• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back

Your friend has configured a wireless network in his house and configured wireless encryption to secure the network. A few days later, his neighbor told him he was able to access the wireless network. Which encryption type did your friend most likely configure.


WEP


Wired Equivalent Privacy


Which type of secure network administration principle is defined if object access auditing is enabled?


Log analysis


Access control list


Rule-based management


Loop protection

Log analysis

As a network technician within your company, one of your main tasks is to gather and analyze system and network security reports. Using these reports, you are required to collaborate with your IT team to identify system and network issues and their root cause. You must also identify areas of weakness within your network that may require additional resources to avoid future issues.


Which action can best be used to meet requirements?


Review system and network security reports for trends.


Review audit logs for trends.


Review system and network security reports for alerts.


Review system and network security reports for alarms.

Review system and network security reports for trends.


Which of the following are examples of risk mitigation strategies?


Recording time offset


Taking hashes


Permissions review


Perform a business impact analysis


Routine audits


Permissions review


Routine audits


1. Searching recycle bins


2. Accessing a secure location by following someone


3. Watching someone enter their sensitive data


4. Sending an email that appears to be from a reputable source and asking for account information


5. Targeting upper management


6. Calling someone and asking them tot update bank information


1. Dumpster Diving


2.Tailgating


3. Shoulder surfing


4. Phishing


5. Whaling


6. Vishing


Which of the following is part of the formula used to calculate risk when performing qualitative risk analysis.


Value


Probability


Exposure Factor


Occurence

Probability


Which authentication factor can use an authentication method based on information extracted from a packet header?


Something you have


Something you do


Somewhere you are


Something you are

Something you are


1. Used to limit resources an application can access; keychain


2. Used to prevent specified software from running; blacklist


3. Commonly used by endpoint security products; sandbox


4. Used to provide secure storage for login information; whitelists


5. Used to provide location-specific information; geo-tagging

1. Sandbox


2. Blacklist


3. Whitelist


4. Keychain


5. Geo-tagging

Match each event to their system log type.


1. Events received from another remote computer


2. Information about a successful operation of a driver.


3. Successful and unsuccessful logon attempts.


4. Information logged by Windows system services.


Forwarded Events log


Security Log


System Log


Application Log


1. Forwarded Events log


2. Application Log


3. Security Log


4. System log


What is the min. EAL certification recommended for commercial systems?


EAL 2


EAL 3


EAL 5


EAL 4

EAL 4


Which of the following should be referenced before creating a BYOD policy?


Acceptable Use Policy


SLA Policy


Change Management Document


Site Survey

Acceptable Use Policy


You are working on segmenting a small network to adhere to the VLAN management secure network administration principle. You would like to create four VLANs, one for each company department. If all departments need to communicate with one another, which devices would you use?


One router


One hub


Four layer 2 switches


One layer 2 switch


One router


One layer 2 switch


Your organization is required to make all decryption keys available, in the event that they are requested by law enforcement. Which of the following would best allow you to accomplish this?


Digital signatures


KDC


KRA


Key escrow

Key escrow


Which phase of the incident response process provides the greatest impact for future security incidents?


Recovery


Identification


Preparation


Reporting

Reporting


Which statement BEST describes TPM?


A physical device used to safeguard and mange digital keys.


A Windows feature that allows for control of the applications that users are allowed to access.


A set of rules that apply to port numbers or IP addresses.


A hardware chip used to store crypto

A hardware chip used to store crypto


When building a SAN what are reasons for the selection of iSCSI over Fibre Channel?


Lower implementation cost


Less resource intensive


Lower learning curve


Higher performance


Lower implementation cost


Lower learning curve


Your company uses a PKI. As a member of your local IT, team you have been tasked with implementing a method of storing keys that can be used by law enforcement to decrypt encrypted documents. What should you do to meet this requirement?


Configure a key escrow


Configure all CAs to use a CRL


Implement a PKI hierarchical trust model


Assign a recovery agent

Configure a key escrow


What is used on switches for loop prevention?


Half duplex mode


STP


VLAN


VTP

STP


Which block cipher would be considered the MOST secure?


