sec Flashcards

1
Q

D. The server stores passwords in the database for three days.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E. VPN

A

CE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

D. Hardened host firewall

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

D. MD4.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

D. NIPS

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

D. Dumpster diving

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

D. The server is running a host-based firewall

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

D. It meets gray box testing standards.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

D. Error and exception handling

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

D. TPM

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

D. Security

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

D. Recovery agent

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

D. Mandatory access control

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

D. Proxy

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

D. DDoS

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

D. Input validation

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

D. Social engineering

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

D. Password hashing

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

D. SLE

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

D. Placing a firewall between the Internet and database servers

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

D. CPU and memory resources may be consumed by other servers in the same cloud

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

D. Issues and signs all root certificates

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

D. Distributed dictionary attacks

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

D. The request needs to be sent to the change management team.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

D. Use of public and private keys

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

D. Separation of duties

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

D. Least privilege

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

D. Adware

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

D. Server clustering

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

D. Operational

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

D. Set the switch ports to 802.1q mode.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

E. 10.4.4.199

A

CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

E. RSA

A

BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

D. Software as a Service

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

D. TLS

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

D. Change management

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

D. Incident management

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

D. TFTP utilizes UDP and FTP uses TCP.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

D. SHA1-HMAC

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

D. Load balancer

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

D. Packet sniffing

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

D. Patch management

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

D. Removable media encryption

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

D. Role based access control

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

D. Authentication

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

D. Individual accountability

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

D. Job function rotation

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

D. All public keys are accessed by an unauthorized user.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

D. PKI

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

D. Vulnerability scan

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

D. Brute Force scan

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

D. Integrity

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

E. Decompile suspicious files

A

AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

D. Key escrow

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

D. Recovery key

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

E. Public keys

A

BD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

D. Session hijacking

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

E. is mostly used in hashing algorithms.

A

CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

D. Cross-site scripting prevention

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

D. Some exploits when tested can crash or corrupt a system causing downtime or data loss.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

D. LDAP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

D. Differential backups on the weekend and full backups every day.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

D. CHAP

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

E. 3DES

A

BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

D. Warm site

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

D. RPO

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

D. Ping of death

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

D. 465

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

D. Packet switching

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

D. Separation of duties

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

D. Key escrow

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

D. ACL

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

D. ICMP

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

D. Strong passwords

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

D. Routine log review

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

D. Fingerprint and retina scan

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

D. Improper error handling

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

D. Management of interfaces

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

D. Security awareness training

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

D. Spam filter

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

D. Bluesnarfing

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

D. Recovery agents

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

D. ICMP

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

D. NIPS

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

D. true positive.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

D. Router

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

D. 23

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

D. The website is using an expired self-signed certificate.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

D. Fire suppression

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

D. If user’s input exceeds buffer length, then truncate the input.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

D. Anomaly-based NIPS

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

E. Authorization

A

AE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

D. WPA

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

D. that a rogue access point has been installed within range of the symbols.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

E. SSL

A

BE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

D. Packet sniffing

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

D. identification of the user is non-repudiated.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

E. CRL

A

BD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

D. TKIP

A

C

100
Q

D. Removing single points of failure

A

C

101
Q

D. Virtualization

A

B

102
Q

D. Interview witnesses

A

C

103
Q

D. The firewall executes an implicit deny.

A

D

104
Q

D. Pharming

A

B

105
Q

D. SMTP

A

B

106
Q

D. Implement WEP

A

A

107
Q

D. Access Control List (ACL)

A

B

108
Q

D. Capturing system images

A

A

109
Q

D. Detection strategies

A

C

110
Q

D. Four factor

A

B

111
Q

D. IP access control lists

A

C

112
Q

D. Buffer overflow

A

B

113
Q

E. ICMP

A

BC

114
Q

D. ARP poisoning

A

A

115
Q

D. PAT

A

A

116
Q

D. shoulder surfing.

A

D

117
Q

D. Firewall

A

B

118
Q

D. XML injection

A

B

119
Q

D. Transitive access

A

B

120
Q

D. SLE divided by the ARO

A

C

121
Q

D. ARP poisoning

A

C

122
Q

D. RADIUS

A

D

123
Q

D. WEP uses the weak RC4 cipher.

A

B

124
Q

F. Device encryption

A

CF

125
Q

D. Patch management

A

B

126
Q

D. Alarm

A

B

127
Q

D. White box testing

A

D

128
Q

D. Transport layer security

A

C

129
Q

D. A malicious user can redirect a user to another website across the Internet.

A

A

130
Q

D. to turn on remote GPS tracking to find the device and track its movements.

A

B

131
Q

E. TFTP

A

CD

132
Q

D. Implicit permit

A

C

133
Q

D. Application log

A

D

134
Q

D. MyTr@in#8

A

B

135
Q

J. Telnet

A

BCFJ

136
Q

D. Vulnerability scanning

A

A

137
Q

D. Application fuzzing

A

A

138
Q

D. Firewalls

A

B

139
Q

D. Adware

A

C

140
Q

D. IT Contingency Plan

A

D

141
Q

numbers are often reused it becomes easy to derive the remaining WEP key.

