Q300-Q362 Flashcards

1
Q

Which of the following protocols allows for secure transfer of files? (Select TWO).
A. ICMP B. SNMP C. SFTP D. SCP E. TFTP

A

C. SFTP

D. SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following passwords is the LEAST complex?
A. MyTrain!45
B. Mytr@in!!
C. MyTr@in12 
D. MyTr@in#8
A

B. Mytr@in!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).
A. 21
B. 22
C. 23
D. 69
E. 3389
F. SSH
G. Terminal services H. Rlogin
I. Rsync J. Telnet
A

B. 22
C. 23
F. SSH
J. Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an application security coding problem?
A. Error and exception handling B. Patch management
C. Application hardening
D. Application fuzzing

A

A. Error and exception handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement?
A. Implement IIS hardening by restricting service accounts.
B. Implement database hardening by applying vendor guidelines. C. Implement perimeter firewall rules to restrict access.
D. Implement OS hardening by applying GPOs.

A

D. Implement OS hardening by applying GPOs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the MOST specific plan for various problems that can arise within a system?
A. Business Continuity Plan
B. Continuity of Operation Plan C. Disaster Recovery Plan
D. IT Contingency Plan

A

D. IT Contingency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following BEST describes the weakness in WEP encryption?
A. The initialization vector of WEP uses a crack-able RC4 encryption algorithm.
Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived.
B. The WEP key is stored in plain text and split in portions across 224 packets of random data. Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key.
C. The WEP key has a weak MD4 hashing algorithm used.
A simple rainbow table can be used to generate key possibilities due to MD4 collisions.
D. The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.

A

D. The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years.
Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years.
Which of the following should Sara do to address the risk?
A. Accept the risk saving $10,000. B. Ignore the risk saving $5,000. C. Mitigate the risk saving $10,000. D. Transfer the risk saving $5,000.

A

D. Transfer the risk saving $5,000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an authentication and accounting service that uses TCP for connecting to routers and switches?
A. DIAMETER B. RADIUS
C. TACACS+ D. Kerberos

A

C. TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?
A. Input validation
B. Network intrusion detection system C. Anomaly-based HIDS
D. Peer review

A

A. Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pete, an IT Administrator, needs to secure his server room. Which of the following mitigation methods would provide the MOST physical protection?
A. Sign in and sign out logs B. Mantrap
C. Video surveillance
D. HVAC

A

B. Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following should be connected to the fire alarm system in order to help prevent the spread of a fire in a server room without data loss to assist in an FM-200 deployment?
A. Water base sprinkler system B. Electrical
C. HVAC
D. Video surveillance

A

C. HVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Matt, a security consultant, has been tasked with increasing server fault tolerance and has been given no budget to accomplish his task. Which of the following can Matt implement to ensure servers will withstand hardware failure?
A. Hardware load balancing B. RAID
C. A cold site
D. A host standby

A

B. RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following fire suppression systems is MOST likely used in a datacenter?
A. FM-200 B. Dry-pipe C. Wet-pipe D. Vacuum

A

A. FM-200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security administrator has installed a new KDC for the corporate environment. Which of the following authentication protocols is the security administrator planning to implement across the organization?
A. LDAP
B. RADIUS C. Kerberos D. XTACACS

A

C. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks?
A. Cross-site scripting B. Buffer overflow
C. Header manipulation D. Directory traversal

A

B. Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jane has recently implemented a new network design at her organization and wishes to passively identify security issues with the new network. Which of the following should Jane perform?
A. Vulnerability assessment B. Black box testing
C. White box testing
D. Penetration testing

A

A. Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A security technician is working with the network firewall team to implement access controls at the company’s demarc as part of the initiation of configuration management processes. One of the network technicians asks the security technician to explain the access control type found in a firewall. With which of the following should the security technician respond?
A. Rule based access control B. Role based access control C. Discretionary access control D. Mandatory access control

A

A. Rule based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Jane, a security administrator, has been tasked with explaining authentication services to the company’s management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company’s environment?
A. Kerberos
B. Least privilege C. TACACS+
D. LDAP

A

A. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Pete, the compliance manager, wants to meet regulations. Pete would like certain ports blocked only on all computers that do credit card transactions. Which of the following should Pete implement to BEST achieve this goal?
A. A host-based intrusion prevention system
B. A host-based firewall
C. Antivirus update system
D. A network-based intrusion detection system

A

B. A host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?
A. Firewall
B. Switch
C. URL content filter
 D. Spam filter
A

C. URL content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pete, the system administrator, wishes to monitor and limit users’ access to external websites. Which of the following would BEST address this?
A. Block all traffic on port 80. B. Implement NIDS.
C. Use server load balancers. D. Install a proxy server.

