pp Flashcards
Analyze the following scenarios and determine which attacker used piggy backing.
On the way to a meeting in a restricted area of a government facility, a contractor holds open a gate for a person in a military uniform, who approaches the entry point at a jog, flashing a badge just outside of the readable range.
A government employee is late for a meeting in a restricted area of a military installation. Preoccupied with making the meeting on time, the employee does not notice when the gate has not closed and someone enters the restricted area.
An employee leaves the workstation to use the restroom. A coworker notices that the employee has forgotten to lock the workstation, and takes advantage of the user’s permissions.
Several prospective interns are touring the operations floor of a large tech firm. One of them seems to be paying especially close attention to the employees.
A
Piggy backing is similar to tailgating, but the attacker enters a secure area with an employee’s permission. Flashing an unreadable badge implies a request, soliciting to hold the door. The attacker takes advantage of urgency.
Tailgating is a means of entering a secure area without authorization by following close behind a person who is allowed to open the door or checkpoint.
Lunchtime attacks take advantage of an unsecured, unattended workstation to gain access to the system.
An attacker can use shoulder surfing to learn a password or PIN (or other secure information) by watching the user type it. Despite the name, the attacker may not have to be close to the target.
Analyze and select the statements that accurately describe both worms and Trojans. (Select all that apply.)
A worm is concealed within an application package while a Trojan is self-contained.
Both worms and Trojans can provide a backdoor.
Both worms and Trojans are designed to replicate.
A worm is self-contained while a Trojan is concealed within an application package.
BD
Both worms and Trojans can provide a backdoor into a system. Worms can carry a payload that may perform a malicious action such as installing a backdoor. Many Trojans function as backdoor applications.
Worms are self-contained and are memory-resident viruses that replicate over network resources. A Trojan is concealed within an application package.
Worms do not need to attach themselves to another executable file as they are self-contained. Trojans are not self-contained and are delivered with an application.
Worms are designed to replicate, but Trojans are not. Typically, a worm is designed to rapidly consume network bandwidth as it replicates. This action may be able to crash a system.
An end-user has enabled cookies for several e-commerce websites and has started receiving targeted ads. The ads do not trouble the user until, when trying to access an e-commerce site, the user gets several pop-up ads that automatically redirect the user to suspicious sites the user did not intend to visit. What is the most likely explanation for this phenomenon?
Tracking cookies have infected the user’s computer.
Ransomware has infected the user’s computer.
Spyware has infected the user’s computer.
Crypto-malware has infected the user’s computer.
A
Spyware can perform adware-like tracking and monitor local activity. Another spyware technique is to perform domain name service (DNS) redirection to pharming sites.
Cookies are not malware, but if browser settings allow third-party cookies, they can record pages visited, search queries, browser metadata, and IP addresses.
Ransomware is a type of Trojan malware that tries to extort money from the victim. It will display threatening messages, stating the computer will remain locked until the victim pays the ransom.
Crypto-malware is a class of ransomware that attempts to encrypt data files. The user will be unable to access the files without obtaining the private encryption key, which is held by the attacker.
A hacker gains access to a database of usernames for a target company and then begins combining common, weak passwords with each username to attempt authentication. The hacker conducts what type of attack?
Password spraying
Brute force attack
Dictionary attack
Rainbow table attack
A
Password spraying is a horizontal brute-force online attack. An attacker chooses common passwords and tries them with multiple usernames.
A brute-force attack attempts every possible combination in the output space to match a captured hash and guess at the plaintext that generated it.
An attacker uses a dictionary attack where there is a good chance of guessing the plaintext value (non-complex passwords). The software generates hash values from a dictionary of plaintexts to try to match one to a captured hash.
Rainbow table attacks refine the dictionary approach. The attacker uses a precomputed lookup table of all possible passwords and their matching hashes and looks up the hash value of a stored password in the table to discover the plaintext.
A retail establishment experiences an attack where whole number values have been exploited. As a result, some credit values are manipulated from positive values to negative values. Which type of attack is the establishment dealing with?
