maybe this one? Flashcards
(233 cards)
A penetration tester has written an application that performs a bit-by- bit XOR 0xFF operation on
binaries prior to transmission over untrusted media. Which of the following BEST describes the action
performed by this type of application?
Encryption
A company wants to ensure confidential data storage media is sanitized in such a way that the drive
cannot be reused. Which of the following methods should the technician use?
Shredding
A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is
looking for information about software versions on the network. Which of the following techniques is
the intruder using?
Banner grabbing
Which of the following specifically describes the exploitation of an interactive process to access
otherwise restricted areas of the OS?
Pivoting
When developing an application, executing a preconfigured set of instructions is known as:
A stored procedure
A network administrator needs to allocate a new network for the R&D group. The network must not be
accessible from the internet, regardless of the network firewall or other external misconfigurations.
Which of the following settings should the network administrator implement to accomplish this?
Enable protected ports on the switch
An application was recently compromised after some malformed data came in via a web form. Which of
the following would MOST likely have prevented this?
Input validation
When attackers use a compromised host as a platform for launching attacks deeper into a company’s
network, it is said that they are:
Pivoting
A new Chief Information Officer has been reviewing the badging procedures and decides to write a
policy that all employees must have their badges rekeyed at least annually. Which of the following
controls BEST describes this policy?
Administrative
Which of the following refers to the term used to restore a system to its operational state?
RPO
A security manager is creating an account management policy for a global organization with sales
personnel who must access corporate network resources while traveling all over the world. Which of the
following practices is the security manager MOST likely to enforce with the policy? (Select TWO)
Password complexity
Group-based access control
Which of the following would provide additional security by adding another factor to a smart card?
PIN
A security analyst is mitigating a pass-the- hash vulnerability on a Windows infrastructure. Given the
requirement, which of the following should the security analyst do to MINIMIZE the risk?
Disable NTLM
14.) A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The
main culprit of CPU utilization is the antivirus program. Which of the following issues could occour if left
unresolved?(Select TWO)
DoS attack
Resource exhaustion
A company has a data classification system with definitions for “Private” and “Public.” The company’s
security policy outlines how data should be protected based on type. The company recently added the
data type “Proprietary” which of the following is the MOST likely reason the company added this data
type.
More searchable data
A computer emergency response team is called at midnight to investigate a case in which a mail server
was restarted. After an initial investigation, it was discovered that email is being exfiltrated through an
active connection. Which of the following is the NEXT step the team should take?
Perform a containment procedure by disconnecting the server
A security engineer must install the same x.509 certificate on three different servers. The client
application that connects to the server performs a check to ensure the certificate matches the host
name. Which of the following should the security engineer use?
Certificate chaining
Which of the following BEST describes an important security advantage yielded by implementing vendor
diversity?
Resiliency
20.) Which of the following differentiates a collision attack from a rainbow table attack?
A rainbow table attack performs a hash lookup
Ransomware is detected on a database administrators workstation. Which of the following forensic
procedures should be performed FIRST to mitigate the threat?
Capture volatile memory
Ann, a new security specialists, is attempting to access the internet using the company’s open wireless
network. The wireless network is not encrypted, however, once associated, Ann cannot access the
internet or other resources. In an attempt to troubleshoot, she scans the wireless network with NMAP
and discovers the firewall is the only other device on the wireless network. Which of the following BEST
describes the company’s wireless network situation?
The company uses VPN to authenticate and encrypt connections and traffic
RJ-45 ports have been implemented on an embedded system to allow engineers more convenient
access. The network administrator has concerns regarding placing the equipment on the internal
network and exposing the devices. Which of the following would BEST meet both concerns if the
equipment is placed on the internal network?
Create a separate network segment for the equipment that only the engineers can access
Which of the following threats is BEST mitigated by application hardening and patching rather than
security training?
Software exploits
A security administrator generates a key pair and sends one key inside a request file to a third party. The
third party sends back a signed file. In this scenario, the key sent to the third party is called a:
Public key