Security 2 Flashcards
(101 cards)
An attacker would like to target a company and redirect their legitimate traffic to other sites. Which of the following attacks would be used to cause this malicious
URL redirection?
A.
Botnet
B.
Backdoor
C.
DNS Poisoning
D.
Phishing
C
When performing a risk analysis, which of the following is considered a threat?
A.
The potential exploitation of vulnerability
B.
The transference of risk to another party
C.
The presence of a risk in the environment
D.
The lack of mitigation for vulnerabilities
A
A recent security audit revealed the company is lacking deterrent security controls. Which of the following could be implemented to address this finding?
A.
Rogue machine detection
B.
Continuous security monitoring
C.
Security cameras
D.
Intrusion detection system
C
A research user needs to transfer multiple terabytes of data across a network. The data is not confidential, so for performance reasons, does not need to be
encrypted. However, the authentication process must be confidential. Which of the following is the BEST solution to satisfy these requirements?
A.
Secured LDAP
B.
Kerberized FTP
C.
SCP
D.
SAML 2.0
B
Which of the following is a contract with a service provider that typically includes performance parameters like MTBF and MTTR?
A.
SLA
B.
NDA
C.
ISA
D.
MOU
E.
ALE
A
Several computers in an organization are running below the normal performance baseline. A security administrator inspects the computers and finds the following
pieces of information:
– Several users have uninstalled the antivirus software
– Some users have installed unauthorized software
– Several users have installed pirated software
– Some computers have had automatic updating disabled after being deployed
– Users have experienced slow responsiveness when using the Internet browser
– Users have complete control over critical system properties
Which of the following solutions would have prevented these issues from occurring? (Select TWO).
A.
Using snapshots to revert unwanted user changes
B.
Using an IPS instead of an antivirus
C.
Placing users in appropriate security groups
D.
Disabling unnecessary services
E.
Utilizing an application whitelist
F.
Utilizing an application blacklist
C, E
An administrator must select an algorithm for creating hashes of critical system files in order to later detect any unauthorized changes. Which of the following could
the administrator use? (Select TWO).
A.
3DES
B.
Diffie-Hellman
C.
CHAP
D.
RIPEMD
E.
RSA
F.
AES-256
G.
SHA-512
D, G
A recent regulatory audit discovers a large number of former employees with active accounts. Terminated users are removed from the HR system but not from
Active Directory. Which of the following processes would close the gap identified?
A.
Send a recurring email to managers with a link to IT Security policies.
B.
Perform routine audits against the HR system and Active Directory.
C.
Set an account expiration date for all Active Directory accounts to expire annually.
D.
Conduct permissions reviews in Active Directory for group membership.
B
After responding to a virus detection notification, a security technician has been tasked with discovering how the virus was downloaded to the client computer.
Which of the following would BEST provide the technician with information related to the attack vector?
A.
Vulnerability scanning logs
B.
NIPS alerts
C.
Surveillance videos
D.
Proxy logs
D
An employee connects to a public wireless hotspot during a business trip. The employee attempts to go to a secure website, but instead connects to an attacker
who is performing a man-in-the-middle attack. Which of the following should employees do to mitigate the vulnerability described in the scenario?
A.
Connect to a VPN when using public wireless networks
B.
Only connect to WPA2 networks regardless of whether the network is public or private
C.
Ensure a host-based firewall is installed and running when using public wireless networks
D.
Check the address in the web browser before entering credentials
D
During a recent audit, it was discovered that several database services were running with local user accounts named “admin” and “dbadmin”. The following controls
will prevent network administrators from using these types of usernames for services in the future? (Select TWO)
A.
Use shared account policies
B.
Prohibit generic or default accounts
C.
Perform continuous access monitoring
D.
Perform user account access reviews
E.
Require dedicated service accounts
B, E
A major banking institution has been the victim of recurring, widespread fraud. The fraud has all occurred on the bank’s web portal. Recently, the bank implemented
a requirement for all users to obtain credentials in person at a physical office. However, this has not reduced the amount of fraud against legitimate customers.
Based on a review of the logs, most fraudulent transactions appear to be conducted with authentic credentials. Which of the following controls should be
strengthened to reduce the fraud through the website?
A.
Authentication
B.
DAC
C.
Identification
D.