Integer overflow
Buffer overflow
Stack overflow
Race condition
A
An integer overflow attack causes the target software to calculate a value that exceeds these bounds. This may cause a positive number to become negative.
A buffer is an area of memory that the application reserves to store expected data. To exploit a buffer overflow vulnerability, the attacker passes data that deliberately overfills the buffer.
A stack is an area of memory used by a program. It includes a return address, which is the location of the program that called the subroutine. An attacker could use a buffer overflow to change the return address.
Race conditions occur when the outcome from an execution process is directly dependent on the order and timing of certain events, and those events fail.
An attacker compromises a confidential database at a retailer. Investigators discover that unauthorized ad hoc changes to the system were to blame. How do the investigators describe the actor vector in a follow-up report? (Select all that apply.)
Configuration drift
Weak configuration
Lack of security controls
Shadow IT
AD
Configuration drift happens when malware exploits an undocumented configuration change on a system.
Shadow IT occurs when software or an unauthorized service/port reapply the baseline configuration and investigate configuration management procedures to prevent this type of ad hoc change.
Weak configuration occurs when a configuration was correctly applied but was exploited anyway. Review the template to devise more secure settings.
A lack of security control is likely to happen if an attack could have been prevented by endpoint protection or antivirus, a host firewall, content filtering policies, data loss prevention systems, or a mobile device management program.
P488
Configuration drift—if the malware exploited an undocumented configuration
change (shadow IT software or an unauthorized service/port, for instance), reapply
the baseline configuration and investigate configuration management procedures
to prevent this type of ad hoc change.
An unauthorized person gains access to a restricted area by claiming to be a member of upper management and bullying past the door guard’s verbal attempts to stop the unauthorized visitor. What type of policy could help mitigate this type of social engineering attack?
Challenge policy
ID badge policy
Mantrap policy
Skimming policy
A
One of the most important parts of surveillance is the challenge policy, which details appropriate responses for given situations and helps to defeat social engineering attacks. Challenge policies may include insisting that individuals complete proper authentication at gateways, even if this means inconveniencing staff members (no matter their seniority).
Anyone moving through secure areas of a building should be wearing an ID badge; anyone without an ID badge security should challenge them.
A mantrap is a physical security control used for critical assets, where one gateway leads to an enclosed space protected by another barrier.
Skimming involves the use of a counterfeit card reader to capture card details, which are then used to program a duplicate.
p556
Reception Personnel and ID Badges
One of the most important parts of surveillance is the challenge policy. This sets out what type of response is appropriate in given situations and helps to defeat social engineering attacks. This must be communicated to and understood by the staff. Challenges represent a whole range of different contact situations. For example:
• Challenging visitors who do not have ID badges or are moving about unaccompanied.
• Insisting that proper authentication is completed at gateways, even if this means inconveniencing staff members (no matter their seniority).
• Intruders and/or security guards may be armed.
The safety of staff and compliance with local laws has to be balanced against the imperative to protect the company’s other resources. It is much easier for employees to use secure behavior in these situations if they know that their actions are conforming to a standard of behavior that has been agreed upon and is expected of them.
An attack at a company renders a network useless after a switch is impacted. Engineers review network traffic and determine that the switch is behaving like a hub. What do the engineers conclude is happening? (Select all that apply.)
The switch’s memory is exhausted.
The switch is flooding unicast traffic.
The switch MAC table has invalid entries.
The switch is using MAC-based forwarding.
AB
MAC flooding is used to attack a switch. The intention of the attack is to exhaust the memory used to store the switch’s MAC address table.
Overwhelming the switch’s MAC table can cause the switch to stop trying to apply MAC-based forwarding and flood unicast traffic out of all ports.
If the switch has invalid entries, it would need to build a new MAC table. It would not be flooding traffic out all ports.
The switch uses the MAC address table to determine which port to use to forward unicast traffic to its correct destination.
