questions đź–¤ Flashcards

1
Q

A security administrator wants to deploy security controls to mitigate the threat of company employees’ personal information being captured online. Which of the following would best serve this purpose?
A)antivirus
B) host-based firewall
C) anti-spyware
D) web content filter

A

C) anti-spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The below report indicates that the system is most likely infected by which of the following? Protocol LOCAL IP FOREIGN IP STATE, TCP 0.0.0:445 0.0.0.0.:0 Listening, TCP 0.0.0.0:3390 0.0.0.0.:0

A) worm
B) Trojan
C)listening
D)logic bomb

A

C)listening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The network manager has obtained a public IP address for use with a new system to be available via the internet. This system will be placed in the DMZ and will communicate with a database server on the LAN. Which of the following should be used to allow for secure communication between internet users and the internal systems?

A) NAT
B) SSL
C) DNS
D) VLAN

A

B) SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The SS ID broadcast for wireless router has been stopped, but a LAN administrator has noticed that authorized users are still accessing the wireless LAN. The administrator has determined that the attackers are still able to detect the presence of the wireless LAN even though the SS ID has been stopped. What would further obscure the presence of the wireless LAN?

A) reroute wireless users to honeypot
B) disable responses to a broadcast probe request
C) create a non-zero length SS ID for the wireless router
D) upgrade the encryption to WPA or WPA2

A

D) upgrade the encryption to WPA or WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a Data Loss Prevention (DLP) strategy that addresses data transit issues?

A) scanning of outbound IM
B) scanning copying of documents to USB
C) scanning of SharePoint documents library
D) scanning printing of documents

A

A) scanning of outbound IM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An employee in the accounting department recently received a phishing email that instructed them to click a link in the email to view an important message from the IRS which threatened penalties if a response was not received by the end of the business day. The employee clicked on the link and the machine was infected with malware. Which of the following principles best describes why this social engineering ploy was successful?

A) scarcity
B) urgency
C) social proof
D) familiarity

A

B) urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system administrator would like to safeguard the integrity of data while in transit over the local LAN. What should be implemented to fulfill this requirement?
A) encryption
B)data loss prevention
C) access control lists
D)HIPS

A

A) encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attacker wants to get confidential data from an organization. The attacker decides to implement stenography as the method of hacking. Which of the following techniques should the attacker use?
A) uses a substitution cipher
B) add information to a sound file
C) encrypt an existing image file
D) hash an existing document

A

B) add information to a sound file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is protocol that could be used to support authentication services for several local devices from a central location without the use of tokens or tickets?
A)biometrics
B)TACACS+
C)PKI
D)smartcards

A

B) TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following offerings typically allows the customer to apply operating system patches?
A)cloud-based storage
B) software as a service
C) public clouds
D) infrastructure as a service

A

D) infrastructure as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security analyst is investigating a potential breach. Upon gathering, documenting, and securing the evidence, which of the following actions is the next step to minimize the business impact?
A)launch an investigation to identify the attacking host
B) review lessons learned in the process
C) remove malware and restore the system to normal operation
D) initiate the incident response plan

A

C)remove malware and restore the system to normal operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An external auditor visits the human resource department and performs a physical security assessment. The auditor observes documents on printers that are unclaimed. A closer look at these documents reveals employees’ names, addresses, ages, and type of medical and dental coverage options each employee has selected. Which of the following is the most appropriate action to take?
A) flip the documents face down so no one knows these documents are PII sensitive
B)retrieve the documents, label them with PII cover sheets, and return them to the printer
C) shred the documents and let the owner of the printer discover the missing documents on their own
D) report to the human resources manager that their personnel are violating a privacy policy

A

D) report to the Human Resources manager that their personnel are violating a privacy policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Following a system review, one corporate workstation was found to be strong passwords in plain text. Which of the following is the correct method for storing passwords?
A) hashing the password prior to storing
B)creating a digital certificate of the password prior to storing
C) using cryptography to conceal the password prior to strong
D) run the passwords through a quaternion system of equations

A

A) hashing the password prior to strong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following best describes the initial processing phase used in mobile device forensics?

A)the phone and storage cards should be examined as a complete unit after examining the removable storage cards separately
B) the phone should be powered down and the battery removed to preserve the state of data on any internal or removable storage utilized by the mobile device

C) the mobile device should be examined first, then removeable storage and lastly the phone without removable storage should be examined again

D) the removable data storage cards should be processed first to prevent data alteration when examining the mobile device

A

B) the phone should be powered down and the battery removed to preserve the state of data on any internal or removable storage utilized by the mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Chief Information Officer (CIO) is concerned with moving an application to a SaaS cloud provider. Which of the following can be implemented to provide for data confidentiality assurance during and after the migration to the cloud?

A)HPM technology
B)DLP policy
C) TPM technology
D) full-disk encryption

A

B)DLP policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following exposures associated with the spoiling of sensitive reports for offline printing could be considered the most serious?

A) Other unauthorized copies of reports could be printed
B) sensitive data may be read by operators
C) data cannot be altered without authorization
D) output would be lost in case of system failure

A

A) Other unauthorized copies of reports could be printed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Biba security model concerned with?

A

A) Reliability
B) Availability
C) Integrity
D) Confidentially

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is not a common integrity goal?