Authorization
D
During an audit of a software development organization, an auditor found that the organization did not properly follow industry best practices including peer review
and board approval prior to moving applications into the production environment. The auditor recommended adapting a formal process incorporating these steps.
To remediate the finding, the organization implemented:
A.
incident management.
B.
a configuration management board.
C.
asset management.
D.
change management.
D
A web server at an organization has been the target of distributed denial of service attacks. Which of the following, if correctly configured, would BEST mitigate
these and future attacks?
A.
SYN cookies
B.
Implicit deny
C.
Blacklisting
D.
URL filter
A
A network has been impacted by downtime resulting from unauthorized devices connecting directly to the wired network. The network administrator has been
tasked to research and evaluate technical controls that would effectively mitigate risks associated with such devices. Which of the following capabilities would be
MOST suitable for implementation in this scenario?
A.
Host hardening
B.
NIDS
C.
VLAN trunking
D.
Loop protection
E.
Port security
E
A security engineer notices that unknown devices are connecting to the company’s wireless network and trying to access the database server. The wireless access
point is configured with WPA for encryption and the network administrator setup an digit pin for easy setup to the wireless access point. Which of the following is the
MOST likely type of attack?
A.
IV attack
B.
WPS attack
C.
Bluesnarfing attack
D.
Replay attack
B
A system administrator is troubleshooting an issue affecting some FTP connections. Some employees are unable to upload or download files, although the firewall
is allowing the default FTP port. Which of the following can the administrator do to fix this case?
A.
Disable the use PASV in the FTP client
B.
Configure all FTP clients to use BIN transfer
C.
Enable inbound TCP port 20 on the firewall
D.
Enable both port 21 and 22 on the firewall
A
A PKI architect is implementing a corporate enterprise solution. The solution must incorporate key escrow and recovery agents, as well as a tiered architecture.
Which of the following is required to implement the architecture correctly?
A.
Certificate revocation list
B.
Strong ciphers
C.
Intermediate authorities
D.
IPSec between CAs
C
A systems administrator is working with a third party to establish the automated transfer of large amounts of proprietary data. The interface will need to use secured
credentials and the transmission will consist of data that has been encrypted prior to transit and needs no additional protection. Which of the following would be the
MOST efficient method of data transmission given the established requirements?
A.
SSH
B.
TFTP
C.
FTP
D.
FTPS
A
A high traffic website is experiencing numerous brute force attacks against its user base. The attackers are using a very large botnet to carry out the attack. As a
result, many users passwords are being compromised Which of the following actions is appropriate for the website administrator to take in order to reduce the
threat from this type of attack in the future. .
A.
Temporarily ban each IP address after five failed login attempts
B.
Prevent users from using dictionary words that they have used before.
C.
Prevent users from using passwords they have used before.
D.
Require user passwords to be at least ten characters in length
D
A security administrator is responsible for deployment of a new two factor authentication solution. The administrator has been informed that the solution will use soft
tokens. Which of the following are valid token password schemes for the two factor solution being deployed? (Select TWO)
A.
CHAP
B.
PAP
C.
NTLMv2
D.
HMAC
E.
Smart card
F.
Time-based
A, D
The border firewall rules were recently modified by a network administrator to allow access to a new service on Server 1 using the default https port. When testing
the new rules internal to the company network there are no issues and when testing from an external connection it does not work. The host running the service
does not receive external packets. Other services hosted on Server 1 are responding fine to to both internal and external connection attempts. Which of the
following is MOST likely configured improperly?
A.
Network access control lists
B.
802.1x
C.
Port security
D.
Implicit deny
A
Joe has been in the same IT position for the last 27 years and has developed a lot of homegrown applications that the company utilizes. The company is concerned
that Joe is the only one who can administer these applications. The company should enforce which of the following best security practices and avoid Joe being a
single point of failure?
A.
Separation of duties
B.
Least privilege
C.
Job rotation
D.
Mandatory vacation
C
The Chief Security Officer (CSO) is concerned with unauthorized access at the company’s off-site datacenter. The CSO would like to enhance the security posture
of the datacenter. Which of the following would BEST prevent unauthorized individuals from gaining access to the datacenter?
A.
Security guard
B.
Video monitoring
C.
Magnetic entry cards
D.
Fencing
A