A

D. Install a proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?
A. PAT B. NAP C. DNAT D. NAC

A

A. PAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability?
A. Twofish
B. Diffie-Hellman C. ECC
D. RSA

A

C. ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach?
A. $1,500 B. $3,750 C. $15,000 D. $75,000

A

B. $3,750

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Methods to test the responses of software and web applications to unusual or unexpected inputs is known as:
A. Brute force.
B. HTML encoding. C. Web crawling. D. Fuzzing.

A

D. Fuzzing.

27
Q

Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?
A. TCP 23 B. UDP 69 C. TCP 22 D. TCP 21

A

C. TCP 22

28
Q

Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent?
A. Warm site
B. Load balancing C. Clustering
D. RAID

A

C. Clustering

29
Q

Which statement is TRUE about the operation of a packet sniffer?
A. It can only have one interface on a management network.
B. They are required for firewall operation and stateful inspection.
C. The Ethernet card must be placed in promiscuous mode.
D. It must be placed on a single virtual LAN interface.

A

C. The Ethernet card must be placed in promiscuous mode.

30
Q

Which of the following firewall rules only denies DNS zone transfers?
A. deny udp any any port 53 B. deny ip any any
C. deny tcp any any port 53 D. deny all dns packets

A

C. deny tcp any any port 53

31
Q

Which of the following BEST explains the use of an HSM within the company servers?
A. Thumb drives present a significant threat which is mitigated by HSM.
B. Software encryption can perform multiple functions required by HSM.
C. Data loss by removable media can be prevented with DLP.
D. Hardware encryption is faster than software encryption.

A

D. Hardware encryption is faster than software encryption.

32
Q

Which of the following technologies can store multi-tenant data with different security requirements?
A. Data loss prevention
B. Trusted platform module C. Hard drive encryption
D. Cloud computing

A

D. Cloud computing

33
Q

Matt, a security analyst, needs to implement encryption for company data and also prevent theft of company data. Where and how should Matt meet this requirement?
A. Matt should implement access control lists and turn on EFS.
B. Matt should implement DLP and encrypt the company database.
C. Matt should install Truecrypt and encrypt the company server.
D. Matt should install TPMs and encrypt the company database.

A

B. Matt should implement DLP and encrypt the company database.

34
Q

Which of the following types of encryption will help in protecting files on a PED?
A. Mobile device encryption B. Transport layer encryption C. Encrypted hidden container D. Database encryption

A

A. Mobile device encryption

35
Q
Which of the following does full disk encryption prevent?
A. Client side attacks
B. Clear text access
C. Database theft
D. Network-based attacks
A

B. Clear text access

36
Q

Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company’s password policy. Which of the following should Pete do NEXT?
A. Contact the Chief Information Officer and ask them to change the company password policy so that the application is made compliant.
B. Tell the application development manager to code the application to adhere to the company’s password policy.
C. Ask the application development manager to submit a risk acceptance memo so that the issue can be documented.
D. Inform the Chief Information Officer of non-adherence to the security policy so that the developers can be reprimanded.

A

B. Tell the application development manager to code the application to adhere to the company’s password policy.

37
Q

Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning?
A. A recent security breach in which passwords were cracked. B. Implementation of configuration management processes. C. Enforcement of password complexity requirements.
D. Implementation of account lockout procedures.

A

A. A recent security breach in which passwords were cracked.

38
Q

Which of the following presents the STRONGEST access control?
A. MAC
B. TACACS C. DAC
D. RBAC

A

A. MAC

39
Q

Which of the following encompasses application patch management?
A. Configuration management B. Policy management
C. Cross-site request forgery D. Fuzzing

A

A. Configuration management

40
Q

Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent?
A. Buffer overflow
B. Pop-up blockers C. Cross-site scripting D. Fuzzing

A

A. Buffer overflow

41
Q

Which of the following is the LEAST volatile when performing incident response procedures?
A. Registers B. RAID cache C. RAM
D. Hard drive