A) maintain internal and external consistency
B)prevent unauthorized users from making modifications
C) Prevent paths that could lead to inappropriate disclosure
D) Prevent authorized users from making improper modifications

A

C) prevent paths that could lead to inappropriate disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Attributable data should be:

A

Always traced to individuals responsible for observing and recording the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following questions is less likely to help in assessing controls covering audit trails?

A) is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?

B) Are incidental monitored and tracked until resolved?

C) Is access to online logs strictly controlled?

D) Does the trail provide a trace of user actions?

A

B) Are incidental monitored and tracked until resolved?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is not a method to protect objects Andy the data within the objects?
A) layering
B) data mining
C) data hiding
D) abstraction

A

B) data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a locking device that prevents unauthorized unplugging of cables from computer devices called?

A) Preset locks
B) Door delays
C) Cable trap
D) slot locks

A

C) cable trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does it mean if a system uses “Trusted Recovery”?

A) A failure or crash of the system cannot be breach security

B) A single account on the system has the administrative rights to recover or reboot the system after a crash

C) The recovery process is done from media that have been locked in state

D) There is no such principle as “Trusted Recovery” in security

A

A) A failure or crash of the system cannot be breach security

24
Q

When it comes to magnetic media sanitization, what difference can be make between clearing and purging information?

A) They both involve rewriting the media

B) Clearing completely crases the media
whereas purging only removes file headers, allowing the recovery of files

C) Clearing renders information unrecoverable by a keyboard attack and purging renders information unrecoverable against laboratory attack

A

C) Clearing renders information unrecoverable by a keyboard attack and purging renders information unrecoverable against laboratory attack

25
Q

The Information Technology Security Evaluation Criteria (ITSEC) was written to address which one of the following that the Orange Book did not address?

A) Integrity and availability
B) Integrity and confidentiality
C) confidentiality and availability
D) accessibility and confidentiality

A

A) Integrity and availability

26
Q

Small files that websites put on your computer hard disk drive when you visit, your information is sometime sold to other websites

A

Cookies

27
Q

What is Malware?

A

Software that may harm your computer

28
Q

T or F : if you receive an attachment from someone you don’t know, you should never open it.

A

True

29
Q

The ________ type of malware that is triggered by the user. Code automatically makes copies of itself.

A

Virus

30
Q

Which of the following may result in a malware infection?

Opening an email attachment
Clicking on an infected link
Downloading a file from a website
All of the above

A

All of the above

31
Q

What is phishing?

A

A scam to get confidential information

32
Q

What damage can be caused by malware?

Computer crashes
Permanent deletion
The compromising personal information, which may lead to identity theft
All of the above

A

All of the above

33
Q

The _______ type of malware, that secretly collects personal information and sends it to a third party

A

Spyware

34
Q

Which of the following is not effective in preventing malware infections?

A

Opening email attachments

35
Q

If you think your computer has a virus, a good first step in solving the problem would be to:

A

Run a virus scan

36
Q

Special program which can detect and remove viruses from computer is called

A

Anti virus

37
Q

What is a Trojan horse?

A

Is destructive software disguised as something good

38
Q

What is an email attachment

A

Is a computer file sent along with an email message

39
Q

What is “crash” as it relates to computers?

A

The system stops functioning properly

40
Q

What is an example of a firewall being effective?

A

When a certain website might be blocked

41
Q

How can you get rid of a virus

A

-Take it to a computer specialist
-scan for the virus in the computer’s settings

42
Q

It is a self- replicating program that is harmful to networks.

A

Worm

43
Q

It help prevent attackers from monitoring or recording traffic between resources and computers, by making data more difficult to read

A

Data encryption

44
Q

Two-factor authentication

A

Users are required to verify their identify in 2 different ways

45
Q

Anti- malware software

A

Uses a database of known harmful software to search for dangerous files on a device

46
Q

Passwords

A

A string of characters used to gain access to a computer system

47
Q

Firewalls

A

Prevents certain packets of data from entering/ leaving a network

48
Q

Access levels

A

Allowing different users different permissions for files and programs

49
Q

Firewalls are available as a special hardware device or as __________.

A

Software

50
Q

A firewall will block________ of information from certain malicious IP addresses.

A

Packets

51
Q

Fire walls can also block packets that are for _____ that are not used.

A

Ports

52
Q

When packets are blocked from entering a computer or network they are said to be _______.

A

Dropped

53
Q

A firewall can look at the data inside each packet of data. This is known as ________. Computers that are protected by the firewall are part of the trusted network.

A

Packet inspection

54
Q

Put the stages of initializing a HTTPS connection with SSL/TLS in order

A

1) client browser requests a secure connection

2) Server responds be sending a copy it’s security certificate

3)The browser inspects and verifies the server certificate

4) if the certificate is valid, the browser will send an encrypted session key to the server

5) The server and browser can now communicate using session key

55
Q

Which of these user authentication methods are not bio-metric

Retina scan
2FA
Facial recognition
Fingerprint scanning

A

2FA

56
Q

The user who has access to all files, data and programs on a computer system is known as the ______.

A

Admin
(Administrator)

57
Q

A _______ is a type of malware that is triggered by running an infected file, whereas a ______ is able to self-replicate and will often spread automatically through a local network

A

Virus
Worm