SEC+ Revision Questions Mitigating Security Threats Flashcards
The web developers at your company are testing their latest web site code before going live to ensure that it is robust and secure. During their testing they provide malformed URLs with
additional abnormal parameters as well as an abundance of random data. What term describes their actions?
A. Cross-site scripting
B. Fuzzing
C. Patching
D. Debugging
Fuzzing
The process of disabling unneeded network services on a computer is referred to as what?
A. Patching
B. Fuzzing
C. Hardening
D. Debugging
Hardening
You are on a conference call with your developers, Serena and Thomas, discussing the security of your new travel site. You express concern over a recent article describing how user submissions to web sites may contain malicious code that runs locally when others simply read the post. Serena suggests validating user input before allowing the user submissions. Which problem might validation solve?
A. Cross-site scripting
B. Fuzzing
C. Hardening
D. Patching
Cross-site scripting
Which of the following lessens the success of dictionary password attacks?
A. Password complexity requirements
B. Account lockout threshold
C. Password hints
D. Enforce password history
Password complexity requirements
A RADIUS server is used to authenticate your wireless network users. While creating a new user account, you notice there are many more user accounts than actual users. What should be done?
A. Delete all accounts not linked to a user.
B. Disable all accounts not linked to a user.
C. Verify how accounts are used and then delete unnecessary accounts.
D. Verify how accounts are used and then disable unnecessary accounts.
Verify how accounts are used and then disable unnecessary accounts.
The 802.11n wireless network in your department must be layer 2 secured. You would like to control which specific wireless devices are allowed to connect. How can you do this?
A. SIM card
B. NetBIOS computer name
C. MAC address
D. IP address
MAC address
What is the best definition of the IEEE 802.1x standard?
A. It defines a group of wireless standards.
B. It defines the Ethernet standard.
C. It defines network access control only for wireless networks.
D. It defines network access control for wired and wireless networks.
It defines network access control for wired and wireless networks.
You are hardening a Linux computer and have disabled SSH in favor of Telnet. You ensure passwords are required for Telnet access. Identify your error.
A. Secure Telnet should have public key authentication enabled.
B. Only strong passwords should be used with Telnet.
C. SSH should have been used instead of Telnet.
D. The Telnet port should have been changed from 23 to 8080.
SSH should have been used instead of Telnet.
As the IT director of a high school using Group Policy and Active Directory, you plan the appropriate standard security settings for newly deployed Windows 7 workstations. Some teachers require modifications to these settings because of the specialized software they use. Which term refers to the standardized security parameters?
A. Initial baseline configuration
B. Principle of least privilege
C. Sysprepped image
D. Local security policy
Initial baseline configuration
The periodic assessment of security policy compliance is referred to as what?
A. Remediation
B. Hardening
C. Continuous security monitoring
D. Trend analysis
Continuous security monitoring
You are a Windows Server 2012 administrator. You install and configure the Network Policy Server (NPS) role and configure health policies that require all connecting clients to have firewall and spyware software enabled. Clients violating these health policies will receive an IP address placing them on a restricted subnet containing servers with client firewall and spyware software to install. What term accurately refers to the role the servers on this restricted subnet play?
A. Isolation
B. Remediation
C. Validation
D. Authentication
Remediation
IT security personnel respond to the repeated misuse of an authenticated user’s session cookie on an e-commerce web site. The affected user reports that they occasionally use the site but not for the transactions in question. The security personnel decide to reduce the amount of time an authentication cookie is valid. What type of attack have they responded to?
A. DoS
B. Dictionary
C. Privilege escalation
D. Cross-site request forgery
Cross-site request forgery
A network administrator places a network appliance on the DMZ network and configures it with various security thresholds, each of which will notify the IT group via e-mail. The IT group will then adhere to the incident response policy and take action. What will be triggered when any of these thresholds is violated?
A. Alarm
B. Alert
C. Remediation
D. Input validation
Alarm
A user reports repeated instances of Windows 7 slowing down to the point where they can no longer be productive. You view the Windows Event Viewer logs for the past month and notice an exorbitant amount of SMTP traffic leaving the local machine each morning between
10 A.M. and 11 A.M. What type of analysis was performed to learn of this anomaly?
A. Forensic
B. Trend
C. Network statistical
D. Vulnerability
B. Trend
Roman is developing an application that controls the lighting system in a large industrial complex. A piece of code calls a function that controls a custom-built circuit board. While running his application, Roman’s application fails repeatedly because of unforeseen circumstances. Which secure coding guideline did Roman not adhere to?
A. Packet encryption
B. Digital signatures
C. Error handling
D. Hardening
C. Error handling
What can be done to harden the Windows operating system? (Choose three.)
A. Disable system restore points.
B. Disable unnecessary services.
C. Patch the operating system.
D. Configure EFS.
E. Disable Group Policy.
B. Disable unnecessary services.
&
C. Patch the operating system.
&
D. Configure EFS.
You are configuring a fleet of Windows 7 laptops for traveling employees, some of whom prefer using USB mice. It is critical that the machines are as secure as possible. What should you configure? (Choose three.)
A. Disable USB ports.
B. Require USB device encryption.
C. Enable and configure the Windows firewall.
D. Install and configure antivirus software.
E. Enable a power management scheme.
B. Require USB device encryption.
&
C. Enable and configure the Windows firewall.
&
D. Install and configure antivirus software.
A shipment of new Windows computers has arrived for Accounting department employees. The computers have the operating system preinstalled but will require additional financial software. In which order should you perform all of the following?
A. Join the Active Directory domain.
B. Apply all operating system patches.
C. Ensure the virus scanner is up to date.
D. Log in to the Active Directory domain to receive Group Policy security settings.
E. Install the additional financial software.
C, B, A, D, E
Which of the following items can help prevent ARP cache poisoning? (Choose three.)
A. Use 802.1x security.
B. Disable ARP.
C. Patch the operating system.
D. Configure the use of digital signatures for all network traffic.
E. Disable unused switch ports.
A. Use 802.1x security.
&
D. Configure the use of digital signatures for all network traffic.
&
E. Disable unused switch ports.
Your intranet provides employees with the ability to search through an SQL database for their past travel expenses once they have logged in. One employee from the IT department discovers that if they enter an SQL string such as SELECT * FROM EXPENSES WHERE EMPID = ‘x’=’x’;, it returns all employee travel expense records. What secure coding guideline was ignored?
A. SQL injection prevention
B. Input validation
C. Disabling of SQL indexes
D. User authentication
B. Input validation
You capture and examine network traffic weekly to ensure the network is being used properly. In doing so, you notice traffic to TCP port 53 on your server from an unknown IP address. After reviewing your server logs, you notice repeated failed attempts to execute a zone transfer to your server. What type of attack was attempted?
A. ARP poisoning
B. Cross-site scripting
C. DNS poisoning
D. MAC flooding
C. DNS poisoning
A network security audit exposes three insecure wireless routers using default configurations. Which security principle has been ignored?
A. Application patch management
B. Device hardening
C. Input validation
D. Principle of least privilege
B. Device hardening
Which of the following standards must authenticate computing devices before allowing network access?
A. Router
B. Hub
C. IEEE 802.1x
D. IEEE 802.11n
C. IEEE 802.1x
What will prevent frequent repeated malicious attacks against user account passwords?
A. Minimum password age
B. Password hints
C. Password history
D. Account lockout
D. Account lockout