Lets Pray Flashcards

1
Q

A security administrator is segregating all web-facing server traffic from the internal network and restricting it to a single interface on a firewall. Which of the following BEST describes this new network?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organization does not want the wireless network name to be easily discovered. Which of the following software features should be configured on the access points?

A

SSID Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

While reviewing your vulnerability-scan log files, you find a vulnerability on your network with an assigned identification number. You research that number on the vendor’s website, then apply their recommended fix for the vulnerability.
Which type of vulnerability scanner was used?

A

Signature based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Suspicious traffic without a specific signature was detected. Under further investigation, it was determined that these were false indicators. Which of the following security devices needs to be configured to disable future false alarms?

A

Anomaly based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You want to monitor and limit users’ access to external websites.

Which of the following would BEST address this?

A

Install a proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your company allows business partners to connect to several of your application servers located at the main office. What can the main office implement to protect the rest of the company from those business partners?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TWO ways to segment your network based on organizational groups:

A

VLAN & Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You scan your company routers and find they haven’t been changed from their default configuration. Which would address this?

A

Secure router configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You want to create a small wireless network for testing before you roll the network out company-wide. For now though, you don’t want to tell employees about it yet. Which of these would offer the greatest obscurity about the new wireless network?

A

Disabling SSID broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which device allows you to inspect network traffic by redirecting packets before sending them on to their final destination?

A

Proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

While scanning the network, you find an unauthorized smart-phone has been used to surf the internet. Which of these device attributes was used to figure out that the device was not authorized?

A

MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have a VLAN that is dedicated to printers. This VLAN has more traffic than usual, which is causing congestion. You find out that someone has installed a bunch of new printers without your knowledge. Which of these could prevent this type of traffic congestion from happening again?

A

Access control Listed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attacker was able to connect to your router using a console cable. Which TWO should you have implemented to prevent this?

A

Console access to the router should have been disabled.

Physical access to the router should have been restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is the best reason to include several different elements like firewalls, IDS’s, DMZ’s, HIPs, and antivirus servers in your network?

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s it called when a load-balancer can remember a user, and always send that user to the same server?

A

Session affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your admin thinks that wireless MAC filtering is all he needs to protect the WLAN. Which of these would prove to him that he should also turn on WPA or WPA2?

A

Sniff and clone a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You have a user who must have local admin access on her laptop. Which is the BEST way to reduce the risk of her machine becoming compromised in this scenario?

A

HIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of these can ensure that only authorized devices can connect to your switch, based on MAC address?

A

Switch port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of these would you use to separate different

types of traffic through a switch?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of these would you use to separate different types of traffic through a switch

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are looking at the log file of an attack against your
webserver. Here’s a sample of what you find:

3: 15:45 IP 192.168.5.5.4000 > 10.0.1.8.20 Flags[S]
3: 15:45 IP 192.168.5.5.4001 > 10.0.1.8.21 Flags[S]
3: 15:45 IP 192.168.5.5.4002 > 10.0.1.8.25 Flags[S]
3: 15:45 IP 192.168.5.5.4003 > 10.0.1.8.53 Flags[S]

Which of these ACL’s would you implement to protect
against this attack and future attacks by the same IP,
while minimizing any service interruptions?

A

DENY TCP FROM 192.168.5.5 TO 10.0.1.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are planning on adding a new VoIP phone system
to your network, but you’re worried about
performance problems. The core switches on your
data network are almost maxed-out with traffic
already, so which of these would provide the best
performance and availability for both your VoIP traffic
as well as your existing data traffic?

A

Physically separate the VoIP phones from the data network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Your network has been very slow, so you look at your
Spanning-Tree setup. You find that an old, inferior
switch has been made the root-bridge. Why could this
be?

A

The switch has the lowest MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which would allow server access to external clients,

while still allowing access from internal users?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You just got a wireless music-streaming device for
your birthday and while at home it works great. It
connects to the internet and plays music through its
speakers. At work though, it doesn’t connect to the
internet. It is associated with the AP, and did receive
the expected network parameters. Also, other
wireless devices work fine. Which is the most likely
reason your device doesn’t work while in the office?

A

The company implements a captive portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You want to protect a group of servers. Which would
be BEST to implement to prevent connections from
unauthorized networks?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You’ve plugged a WAP in to your switch and
configured WPA2-TKIP for security. Hacker Joe is
somehow able to intercept clear-text HTTP
communication between the wireless users and the
internet. Why is Hacker Joe able to intercept and see
the clear-text communication?

A

Hacker-Joe is able to capture the wired

communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of these can scan computers to make sure they
have antivirus software, before the computer is
allowed to access the network?

A

NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A group of visitors connect their laptops to your wired
network and start using up a large chunk of your
bandwidth. How can you prevent this situation in the
future?

A

Port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which type of IDS detects intrusions based on a

vendor-provided list?

A

Signature based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

You’re configuring your firewall to block traffic
to-and-from a small list of specific IP addresses, while
allowing all other traffic. Which of these firewall rules
would then be necessary to implement in this
scenario?

A

Implicit allow as the last rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Each cubicle in your company needs to have a VoIP
phone and a desktop computer. Which of these
would be the best way to prevent users from
connecting unauthorized devices to the network?

A

Enforce authentication for network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You’re setting up a new 5GHz wireless network, but
you find that some areas of the building don’t get
very good coverage because you’re using vertical
antennas on your WAPs. Without moving any WAPs,
which of these would fix this problem?

A

Install unidirectional antennas to focus coverage where

needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

You’ve disabled the SSID broadcast on your WAP, but
unauthorized users are still connecting to it. Which of
these would further obscure the presence of your
wireless network?

A

Disable responses to a broadcast probe request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

You have both a secured, password-protected wireless
network for employees, and an open, un-secured visitor
network for guests. Walking by a guest’s laptop, you
notice this on her screen:

Reaver –I mon0 –b 10:4A:7D:0F:6B:EA

Starting…

[+] Trying pin 12345678

[+] Trying pin 12345688

[+] Trying pin 12345698

What should you implement?

A

Disable WPS because the visitor is trying to crack the employee network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You asked your newb tech to connect two buildings’
networks via wireless. He installs two ground plane
antennaes on 802.11b bridges to transfer data
between the buildings, which are 400 feet apart. It
doesn’t work. Which of these should you do to allow
connectivity between the two buildings?

A

Replace the current antennae with Yagi antennae.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You’re thinking about hosting data with a Cloud
Service Provider (CSP) and you are evaluating a
particular provider. Which of these would pose the
biggest risk when choosing to go with that vendor?