P238
MAC Flooding Attacks Where ARP poisoning is directed at hosts, MAC floodingis used to attack a switch. The intention of the attacker is to exhaust the memory used to store the switch’s MAC address table. The switch uses the MAC address tableto determine which port to use to forward unicast traffic to its correct destination. Overwhelming the table can cause the switch to stop trying to apply MAC-based forwarding and flood unicast traffic out of all ports, working as a hub. This makes sniffing network traffic easier for the threat actor.
After several users call to report dropped network connections on a local wireless network, a security analyst scans network logs and discovers that multiple unauthorized devices were connecting to the network and overwhelming it via a smartphone tethered to the network, which provided a backdoor for unauthorized access. How would this device be classified?
A switched port analyzer (SPAN)/mirror port
A spectrum analyzer
A rogue access point (AP)
A thin wireless access point (WAP)
C
With a SPAN port, the sensor attaches to a specially configured port on the switch that receives copies of frames addressed to nominated access ports (or all the other ports).
A spectrum analyzer is a device that can detect the source of jamming (interference) on a wireless network.
A malicious user can set up an unauthorized (rogue) access point with something as basic as a smartphone with tethering capabilities, and non-malicious users could do so by accident.
An access point that requires a wireless controller to function is known as a thin WAP, while a fat WAP’s firmware contains enough processing logic to be able to function autonomously and handle clients without the use of a wireless controller.
P253
An engineer pieces together the clues from an attack that temporarily disabled a critical web server. The engineer determines that a SYN flood attack was the cause. Which pieces of evidence led the engineer to this conclusion? (Select all that apply.)
ACK packets were held by the server
SYN/ACK packets were misdirected from the client
ACK packets were missing from the client
SYN/ACK packets from the server were misdirected
CD
A SYN flood attack works by withholding the client’s ACK packet during TCP’s three-way handshake.
In a SYN attack, the SYN/ACK packets are not misdirected from the client since the client is the attacker. Packets are misdirected from the server since the attacker is a spoofed client.
Typically a client’s IP address is spoofed in a SYN attack, meaning that an invalid or random IP is entered so the server’s SYN/ACK packet can be misdirected.
In a SYN attack, the three-way handshake is compromised. The client’s ACK packet is held, not the SYN packet.
P257
Some types of DDoS attacks simply aim to consume network bandwidth, denying it to legitimate hosts, by using overwhelming numbers of bots. Others cause resource exhaustion on the hosts’ processing requests, consuming CPU cycles and memory. This delays processing of legitimate traffic and could potentially crash the host system completely. For example, a SYN flood attackworks by withholding the client’s ACK packet during TCP’s three-way handshake. Typically the client’s IP address is spoofed, meaning that an invalid or random IP is entered so the server’s SYN/ACK packet is misdirected. A server, router, or firewall can maintain a queue of pending connections, recorded in its state table. When it does not receive an ACK packet from the client, it resends the SYN/ACK packet a set number of times before timing out the connection. The problem is that a server may only be able to manage a limited number of pending connections, which the DoS attack quickly fills up. This means that the server is unable to respond to genuine traffic.
The IT staff at a large company review numerous security logs and discover that the SAM database on Windows workstations is being accessed by a malicious process. What does the staff determine the issue to be?
Shellcode
Persistence
Credential dumping
Lateral movement
C
Credential dumping is a method used to access the credentials file (SAM on a local Windows workstation) or sniff credentials held in memory by the lsass.exe system process.
Shellcode is a minimal program designed to exploit a buffer overflow or similar vulnerability to gain privileges to a system.
Persistence is a mechanism that maintains a connection if the threat actor’s backdoor is restarted, if the host reboots, or if the user logs off.
With lateral movement, the attacker might be seeking data assets or may try to widen access by changing the system security configuration.
P404
A junior engineer suspects there is a breached system based on an alert received from a software monitor. The use of the alert provides which information to the engineer?
TTP
CTI
IoC
ISAC
An indicator of compromise (IoC) is a residual sign that an asset or network has been successfully attacked or is continuing to be attacked and provides evidence of a TTP.
A tactic, technique, or procedure (TTP) is a generalized statement of adversary behavior. TTPs categorize behaviors in terms of a campaign strategy.