A

D

142
Q

D. HMAC

A

D

143
Q

D. Transfer the risk saving $5,000.

A

D

144
Q

D. Blue box

A

C

145
Q

D. Kerberos

A

C

146
Q

D. Peer review

A

A

147
Q

D. HVAC

A

B

148
Q

D. Video surveillance

A

C

149
Q

D. A host standby

A

B

150
Q

D. Mandatory

A

A

151
Q

D. Vacuum

A

A

152
Q

D. XTACACS

A

C

153
Q

D. SHA

A

C

154
Q

D. Directory traversal

A

B

155
Q

D. Penetration testing

A

A

156
Q

E. Place the database server behind a door requiring biometric authorization.

A

AE

157
Q

D. Replay

A

A

158
Q

D. Single sign-on

A

B

159
Q

D. Enable LDAP and strong passwords

A

B

160
Q

D. A private network that is protected by a firewall and a VLAN.

A

A

161
Q

D. Mandatory access control

A

A

162
Q

E. PIV

A

CE

163
Q

D. Vulnerability is related to the probability of the event.

A

C

164
Q

D. War driving

A

D

165
Q

D. Separate voice gateway

A

A

166
Q

F. TACACS+

A

CF

167
Q

D. Monitoring access logs

A

D

168
Q

D. Vishing

A

B

169
Q

D. Install a proxy server.

A

D

170
Q

D. NAC

A

A

171
Q

D. End user license agreement

A

C

172
Q

D. Business impact analysis

A

B

173
Q

D. Secure socket layer

A

C

174
Q

D. $75,000

A

B

175
Q

D. NAT

A

C

176
Q

D. Place the Web server on a VPN

A

C

177
Q

D. TCP 21

A

C

178
Q

D. Incremental backups monthly

A

A

179
Q

D. deny udp any server eq 69 log

A

D

180
Q

D. A logic bomb is undetectable by current antivirus signatures because a patch has not been issued.

A

A

181
Q

D. Botnets are used within DR to ensure network uptime and viruses are not.

A

B

182
Q

D. Hardware encryption is faster than software encryption.

A

D

183
Q

D. Cloud computing

A

D

184
Q

D. Data loss prevention

A

A

185
Q

D. Matt should install TPMs and encrypt the company database.

A

B

186
Q

D. Database encryption

A

A

187
Q

D. TPM

A

D

188
Q

D. Network-based attacks

A

B

189
Q

reprimanded.

A

B

190
Q

D. Implementation of account lockout procedures.

A

A

191
Q

D. RBAC

A

A

192
Q

D. Fuzzing

A

A

193
Q

D. Fuzzing

A

A

194
Q

D. Hard drive

A

D

195
Q

D. Journaled file system

A

A

196
Q

D. Block Cipher

A

D

197
Q

D. Cognitive passwords attacks

A

D

198
Q

D. Data disposal

A

D

199
Q

D. Transitive Access

A

B

200
Q

D. Rogue access point

A

D

201
Q

E. MD4

A

A

202
Q

D. WEP

A

C

203
Q

D. WPA2 PSK TKIP

A

A

204
Q

D. MAC address filtering

A

D

205
Q

D. If connected to a computer, unknown malware may be introduced into the environment.

A

D

206
Q

D. Elimination of risks caused by unauthorized P2P file sharing

A

B

207
Q

D. Require users to sign conduct policies forbidding these actions.

A

A

208
Q

D. Move the data back-ups to the offsite location, but retain the hardware on the main campus for redundancy.

A

A

209
Q

D. DMZ

A

C

210
Q

D. Hashing algorithm

A

A

211
Q

D. NTLM, NTLMv2

A

A

212
Q

D. EAP method

A

C

213
Q

D. EAP-TLS

A

C

214
Q

D. Virtualization

A

A

215
Q

D. NIDS.

A

B

216
Q

D. Rule based

A

A

217
Q

D. NAT

A

C

218
Q

D. Compliance activity

A

B

219
Q

D. VPN concentrator

A

A

220
Q

D. DNS

A

C

221
Q

D. The sub-interfaces each implement quality of service.

A

B

222
Q

E. Availability

A

C

223
Q

address to read from a location holding the payload.

A

A

224
Q

D. Trusted platform module

A

D

225
Q

D. Implement a cipher key lock

A

D

226
Q

D. monitor any incoming connections from the Internet.

A

B

227
Q

D. Deploy a HIPS.

A

A

228
Q

D. Run a last logon script to look for inactive accounts.

A

D

229
Q

D. rootkit.

A

B

230
Q

D. TACACS+

A

D

231
Q

D. SSID broadcast

A

D

232
Q

D. Develop a change management policy incorporating oversight of the project lifecycle.

A

C

233
Q

D. Delete all temporary Internet files

A

A

234
Q

D. Cable lock

A

D

235
Q

D. Application hardening

A

B

236
Q

D. Botnet

A

A

237
Q

D. Hashing

A

A

238
Q

D. Digital signature

A

B

239
Q

E. Switch from 802.11a to 802.11b

A

CD

240
Q

D. Malicious add-ons

A

D

241
Q

D. Flood guards

A

B

242
Q

D. Penetration test

A

D

243
Q

D. Vulnerability scan

A

A

244
Q

D. Buffer overflow

A

D

245
Q

D. Software vendors

A

C