Examen 1 Flashcards
(125 cards)
What type of vulnerability/attack is it when the malicious person forces the user's browser to send an authenticated request to a server? A. Cross-site request forgery B. Cross-site scripting C. Session hijacking D. Server side request forgery
A. Cross-site request forgery
Your next-door neighbor, that you do not get along with, is having issues with their network, so he yells to his spouse the network’s SSID and passowrd and you hear them both clearly. What do you do with this information?
A. Nothing but suggest to him to change the network’s SSID and password.
B. Sell his SSID and password to friends that come to your house, so it doesn’t slow down your network.
C. Log onto to his network, after all it’s his fault you can get in.
D. Only use his network when you have large downloads so you don’t tax your own network.
A. Nothing but suggest to him to change the network’s SSID and password.
Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users. A. SQL injection attack B. Cross-Site Scripting (XSS) C. LDAP Injection attack D. Cross-Site Request Forgery (CSRF)
B. Cross-Site Scripting (XSS)
An Internet Service Provider (ISP) has a need to authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is most likely able to handle this requirement?
A. RADIUS
B. DIAMETER
C. Kerberos
D. TACACS+
A. RADIUS
A recent security audit revealed that there were indeed several occasions that the company's network was breached. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving? A. True positive B. False negative C. False positive D. False positive
B. False negative
Which among the following is a Windows command that a hacker can use to list all the
shares to which the current user context has access?
A. NET FILE
B. NET USE
C. NET CONFIG
D. NET VIEW
B. NET USE
Which of the following prgramming languages is most vulnerable to buffer overflow attacks? A. Perl B. C++ C. Python D. Java
B. C++
Which of the following command line switch would you use ofr OS detection in Nmap? A. -D B. -O C. -P D. -X
B. -O
Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust
relationship exists and that a certificate is still valid for specific operations?
A. Certificate issuance
B. Certificate validation
C. Certificate cryptography
D. Certificate revocation
B. Certificate validation
Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her? A. Password protected files B. Hidden folders C. BIOS password D. Full disk encryption.
D. Full disk encryption.
Which of the following is a characteristic of Public Key Infrastructure (PKI)?
A. Public-key cryptosystems are faster than symmetric-key cryptosystems.
B. Public-key cryptosystems distribute public-keys within digital signatures.
C. Public-key cryptosystems do not require a secure key distribution channel.
D. Public-key cryptosystems do not provide technical non-repudiation via digital signatures
B. Public-key cryptosystems distribute public-keys within digital signatures.
The chance of a hard drive failure is once every three years. The cost to buy a new ard
drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will
require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?
A. $146
B. $1320
C. $440
D. $100
A. $146
Due to a slowdown of normal network operations, IT department decided to monitor
internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?
A. All of the employees would stop normal work activities
B. IT department would be telling employees who the boss is
C. Not informing the employees that they are going to be monitored could be an invasion of privacy.
D. The network could still experience traffic slow down.
C. Not informing the employees that they are going to be monitored could be an invasion of privacy.
If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation? A. Civil B. International C. Criminal D. Common
A. Civil
What hacking attack is challenge/response authentication used to prevent?
A. Replay attacks
Bob is doing a password assessment for one of his clients. Bob suspects that security policies are not in place. He also suspects that weak passwords are probably the norm throughout the company he is evaluating. Bob is familiar with password weaknesses and key loggers. Which of the following options best represents the means that Bob can adopt to retrieve passwords from his clients hosts and servers?
A. Hardware, Software, and Sniffing.
B. Hardware and Software Keyloggers.
C. Passwords are always best obtained using Hardware key loggers.
D. Software only, they are the most effective.
A. Hardware, Software, and Sniffing.
Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall? A. UDP 123 B. UDP 541 C. UDP 514 D. UDP 415
C. UDP 514
Code injection is a form of attack in which a malicious user:
A. Inserts text into a data field that gets interpreted as code
B. Gets the server to execute arbitrary code using a buffer overflow
C. Inserts additional code into the JavaScript running in the browser
D. Gains access to the codebase on the server and inserts new code
A. Inserts text into a data field that gets interpreted as code
Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic. He can mark this alert as: A. False negative B. False positive C. True positive D. False signature
B. False positive
PGP, SSL, and IKE are all examples of which type of cryptography? A. Public key B. Secret Key C. Hash Algorithm D. Digest
A. Public key
B. Secret key
C. Hash Algorithm
D. Digest
The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed to achieve compliance. Which of the following requirements would best fit under the objective, “implement stron access control measures”?
A. Regularly test security system and proccesses
B. Encrypt transmission of cardholder data across open, public networks
C. Assign a unique ID to each person with computer access.
D. Use and regularly update anti-virus software on all systems commonly affected by malware.
C. Assign a unique ID to each person with computer access.
The purpose of a \_\_\_\_\_\_\_\_\_\_ is to deny network access to local area networks and other information assets by unauthorized wireless devices. A. Wireless Intrusion Prevention System B. Wireless Access Point C. Wireless Access Control List D. Wireless Analyzer
A. Wireless Intrusion Prevention System
What is GINA?
A. Gateway Interface Network Application
B. GUI Installed Network Application CLASS
C. Global Internet National Authority
D. Graphical Identification and Authentication DLL
D. Graphical Identification and Authentication DLL
A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over pots 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator classify this situation? A. True negatives B. False negatives C. True positives D. False positives
D. False positives