Security+ 501 Test 2 Flashcards

(133 cards)

1
Q

Which of the following can be established in a cloud environment through effective security controls and well-written service-level agreements?

A

Responsibility and Accountability

Accountability and responsibility can be established through effective security controls and well-written service-level agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which regulation would guide a healthcare organization to protect the confidentiality of stored patient data adequately?

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which regulation covers the risk management of U.S. Department of Defense systems

A

RMF (Risk Management Framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which regulations are involved with financial data?

A

Sarbanes-Oxley and PCI (Payment Card Industry)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of system involves the use of a common authentication system and credentials database that multiple entities use and share.

A

A Federated System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of system shows one party trusts another but not the reverse?

A

One way trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of system shows if entity B trusts entity A and entity C trusts entity B then entity C trusts entity A?

A

.A transitive Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are usually annoying advertisements that come in the form of pop-up messages in a user’s browser?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A (Blank) is a piece of malicious software that must be propagated through a definite user action.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A (Blank) is a piece of software that seems to be of value to the user, but in reality, is malware.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A (Blank) is a script set to execute at a certain time, which is usually created by rogue administrators or disgruntled employees.

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following requires team members to go through the motions of fulfilling the responsibilities and conducting the activities required during an actual incident or disaster?

A

Walkthrough test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A (blank) is the simplest form of test, in which the business continuity plan, disaster recovery plan, and associated documents are reviewed by relevant personnel including managers, recovery team members, and anyone else who may have responsibilities directly affecting plans.

A

Documentation Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a (Blank), all personnel are usually involved and may actually conduct activities as they would during a real incident. This type of test is more complex and normally requires extensive resources, such as people and equipment, so it is typically conducted infrequently.

A

Full-Scale Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is the most common public-private key generation algorithm used in public-key cryptography?

A

RSA (Rivest-Shamir-Adleman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Blank) is a key exchange protocol used in public-key cryptography. It is used to negotiate, agree upon, and establish a secure session between two parties.

A

(ECDH) Elliptic Curve Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(blank) is used to generate message digests for plaintext. It is not used in public-key cryptography to exchange keys or establish secure sessions.

A

SHA-2 (Secure Hashing Algorithm - 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a logging facility found in UNIX and Linux systems?

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of log management involves collecting logs from across the network into one system and being able to review them as a group.

A

Centralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(blank) is a centralized method of obtaining logs and other data from disparate devices across the network.

A

SIEM (Security Information Event Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of log management means that logs are managed and reviewed on a host-by-host basis, rather than as a centralized, consolidated group.

A

Decentralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is it called when someone keeps getting new privileges but nothing ever gets turned off?

A

Privilege Creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

(Blank) means that administrators never give a user account more rights and permissions than is needed for the user to do his or her job.

A

least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(Blank) indicates the level of errors that the system may generate indicating that unauthorized users are identified and authenticated as valid users in a biometric system.