A

The financial review indicates the company is a startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Your users are having trouble reaching your intranet
site. You sniff the traffic going to the site and you see
the following packets:

09: 15:25 192.168.3.12:52550 -> 172.16.10.10:80 SYN
09: 15:25 192.168.3.12:52550 -> 172.16.10.10:80 SYN
09: 15:25 192.168.3.12:52550 -> 172.16.10.10:80 SYN
09: 15:25 192.168.3.12:52550 -> 172.16.10.10:80 SYN
09: 15:25 192.168.3.12:52550 -> 172.16.10.10:80 SYN
09: 15:25 192.168.3.12:52550 -> 172.16.10.10:80 SYN

A

DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of these would prevent users from using ARP
spoofing attacks against the computers located in
your HR department?

A

Separate Layer 2 VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

You set up an ECS (Environmental Control System) to
protect your data-center. You want to be able to
manage and monitor this system from any part of the
network. Which should you do to allow access, while
also reducing the attack surface of the system?

A

Configure the ECS host-based firewall to block non-ECS

application traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Corporate policy says that in order for new computers
to be added to your network, they must have the
corporate antivirus software loaded on them first.
Which of these would send an alert if a computer is
added to the network without the antivirus software?

A

NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

You have a server that is supposed to only be
accessible from the inside of your network.
Unfortunately, one of your admins made a
configuration mistake, and now the server is
accessible from the outside. Which one of these
configurations was probably modified wrong?

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which TWO would prevent unauthorized devices

from connecting to your wireless network?

A

MAC filtering

Enable WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

An inside attacker has sent thousands of MAC
addresses through one switch port in order to fill up
the switch’s CAM table (MAC address table). Which of
these would prevent this type of attack in the future?

A

Port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which would you use to encrypt voice data?

A

SRTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Your video application relies on IGMP to function.

Which of these is your app most likely using?

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of these is the best way to prevent
unauthorized devices from connecting to the
corporate network?

A

Port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which network design component would separate

network traffic based on the logical location of users?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which would be the best way to prevent attacks from

new devices introduced to the corporate network?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

You have a connectivity issue and you think that the
router may be blocking traffic to a remote network.
Which of these would confirm your theory by
providing helpful feedback?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

You need to ensure that only authorized devices can
connect to the wired and wireless networks.
Unauthorized devices should be automatically placed
on a guest network. Which TWO of these should you
implement to achieve these goals?

A

Port security

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

You need to build several different environments for
application development and testing. What should
you implement to create these new environments?

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

You need to find the source of a suspected attack that
keeps disconnecting systems from the wireless
network. You verify that there are no rogue wireless
access points, unauthorized wireless clients, or
de-authentication attacks occurring. Which would be
BEST to identify the source of the outage?

A

Conduct a wireless site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is it called when you use a cloud infrastructure

as your company’s payment portal?

A

software as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

You get an alert that an internal IP address is connecting to several
unknown malicious domains. You connect to the switch and add a
MAC filter to switch port 18 to block the system from the network.

Before

After

A few minutes later, the same malicious traffic starts again from a
different IP. Which of the following is the MOST likely reason that the
system was able to bypass the administrator’s MAC filter?

A

The system is now spoofing a MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

You discover that telnet was enabled on your Sales
server and that someone outside the Sales subnet has
been attempting to login to the server. You’ve
disabled telnet on the server, but which of these
would let you track attempts to log on to telnet
without exposing important company data?

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of these configurations would give you the
MOST information regarding threats while also
minimizing the risk to the internal corporate network?

A

Placing a NIDS between the corporate firewall and ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

You are investigating an incident involving an internal host
that has been communicating with a C&C server. You are
having trouble determining the identity of the host. You
discover that the flow of traffic from the host to the C&C
server takes the following path: Switch A, Proxy A, Switch
B, and Router A. Multiple departments also follow the
same flow of traffic. You see one RFC1918 (private)
address arriving at Router A. Which of the following
administrator should be contacted FIRST in order to help
aid in determining the identification of the compromised
host?

A

Router A network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A security administrator has concerns about new
types of media which allow for the mass distribution
of personal comments to a select group of people. To
mitigate the risks involved with this media, employees
should receive training on which of the following?

A

Social networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A security team has established a security awareness
program. Which of the following would BEST prove
the success of the program?

A

Metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

In which of the following steps of incident response
does a team analyze the incident and determine steps
to prevent a future occurrence?

A

Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which of these risk mitigation techniques could help

prevent collusion between users?

A

Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Separation of duties is often implemented between
developers and administrators in order to separate
which of the following?

A

Changes to program code and the ability to deploy to production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Sara, a security architect, has developed a framework
in which several authentication servers work together
to increase processing power for an application.
Which of the following does this represent?

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which of the following is the BEST approach to

perform risk mitigation of user access control rights?

A

Perform routine user permission reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

One of your datacenters is handling some sensitive
data, however, it is in an area with a volatile political
situation. You decide to move that data to another
datacenter in a more stable region. Which risk
mitigation strategy did you adopt here?

A

Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

You find that some of your users have permissions to
shares they should no longer have, because of
department changes and promotions. Which of the
following would mitigate this issue in the future?

A

User account reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

You find that long-time employees have more system
rights than they need to do their jobs. Which two
should you implement to make sure employees only
have the access they need to do their jobs?

A

Implement access control lists

Conduct user access reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which of these would be the BEST example of a

deterrent security control?

A

Security cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which control should you use to reduce the risk of

losing USB drives that contain confidential data?

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

You installed a new patch to a server which caused it
to crash. You couldn’t find system rollback procedures
so you just restored the server from the last backup.
What can you do to prevent future problems caused
by the lack of rollback procedures?

A

Change management plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What would be the reason for having two racks of
servers, one behind the other, facing in opposite
directions?

A

To create environmental hot and cold aisles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which stage of the Incident Handling process involves
developing procedures in order to respond to future
incidents?

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Before updating some production networking devices,
you have been asked to first submit a an
implementation plan and a roll-back plan. Which type
of risk mitigation strategy is being used here?

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which is the best way to ensure that ad hoc changes

aren’t making their way into your live applications?

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

You are concerned that your database admins are
also responsible for auditing database changes and
backup logs. Which access control method would
BEST help with this situation.

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of these uses disk striping with parity?

A

RAID 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

When you audit your business partner and compare

your findings to the SLA, you are trying to verify:

A

Performance and service delivery metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of these would BEST address physical safety

concerns for your building?

A

Escape routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of these documents contains information
about how and when something will be done, as well
as penalties for failure?

A

SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Sally finds a thumb-drive in the parking lot and plugs
it in to her computer. As soon as she does a command
prompt opens up and a script starts running. She
reports it to you, and you figure out that data on a
server has been compromised. What is this scenario
an example of?

A

Incident identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

When gathering evidence of a cyber-crime, in which
of these system components should you capture data
FIRST?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

You have a server that fails and needs to be replaced
once every 4 years and costs $4,000. Which would be
the valid factors in a risk calculation for this?

