side scripts on a per-domain basis
D. Run untrusted HTML input through an HTML sanitization engine.
E. Same Site cookie attribute should not be used.
Incorporate contextual output encoding/escaping
Enable client-side scripts on a per-domain basis
Which two mechanisms are used to control phishing attacks? (Choose two)
A. Use antispyware software.wrong
B. Implement email filtering techniques.
C. Revoke expired CRL of the websites.
D. Enable browser alerts for fraudulent websites.
E. Define security group memberships.
Implement email filtering techniques.
Enable browser alerts for fraudulent websites.
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
A. rootkit exploitwrong
B. Smurf
C. distributed denial of service
D. cross-site scripting
cross-site scripting
Which two behavioral patterns characterize a ping of death attack? (Choose two)
A. Malformed packets are used to crash systems.
B. The attack is fragmented into groups of 8 octets before transmission.
C. The attack is fragmented into groups of 16 octets before transmission.
D. Publicly accessible DNS servers are typically used to execute the attack.
E. Short synchronized bursts of traffic are used to disrupt TCP connections.
Malformed packets are used to crash systems.
The attack is fragmented into groups of 8 octets before transmission.
What is the difference between deceptive phishing and spear phishing?
A. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
B. A spear phishing campaign is aimed at a specific person versus a group of people.
C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
D. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
A spear phishing campaign is aimed at a specific person versus a group of people.
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
A. Patch for cross-site scripting.
B. Perform backups to the private cloud.
C. Protect systems with an up-to-date antimalware program.
D. Protect against input validation and character escapes in the endpoint.
E. Install a spam and virus email filter.
Protect systems with an up-to-date antimalware program.
Install a spam and virus email filter.
Which two capabilities does TAXII support? (Choose two)
A. Binding
B. Exchange
C. Mitigating
D. Pull messaging
E. Correlation
Binding
Pull messaging
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. web page images
B. database
C. Linux and Windows operating systems
D. user input validation in a web page or web application
user input validation in a web page or web application
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
A. Secure the connection between the web and the app tier.
B. Use prepared statements and parameterized queries.
C. Check integer, float, or Boolean string parameters to ensure accurate values.
D. Block SQL code execution in the web application database login.
E. Write SQL code instead of using object-relational mapping libraries.
Use prepared statements and parameterized queries.
Check integer, float, or Boolean string parameters to ensure accurate values.
Which form of attack is launched using botnets?
A. DDOS
B. EIDDOS
C. TCP flood
D. virus
DDOS
Which type of attack is social engineering?
A. trojan
B. malware
C. phishing
D. MITM
phishing
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
A. profile
B. url
C. terminal
D. selfsigned
profile
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
A. ARP spoofing
B. exploits
C. malware
D. eavesdropping
E. denial-of-service attacks
exploits
malware
What are two rootkit types? (Choose two)
A. bootloader
B. buffer mode
C. registry
D. virtual
E. user mode
bootloader
user mode
Which threat involves software being used to gain unauthorized access to a computer system?
A. ping of death
B. HTTP flood
C. virus
D. NTP amplification
virus
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
A. 3DES
B. DES
C. RSA
D. AES
RSA
Which two descriptions of AES encryption are true? (Choose two)
A. AES is more secure than 3DES.
B. AES can use a 168-bit key for encryption.
C. AES can use a 256-bit key for encryption.
D. AES encrypts and decrypts a key three times in sequence.
E. AES is less secure than 3DES.
AES is more secure than 3DES.
AES can use a 256-bit key for encryption.
Which algorithm provides encryption and authentication for data plane communication?
A. SHA-96
B. SHA-384
C. AES-GCM
D. AES-256
AES-GCM
Which two key and block sizes are valid for AES? (Choose two)
A. 128-bit block size, 192-bit key length
B. 128-bit block size, 256-bit key length
C. 64-bit block size, 168-bit key length
D. 192-bit block size, 256-bit key length
E. 64-bit block size, 112-bit key length
128-bit block size, 192-bit key length
128-bit block size, 256-bit key length
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
A. DMVPN
B. FlexVPN
C. IPsec DVTI
D. GET VPN
GET VPN
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
The IPsec configuration that is set up on the active device must be duplicated on the standby device
The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.