Topic 1 Flashcards Preview

Sec+ > Topic 1 > Flashcards

Flashcards in Topic 1 Deck (99)
Loading flashcards...
1

A network administrator wants to implement a method of securing internal routing. Which of the following
should the administrator implement?

DMZ
NAT
VPN
PAT

VPN

2

Malicious traffic from an internal network has been detected on an unauthorized port on an application server.
Which of the following network-based security controls should the engineer consider implementing?

ACLs
HIPS
NAT
MAC filtering

ACLs

3

Which of the following is an important step to take BEFORE moving any installation packages from a test
environment to production?

Roll back changes in the test environment
Verify the hashes of files
Archive and compress the files
Update the secure baseline

Verify the hashes of files

4

When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?

Owner
System
Administrator
User

Administrator

5

A company wants to host a publicity available server that performs the following functions:
Evaluates MX record lookup
Can perform authenticated requests for A and AAA records
Uses RRSIG
Which of the following should the company use to fulfill the above requirements?

LDAPS
DNSSEC
SFTP
nslookup
dig

DNSSEC

6

A penetration tester is crawling a target website that is available to the public. Which of the following
represents the actions the penetration tester is performing?
URL hijacking
Reconnaissance
White box testing
Escalation of privilege

Reconnaissance

7

In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?

Using salt
Using hash algorithms
Implementing elliptical curve
Implementing PKI

Using Salt

8

A company is terminating an employee for misbehavior. Which of the following steps is MOST important in
the process of disengagement from this employee?

Obtain a list of passwords used by the employee.
Generate a report on outstanding projects the employee handled.
Have the employee surrender company identification.
Have the employee sign an NDA before departing

Have an employee surrender company identification

9

An employer requires that employees use a key-generating app on their smartphones to log into corporate
applications. In terms of authentication of an individual, this type of access policy is BEST defined as:

Something you have.
Something you know.
Something you do.
Something you are.

Something you have

10

A user suspects someone has been accessing a home network without permission by spoofing the MAC
address of an authorized system. While attempting to determine if an authorized user is logged into the home
network, the user reviews the wireless router, which shows the following table for systems that are currently
on the home network.
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
A. Apply MAC filtering and see if the router drops any of the systems.
B. Physically check each of the authorized systems to determine if they are logged onto the network.
C. Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this
host.
D. Conduct a ping sweep of each of the authorized systems and see if an echo response is received.

Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this
host.

11

A company is developing a new secure technology and requires computers being used for development to be
isolated. Which of the following should be implemented to provide the MOST secure environment?
A perimeter firewall and IDS
An air gapped computer network
A honeypot residing in a DMZ
An ad hoc network with NAT
A bastion host

An air gapped computer network

12

A security administrator has found a hash in the environment known to belong to malware. The administrator
then finds this file to be in in the preupdate area of the OS, which indicates it was pushed from the central
patch system.
File: winx86_adobe_flash_upgrade.exe
Hash: 99ac28bede43ab869b853ba62c4ea243
The administrator pulls a report from the patch management system with the following output:
Given the above outputs, which of the following MOST likely happened?

The file was corrupted after it left the patch system.
The file was infected when the patch manager downloaded it.
The file was not approved in the application whitelist system.
The file was embedded with a logic bomb to evade detection

The file was embedded with a logic bomb to evade detection.

13

Which of the following encryption methods does PKI typically use to securely project keys?

Elliptic curve
Digital signatures
Asymmetric
Obfuscation

Asymmetric

14

An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission
of the OCSP will impact network performance. Which of the following should the security analyst recommend
is lieu of an OCSP?

CSR
CRL
CA
OID

CRL

15

A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the
domain controller, the systems administrator needs to provide the domain administrator credentials. Which of
the following account types is the systems administrator using?

Shared account
Guest account
Service account
User account

Service account

16

When identifying a company’s most valuable assets as part of a BIA, which of the following should be the
FIRST priority?

Life
Intellectual property
Sensitive data
Public reputation

Life

17

A security analyst is reviewing the following output from an IPS:
Given this output, which of the following can be concluded? (Select two.)
The source IP of the attack is coming from 250.19.18.22.
The source IP of the attack is coming from 250.19.18.71.
The attacker sent a malformed IGAP packet, triggering the alert.
The attacker sent a malformed TCP packet, triggering the alert.
The TTL value is outside of the expected range, triggering the alert.

The source IP of the attack is coming from 250.19.18.71

and

The attacker sent a malformed IGAP packet, triggering the alert.

18

Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a
free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were
unable to find the application in the app stores. Which of the following allowed Joe to install the application?
(Select two.)

Near-field communication
Rooting/jailbreaking
Ad-hoc connections
Tethering
Sideloading

Rooting/jailbreaking and Sideloading

19

Two users need to send each other emails over unsecured channels. The system should support the principle of
non-repudiation. Which of the following should be used to sign the user’s certificates?

RA
CA
CRL
CSR

CA

20

A company is currently using the following configuration:
IAS server with certificate-based EAP-PEAP and MSCHAP
Unencrypted authentication via PAP
A security administrator needs to configure a new wireless setup with the following configurations:
PAP authentication method
PEAP and EAP provide two-factor authentication
Which of the following forms of authentication are being used? (Select two.)
PAP
PEAP
MSCHAP
PEAP- MSCHAP
EAP
EAP-PEAP

PAP and MSCHAP

21

A company determines that it is prohibitively expensive to become compliant with new credit card regulations.
Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the
following is the company doing?

Transferring the risk
Accepting the risk
Avoiding the risk
Migrating the risk

Transferring the risk

22

Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML
iframe with JavaScript code via a web browser?
Buffer overflow
MITM
XSS
SQLi

XSS

23

A system administrator wants to provide for and enforce wireless access accountability during events where
external speakers are invited to make presentations to a mixed audience of employees and non-employees.

Which of the following should the administrator implement?
Shared accounts
Preshared passwords
Least privilege
Sponsored guest

Sponsored Guest

24

Which of the following cryptographic attacks would salting of passwords render ineffective?

Brute force
Dictionary
Rainbow tables
Birthday

Rainbow tables

25

An organization's file server has been virtualized to reduce costs. Which of the following types of backups
would be MOST appropriate for the particular file server?
Snapshot
Full
Incremental
Differential

Incremental

26

A wireless network uses a RADIUS server that is connected to an authenticator, which in turn connects to a
supplicant. Which of the following represents the authentication architecture in use?

Open systems authentication
Captive portal
RADIUS federation
802.1x

802.1x

27

A manager wants to distribute a report to several other managers within the company. Some of them reside in
remote locations that are not connected to the domain but have a local server. Because there is sensitive data
within the report and the size of the report is beyond the limit of the email attachment size, emailing the report
is not an option. Which of the following protocols should be implemented to distribute the report securely?
(Select three.)
S/MIME
SSH
SNMPv3
FTPS
SRTP
HTTPS
LDAPS

SSH, FTPS, and HTTPS

28

An organization has determined it can tolerate a maximum of three hours of downtime. Which of the
following has been specified?
RTO
RPO
MTBF
MTTR

RTO (Recovery Time Objective)

29

A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS
attack. News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to
the website that crashed. To which of the following categories does the refrigerator belong?

SoC
ICS
IoT
MFD

IoT (internet of things)

30

A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a
user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers
the user is on vacation and does not have network access. Which of the following types of attacks are MOST
likely occurring? (Select two.)

Replay
Rainbow tables
Brute force
Pass the hash
Dictionary

Brute Force and Dictionary