A

ARO = 0.25; SLE = $4,000; ALE = $1,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Bob, a security officer, has been ordered to look into a
possible vulnerability on a server. After investigating,
he decides it was a false alarm. Which of these is the
BEST action he should take here?

A

Document the results and report the findings

according to the incident response plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which document would you need if you were going to
share data between two companies, and you wanted
to outline the data sensitivity, as well as the type and
flow of the data?

A

ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

One of your forensic analysts was handed a
hard-drive to investigate. He used a log to capture
events, then sent the evidence to the lawyers to be
used in a court case. Which of these is being
demonstrated?

A

Data analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

You need to be able to restore data with an RPO of 24
hours, but you also need your backups to happen
within a restricted timeframe. You also want to be
able to take backups offsite every week. Which of
these should you do?

A

Daily incremental backup to tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which of these would be MOST relevant to logical

security controls?

A

Biometric access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

When developing your incident response plan, who
should be trained on Order Of Volatility, Chain of
Custody, and forensics?

A

First responders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Which of these would prevent users from installing

unauthorized applications?

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Your company often has guests who visit the office.
Which of these would be a low-cost way to prevent
those guests from viewing sensitive information?

A

Clean-desk policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

How would you calculate the total monetary losses

from a vulnerability that has been exploited?

A

Calculate the ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

How would you reduce the chances of electric shocks

when touching metal items in your server room?

A

Increase the humidity in the room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which is the BEST description/objective of the term

“succession planning”?

A

To ensure that a personnel management plan is in
place to ensure continued operation of critical
processes during an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

The same admin who approves patches also deploys
them. Your company has no formal vetting process
for installed patches, and there is no documented
patch management process. Which TWO controls
should you implement to reduce the risk involved
with this situation?

A

Separation of duties

Change management policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

After a security breach, you learn that not all of your
incident-response team has the tools they need to do
their job. You distribute those tools to your team, but
when should this problem BEST be revisited?

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

On your company systems, your admin has installed
anti-virus software and then configure whitelisting
controls to prevent malware and unauthorized
application installation. What has he achieved by
combining these two technologies?

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

You’ve created a Continuity Of Operations Plan and
need to be sure that everyone knows what actions to
perform in the event of a disaster. Which of the
following can be performed instead of completing a
full fail-over to validate this requirement?

A

Tabletop exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which of these would be the BEST reason to forbid
employees from using their personal devices on the
corporate network?

A

Personally owned devices might not be subjected to

the same security controls as corporate devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which BCP aspect involves choosing new key

personnel when there is a loss?

A

Succession planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What’s the name of the policy that defines how long
certain types of data should remain on company
equipment?

A

Data retention policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Your company webserver sometimes reboots in the
middle of the day due to regular OS patches. This
results in loss of sales while the system is rebooting.
Which of these would reduce the chances of this
happening in the future?

A

Change management controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

You are considering several options for internet
service at your location. Which of these documents
would be the most likely to contain information about
latency levels and MTTR?

A

SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which would be the best preventative control to stop

the theft of equipment from a construction site?

A

Fencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

When a company computer gets a virus or malware, it
is immediately removed from the corporate network.
Which incident response step does this describe?

A

Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

One of your admins has gone rogue and maliciously
deleted some important folders from one of your
servers. He or she logged on to the machine locally to
do this. Unfortunately, you don’t know exactly which
admin did this, so which of these would be the best
way to figure out who did it?

A

CCTV review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Which of these would you implement if you wanted
peer review and committee approval on all
application changes before those applications make
their way into your production environment?

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

During your Business Continuity Planning process, you
and your team analyze a potential disaster and want
to elicit constructive discussion. Which of these is
being described?

A

Tabletop exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Which term refers to how often a device experiences

a breakdown?

A

MTBF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which of these documents would best protect against
sharing data with people who are unauthorized to
view that data?

A

NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

You need to decommission all virtual servers hosted
on the cloud. When wiping the virtual hard drives
which of the following should be removed?

A

Data remnants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Your data-center has had repeated burglaries that led
to equipment theft and arson. The thieves have
shown they are determined to bypass any installed
safeguards. After mantraps had been installed to
prevent tailgating, the thieves crashed through the
wall of the data-center with a Humvee late at night.
Which TWO of these could further improve the
physical safety and security of the data-center?

A

K-rated fencing

FM200 fire suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

You allow employees to use personal cell phones,
laptops, and tablets for business purposes. Recently,
several files infected by viruses have been detected
on one of your servers. You suspect the files came
from an employee’s personal laptop. Which of these
BEST describes the cause of this issue?

A

Insufficient on-boarding procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

A finance manager is responsible for both approving
wire transfers and also for processing those transfers.
A number of discrepancies have been found related
to the wires and they appear to be fraudulent. Which
of these should you implement to reduce the
likelihood of fraud related to wire transfers?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which would you use to prove that digital evidence
hasn’t been tampered with after being taken into
custody?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

You’ve created a new technology that has the
potential to revolutionize your industry. If you wanted
to know who might be interested in stealing your
intellectual property which of these should you
commission?

A

a threat assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

The first responder to an incident has been asked to
provide an after-action report. This is an example of
which of these incident response procedures?

A

Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

A security administrator wants to perform routine
tests on the network during working hours when
certain applications are being accessed by the most
people. Which of the following would allow the
security administrator to test the lack of security
controls for those applications with the least impact
to the system?

A

Vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

A security analyst, Sally, is reviewing an IRC channel
and notices that a malicious exploit has been created
for a frequently used application. She notifies the
software vendor and asks them for remediation steps,
but is alarmed to find that no patches are available to
mitigate this vulnerability.

Which of the following BEST describes this exploit?

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

The Quality Assurance team is testing a new third
party developed application. The Quality team does
not have any experience with the application. Which
of the following is the team performing?

A

Black box testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

A vulnerability scan is reporting that patches are
missing on a server. After a review, it is determined
that the application requiring the patch does not exist
on the operating system.

Which of the following describes this cause?

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Using a heuristic system to detect an anomaly in a
computer’s baseline, a system administrator was able
to detect an attack even though the company
signature based IDS and antivirus did not detect it.
Further analysis revealed that the attacker had
downloaded an executable file onto the company PC
from the USB port, and executed it to trigger a
privilege escalation flaw. Which of the following
attacks has MOST likely occurred?

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

A malicious individual is attempting to write too much
data to an application’s memory. Which of the
following describes this type of attack?

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

You find a workstation that has data-leakage
occurring. Files are being transmitted to an IP address
in China. You check the workstation and the antivirus
and anti-malware software both have the latest
signature files. You also check and find that the
firewall has not been tampered with. Which is the
MOST likely reason for the data-leakage?

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Your wireless network uses two WAPs with one SSID.
You do a network scan and you find three BSSIDs but

only the one SSID. Which of the following is the best
explanation?