Threat data can be packaged as feeds that integrate with a security information and event management (SIEM) platform. These feeds are usually described as cyber threat intelligence (CTI) data.
Public/private information sharing centers are utilized in many critical industries. Information Sharing and Analysis Centers (ISAC) are set up to share threat intelligence and promote best practices.
P650
IoC (indicator of compromise)A sign that an asset or network has been attacked or is currently under attack.
P38
Tactics, Techniques, and Procedures and Indicators of Compromise A tactic, technique, or procedure (TTP)is a generalized statement of adversary behavior. The term is derived from US military doctrine (mwi.usma.edu/what-is-armydoctrine).
TTPs categorize behaviors in terms of campaign strategy and approach (tactics), generalized attack vectors (techniques), and specific intrusion tools and methods (procedures).
An indicator of compromise (IoC)is a residual sign that an asset or network has been successfully attacked or is continuing to be attacked.
Put another way, an IoC is evidence of a TTP. TTPs describe what and how an adversary acts and Indicators describe how to recognize what those actions might look like.(stixproject.github.io/documentation/concepts/ ttp-vs-indicator) As there are many different targets and vectors of an attack, so too are there many different potential IoCs. The following is a list of some IoCs that you may encounter:
• Unauthorized software and files
• Suspicious emails
• Suspicious registry and file system changes
• Unknown port and protocol usage
• Excessive bandwidth usage
• Rogue hardware
• Service disruption and defacement
• Suspicious or unauthorized account usage
An IoC can be definite and objectively identifiable, like a malware signature, but often IoCs can only be described with confidence via the correlation of many data points. Because these IoCs are often identified through patterns of anomalous activity rather than single events, they can be open to interpretation and therefore slow to diagnose. Consequently, threat intelligence platforms use AI-backed analysis to speed up detection without overwhelming analysts’ time with false positives.
An engineer routinely provides data to a source that compiles threat intelligence information. The engineer focuses on behavioral threat research. Which information does the engineer provide?
IP addresses associated with malicious behavior
Descriptions of example attacks
Correlation of events observed with known actor indicators
Data available as a paid subscription
B
Behavioral threat research is narrative commentary describing examples of attacks and TTPs gathered through primary research sources.
Reputational threat intelligence includes lists of IP addresses and domains associated with malicious behavior, plus signatures of known file-based malware.
Threat data is computer data that can correlate events observed on a customer’s own networks and logs with known TTP and threat actor indicators.
Data that is part of a closed/proprietary system is made available as a paid subscription to a commercial threat intelligence platform. There is no mention of a subscription model in this case.
P36
Threat Intelligence Providers
The outputs from the primary research undertaken by security solutions providers and academics can take three main forms:
• Behavioral threat research—narrative commentary describing examples of attacks and TTPs gathered through primary research sources.
• Reputational threat intelligence—lists of IP addresses and domains associated with malicious behavior, plus signatures of known file-based malware.
• Threat data—computer data that can correlate events observed on a customer’s own networks and logs with known TTP and threat actor indicators.
An actor penetrates a system and uses IP spoofing to reroute information to a fraudulent host. Which method does the actor utilize for this purpose?
Data exfiltration
Data breach
Privacy breach
Data leak
A
Data exfiltration refers to the methods and tools by which an attacker transfers data without authorization from the victim’s systems to an external network or media.
A data breach event is where confidential data is read or transferred without authorization. A breach can be intentional/malicious or unintentional/accidental.
A privacy breach occurs when personal data is not collected, stored, or processed in full compliance with the laws or regulations governing personal information.
A breach can also be described as a data leak and is where confidential data is read or transferred without authorization.
An organization hires a pen tester. The tester achieves a connection to a perimeter server. Which technique allows the tester to bypass a network boundary from this advantage?
Persistence
Privilege escalation
Pivoting
Lateral movement
C
If the pen tester achieves a foothold on a perimeter server, a pivot allows them to bypass a network boundary and compromise servers on an inside network.