A

False acceptance rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following is most appropriate if you have limited external public IP addresses available, but a requirement to share those IP addresses with internal hosts that must connect to the public Internet?
NAT firewall Using network address translation (NAT) in conjunction with a firewall enables you to share one external address with multiple internal hosts that require external addresses for their connectivity.
26
What type of control assists and mitigates the risk an existing control is unable to mitigate?
Compensating
27
What type of control is used to correct a condition when there is either no control at all, or the existing control is ineffective.
Corrective
28
What is the difference between deterrence and preventative controls?
A deterrent control and a preventive control is that it is necessary to have knowledge of the deterrent control for it to work. Users do not need to have knowledge of a preventative control for it to function.
29
What type of attack attempts to send unsolicited ARP messages to a client to add false entries to its ARP cache?
ARP Poisoning
30
What type of attack is an attempt to hijack a user's Web browsing session by stealing cookies or using other network attack methods.
Session Hijacking
31
What solutions allow applications that users can download, install, and execute to be added to a safe list?
Whitelisting
32
(Blank) involves an administrator adding undesirable or restricted software or applications to a list on content filtering devices, in group policy, or through some other type of mechanisms. This ensures that users are not allowed to download, install, or execute these particular applications.
Blacklisting
33
What security controls should be implemented to make sure that users require previous knowledge of the network identifier to join a network?
Disable SSID Broadcasting broadcasting if you're not actively broadcasting your network name. When this control is implemented, a user must know the name of the network before he or she can connect to it.
34
Which of following uses geolocation features to ensure that a mobile device does not leave specific areas of corporate property?
Geofencing
35
Which type of cloud service is for use by only one organization and is usually hosted by that organization's infrastructure?
private
36
What type of cloud service is for use by similar organizations or communities, such as universities or hospitals, that need to share common data.
Community
37
What type of cloud service is is usually operated by a third-party provider that sells or rents "pieces" of the cloud to different entities, such as small businesses or large corporations.
Public
38
(Blank) can enable users to perform their work via a browser, from anywhere they have Internet connectivity. This can be configured either to allow a local copy along with the cloud copy of the data, or the data can be edited directly within the cloud.
Cloud Services
39
(Blank) allows multiple virtual machines to run on the same piece of hardware.
Virtualization
40
Disabling ________ will help prevent security issues caused by having ping and traceroute enabled.
ICMP ICMP is the protocol used by the ping and traceroute utilities for network diagnostics, and it should be disabled unless it's being used for important purposes.
41
A virtual LAN (VLAN) does NOT offer which of the following security controls? 1. Creates Broadcast domains 2. Allows different security policies to be applied to different hosts 3. Allows physical segmentation of hosts by IP subnet 4. Allow logical segmentation of hosts by IP subnet
3.Allows physical segmentation of hosts by IP subnet VLANS do not physically segment hosts; they logically segment them.
42
Which of the following processes uses auditing to ensure that users are traced to and held responsible for their actions?
Accountability
43
(Blank) is the process of controlling access to resources through methods that include permissions, rights, and privileges.
Authorization
44
(Blank) is the process of validating that a user's credentials are correct after they have presented them through the identification process.
Authentication
45
(Blank) is the process of reviewing logs and other audit trails to determine what actions have been performed on systems and data.
Auditing
46
Which of the following describes a false acceptance rate?
Type II error and when an unauthorized user is validated as authorized
47
Which of the following technologies enables communication between devices using a beam of light?
Infrared
48
What is normally the job of a senior leader within the incident response team?
Notifying and coordinating with senior management and law enforcement officials is normally the job of a senior leader within the incident response team.
49
Which of the following fire suppression chemicals widely replaced halon in data center fire suppression systems?
Fm-200
50
Which of the following terms describes someone who hacks into systems, with permission of the system's owner, to discover exploitable vulnerabilities and help secure the system?
White Hat Hacker
51
Who is someone that uses his or her skills for both good and evil purposes?
Grey Hat Hacker
52
The United States Department of Defense uses a specific form of personal identification verification (PIV) card called?
CAC (common access control)
53
(Blank) is an algorithm used to generate one-time passwords
HOTP (HMAC-based one-time password)
54
Which of the following power devices do you install to enable the constant availability of critical servers during a power outage?
Generators
55
What is a battery backup used to provide backup power for only a short period of time and are often used to allow a graceful shutdown of less critical systems.
UPS
56
Containerization is the process of virtualizing which of the following items?
Operating System
57
Which of the following methods will help improve SNMP security?
Disable ICMP
58