A

D. Hard drive

42
Q

Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall application but does not have all the details. Jane needs to review the software before it is released to production. Which of the following reviews should Jane conduct?
A. Gray Box Testing
B. Black Box Testing
C. Business Impact Analysis D. White Box Testing

A

A. Gray Box Testing

43
Q
The information security team does a presentation on social media and advises the participants not to provide too much personal information on social media web sites. This advice would BEST protect people from which of the following?
A. Rainbow tables attacks
B. Brute force attacks
C. Birthday attacks
D. Cognitive passwords attacks
A

D. Cognitive passwords attacks

44
Q

Pete’s corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number.
Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent?
A. Collusion
B. Impersonation
C. Pharming
D. Transitive Access

A

B. Impersonation

45
Q

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?
A. Interference
B. Man-in-the-middle C. ARP poisoning
D. Rogue access point

A

D. Rogue access point

46
Q

Which of the following can be implemented with multiple bit strength?
A. AES B. DES C. SHA-1 D. MD5 E. MD4

A

A. AES

47
Q

Pete, the system administrator, has blocked users from accessing social media web sites. In addition to protecting company information from being accidentally leaked, which additional security benefit does this provide?
A. No competition with the company’s official social presence
B. Protection against malware introduced by banner ads
C. Increased user productivity based upon fewer distractions D. Elimination of risks caused by unauthorized P2P file sharing

A

B. Protection against malware introduced by banner ads

48
Q

Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Pete’s BEST option?
A. Use hardware already at an offsite location and configure it to be quickly utilized.
B. Move the servers and data to another part of the company’s main campus from the server room.
C. Retain data back-ups on the main campus and establish redundant servers in a virtual environment.
D. Move the data back-ups to the offsite location, but retain the hardware on the main campus for redundancy.

A

A. Use hardware already at an offsite location and configure it to be quickly utilized.

49
Q
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?
A. Block cipher
B. Stream cipher
C. CRC
D. Hashing algorithm
A

A. Block cipher

50
Q

Which of the following is the BEST approach to perform risk mitigation of user access control rights?
A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.

A

B. Perform routine user permission reviews.

51
Q

Which of the following devices is BEST suited for servers that need to store private keys?
A. Hardware security module B. Hardened network firewall C. Solid state disk drive
D. Hardened host firewall

A

A. Hardware security module

52
Q

All of the following are valid cryptographic hash functions EXCEPT:
A. RIPEMD. B. RC4.
C. SHA-512. D. MD4.

A

B. RC4.

53
Q

In regards to secure coding practices, why is input validation important?
A. It mitigates buffer overflow attacks.
B. It makes the code more readable.
C. It provides an application configuration baseline. D. It meets gray box testing standards.

A

A. It mitigates buffer overflow attacks.

54
Q

Which of the following would be used when a higher level of security is desired for encryption key storage?
A. TACACS+ B. L2TP
C. LDAP
D. TPM

A

D. TPM

55
Q

A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?
A. Firewall
B. Application C. IDS
D. Security

A

D. Security

56
Q
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?
A. Registration
B. CA
C. CRL
D. Recovery agent
A

C. CRL

57
Q

Employee badges are encoded with a private encryption key and specific personal information.
The encoding is then used to provide access to the network. Which of the following describes this access control type?
A. Smartcard
B. Token
C. Discretionary access control D. Mandatory access control

A

A. Smartcard

58
Q

Which of the following devices would MOST likely have a DMZ interface?
A. Firewall
B. Switch
C. Load balancer D. Proxy

A

A. Firewall

59
Q
Which of the following application security testing techniques is implemented when an automated system generates random input data?
A. Fuzzing
B. XSRF
C. Hardening
D. Input validation
A

A. Fuzzing

60
Q

Which of the following can be used by a security administrator to successfully recover a user’s forgotten password on a password protected file?
A. Cognitive password B. Password sniffing C. Brute force
D. Social engineering

A

C. Brute force

61
Q

A security administrator wants to check user password complexity. Which of the following is the BEST tool to use?
A. Password history B. Password logging C. Password cracker D. Password hashing

A

C. Password cracker

62
Q

Certificates are used for: (Select TWO).
A. Client authentication. B. WEP encryption.
C. Access control lists. D. Code signing.
E. Password hashing.

A

A. Client authentication.

D. Code signing.

63
Q
Which of the following is a hardware based encryption device?
A. EFS
B. TrueCrypt 
C. TPM
D. SLE
A

C. TPM