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What is it called when you verify the data being
submitted to a program, with the intent of preventing
malicious attacks against the program or its data?

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Your boss thanks you for the increase in wireless
network speed. You don’t know what he’s talking
about so, after investigating, you find a WAP hidden
in a potted plant outside of his office. Which type of
attack is MOST likely happening?

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Which TWO terms describe malware that tracks your
web surfing activities, then shows you advertisements
on other web pages?

A

Spyware

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

After having some wireless problems, you notice a
new WAP has been turned on. It has the same SSID
name as the corporate network and is set to the same
channel as a nearby WAP, however, it isn’t connected
to the wired network. Which is the MOST likely
scenario that’s causing your wireless problems?

A

An evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

You want to see if your new webserver complies with
your company security requirements. What is it called
when you try to identify a lack of security controls, as
well as common misconfigurations on the server?

A

Vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Your UNIX server was hacked, and you think the
attacker altered the log files to cover his tracks. Which
of these would help detect attempts to further alter
the log files?

A

Implement remote syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What’s it called when someone intercepts
communications between two parties and modifies
the data without either party being aware?

A

Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

You’ve had a string of data loss incidents lately, but
no break-ins have been reported. Which of these
would MOST likely reduce these incidents?

A

Conduct security awareness training

134
Q

Your employees keep getting phishing e-mails asking them
to click on links similar to this:
http://www.site.org/account.php?status=expired

These e-mails ask the user to click the link to re-activate
their accounts. All these e-mails come from a .org domain,
they all use http, and they all have the exact same URL.
Which of these configurations on your content filter will
prevent users from accessing this phishing URL while also
minimizing false positives?

A

DENY http://*.org/account.php?status=expired

135
Q

Which attack begins a connection by sending packets

with multiple TCP flags turned on, or set to 1?

A

Xmas

136
Q

You install a server that does a vulnerability scan on
your network and provides a report of which
machines are missing patches. Which is being used
here?

A

Gray box vulnerability testing

137
Q

You accidentally installed a new search toolbar into
your browser. The toolbar then tracked your online
activities and sent that data to a server out on the
internet. Which of these attacks took place?

A

Malicious add-on

138
Q

What’s it called when you check a system to confirm
that unnecessary ports and services are disabled,
patches are up to date, and application hot-fixes are
current?

A

Vulnerability assessment

139
Q

Which of these is the best way find out the version

numbers of the apps that are installed on a server?

A

Banner grabbing

140
Q

In your hotel, logging onto the open wireless network
requires you to go to a captive portal and
authenticate as a guest user. You utilize your hacker
skillz and figure out that the captive portal can be
bypassed, as long as one other wireless guest user is
on the network. Which one of these attacks did you
use?

A

MAC spoofing

141
Q

Your vulnerability scan shows no problems with your
server, but you do a manual test later and find that
there really were vulnerabilities on the server. Which
of these were reported by your initial scan?

A

False negative

142
Q

Your server got compromised. Here are some entries
from your router log file:

Rtr5: list 120 permitted tcp 172.16.10.5(52888) -> 192.168.5.10(6667), 10 packets

Rtr5: list 120 permitted tcp 172.16.10.5(52888) -> 192.168.5.10(6667), 15 packets

Rtr5: list 120 permitted tcp 172.16.10.5(52888) -> 192.168.5.10(6667), 7packets

What happened to the server?

A

It is participating in a botnet

143
Q

What are exploit kits?

A

Tools capable of taking advantage of multiple CVEs

144
Q

While using public wireless hotspots, which would be
the appropriate control to prevent other wireless
users from accessing your laptop?

A

Host-based firewall

145
Q

Someone in your building is running an evil-twin
access point that spoofs any SSID your clients request.
How can you mitigate this attack?

A

Configure the devices to verify access point MAC

addresses.

146
Q

How would you protect your datacenter against the
following: Unauthorized access, Arson, and someone
driving a truck through the wall? Choose THREE:

A

Mantraps
Escape routes
K-rated fencing

147
Q

A man-in-the-middle intercepted your web traffic and
inserted a line that set the referrer URL. Which of
these is the attacker utilizing?

A

Header manipulation

148
Q

Which of these can be mitigated with secure coding?

A

Cross-site scripting

149
Q

Your switch only allows 2 MAC addresses at a time to
show up on any particular port. Which of these could
have caused a port to be shut-down by sending 3 or
more MAC addresses through the same port? Choose
the BEST answer.

A

A rogue access point was plugged in.

150
Q

Hacker Joe uses a wireless sniffer to capture his own
transaction that adds money to his gift-card. He then
pushes a copy of those packets onto the network
again and again to keep adding money to the card.
Which is the best description of this attack?

A

Replay attack

151
Q

Which of these tools would let you decipher network

traffic?

A

Packet analyzer

152
Q

Which of these would let you monitor the types of
traffic on your network, so you can be sure that the
secure version of protocols are used wherever
possible?

A

Network analyzer

153
Q

Access to your building is controlled by man-traps and
badge swipe. Which of these would ensure that
certain custodial employees can only enter the
building on weekends?

A

Time of day restrictions

154
Q

Which of these would be considered an ‘active’
penetration testing method? Choose the BEST
answer.

A

Running a port scanner against the target network

155
Q

Admin Sally has disabled the SSID broadcast on the
corporate WAPs. On your laptop, you still see the
wireless network listed. Which attack could be
happening here?

A

Evil twin

156
Q

Which would be the BEST way to deter admins from

making unauthorized changes to company systems?

A

System and data file hashing

157
Q

Bob in accounting got an e-mail that contained
malicious content. He realized this, and tried to delete
it, but he accidentally opened the e-mail instead.
Unfortunately, it then infected the network with a
zero-day exploit. How could you prevent this scenario
from happening in the future?

A

Set the email program default to open messages in

plain text.

158
Q

Bob’s security software identified malware on his
system and sent an alert to your central monitoring
server. Unfortunately, the malicious software was still
executed. Why?

A

The computer is running an IDS.

159
Q

Which TWO of these could be used for software
testing when the tester has no knowledge of the
system being tested?

A

Black box

Fuzzing

160
Q

You have a consultant doing tests on your network.
You’ve given him full knowledge of the company
equipment and their configurations. He performs a
test that successfully exploits a zero-day vulnerability.
Which of these did he perform?

A

Penetration test

161
Q

Which of these is the BEST description of a threat?

A

The potential exploitation of a vulnerability

162
Q

You’ve hired a pen-tester to test your DMZ. The only
info you’ve given her is the contact info of the
accounts payable department (so she can get paid),
and the admin’s contact info so she can submit the
final report. Which of these tests will be performed?

A

Black box

163
Q

Which type of malware can avoid being detected by

antivirus signatures?

