Practice Test 5 Flashcards

(25 cards)

1
Q

What is the best countermeasure against social engineering?

AAA protocols
User authentication
Strong passwords
User education

A

User education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following violates the principle of least privilege?

Onboarding process
Improperly configured accounts
Shared accounts for privileged users
Time-of-day restrictions

A

Improperly configured accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An e-commerce store app running on an unpatched web server is an example of:

Architecture/design weakness
Risk acceptance
Vulnerable business process
Security through obscurity

A

Vulnerable business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The purpose of a downgrade attack is to make a computer system fall back to a weaker security mode which makes the system more vulnerable to attacks.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A situation in which an application fails to properly release memory allocated to it or continually requests more memory than it needs is called:

Memory leak
Buffer overflow
DLL injection
Integer overflow

A

Memory leak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?

Buffer overflow
Pointer dereference
Memory leak
Integer overflow

A

Integer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A situation in which an application writes to or reads from an area of memory that it is not supposed to access is referred to as:

DLL injection
Buffer overflow
Memory leak
Integer overflow

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following terms describes an attempt to read a variable that stores a null value?

Integer overflow
Pointer dereference
Buffer overflow
Memory leak

A

Pointer dereference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources is known as:

DLL
ISO
EXE
INI

A

DLL

A dynamic link library (DLL) is a shared program module with ordered code, methods, functions, enums and structures that may be dynamically called by an executing program during run time. ADLLusually has a file extension ending in .dll.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the terms listed below describes a type of attack that relies on executing a library of code?

Memory leak
DLL injection
Pointer dereference
Buffer overflow

A

DLL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“In the IT industry, the term ““System sprawl”” is used to describe poor hardware resource utilization.”

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An effective asset management process provides countermeasures against: (Select all that apply)

System sprawl
Race conditions
Undocumented assets
Architecture and design weaknesses
User errors
A

System sprawl
Undocumented assets
Architecture and design weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero-day attack exploits:

New accounts
Patched software
Vulnerability that is present in already released software but unknown to the software developer
Well known vulnerability

A

Vulnerability that is present in already released software but unknown to the software developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:

Antivirus
Firewall
Antispyware
Malware

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following applies to a request that doesn’t match the criteria defined in an ACL?

Group policy
Implicit deny rule
Transitive trust
Context-aware authentication

A

Implicit deny rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stateless inspection is a firewall technology that keeps track of network connections and based on the collected data determines which network packets should be allowed through the firewall.

True
False

17
Q

Which of the answers listed below refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet?

VPN concentrator
Load balancer
Managed switch
Multilayer switch

A

VPN concentrator

18
Q

VPNs can be either remote-access (used for connecting networks) or site-to-site (used for connecting a computer to a network).

True
False

19
Q

Which of the IPsec modes provides entire packet encryption?

Tunnel
Payload
Transport
Default

20
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is known as:

Protected mode
Tunnel mode
Transport mode
Safe mode

A

Transport mode

21
Q

Which part of the IPsec protocol suite provides authentication and integrity?

CRC
AH
SIEM
AES

A

AH

Authentication Header (AH) is a protocol and part of the Internet ProtocolSecurity(IPsec) protocol suite, which authenticates the origin of IP packets (datagrams) and guarantees the integrity of the data.

22
Q

Which of the IPsec protocols provides authentication, integrity, and confidentiality?

AES
SHA
AH
ESP

A

ESP

An EncapsulatingSecurityPayload (ESP) is a protocol within the IPSec for providing authentication, integrity and confidentially of network packets data/payload in IPv4 and IPv6 networks.ESPprovides message/payload encryption and the authentication of a payload and its origin within the IPSec protocol suite.

23
Q

Which of the terms listed below describes a type of VPN that alleviates bottlenecks and conserves bandwidth by allowing users simultaneously make use of both the VPN and public network links?

Tethering
Split tunnel
Load balancing
Full tunnel

24
Q

Examples of secure VPN tunneling protocols include: (Select 2 answers)

bcrypt
SCP
IPsec
WEP
TLS
25
" The term ""Always-on VPN"" refers to a type of persistent VPN connection the starts automatically as soon as the computer detects a network link."    True    False
True