Which of the following terms describes a security appliance that is usually installed on an individual device, usually as a chip on the system motherboard?
TMP (Trusted Module Platform)
59
(Blank) is usually a hardware appliance or standalone device used to provide hardware encryption services for specific hosts.
HSM (Hardware Security Module)
60
Which of the following is a non-secure protocol used to copy files to and from Internet-based hosts?
FTP (File Transfer Protocol)
61
What is the difference between FTPS and SFTP
FTPS uses SSL and SFTP uses SSH
62
(Blank) is a secure copy protocol used to copy files securely to and from a networked host, and it uses SSH.
SCP
63
Which of the following attacks results in mathematical operations that the host or application cannot handle, causing them to fail?
Integer Overflow Attack
64
A (Blank) injection attack targets directory services databases, such as those used in X.500 implementations.
DLL Injection
65
What type of attack targets non-secure directory structures on the host, such as folder structures.
Directory Traversal
66
What type of evidence is generally in the form of charts, graphs, or drawings to help non-technical people?
Demonstrative evidence
67
(Blank) evidence proves innocence.
Exculpatory
68
(Blank) evidence proves guilt.
Inculpatory
69
(Blank) evidence directly supports or proves a definitive assertion.
Documentary
70
Which cryptography concept refers to the requirement for a trusted third party that can hold a special key (in addition to your private and public key pair) that is used to decrypt a stored backup copy of the private key if the original is lost?
Key Escrow
71
What is the third step in the incident response life cycle?
Containment, eradication, and recovery
72
Which of the following is an access control model based upon various access control rules that apply to users, objects, and actions?
Rule-Based
73
Which of the following resides on network devices and filters traffic coming into and out of the device?
Access Control List
74
Which of the following tools will help you track down a potential backdoor program allowing access into a host on your network?
Protocol Analyzer
75
Which of the following are used to back up files that have changed since the last full backup of a virtual machine? (Choose two.)
Differential and Incremental
76
A (Blank) involves sending malicious XML content to a Web application, taking advantage of any lack of input validation and XML parsing.
XML injection attack
77
You are the security administrator for a small business. You want to provide your users with the ability to encrypt outbound e-mail messages, but the company cannot afford an expensive encryption solution. Which of the following is the best option?
PGP/GPG
78
Which of the following types of injections use standardized database interfaces to attack a Web application?
SQL Injection
79
Which attack involves sending specially-crafted traffic to a wireless client and an access point?
Deauthentication Attack
80
(Blank) involves impersonating a wireless client or access point through either its IP or its MAC address.
Spoofing
81
Which of the following cryptography types do you use when you want to perform a one-time, single-key, encrypted transaction with another company?
Symmetric
82
Which of the following forms of authentication uses password hashes and challenge methods to authenticate to the system?
CHAP
83
The (Blank) is a modern authentication framework that can use various authentication methods. It also does not pass the user name and password information in clear text.
Extensible Authentication Protocol (EAP)
84
Which of the following is the most comprehensive and expensive form of disaster recovery exercise?
Full Scale
85
Which mobile device management deployment model uses corporate-owned devices where the corporation dictates the software installation and maintenance actions?
COBO (Company Owned Business Only)
86
(Blank) is similar to CYOD, but employees are limited to installing only white-listed apps.
Company-issued, personally-enabled (COPE)
87
(Blank) means the organization retains ownership, but employeess may install personal apps on the device.
Choose your own device (CYOD)
88
Which of the following is a non-secure client-side e-mail protocol that uses TCP port 110?
POP3
89
You've discovered that a number of systems within your network have become infected with malware; it's believed that all the affected users visited a common site during the previous week. What type of attack would this likely be?
Watering Hole Attack
90
Which of the following methods of enhancing security between hosts involves generating and exchanging asymmetric keys within a particular communication session?
Key Exchange
91
Which of the following is a cryptographic representation of text, but not the text itself? (Choose two.)
Hash and Message Digest
92
Which of the following is a port-based authentication method?
802.11X
93
Which of the following is a rogue wireless access point set up to be nearly identical to a legitimate access point?
Evil Twin
94
Which of the following is used in Windows systems to identify a user account?
SID (Security Identifier)
95
Which of the following are characteristics of hashing? (Choose all that apply.) 1. Hashing can be used to protect data integrity 2. Hashes are decrypted using the same algorithm that encrypted them 3. Hashes produce fixed-length digests for variable length text 4. Hashes are cryptographic representations of plaintext
1. Hashing can be used to protect data integrity 3. Hashes produce fixed-length digests for variable length text 4. Hashes are cryptographic representations of plaintext
96
Which of the following desired attributes would make an organization most likely to move to a cloud provider?
Availability
97
Which type of network intrusion detection system uses defined rule sets to determine when attacks may be occurring?
Rule-Based
98
Which of the following answers best describes the one major advantage of TACACS+ over RADIUS?