IDEA


3DES


AES


DES


AES


Advanced Encryption Standard


When running software, which rings in the CPU privilege architecture correspond to device drivers?


0


1


3


2


1


2


You require asymmetric encryption type that can be used for encryption and digital signatures. Which encryption type should you select?


RSA


CAST


Diffie-Hellman


ECC


RSA


You are reviewing the routing table on a device as part of a security audit. Which IPv6 address would be in the table if a default route has been configured?


::1/128


::/0


::/128


201::DBA1:0:0:1


::/0


A default route is a singular route that forwards all traffic to the exit interface. This technique is used to conserve room in a routing table. The address ::/0 is the default unicast route address.


Sequence system components from the most volatile to least.


Archival Media


Hard drive


Temporary file systems


CPU cache


Physical configuration


Memory


CPU Cache


Memory


Temporary File Systems


Hard Drive


Physical Configuration


Archival Media


Match each security design goal with the statement that best describes its key obj.


1. Ensures that the data that users are working on is accurate


2. Ensures that data and security controls are all functioning whenever access is required to the information system.


3. Dictates who is responsible for a particular item.


4. Ensures that information is not disclosed to unauthorized parties.


Accountability


Integrity


Confidentiality


Availability


1. Integrity


2. Availability


3. Accountability


4. Confidentiality


You need to identify vulnerability issues. The vulnerability scanning tool that you will be using allows you to authenticate. Which type of scanning is being described?


Intrusive


Credentialed


Non-credentialed


Non-intrusive


Credentialed


You have just hired a new employee to take care of server backups. You have given the employee backup operator permissions to allow him to perform the tasks he is required to do for his position. Which principle of security did you apply?


Rotation of duties


Separation of duties


Least privilege


Due care


Least privilege


Process of only providing enough permission for the user to perform duties.


Which common vulnerability assessment tool is used to identify the services that are running on a system, open network ports, and unpatched operating systems?


Network mapper


Protocol analyzer


Port scanner


Vulnerability scanner


Vulnerability scanner


Which of the following attacks target wireless networks encrypted with WEP?


Packing sniffing


Evil twin


IV attack


War chalking


IV attack


Initialization vector attacks target wireless networks encrypted with WEP. WEP uses a 24-bit IV, and the IV changes with each transmission. Since it is only 24-bit it can be cracked easily. Once IV cracked attacker can gain access to network.

Vulnerability scans are conducted on a regular basis in attempt to detect vulnerabilities. A vulnerability assessment reports that a vulnerability exists; however, it turns out as being normal non-malicious event. What is this known as?


Mitigation


False positive


False negative


Exposure factor

False positive

You have been hired as a security consultant for a small company. Management is concerned about the security of their company web server due to some recent DoS attacks. They have asked you to provide them with specific procedures to follow to get the web server back online as quickly as possible if another attack occurs. Which of the following assist in this task?

Create incident management document

Which type of attack refers to inserting malicious code into a web browser in an attempt to get a user to unknowingly execute the code when accessing the web page?


LDAP injection


Cross-site scripting


SQL injection


XML injection

Cross-site scripting


Which of the following are the two main types of SSL VPNs?


Point to point


Transport


Portal


Tunnel


Tunnel


Portal


What can be implemented so organizations do not have to run a separate network for their LAN and one for SAN?


VLAN


FCoE


SATA


FC


FCoE


Fibre channel over Ethernet is a technology that allows FC information and normal LAN traffic to be run on same network. This saves cost and time as additional hardware and configuration is not required. The FCoE traffic is encapsulated as Ethernet frames to traverse the networks.


Your company has opened a new branch office location that will require personnel to handle sensitive corporate information. You have been tasked with implementing a deterrent technique for the branch office to securely document and store all actions taken by any personnel at any time. Costs should be kept at min.


Which deterrent technique should you implement to meet requirements.


Install a motion activated camera


Hire ten full time security guards


Deploy a CCTV environment


Hire security guard

Deploy CCTV environment


You need to use a method called key stretching that will make a weak key more secure. Which algorithms can be used for key stretching.