A

Polymorphic

164
Q

Which should you implement to protect your website
from XSS (cross-site scripting) and SQL injection
attacks?

A

Web application firewall

165
Q

Which is the fastest way to decode hashed

passwords?

A

Rainbow tables

166
Q

What’s it called when you can access the application
you wrote without having to use any login
credentials?

A

Backdoor

167
Q

Which of these tools helps you to decipher network

traffic?

A

Packet analyzer

168
Q

Which of these could you use to determine the

operating system of a remote host?

A

Banner grabbing

169
Q

Which of the following is true about input validation
in a client-server architecture, when data integrity is
critical to the organization?

A

It should be performed on the server side.

170
Q

A company is about to release a very large patch to its
customers. An administrator is required to test patch
installations several times prior to distributing them
to customer PCs. Which of the following should the
administrator use to test the patching process quickly
and often?

A

Create a virtualized sandbox and utilize snapshots

171
Q

Matt, a security analyst, needs to implement
encryption for company data and also prevent theft
of company data. Where and how should Matt meet
this requirement?

A

Matt should implement DLP and encrypt the company database.

172
Q

Which of the following is a hardware based

encryption device?

A

TPM

173
Q

The IT department is allowing a BYOD policy, but is
concerned about corporate data loss if the device is
lost or stolen. Which TWO would be best to protect
the data, even if the communication SIM is removed
from the device?

A

Screen-locks

Device encryption

174
Q

You work at a laptop all day in a public area, but you
are concerned about the physical safety of the laptop
while it’s not in use. Which security control would
BEST address this concern?

A

Cable locks

175
Q

You want to secure company tablets by protecting the
Operating System, and making it difficult for an
attacker to change the data on the tablets. Which of
the following would work best for this goal?

A

TPM

176
Q

Your users have been sending unencrypted company
information via e-mail. Which should you select to
BEST detect and provide alerts when this happens?

A

DLP

177
Q

What’s it called when developers evaluate and

provide feedback of other developer’s code?

A

Peer review

178
Q

You decide to allow BYOD for several different mobile
platforms, and you’re in the process of choosing an
MDM solution. Which of these is the MOST important
technical security criteria for selecting your MDM?

A

Breadth of support for device manufacturers’ security

configuration APIs.

179
Q

You have a group of servers that should ONLY be
accessible while within the main building. Which of
these would be the MOST effective way to limit
access in this scenario?

A

Air gap

180
Q

Your company-issued smart phones have sensitive
data on them. Which of these security measures
would BEST prevent access to the data in the case of
loss or theft of the phones?

A

Configure the smart phones so that the stored data

can be destroyed from a centralized location

181
Q

Which TWO protocols would be used to connect to a

SAN?

A

iSCSI

Fibre Channel

182
Q

You’re reviewing the security posture of a server and
discover several user accounts that will never be
used. Which of these would fix the situation?

A

Host hardening

183
Q

You need to add a new VLAN to be used by a SAN you
are building. Which protocol should you use for data
transport on the SAN?

A

iSCSI

184
Q

You have a group of computers, each running one VM
in bridged-mode. All computers connect to the same
switch, and you want to enable port-security. To allow
both the hosts their VM’s to connect to the network,
what should you set the “maximum MAC address”
setting to on each switch port?

A

Two

185
Q

Which TWO of these would be best security practices

when deploying new servers?

A

Change default passwords

Disable unnecessary services

186
Q

Which of these would be BEST for fault-tolerance?

A

Clustering

187
Q

Your company web page only allows letters in the
“comments” field. An attacker was able to do a SQL
injection attack by sending special characters in this
field, even though the web page doesn’t allow them.
Which of these has the developer failed to
implement?

A

Server side validation

188
Q

An employee uses their home e-mail account to send
you an e-mail with a help-request. Attached to the
e-mail is an example of their problem, but it includes
customer names and credit-card numbers. Which of
these is the BEST technical control to mitigate the risk
of leaking sensitive data?

A

Implement a DLP solution for the email gateway to scan

email and remove sensitive data or files.

189
Q

You’ve turned off the GPS functionality in your
phone’s camera app, but you also want to make sure
the app can’t re-enable the setting without your
knowledge. Which of these should you disable to
achieve this?

A

Location-based services

190
Q

An attacker was able to gain admin access to your
webservers by exploiting vulnerabilities associated
with FTP, DNS, telnet, POP, IMAP, and SMTP. Which
of these would be BEST to increase the security of
your webservers?

A

Disable unnecessary services.

191
Q

Using fuzzing against an application would most likely

achieve which TWO types of attacks?

A

Buffer overflow

SQL injection

192
Q

Which of these will ensure confidentiality of your data

should your laptop become lost or stolen?

A

Full device encryption

193
Q

Which TWO of these can be used for hardware-based
encryption, as well as for key storage for full-disk or
full-device encryption?

A

HSM

TPM

194
Q

You want to test a new OS without applying any
patches, just to see if there are any vulnerabilities in
the system. Which of these options would allow you
to do your testing, while keeping your production
network safe?

A

Deploy the system in a sandbox environment on a

virtual machine.

195
Q

If you’re considering a BYOD policy, which TWO

considerations must be addressed in your policy?

A

Data ownership

Acceptable use

196
Q

Which is the BEST way to prevent sensitive
information from being shared with an attacker while
your users surf the internet?

A

DLP

197
Q

While reviewing logs, you find that a workstation on
the open wireless network has repeatedly tried to
access your SCADA controls. Which of these would be
the BEST way to prevent this from happening again?

A

Implement VLANs to separate the SCADA system.

198
Q

You had an employee who accessed sensitive data,
encrypted it, and sent it out of the company via his
Gmail account. You want to prevent this in the future,
so how would you achieve the following goals?

  • Track access and use of files marked ‘secret’
  • Prevent employees from sending secret data via third-party e-mail
  • Provide documentation to investigators
  • Identify other employees who may be involved
A

Agent-based DLP software with correlations and logging enabled

199
Q

Your admin determines that some of the PII in your
databases is not needed. He instructs you to comb
through the data and delete the unnecessary PII.
Which of these would best accomplish this?

A

Implementation of data sanitization routines

200
Q

What should you implement to prevent a known set

of applications from running?

A

Blacklisting

201
Q

You’ve reviewed the security design of a new app
your company is developing. You see nothing wrong
with the design, but when you run a vulnerability
scanner on the software at the very end of the project
cycle, it finds fundamental issues. Which of these
should have been done earlier in the project cycle?

A

Code review

202
Q

Which TWO of these would allow you to confirm that
an attacker has exfiltrated data from a server as a
result of his/her unauthorized remote access?

A

Log analysis

DLP alerts

203
Q

Where is the best place to install an app so that you

can train users on the app before implementation?

