1-50 Security plus questions Flashcards

1
Q

A company is considering implementing a BYOD policy. What is the most significant security risk to consider?

A

Possible data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security analyst observes a huge amount of ICMP echo reply (ping) traffic coming from multiple sources to a
single destination within the network. What type of attack is most likely occurring?

A

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocol is vulnerable to sniffing attacks because it transmits usernames and passwords in cleartext?

A

B. FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company has a policy that requires all mobile devices to be encrypted. What is the primary purpose of this
policy?

A

To prevent data loss if a device is physically lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cybersecurity analyst is reviewing a series of failed login attempts on the company’s user portal. The attempts
appear to be using common usernames and passwords. Which type of attack is most likely being attempted?

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following symmetric encryption algorithms is considered to be the most secure?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a rootkit primarily target?

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cybersecurity analyst has discovered that an attacker has been moving laterally within the network. What is
the BEST next step?

A

Contain the compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is considered an example of a technical control?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company has implemented a system to centralize the management of user credentials. What is this system
known as?

A

Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary purpose of a Web Application Firewall (WAF)?

A

Protect against SQL injection and XSS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main difference between a worm and a virus?

A

A virus requires user action to spread, while a worm can spread by itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a type of public key infrastructure (PKI) attack where the attacker redirects the user to
a malicious website that appears to be legitimate?

A

Pharming attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system administrator finds a file on a user’s desktop that appears to contain a list of passwords for various
company systems. What type of attack has likely occurred?

A

Credential harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company has implemented a system that uses a single secure private key to encrypt and decrypt messages.
What type of encryption system is this?

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A security analyst is examining logs and notices a large number of HTTP GET and POST requests from an IP
address that doesn’t belong to the company. What type of attack is likely occurring?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A DDoS attack is overwhelming the company’s website. Which of the following would be the most effective way
to mitigate this attack?

A

Implement rate limiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary purpose of a VLAN?

A

To separate network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is a risk associated with cloud computing?

A

Vendor lock-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An employee receives an email that appears to be from the CEO asking for sensitive company information. What
type of attack is this an example of?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which form of authentication is based on something the user has?

A

Security token

22
Q

Which of the following is the most critical step in responding to a security incident?

A

Documenting the incident

23
Q

Which of the following is NOT a characteristic of a zero-day vulnerability?

A

It is easy to detect

24
Q

Which technology is used to separate a physical server into multiple virtual servers?

A

Hypervisor

25
Q

Which of the following is a security advantage of using a virtual private network (VPN)?

A

It encrypts data in transit

26
Q

A security analyst has detected an anomaly in network traffic. Which tool would be best suited to further
investigate this issue?

A
27
Q

Which type of malware requires a host program to spread?

A

Trojan

28
Q

What is the main benefit of a stateful firewall over a stateless firewall?

A

It can filter traffic based on the state of the connection

29
Q

A company is considering outsourcing its email services to a cloud provider. What type of cloud service model is
it considering?

A

Software as a Service (SaaS)

30
Q

Which type of security testing involves the tester having full knowledge of the system being tested?

A

White box testing

31
Q

A company has implemented a policy that requires all employees to use a smart card and a PIN to access the
corporate network. What type of authentication method is this?

A

Multifactor authentication

32
Q

Which of the following is a characteristic of a rainbow table attack?

A

It uses precomputed hashes to crack passwords

33
Q

What is the primary purpose of a security incident response plan?

A

To define the steps to take in response to a security incident

34
Q

What is the primary purpose of a Certificate Authority (CA) in a Public Key Infrastructure (PKI)?

A

To issue digital certificates

35
Q

A security analyst is investigating a potential security incident and notices a large amount of data being
transferred from a company server to an unknown IP address. What type of threat is most likely being
encountered?

A

Data exfiltration

36
Q

Which of the following is a characteristic of a full backup?

A

It backs up all data and marks each file as being backed up

37
Q

A company is developing a new web application and wants to ensure it is secure. Which of the following would
be the BEST approach?

A

Conduct a penetration test

38
Q

A company has suffered a data breach and the investigation revealed that an insider was responsible. What type
of threat does this represent?

A

Insider threat

39
Q

Which of the following is a security disadvantage of using peer-to-peer (P2P) networks?

A

They can be used to distribute malware

40
Q

Which of the following is a critical step in the patch management process?

A

Test patches before deployment

41
Q

Which of the following is an example of a physical security control?

A
42
Q

A security analyst is conducting a penetration test and has gained access to a system. The analyst now wants to
ensure they maintain access to the system, even if the system is rebooted. What technique should the analyst
use?

A

Implementing a backdoor

43
Q

Which of the following is a benefit of using a Host-based Intrusion Detection System (HIDS) over a Networkbased
Intrusion Detection System (NIDS)?

A

It can detect attacks that a NIDS cannot, such as attacks that occur within encrypted traffic

44
Q

A company is planning to implement a system that will require users to provide two forms of identification from
different categories (something they know, something they have, something they are). What type of
authentication is this?

A

Multifactor authentication

45
Q

Which of the following is the most secure method for securely disposing of SSD drives?

A

Physical destruction

46
Q

A security analyst has detected a number of failed login attempts on a server from a single IP address. What type
of attack is most likely being attempted?

A

Brute force attack

47
Q

A user reports that their computer has been running slowly and they have been receiving pop-up ads while
browsing the internet. What type of malware is most likely causing these symptoms?

A

Adware

48
Q

Which of the following is an advantage of using a Security Information and Event Management (SIEM) system?

A

It provides real-time analysis of security alerts

49
Q

A company uses a secure protocol for transferring files between systems. This protocol also allows for
management and manipulation of directories on the remote system. What protocol is the company using?

A

SFTP

50
Q

What are the key concepts of the CIA triad in cybersecurity?

A

Non-repudiation
Integrity
Availability