Persistence is the tester’s ability to reconnect to the compromised host and use it as a remote access tool (RAT) or backdoor.
A pen tester uses privilege escalation in attempts to map out the internal network and discover the services running on it and the accounts configured to access it.
Lateral movement is the action of gaining control over other hosts. This is done partly to discover more opportunities to widen access, partly to identify where valuable data assets might be located, and partly to evade detection.
P80
Pen Test Attack Life Cycle
In the kill chain attack life cycle, reconnaissance is followed by an initial exploitation phase where a software tool is used to gain some sort of access to the target’s network.
This foothold might be accomplished using a phishing email and payload or by obtaining credentials via social engineering.
Having gained the foothold, the pen tester can then set about securing and widening access.
A number of techniques are required:
• Persistence—the tester’s ability to reconnect to the compromised host and use it as a remote access tool (RAT) or backdoor. To do this, the tester must establish a command and control (C2 or C&C) network to use to control the compromised host, upload additional attack tools, and download exfiltrated data. The connection to the compromised host will typically require a malware executable to run after shut down/log off events and a connection to a network port and the attacker’s IP address to be available.
• Privilege escalation—persistence is followed by further reconnaissance, where the pen tester attempts to map out the internal network and discover the services running on it and accounts configured to access it. Moving within the network or accessing data assets are likely to require higher privilege levels. For example, the original malware may have run with local administrator privileges on a client workstation or as the Apache user on a web server. Another exploit might allow malware to execute with system/root privileges, or to use network administrator privileges on other hosts, such as application servers.
• Lateral movement—gaining control over other hosts. This is done partly to discover more opportunities to widen access (harvesting credentials, detecting software vulnerabilities, and gathering other such “loot”), partly to identify where valuable data assets might be located, and partly to evade detection. Lateral movement usually involves executing the attack tools over remote process shares or using scripting tools, such as PowerShell.
• Pivoting—hosts that hold the most valuable data are not normally able to access external networks directly. If the pen tester achieves a foothold on a perimeter server, a pivot allows them to bypass a network boundary and compromise servers on an inside network. A pivot is normally accomplished using remote access and tunneling protocols, such as Secure Shell (SSH), virtual private networking (VPN), or remote desktop.
• Actions on Objectives—for a threat actor, this means stealing data from one or more systems (data exfiltration). From the perspective of a pen tester, it would be a matter of the scope definition whether this would be attempted. In most cases, it is usually sufficient to show that actions on objectives could be achieved.
• Cleanup—for a threat actor, this means removing evidence of the attack, or at least evidence that could implicate the threat actor. For a pen tester, this phase means removing any backdoors or tools and ensuring that the system is not less secure than the pre-engagement state.
An organization requires that a file transfer occurs on a nightly basis from an internal system to a third-party server. IT for both organizations agree on using FTPS. Which configurations does IT need to put in place for proper file transfers? (Select all that apply.)
Configure the use of port 990
Configure the use of port 22
Negotiate a tunnel prior to any exchanged commands
Using Secure Shell (SSH) between client and server
Implicit TLS (FTPS) mode FTPS is tricky to configure when there are firewalls between the client and server, and it uses the secure port 990 for the control connection.
Implicit TLS (FTPS) negotiates an SSL/TLS tunnel before the exchange of any FTP commands.
SSH FTP (SFTP) uses a secure link that is created between the client and server using Secure Shell (SSH) over TCP port 22.
With SFTP, which uses SSH, a secure link is created between the client and server. Ordinary FTP commands and data transfer can then be sent over the secure link without risk of eavesdropping or man-in-the-middle attacks.
An administrator provisions both a new cloud-based virtual server and an on-premises virtual server. Compare the possible virtualization layer responsibilities for the implementation and determine which one applies to this configuration.
CSP is responsible for the cloud, the administrator is responsible for the on-premise.
CSP is responsible for the cloud, the CSP is responsible for the on-premise.
The administrator is responsible for the cloud, the administrator is responsible for the on-premise.
The administrator is responsible for the cloud, the CSP is responsible for the on-premise.