A

On a virtualized test server before company-wide

implementation

204
Q

You’re traveling overseas with an encrypted USB drive
containing sensitive company data. Which of these
would be the BEST way to protect the data should it
be lost or stolen?

A

Password protecting, full device encryption and

locked case

205
Q

What’s the weakness with software-based

encryption?

A

Cryptographic operations can be far slower than with

hardware based encryption.

206
Q

Which of these are a way to harden a Linux

host-based application?

A

Shadow files

207
Q

Your application stores several types of data on a
server, including temporary files. Which of these
would securely store the data outside of the
application?

A

Full-disk encryption

208
Q

Your company database started out small, but has
been quickly growing in size and scope. Now you
realize that it wasn’t designed with this much growth
in mind. Which of these should you switch to so that
your database is more scalable and can use dynamic
schemas?

A

RDBMS

209
Q

You are about to do a major upgrade to a system that
is running in a virtual machine. Which of these would
result in the least amount of downtime if something
goes wrong with the update?

A

Taking an initial snapshot of the system

210
Q

Which would be the BEST way to prevent employees

from moving computers around between work areas?

A

Cable locks

211
Q

You’re considering allowing employee mobile devices
to connect to the corporate network. Which would be
the biggest concern affecting your company’s ability
to extend enterprise policies to those devices?

A

Support for mobile OS

212
Q

Which of these would be the best way to monitor the

behavior of potentially malicious programs?

A

Sandboxing

213
Q

You’ve noticed an increase in hosts that have been
exploited using vulnerabilities in third-party software.
Which of these would BEST help reduce the likelihood
of vulnerabilities within the software creating future
problems?

A

Patch management

214
Q

Some hosts have been running really slow lately. You
inspect the computers and find that the users have
uninstalled their antivirus software, they’ve installed
un-authorized and pirated software, and the users
have complete control over critical system properties.
Which TWO would prevent these issues from
happening in the future?

A

Placing users in appropriate security groups

Utilizing an application whitelist

215
Q

Your webserver has been the target of DDoS attacks.
Which of these would best mitigate these and future
attacks?

A

Blacklisting

216
Q

You suspect that an employee has altered some fields
in the database. Which of these should you do to
confirm the identity of the employee?

A

Review the database access log files.

217
Q

You are planning on providing mobile devices to
employees. Which TWO are valid security concepts
that should be included in your new mobile device
policy?

A

Asset tracking

Remote wiping

218
Q

Which TWO are BEST for physically securing your

electronic devices while traveling?

A

Cable locks

Safe

219
Q

An administrator discovers that many users have used
their same passwords for years even though the
network requires that the passwords be changed
every six weeks. Which of the following, when used
together, would BEST prevent users from reusing
their existing password? (Select TWO).

A

Password history

Minimum password age

220
Q

The Chief Technical Officer (CTO) has been informed
of a potential fraud committed by a database
administrator performing several other job functions
within the company. Which of the following is the
BEST method to prevent such activities in the future?

A

Separation of duties

221
Q

Which TWO would you implement to protect your

passwords from brute-force attacks?

A

Minimum length

Minimum complexity

222
Q

The system administrator is tasked with changing the
administrator password across all 2000 computers in
the organization. Which of the following should the
system administrator implement to accomplish this
task?

A

A group policy

223
Q

An auditing team has found that passwords do not
meet best business practices. Which of the following
will MOST increase the security of the passwords?
(Select TWO).

A

Password Complexity

Password Length

224
Q

Which of the following types of authentication

packages user credentials in a ticket?

A

Kerberos

225
Q

Which of these gives you the ability to perform
advanced authentication, authorization, and
accounting services?

A

TACACS+

226
Q

LDAP and Kerberos are commonly used for which of

the following?

A

To utilize single sign-on capabilities

227
Q

The company’s sales team plans to work late to
provide the Chief Executive Officer (CEO) with a
special report of sales before the quarter ends. After
working for several hours, the team finds they cannot
save or print the reports.

Which of the following controls is preventing them
from completing their work?

A

Time of Day access control

228
Q

You are worried about the fact that one person
writes, signs, and distributes paychecks and other
checks. What should you implement?

A

Separation of duties

229
Q

How can you detect unauthorized use of valid

employee accounts?

A

Continuous monitoring and review of user access

230
Q

Which system should you implement if you want to
create a file system access control model where you
can label files as “Secret”, “Confidential”, “Restricted”,
or “Unclassified”?

A

Trusted OS

231
Q

Which THREE controls would be best to protect

passwords from brute force attacks?

A

Account lockout
Password complexity
Minimum password length

232
Q

Which of these protocols is proprietary and often

used for router authentication?

A

TACACS

233
Q

It appears that someone has logged on to your
account and changed some files on the network using
your credentials. In the security log you find several
failed login attempts with your account. Which should
you implement to prevent this in the future?

A

Account lockout

234
Q

You use Kerberos for authentication onto the
network. It’s also used for accessing numerous
applications. What are you trying to achieve by using
Kerberos here?

A

Single sign-on

235
Q

Which technology would be used to protect
government systems and to make sure that files and
services operate within a strict rule-set?

A

Trusted OS

236
Q

You work for a bank that has had a wave of ATM-card
fraud. They now want to add a third factor to protect
the ATM transactions. Which of these should you
implement?

A

Fingerprint

237
Q

You’re having problems connecting to your corporate
website. The IT department has you restart the NTP
service on your computer, and now you can connect
to the site. Which of these authentication systems is
the site probably using?

A

Kerberos

238
Q

Which of these would you use to create an SSO
solution using an open standard, that would allow you
to exchange authentication and authorization
information across numerous web-based
applications?

A

SAML

239
Q

Which of these should you implement to give data
owners the ability to manage and configure access
control to their resources?

A

Discretionary access control

240
Q

Select TWO actions that would be the most effective

in stopping infiltration by ex-employees.

A

Assess and eliminate inactive accounts.

Review and address invalid login attempts.

241
Q

You require username and password for users to
log-in to the network. You want to make it so that
users can ONLY log in while in the main office
building. Which of these must you use?

A

Dual factor authentication

242
Q

After reviewing your system logs, you see a large
number of account lock-outs due to brute-force
attacks. Which of these should you implement to
reduce the chances of this type of attack going
undetected?

A

Continuous monitoring

243
Q

Which of these settings would have the most impact

on employees using generic and/or shared accounts?

A

Concurrent logins

244
Q

After reviewing the security logs, you see that there
are numerous password change alerts on the same
day, from many of the same users. Which of these
should you implement to stop this behavior?

A

Password Minimum Age

245
Q

You’re writing a new application and you want users
to be able to use their existing network credentials to
access the app. Which of these should you use in your
new app to enable this?

A

LDAP

246
Q

Which would be best to allow an application to
authenticate users by receiving credentials from a
remote web domain?