TACACS+ encrypts everything
99
Which of the following devices typically makes requests on behalf of internal clients?
Proxy
100
Which of the following access control models uses labels and security clearances to grant access to objects?
Mandatory Access Control
101
If a person does not know a control exists, and this control keeps her from performing a malicious act, what type of control would this be classified as?
Preventative
102
Which of the following refers to the use of several different factors to authenticate to a system?
Multifactor authentication
103
Which of the following is a legacy wireless encryption protocol that uses the RC4 streaming protocol?
WEP (Wireless Equalivant Privacy)
104
Which of the following attacks targets relational databases that reside behind Web applications?
A SQL injection
105
Before information is converted to an unreadable state using cryptography, in what form is the information?
Plaintext
106
Which of the following terms indicates the amount of time it takes for a hardware component to recover from failure?
Mean time to recovery (MTTR
107
(Blank) represents the manufacturer's best guess (based on historical data) regarding how much time will pass between major failures of that component. This is assuming that more than one failure will occur, which means that the component will be repaired, rather than replaced.
Mean time between failures (MTBF)
108
(blank) is the length of time a device is expected to last in operation. In MTTF, only a single, definitive failure will occur and will require that the device be replaced rather than repaired.
Mean time to failure (MTTF)
109
The corporate IT manager wants you to implement a process that will allow administrators to restrict users from installing and executing certain applications on their mobile devices. Which of the following meets those goals?
Blacklisting
110
Which of the following terms describes someone who hacks into a system for malicious purposes, without permission from the system's owner, and shares the system hacking information with others?
Black Hat Hacker
111
Which of the following cannot identify patterns alone and requires other data and event sources to identify trends and patterns?
Log Analysis
112
(Blank) involves looking at data from various sources, including device logs, to identify patterns over a period of time
Trend Analysis
113
Which of the following terms represents the manufacturer's best guess (based on historical data) regarding how much time will pass between major failures of a component produced by that manufacturer?
Mean time between failures (MTBF)
114
Which of the following is a software or a hardware appliance responsible for balancing user requests and network traffic among several different physical or virtualized hosts?
Load Balancer
115
Type the command to create an ACL entry that you would use to create an access rule on your router to prevent any telnet traffic from passing through to the destination network 192.168.21.0.
Deny source all destination 192.168.21.0 tcp port 23
116
Which of the following methods involves sending individual characters of the key through an algorithm and using a mathematical XOR function to change the output?
Key Streaming
117
Which of the following is a key negotiation and agreement protocol used in public key cryptography?
DHE (Diffie Hellman Exchange)
118
(Blank) is a public key cryptography protocol used on small mobile devices because of its low power and computing requirements.
Elliptic curve cryptography (ECC)
119
Which of the following 802.11 encryption protocols would you implement to provide the strongest encryption for communications across your wireless network?
WPA2
120
A password is an example of which of the following authentication factors?
Something you know
121
Which of the following policy settings enforces the use of longer password lengths and character spaces to increase password strength?
Password Complexity
122
During which type of assessment would penetration testers not have any knowledge about the network, while defenders are aware of their presence? (Choose two.)
Blind Test and Black Box
123
Which of the following is a variant of a phishing attack that targets a particular type of user and includes specific information?
Spear phishing
124
Which type of assessment looks at events that could exploit vulnerabilities?
Threat Assesment
125
A (Blank) looks for weaknesses in systems.
vulnerability assessment
126
A (Blank) is a combination of assessments and is designed to assess factors, including likelihood and impact that affect an asset.
risk assessment
127
A (Blank) attempts to exploit actual vulnerabilities found within the systems.
penetration test
128
In many cases a load balancer uses which of the following on a client's browser to maintain session affinity?
Cookies
129
What type of evidence in a computer forensics investigation directly supports a particular assertion?
Documentary evidence
130
Marisol needs to interconnect multiple VLANs in her production environment. Which of the following network devices would best address this issue?
Layer 3 Switch A layer 3 switch supports inter VLAN routing to interconnect disparate VLANs.
131
A (Blank) could interconnect two VLANs, but this would take substantial configuration.
Router
132
What is a Layer 2 Switch?
A layer 2 switch could interconnect VLAN via trunk ports, but only to interconnect to other layer 2 switches.
133
Mike has five Linux systems that need access to a shared folder with Windows file server that's part of an Active (AD) domain. What can he do to give these systems access to the shared resource? (Choose two) 1. Install and configure SAMBA on the Linux systems to access the AD 2. Create new local users on the domain controller 3. Create user groups on all the Linux systems 4. Configure access to the resource on the file server
1. Install and configure SAMBA on the Linux systems to access the AD 4. Configure access to the resource on the file server