Topic 1 Flashcards
A network administrator wants to implement a method of securing internal routing. Which of the following
should the administrator implement?
DMZ
NAT
VPN
PAT
VPN
Malicious traffic from an internal network has been detected on an unauthorized port on an application server.
Which of the following network-based security controls should the engineer consider implementing?
ACLs
HIPS
NAT
MAC filtering
ACLs
Which of the following is an important step to take BEFORE moving any installation packages from a test
environment to production?
Roll back changes in the test environment
Verify the hashes of files
Archive and compress the files
Update the secure baseline
Verify the hashes of files
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?
Owner
System
Administrator
User
Administrator
A company wants to host a publicity available server that performs the following functions:
Evaluates MX record lookup
Can perform authenticated requests for A and AAA records
Uses RRSIG
Which of the following should the company use to fulfill the above requirements?
LDAPS DNSSEC SFTP nslookup dig
DNSSEC
A penetration tester is crawling a target website that is available to the public. Which of the following
represents the actions the penetration tester is performing?
URL hijacking
Reconnaissance
White box testing
Escalation of privilege
Reconnaissance
In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?
Using salt
Using hash algorithms
Implementing elliptical curve
Implementing PKI
Using Salt
A company is terminating an employee for misbehavior. Which of the following steps is MOST important in
the process of disengagement from this employee?
Obtain a list of passwords used by the employee.
Generate a report on outstanding projects the employee handled.
Have the employee surrender company identification.
Have the employee sign an NDA before departing
Have an employee surrender company identification
An employer requires that employees use a key-generating app on their smartphones to log into corporate
applications. In terms of authentication of an individual, this type of access policy is BEST defined as:
Something you have.
Something you know.
Something you do.
Something you are.
Something you have
A user suspects someone has been accessing a home network without permission by spoofing the MAC
address of an authorized system. While attempting to determine if an authorized user is logged into the home
network, the user reviews the wireless router, which shows the following table for systems that are currently
on the home network.
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
A. Apply MAC filtering and see if the router drops any of the systems.
B. Physically check each of the authorized systems to determine if they are logged onto the network.
C. Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this
host.
D. Conduct a ping sweep of each of the authorized systems and see if an echo response is received.
Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this
host.
A company is developing a new secure technology and requires computers being used for development to be
isolated. Which of the following should be implemented to provide the MOST secure environment?
A perimeter firewall and IDS
An air gapped computer network
A honeypot residing in a DMZ
An ad hoc network with NAT
A bastion host
An air gapped computer network
A security administrator has found a hash in the environment known to belong to malware. The administrator
then finds this file to be in in the preupdate area of the OS, which indicates it was pushed from the central
patch system.
File: winx86_adobe_flash_upgrade.exe
Hash: 99ac28bede43ab869b853ba62c4ea243
The administrator pulls a report from the patch management system with the following output:
Given the above outputs, which of the following MOST likely happened?
The file was corrupted after it left the patch system.
The file was infected when the patch manager downloaded it.
The file was not approved in the application whitelist system.
The file was embedded with a logic bomb to evade detection
The file was embedded with a logic bomb to evade detection.
Which of the following encryption methods does PKI typically use to securely project keys?
Elliptic curve
Digital signatures
Asymmetric
Obfuscation
Asymmetric
An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission
of the OCSP will impact network performance. Which of the following should the security analyst recommend
is lieu of an OCSP?
CSR
CRL
CA
OID
CRL
A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the
domain controller, the systems administrator needs to provide the domain administrator credentials. Which of
the following account types is the systems administrator using?
Shared account
Guest account
Service account
User account
Service account
When identifying a company’s most valuable assets as part of a BIA, which of the following should be the
FIRST priority?
Life
Intellectual property
Sensitive data
Public reputation
Life
A security analyst is reviewing the following output from an IPS:
Given this output, which of the following can be concluded? (Select two.)
The source IP of the attack is coming from 250.19.18.22.
The source IP of the attack is coming from 250.19.18.71.
The attacker sent a malformed IGAP packet, triggering the alert.
The attacker sent a malformed TCP packet, triggering the alert.
The TTL value is outside of the expected range, triggering the alert.
The source IP of the attack is coming from 250.19.18.71
and
The attacker sent a malformed IGAP packet, triggering the alert.
Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a
free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were
unable to find the application in the app stores. Which of the following allowed Joe to install the application?
(Select two.)
Near-field communication Rooting/jailbreaking Ad-hoc connections Tethering Sideloading
Rooting/jailbreaking and Sideloading
Two users need to send each other emails over unsecured channels. The system should support the principle of
non-repudiation. Which of the following should be used to sign the user’s certificates?
RA
CA
CRL
CSR
CA
A company is currently using the following configuration:
IAS server with certificate-based EAP-PEAP and MSCHAP
Unencrypted authentication via PAP
A security administrator needs to configure a new wireless setup with the following configurations:
PAP authentication method
PEAP and EAP provide two-factor authentication
Which of the following forms of authentication are being used? (Select two.)
PAP
PEAP
MSCHAP
PEAP- MSCHAP
EAP
EAP-PEAP
PAP and MSCHAP
A company determines that it is prohibitively expensive to become compliant with new credit card regulations.
Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the
following is the company doing?
Transferring the risk
Accepting the risk
Avoiding the risk
Migrating the risk
Transferring the risk
Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML
iframe with JavaScript code via a web browser?
Buffer overflow
MITM
XSS
SQLi
XSS
A system administrator wants to provide for and enforce wireless access accountability during events where
external speakers are invited to make presentations to a mixed audience of employees and non-employees.
Which of the following should the administrator implement? Shared accounts Preshared passwords Least privilege Sponsored guest
Sponsored Guest
Which of the following cryptographic attacks would salting of passwords render ineffective?
Brute force
Dictionary
Rainbow tables
Birthday
Rainbow tables