A

SAML

247
Q

If you want to use passphrases instead of passwords,

which control needs to be configured first?

A

Length

248
Q

Which access control would allow you to configure
folders for employees that will be owned by the IT
department, writeable by department managers, and
read-only for the employees?

A

Role-based

249
Q

All ten employees in the Human Resources
department have access to the healthcare
administration system. Only three of those employees
have job duties that require access to that system.
Which TWO of these could reduce the risk of data
from that system becoming compromised?

A

Separation of duties

Role-based access control

250
Q

Which of these is commonly used to standardize and
enforce password complexity rules across an entire
company?

A

LDAP

251
Q

Which access control method would enforce the
MOST restrictive access rights for an employee to be
able to perform his/her authorized duties?

A

Least privilege

252
Q

Someone used an old, stale admin account to log on
to a seldom-used server and view porn websites.
Which of these could BEST prevent this from
happening again in the future?

A

Account expiration policies

253
Q

Which of these would be the MOST secure way for

e-mail password recovery?

A

Sending a PIN to a smartphone through text message

254
Q

You are transferring your payroll system to a cloud
service provider (CSP). You want to keep using your
current usernames and passwords when accessing
this system, but you don’t want the CSP to have a
copy of your employees’ passwords. Which of these
options would help in this scenario.

A

Federated authentication

255
Q

Which of these authentication services uses UDP to

communicate between client and server?

A

RADIUS

256
Q

Which of these would be the BEST way to protect
your internet website from online brute-force
password cracking attacks from large botnets?

A

Temporarily ban each IP address after five failed login

attempts.

257
Q

Which of these would provide a confidential

authentication process?

A

Secured LDAP

258
Q

Which of these concepts would prevent users from

accessing data that is not part of their job function?

A

Authorization

259
Q

Your salespeople use tablets while talking to
customers out on the sales floor. Which of these
could you implement to reduce the chances that
unauthorized users would be able to access
information on those tablets?

A

Password Protection

260
Q

You discovered that several database services were
running with the local user account named “admin”
and “dbadmin”. Which TWO of these controls will
prevent admins from using these types of usernames
for services in the future?

A

Prohibit generic or default accounts

Require dedicated service accounts.

261
Q

Which of these remote authentication methods uses

a reliable transport layer protocol to communicate?

A

TACACS+

262
Q

Which of these should you implement to ensure

accountability?

A

Disable shared accounts

263
Q

Bob works in the Sales department. During an audit,
you discover that Bob’s credentials were used while
he was on vacation. You confirm that Bob still has his
badge and it was last used to exit the facility. Which
of these access control methods is BEST for
preventing such occurrences in the future?

A

Access control where the credential cannot be used except

when the associated badge is in the facility

264
Q

A company’s employees were victims of a spear
phishing campaign impersonating the CEO. The
company would now like to implement a solution to
improve the overall security posture by assuring their
employees that email originated from the CEO. Which
of the following controls could they implement to
BEST meet this goal?

A

Digital signatures

265
Q

If your company wants to implement application
whitelisting, which TWO of these concepts should be
used to identify allowed applications?

A

Hashing

Digital signatures

266
Q

Which provides non-repudiation?

A

Digital signatures

267
Q

A company needs to receive data that contains
personally identifiable information. The company
requires both the transmission and data at rest to be
encrypted. Which of the following achieves this goal?
(Select TWO).

A

SSH

PGP/GPG

268
Q

Of the listed protocols, choose the strongest
asymmetric cipher AND also choose the strongest
stream cipher that could be used for video streaming.
(choose TWO)

A

RSA

RC4

269
Q

When you use PGP to protect email, what type of

cryptography is used for the key exchange?

A

Asymmetric

270
Q

What do digital signatures employ to ensure data

integrity?

A

Hashing

271
Q

In order to digitally sign your emails with PGP, what

needs to be created first?

A

A public and private key

272
Q

Which protocol can be used to gather performance

data from network devices?

A

SNMP

273
Q

Which is the best way to make a weak key stronger?

A

Key stretching

274
Q

You have downloaded a program from a website and
created a trojan with it. You gain control of the
website and replace the “good” copy of the
downloadable program with the malicious copy you
have created. You want others to download and run
your malicious file, so to implement this attack and
delay detection, you should also modify which of
these?

A

MD5 hash of the file listed on the website

275
Q

Which is the fastest algorithm to ensure the integrity

of files?

A

SHA1

276
Q

Which TWO of these would BEST increase the security

of accessing cloud-based data?

A

Multifactor authentication

Transport encryption

277
Q

After receiving your new smart card, you find you
cannot open old encrypted e-mail. You try publishing
your certificates to the Global Address List (GAL) and
to your local Windows store. What else would you still
need to do though to be able to read your old
e-mails?

A

Recover your old private certificate.

278
Q

Which of these could be used to encrypt files or

folders using a symmetric key?

A

TwoFish

279
Q

You want to set up a key-escrow to back-up and
protect your users’ private keys. Which of these could
provide protection for your PKI’s escrowed keys?

A

HSM

280
Q

You use HTTP and FTP to transfer files, but you want
to make your file-transfers more secure. Which
should you do?

A

Replace FTP with SFTP and replace HTTP with TLS

281
Q

You send data over the internet via web services.
Which is the BEST way to protect that data from an
attacker who is trying to intercept and read the data?

A

Use algorithms that allow for PFS

282
Q

A hacker gained access to your web server using
admin credentials. From there he starts to
compromise other servers on your network. Which is
the BEST description of this type of attack?

A

Transitive access

283
Q
Which of these should be done if you are going to use
the LDAPS (LDAP Secure) protocol on a server?
A

The client should trust the CA that signed the server’s

certificate.

284
Q

Which would prevent ARP-poisoning attacks from

affecting your SCADA network?

A

VLANs

285
Q

Which of these algorithms would you use to protect

data at rest?

A

Blowfish

286
Q

Which TWO protocols could be used to verify the

authenticity of files?

A

SHA

MD5

287
Q

One of your intermediate CA’s was breached, giving
the attacker complete access to that system. The
certificates on that system were lost. What should be
your next action?

A

Revoke the certificate for the intermediate CA

288
Q

You need to change your intranet sites so that they
work on HTTPS only, and not HTTP. You also need to
do this as cheaply as possible. Which of these would
be the BEST solution for this scenario?

A

Use certificates signed by the company CA.

289
Q

Your company only uses symmetric encryption to
protect files. One of your employees has lost his key
and he needs to decrypt his files. Which of these
should the admin do to decrypt the files?

A

Use the recovery agent

290
Q

Your legal department tells you that you need to
provide them with some data that is on an
employee’s computer. You use PKI in your company
so the data may be encrypted. Which TWO of these
will you need to comply with the legal department’s
request?