A
The virtualization layer is the underlying layer that provides virtualization capabilities such as a virtual server. The CSP is responsible for this in the cloud. An on-premise installation is the responsibility of the administrator.
The CSP is responsible for the cloud, such as in an IaaS or PaaS implementation, but the administrator is responsible for the on-premise installation.
The administrator is only responsible for the on-premise installation. This underlying virtualization platform might be a Windows Hyper-V server for example.
The Cloud Service Provider (CSP) would be responsible for the platform that the administrator utilizes to create a virtual machine.
P420Matrix
under virtualization layer all CSP
Consider an abstract model of network functions for an infrastructure as code (IaC) implementation and determine which plane describes how traffic is prioritized.
Data
Management
Control
Application
C
The control plane makes decisions about how traffic should be prioritized, secured, and switched. A software-defined networking (SDN) application can be used to define policy decisions.
The data plane handles the actual switching and routing of traffic and imposition of security access controls. Decisions made in the control plane are implemented on the data plane.
The management plane is used to monitor traffic conditions and network status. SDN can be used to manage compatible physical appliances, but also virtual switches, routers, and firewalls.
Applications interface with network devices by using APIs. The interface between the SDN applications and the SDN controller is described as the “northbound” API, while that between the controller and appliances is the “southbound” API.
P442
Software-Defined Networking
IaC is partly facilitated by physical and virtual network appliances that are fully configurable via scripting and APIs.
As networks become more complex—perhaps involving thousands of physical and virtual computers and appliances—it becomes more difficult to implement network policies, such as ensuring security and managing traffic flow. With so many devices to configure, it is better to take a step back and consider an abstracted model about how the network functions. In this model, network functions can be divided into three “planes”:
• Control plane—makes decisions about how traffic should be prioritized and secured, and where it should be switched.
• Data plane—handles the actual switching and routing of traffic and imposition of security access controls.
• Management plane—monitors traffic conditions and network status.
A software-defined networking (SDN)application can be used to define policy decisions on the control plane. These decisions are then implemented on the data plane by a network controller application, which interfaces with the network devices using APIs. The interface between the SDN applications and the SDN controller is described as the “northbound” API, while that between the controller and appliances is the “southbound” API. SDN can be used to manage compatible physical appliances, but also virtual switches, routers, and firewalls. The architecture supporting rapid deployment of virtual networking using general-purpose VMs and containers is called network functions virtualization (NFV)(redhat.com/en/ topics/virtualization/what-is-nfv). This architecture saves network and security administrators the job and complexity of configuring each appliance with proper settings to enforce the desired policy. It also allows for fully automated deployment (or provisioning) of network links, appliances, and servers. This makes SDN an important part of the latest automation and orchestration technologies.
Compare the components found in a virtual platform and select the options that accurately differentiate between them. (Select all that apply.)
Hypervisors are Virtual Machine Monitors (VMM) and guest operating systems are Virtual Machines (VM).
Hypervisors facilitate interactions with the computer hardware and computers are the platform that hosts the virtual environment.
Computers are the operating systems that are installed under the virtual environment and guest operating systems are the platform that host the virtual environment.
Hypervisors are operating systems and computers are the platform that hosts the virtual environment.
AB
Hypervisors are the Virtual Machine Monitor (VMM) and guest operating systems are the Virtual Machines (VM) found within the virtual platform.
Hypervisors manage the virtual machine environment and facilitate interaction with the computer hardware and network. The computer component is the platform that hosts the virtual environment. Multiple computers may also be networked together.
Computers are the platform of the virtual environment and guest operating systems are the operating systems installed under the virtual environment.
Guest operating systems are the operating systems installed under the virtual environment and computers are platform that hosts the virtual environment.
After a company moves on-premise systems to the cloud, engineers devise to use a serverless approach in a future deployment. What type of architecture will engineers provision in this deployment? (Select all that apply.)
Virtual machine
Physical server
Containers
Microservices
CD
When a client requires some operation to be processed in a serverless environment, the cloud spins up a container to run the code, performs the processing, and then destroys the container.
