Security+ 501 Flashcards
(252 cards)
Which of the following is the BEST reason for salting a password hash before it is stored in a database?
To prevent duplicate values from being stored
An actor downloads and runs a program against a corporate login page. The program imports a list of usernames and passwords, looking for a successful attempt. Which of the following terms BEST describes the actor in this situation?
Script kiddie
An organization wants to utilize a common, Internet-based third-party provider for authorization and authentication. The provider uses a technology based on OAuth 2.0 to provide required services. To which of the following technologies is the provider referring?
OpenID Connect
A security administrator wants to implement a logon script that will prevent MITM attacks on the local LAN. Which of the following commands should the security administrator implement within the script to accomplish this task?
arp - s 192.168.1.1 00-3a-d1-fa-b1-06
A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server. Which of the following methods is the penetration tester MOST likely using?
Active reconnaissance
Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO)
An attacker could potentially perform a downgrade attack., The IPSec payload reverted to 16-bit sequence numbers.
Which of the following is the BEST choice for a security control that represents a preventive and corrective logical control at the same time?
Antivirus
A web developers improves client access to the company’s REST API. Authentication needs to be tokenized but not expose the client’s password. Which of the following methods would BEST meet the developer’s requirements?
SAML
A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?
Credentialed
A security analyst is updating a BIA document. The security analyst notices the support vendor’s time to replace a server hard drive went from eight hours to two hours. Given these new metrics, which of the following can be concluded? (Select TWO)
The MTTR is faster., The RTO has decreased.
Which of the following could help detect trespassers in a secure facility? (Select TWO)
Motion-detection sensors
The IT department is deploying new computers. To ease the transition, users will be allowed to access their old and new systems. The help desk is receive reports that users are experiencing the following error when attempting to log in to their previous system:
Certificate issues
A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server. The tester successfully moved to another server that was not in the original network. Which of the following is the MOST likely method used to gain access to the other host?
Pivoting
Pivoting
Public key, Private key
The POODLE attack is a MITM exploit that affects:
SSLv3.0 with CBC mode cipher.
To determine the ALE of a particular risk, which of the following must be calculated? (Select TWO).
ARO, SLE
Which of the following are used to increase the computing time it takes to brute force a password using an offline attack? (Select TWO)
PBKDF2, bcrypt
Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-factor authentication to improve security. Which of the following authentication methods should be deployed to achieve this goal?
Smart card
A security administrator needs to address the following audit recommendations for a public-facing SFTP server: Users should be restricted to upload and download files to their own home directories only. Users should not be allowed to use interactive shell login. Which of the following configuration parameters should be implemented? (Select TWO).
ChrootDirectory, PermitTTY
An organization recently moved its custom web applications to the cloud, and it is obtaining managed services of the back-end environment as part of its subscription. Which of the following types of services is this company now using?
CASB explanation: Security Broker (CASB) gives you both visibility into your entire cloud stack and the security automation tool your IT team needs.
Which of the following is commonly done as part of a vulnerability scan?
Identifying unpatched workstations
After a security incident, management is meeting with involved employees to document the incident and its aftermath. Which of the following BEST describes this phase of the incident response process?
Lessons learned
After an identified security breach, an analyst is tasked to initiate the IR process. Which of the following is the NEXT step the analyst should take?
Identification
A user needs to send sensitive information to a colleague using PKI. Which of the following concepts apply when a sender encrypts the message hash with the sender’s private key? (Select TWO)
Non-repudiation, Message integrity