RSA


Bcrypt


ECC


PBKDF2


Bcrypt


PBKDF2


While testing one of your organizations applications you have discovered that a developer has left a backdoor method to gain root access to the application. As a result which of the following attacks is most likely to occur?


TCP/IP hijacking


Privilege escalation


DDoS


Spear phishing

Privilege escalation


Which of the following uses a token device consisting of an internal clock to help determine when to generate a user password?


TOTP


HOTP


CHAP


PAP

TOTP


You have implemented the use of request verification tokens associated with user sessions for a web server. Which type of attack will this help prevent?


IP spoofing


Zero-day


XSRF


Privilege escalation

XSRF


Which of the following is a form of smart card used by the U.S. federal government?


PIV


SSO


Access Card


SSL

PIV


Which key is used by asymmetric algorithms to decrypt messages?


Secret key


Private key


Session key


Public key

Private key


Process of making certain that an entity is as secure as can be is known as:


Stabilizing


Reinforcing


Hardening


Toughening

Hardening


Pete a security auditor has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to?


PAP, MSCHAPv2


CHAP, PAP


MSCHAPv2, NTLMv2


NTLM, NTLMv2

PAP, MSCHAPv2


An IT director is looking to reduce the footprint of their company's server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. Which of the following BEST describes this arrangement?


Infrastructure as a service


Storage as a service


Platform as a service


Software as a service

Infrastructure as a service


Which of the following network devices is used to analyze traffic between various network interfaces?


Proxies


Firewalls


Content inspection


Sniffers

Sniffers

Layer 7 devices used to prevent specific types of html tags are called:


a. firewalls


b. content filters


c. routers


d. NIDS

content filters


You need to install a fence around your company building as the area must be secured. Which of the following would be best solution?


an 8ft (2.4 meter) fence with barbwire strands at a 45 degree out ward facing angle.


a 12ft (3.7 meter) fence


a 10ft (3 meter) fence with barbwire strands at a 45 degree inward facing angle


a 9ft (2.7 meter) fence with barbwire strands facing up

An 8ft (2.4 meter) fence with barbwire strands at a 45 degree out ward facing angle.


Which of the following is used by a user within PKI to request a certificate from a CA?


OCSP


ACL


CPS


CSR


CSR


(Certificate Signing Request)


POP3 139


HTTP 110


NetBIOS 80


IMAP 143


NetBIOS ----- 139


POP3 ------ 110


HTTP ------ 80


IMAP ------ 143


What is used to verify security posture of an organization?


Logs and inventories


Two-tier model


Metrics


Bell-LaPadula model

Metrics


Which of the following relies on out of band key exchanges to transport keys?


Digital signatures


Symmetric algorithms


Asymmetric algorithms


Hashing algorithms

Symmetric algorithms

Which of the following is part of a security posture assessment to identify security problems and provide solutions for resolving these problems?


Initial baseline configuration


Continuous security monitoring


Remediation


Reporting


Remediation


Part of security posture assessment to not only identify security problems but also offer solution for the problem.


You have configured a firewall in your office to block external traffic from reaching the company network. Which type of access control does a firewall use?


Role-based access control


Rule-based access control


Discretionary access control


Mandatory access control

Rule-based access control


Involves creating rules on a system to determine which actions are allowed or not allowed.


You have been hired by a company as a security consultant. The company uses a customized application that references several database servers to manage client information. Users complain that multiple logins are required when using the application. Which of the following authentication methods could you recommend to resolve issue?


Kerberos


SSO


CHAP


Radius


SSO


Single Sign-on


Which of the following options is Kerberos an example of?


Implicit Deny


Access Control


Single sign-on


Trusted OS

Single Sign-on


Which of the following uses a token device consisting of an internal clock to help determine when to generate a user password?


PAP


CHAP


HOTP


TOTP

TOTP


In high-security environments it may be required to configure a PDS. Which of the following is TRUE regarding an alarmed carrier PDS?


It requires periodic inspections


It requires continuous human observation


It is located above the ceiling or below the floor


All connections should be permanently sealed

It is located above the ceiling or below the floor