With serverless technologies, applications are developed as functions and microservices, each interacting with other functions to facilitate client requests.
A virtual machine or VM is a fully operational operating system functioning as a guest instance on a physical host.
A physical machine or server is a fully operational operating system that functions on a physical host system and is not dependent on any virtual technology.
Based on knowledge of identity and authentication concepts, select the true statement.
A user profile must be unique.
Credentials could include name, contact details, and group memberships.
An identifier could be a username and password, or smart card and PIN code.
An account consists of an identifier, credentials, and a profile.
D
An account consists of an identifier, credentials, and a profile. An account identifies a user on a computer system.
An identifier must be unique, not a profile. This is accomplished by defining the account on the system by a Security Identifier (SID) string.
A profile, not credentials, could include name and contact details, as well as group memberships.
Credentials, not an identifier, could be a username and password or smart card and PIN code. This is the information used to authenticate a subject when it attempts user account access.
A guard station deploys a new security device for accessing a classified data station. The installation tech tests the device’s improvements for speed and pressure. Which behavioral technology does the tech test?
Voice recognition
Gait analysis
Typing
Signature recognition
D
Signatures are relatively easy to duplicate, but it is more difficult to fake the actual signing process. Signature matching records the user applying their signature (stroke, speed, and pressure of the stylus).
Voice recognition is relatively cheap, as the hardware and software required are built into many standard PCs and mobiles. However, obtaining an accurate template can be difficult and time-consuming.
Gait analysis produces a template from human movement (locomotion). The technologies can either be camera-based or use smartphone features, such as an accelerometer and gyroscope.
Typing is used to match the speed and pattern of a user’s input of a passphrase.
P185
• Voice recognition—relatively cheap, as the hardware and software required are built into many standard PCs and mobiles. However, obtaining an accurate template can be difficult and time-consuming. Background noise and other environmental factors can also interfere with logon. Voice is also subject to impersonation.
• Gait analysis—produces a template from human movement (locomotion). The technologies can either be camera-based or use smartphone features, such as an accelerometer and gyroscope.
• Signature recognition—signatures are relatively easy to duplicate, but it is more difficult to fake the actual signing process. Signature matching records the user
applying their signature (stroke, speed, and pressure of the stylus).
• Typing—matches the speed and pattern of a user’s input of a passphrase.
An organization considers installing fingerprint scanners at a busy entry control point to a secure area. What concerns might arise with the use of this technology? (Select all that apply.).
Fingerprint scanning is relatively easy to spoof.
Installing equipment is cost-prohibitive.
Surfaces must be clean and dry.
The scan is highly intrusive.
AC
The main problem with fingerprint scanners is that it is possible to obtain a copy of a user’s fingerprint and create a mold of it that will fool the scanner.
The technology required for scanning and recording fingerprints is relatively inexpensive, and the process quite straightforward. A fingerprint sensor is usually a small capacitive cell that can detect the unique pattern of ridges making up the pattern.
Moisture or dirt can prevent good readings, so facilities using fingerprint scanners must keep readers clean and dry, which can prove challenging in high throughput areas.
Fingerprint technology is non-intrusive and relatively simple to use.
An administrator plans a backup and recovery implementation for a server. The goal is to have a full backup every Sunday followed by backups that only include changes every other day of the week. In the event of a catastrophe, the restore time needs to be as quick as possible. Which scheme does the administrator use?
Full followed by incrementals
Image followed by incrementals
Full followed by differentials
Snapshot followed by differentials
C
A full backup includes data regardless of its last backup time. A differential backup includes new and modified files since the last backup. A differential restore is quicker than an incremental.
A full backup includes data regardless of its last backup time. An incremental backup includes new and modified files since the last backup. A restore can be time consuming based on the number of sets involved.
An image is not a backup type in a backup scheme, but is a disk imaging process. An incremental backup includes new files and files modified since the last backup.
A snapshot is a method to backup open files. A differential backup includes new and modified files since the last full backup.