SEC+ Revision Questions Security Assessments and Audits Flashcards
As part of your security audit you would like to see what type of network traffic is being transmitted on the network. Which type of tool should you use?
A. Protocol analyser
B. Port scanner
C. Vulnerability scanner
D. Password cracker
A. Protocol analyser
A network consists of 250 computers. You must determine which machines are secure and which are not. Which type of tool should you use?
A. Protocol analyser
B. Port scanner
C. Vulnerability scanner
D. Password cracker
C. Vulnerability scanner
You would like to focus and track malicious activity to a particular host in your DMZ. What should you configure?
A. Honeynet
B. Honeypot
C. DMZ tracker
D. Web server
B. Honeypot
Which of the following would you employ to determine which TCP and UDP ports on a host are open?
A. Vulnerability scanner
B. Packet sniffer
C. Performance Monitor
D. Port scanner
D. Port scanner
Which procedure identifies assets, threats, and risks and also determines methods to minimize the impact of these threats?
A. Risk analysis
B. Vulnerability assessment
C. Port scanning
D. Network mapper
A. Risk analysis
A technician must identify deviations from normal network activity. Which task must she first perform?
A. Trend analysis
B. Baseline analysis
C. Performance monitoring
D. Risk analysis
B. Baseline analysis
A developer analyses source code to ensure there are no errors or potential security risks. Which term best identifies this activity?
A. Risk assessment
B. Patch management
C. Debugging
D. Code review
D. Code review
A Windows computer has not been patched nor have the unnecessary services been disabled. Which of the following statements is true regarding security?
A. The computer will perform faster.
B. The computer has a large attack surface.
C. The computer has a small attack surface.
D. The computer will perform slower.
B. The computer has a large attack surface.
A network security auditor simulates various network attacks against a corporate network. Which term best defines this procedure?
A. Vulnerability analysis
B. Network mapping
C. Penetration testing
D. Risk assessment
C. Penetration testing
Your manager asks you to configure a collection of purposely vulnerable hosts in a DMZ for the purpose of tracking hacking attempts. What term best describes what you are configuring?
A. Honeynet
B. Honeypot
C. Firewall
D. Proxy server
A. Honeynet
You run a vulnerability scan on subnet 192.168.1.0/24. The results state TCP ports 135 through 139 are open on most hosts. What does this refer to?
A. File and Print Sharing
B. Web server
C. Mail server
D. Remote Desktop Protocol
A. File and Print Sharing
You are a network consultant in charge of creating a wireless network infrastructure for a hotel. Toward the end of the implementation your team evaluates the project to ensure it meets the original stated requirements. What is this called?
A. Penetration testing
B. Risk assessment
C. Design review
D. Code review
C. Design review
After careful log examination you realize somebody has hacked into your WEP-secured home wireless network. What can you do to further secure wireless traffic?
A. Use WPA2 Enterprise
B. Use WPA2 PSK
C. Disable SSID broadcasting
D. Change the SSID name
B. Use WPA2 PSK
What should be done to ensure your network security is effective?
A. Patch all operating systems
B. Update the BIOS on all systems
C. Periodically test network security controls
D. Upgrade to the latest version of Microsoft Office
C. Periodically test network security controls
- Which of the following is considered passive security testing?
A. Capturing network traffic
B. Brute-force password attack
C. Dictionary-based disk decryption
D. OS fingerprinting
A. Capturing network traffic
From the following list, identify the security misconfiguration:
A. A domain administrative account is used as a service account.
B. An Active Directory account is used as a service account.
C. Windows stations receive updates from a WSUS server instead of the Internet.
D. The Windows Guest account is disabled.
A. A domain administrative account is used as a service account.
A security auditing team has been hired to conduct network penetration tests against a network. The team has not been given any data related to the network or its layout. What type of testing will the team perform?
A. Black box
B. White box
C. Gray box
D. Blue box
A. Black box
You are having trouble pinging host 192.168.17.45; there are no replies. One of your users must use the Remote Desktop Protocol (RDP) against the host to run an application. You cannot test RDP for the user because you are currently logged on locally to a Linux server with only a command line. What can you use to quickly determine whether RDP is running on 192.168.17.45?
A. Packet sniffer
B. Virus scanner
C. Wireless scanner
D. Port scanner
D. Port scanner
After conducting a security audit, you inform the network owner that you discovered two unencrypted wireless networks. Your client asks how to best secure wireless traffic. Which of the following is the most secure wireless network encryption?
A. WEP
B. WPA
C. WPA2
D. WPA3
C. WPA2
A security auditor must determine what types of servers are running on a network. Which type of tool should be used?
A. Network mapper
B. Protocol analyser
C. Port scanner
D. Virus scanner
A. Network mapper
A security auditor discovers open wireless networks. She must recommend a secure solution. Which of the following is the most secure wireless solution?
A. 802.1x
B. WEP
C. WPA PSK
D. Disable SSID broadcast
A. 802.1x
Which of the following would not be considered during a security audit?
A. Locked server rooms
B. Wireless encryption in use
C. Patch status of all hosts
D. Price of server licensing
D. Price of server licensing
While auditing a Windows Active Directory environment, you discover that administrative accounts do not have configured account lockout policies. Which of the following are security concerns? (Choose two.)
A. If account lockout is enabled, administrative accounts could be locked out as a result of repeated password attempts.
B. If account lockout is not enabled, administrative accounts could be subjected to password attacks.
C. If account lockout is enabled, administrative accounts could be subjected to password attacks.
D. If account lockout is not enabled, administrative accounts could be locked out as a result of repeated password attempts.
A. If account lockout is enabled, administrative accounts could be locked out as a result of repeated password attempts.
&
B. If account lockout is not enabled, administrative accounts could be subjected to password attacks.
Which type of security testing provides network configuration information to testers?
A. White box
B. Black box
C. Gray box
D. Blue box
A. White box