A

Key escrow

Key recovery agent

291
Q

You are loading a certificate for your VPN
concentrator. The device requires that the file you’re
loading contains the entire certificate chain. For some
reason the import is failing, so you look at the
certificate and find it contains the company certificate
and the root CA. What else will need to be added for
this process to complete successfully?

A

Intermediate authority

292
Q

Which TWO of these are used for secure file

transfers?

A

SCP

FTPS

293
Q

Your password file contains the MD5 hashes of
user-account passwords. Which of these will prevent
the use of rainbow tables in cracking your password
hashes?

A

Use salting when computing the MD5 hashes of the

user passwords.

294
Q

You regularly transfer financial records to your
headquarters office from a branch office. Which of
these could be used to ensure that none of the
records have been changed?

A

Digital signatures

295
Q

If you’re worried that your web admin might be using
steganography to exfiltrate stolen data, which of
these security controls should you use on your
webserver?

A

File integrity monitoring

296
Q

Which of these is the MOST effective way to crack

password hashes?

A

Rainbow tables

297
Q

Which is the MOST common hashing algorithm used

when requesting a new website x.509 certificate?

A

SHA

298
Q

Which of these can check the validity of a certificate,

even during an internet outage?

A

CRL

299
Q

Which would be the best way to determine the

collision resistance of different hashing algorithms?

A

Find a common hash between two specific messages.

300
Q

You want to use RDP to manage a remote server, but
port 3389 is closed on your firewall. You do, however,
have other common ports open. Which of these
protocols could you use to manage the remote server
on a port other than 3389?

A

TLS

301
Q

You want to download and install a program, but
you’re worried about the program being
compromised. You should verify the integrity of the
software by doing which of these?

A

Checking the hash against an official mirror that

contains the same file.

302
Q

After reviewing this log entry, what should you do to
increase security?

July 10 12:15:47.224 EST: %SEC_LOGIN-5-LOGIN_SUCCESS: Login
Success [user: tjones] [Source: 192.168.5.10] [localport: 23] at
12:15:47.224 EST Wed July 10 2013

A

Disable telnet and enable SSH.

303
Q

You need to manage several routers via their web-UI.
When you connect, you get a certificate warning
message. Which of these would allow you to
configure a certificate so you’ll be able to connect to
all routers without getting that warning message?

A

Apply a wildcard certificate obtained from the company’s

certificate authority.

304
Q

You get an alert from your automated
integrity-monitoring application. The alert tells you
that the hash value for a particular video file has
changed. You check it out, but the video appears to
be the same as it was before. Which of these methods
was probably used here?

A

Steganography

305
Q

Which of these would let you encrypt files using a

symmetric key?

A

TwoFish

306
Q

Hacker Joe captures encrypted communications
between two offices for a month straight. He’s finally
able to figure out a session key used during one
exchange, and he can then read a single message. He
then finds that the key can’t be used to decrypt any
other messages. Which of these was probably used in
the encryption scheme?

A

Perfect forward secrecy

307
Q

Which of these are the MOST susceptible to birthday

attacks?

A

Hashed passwords

308
Q

Which of these is an encryption algorithm that could

be used to secure an IPSEC VPN connection?

A

AES

309
Q

Which of these is needed to secure the traffic

to-and-from a public webserver?

A

An asymmetric algorithm for key exchange and a

symmetric algorithm for the session

310
Q

Which attack guesses the PIN of an access point in

order to connect to the wireless network?

A

WPS attack

311
Q

Why would an admin use the Subject Alternative
Name (SAN) attribute of a certificate when trying to
encrypt communications?

A

It can protect multiple domains.

312
Q

You generate a key-pair and send one of the keys to a
third-party inside a request file. The third-party then
sends you back a signed file.

Which of these is the type of file you originally sent?

A

CSR

313
Q

If you want to send encrypted e-mails to your friend
Bob using PGP, what do you need to give to him so
that he can send encrypted replies back to you?

A

Public key

314
Q

Before sending the image of a hard-drive to some
external lawyers for an investigation, you hashed the
drive using MD5. The lawyers had their tech-guy hash
the image on their end using MD5 also, and he came
up with a different output than what you provided.
Which of these is the MOST likely explanation?

A

Files on the image have been altered.

315
Q

Which of these algorithms has the lowest collision

rate?

A

SHA-128

316
Q

Which of these hashing algorithms is the MOST
suitable for use with a secure website’s x.509
certificate?

A

SHA

317
Q

Which type of encryption would be BEST suited for

low-performance mobile devices?

A

ECC

318
Q

Which TWO of these would encrypt remote access

connections to file servers in remote locations?

A

SSH

RDP

319
Q

Which of these should you use to secure large

amounts of data-in-motion?

A

AES

320
Q

Downloading a CRL once per day isn’t all that
effective, and it could lead to compromise. Which of
these should you employ instead if you want the
ability to immediately revoke certificates?

A

OCSP

321
Q

A port scan against a server shows that the following ports
are open:

TCP 22

TCP 25

TCP 80

TCP 631

TCP 995

Which of the following MOST likely describes the server?

A

It is an email server that requires secure email retrieval.

322
Q

Which of these is a secure way to transfer files to a

dedicated file server?

A

SCP

323
Q

You’ve implemented a public-facing authentication
system that uses PKI and extended attributes to allow
third-party, web-based application integration. Which
THREE is this an example of?

A

Federation
Transitive trust
Single sign-on

324
Q

Mary connects to a public wireless hotspot. She
attempts to go to a secure website but instead
connects to an attacker who is performing a
man-in-the-middle attack. Which should she do to
mitigate this vulnerability?

A

Check the address in the web browser before entering

credentials.

325
Q

You need a secure way to send emails to a vendor
without requiring user action. Which of these would
BEST provide security between the email gateways?

A

TLS

326
Q

Your company uses digital signatures to sign
contracts. They also require external entities to
create an account with a third-party digital signature
provider and sign an agreement stating they will
protect the account from unauthorized access. Which
of the following security goals is your company trying
to address?

A

Non-repudiation

327
Q

You see this entry in a system log:

04:42 AM July 05 2016: WARNING: MD5 checksum
on file /etc/sudoers has changed. Please update db if
this change is expected.

What type of application generated this entry?

A

File integrity management

328
Q
Which of these BEST describes the benefit of using
Extended Validation (EV)?
A

The website provider demonstrates an additional level of

trust

329
Q

You are looking into an on-going incident. User SSL
certificates are being presented to access secure
services, but the user certificates are not actually valid
certificates. Which of the following should be
implemented to mitigate this incident?

A

Deploy an OCSP service.

330
Q

Which should be configured in your VPN concentrator

for site-to-site payload encryption?

A

3DES

331
Q

Which encryption solution would allow you to detect

if someone was sniffing your data-in-motion?

A

Quantum Cryptography