• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

During a routine security assessment of a network, the security administrator discovers a user workstation with multiple SSH connections to servers outside the corporate network. Using a protocol analyzer, the administrator identifies hundreds of gigabytes of information being transferred to an external server via SCP. After identifying the user, the administrator discovers that today is the user’s last day of employment, and that the employee is going to work for a competitor. Which of the following tactics is being used to steal company secrets?



a) Logic bomb
b) SSH worm
c) Data exfiltration
d) Privilege escalation
e) SAML exploit

c) Data exfiltration

When considering security requirements which require third party vendor requests, which of the following is a correctly ordered set of events from start to finish?



a) RFP, RFQ, RFC
b) RFI, RFQ, RFP
c) RFP, RFQ, RFI
d) RFC, RFT

b) RFI, RFQ, RFP

As a condition of being awarded a new contract, an organization must increase the security of its VPN ensuring that one compromised SA session key cannot be used to compromise any other sessions. Which of the following could be configured to meet this requirement?



a) Opportunistic encryption
b) Pseudo-random number generator
c) Dual-factor authentication
d) Perfect forward secrecy

d) Perfect forward secrecy


A new Chief Information Officer’s (CIO’s) primary initiative is to reduce risk and the number of vulnerabilities affecting an organization. Which of the following reduces the number of locations to patch internal applications?



a) Provide application access through a VDI
b) Host applications using terminal services
c) Implement an enterprise patch management solution
d) Convert applications to leverage hosted cloud computing

b) Host applications using terminal services

Which of the following practices is MOST likely employed during e-discovery?



a) Legal hold and chain of custody
b) Risk mitigation and policy generation
c) Network enumeration and fingerprinting
d) Data deduplication and hashing

a) Legal hold and chain of custody

A new system has recently been built using the SSDLC process and is in the validation process to ensure the system is behaving correctly. During this process, the development team notices that the system is behaving as it should, except for a few minor internal application bugs. Which of the following validation types would be a result of this issue?



a) Application interface validation
b) Code validation
c) Functional validation
d) Requirements validation

b) Code validation

A security administrator notices a network intrusion and quickly solves the problem by closing an unused port. Which of the following should be completed?



a) After action report
b) ELA
c) MOA
d) Reverse engineering incident report

a) After action report

A server administrator needs to find a web service that will allow most systems to communicate over HTTP using an XML based protocol. Which of the following communication methods will allow this?



a) SOAP
b) XACML
c) SSO
d) SAML

a) SOAP

An IT Manager has requested that specific files stored on the company SAN containing data which is not protected by patent law, but is classified as trade secret encrypted with a block cipher which is both secure and fast. Which of the following BEST satisfies the request?



a) Blowfish
b) MD5
c) Triple-DES
d) RC4

a) Blowfish

An administrator uses an iSCSI unencrypted connection over the corporate network. Which of the following vulnerabilities would be present in regards to iSCSI authentication?



a) Authentication uses the older TACACS protocol and is vulnerable to a botnet attack.
b) Authentication is vulnerable to a dictionary attack.
c) iSCSI uses LDAP authentication in plain text, which can be easily compromised.
d) Kerberos authentication would not be supported on Linux hosts.

b) Authentication is vulnerable to a dictionary attack.