1-50 Security plus questions Flashcards

(50 cards)

1
Q

A company is considering implementing a BYOD policy. What is the most significant security risk to consider?

A

Possible data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security analyst observes a huge amount of ICMP echo reply (ping) traffic coming from multiple sources to a
single destination within the network. What type of attack is most likely occurring?

A

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocol is vulnerable to sniffing attacks because it transmits usernames and passwords in cleartext?

A

B. FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company has a policy that requires all mobile devices to be encrypted. What is the primary purpose of this
policy?

A

To prevent data loss if a device is physically lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cybersecurity analyst is reviewing a series of failed login attempts on the company’s user portal. The attempts
appear to be using common usernames and passwords. Which type of attack is most likely being attempted?

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following symmetric encryption algorithms is considered to be the most secure?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a rootkit primarily target?

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A cybersecurity analyst has discovered that an attacker has been moving laterally within the network. What is
the BEST next step?

A

Contain the compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is considered an example of a technical control?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company has implemented a system to centralize the management of user credentials. What is this system
known as?

A

Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary purpose of a Web Application Firewall (WAF)?

A

Protect against SQL injection and XSS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main difference between a worm and a virus?

A

A virus requires user action to spread, while a worm can spread by itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a type of public key infrastructure (PKI) attack where the attacker redirects the user to
a malicious website that appears to be legitimate?

A

Pharming attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system administrator finds a file on a user’s desktop that appears to contain a list of passwords for various
company systems. What type of attack has likely occurred?

A

Credential harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company has implemented a system that uses a single secure private key to encrypt and decrypt messages.
What type of encryption system is this?

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A security analyst is examining logs and notices a large number of HTTP GET and POST requests from an IP
address that doesn’t belong to the company. What type of attack is likely occurring?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A DDoS attack is overwhelming the company’s website. Which of the following would be the most effective way
to mitigate this attack?

A

Implement rate limiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary purpose of a VLAN?

A

To separate network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is a risk associated with cloud computing?

A

Vendor lock-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An employee receives an email that appears to be from the CEO asking for sensitive company information. What
type of attack is this an example of?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which form of authentication is based on something the user has?

A

Security token

22
Q

Which of the following is the most critical step in responding to a security incident?

A

Documenting the incident

23
Q

Which of the following is NOT a characteristic of a zero-day vulnerability?

A

It is easy to detect

24
Q

Which technology is used to separate a physical server into multiple virtual servers?

25
Which of the following is a security advantage of using a virtual private network (VPN)?
It encrypts data in transit
26
A security analyst has detected an anomaly in network traffic. Which tool would be best suited to further investigate this issue?
27
Which type of malware requires a host program to spread?
Trojan
28
What is the main benefit of a stateful firewall over a stateless firewall?
It can filter traffic based on the state of the connection
29
A company is considering outsourcing its email services to a cloud provider. What type of cloud service model is it considering?
Software as a Service (SaaS)
30
Which type of security testing involves the tester having full knowledge of the system being tested?
White box testing
31
A company has implemented a policy that requires all employees to use a smart card and a PIN to access the corporate network. What type of authentication method is this?
Multifactor authentication
32
Which of the following is a characteristic of a rainbow table attack?
It uses precomputed hashes to crack passwords
33
What is the primary purpose of a security incident response plan?
To define the steps to take in response to a security incident
34
What is the primary purpose of a Certificate Authority (CA) in a Public Key Infrastructure (PKI)?
To issue digital certificates
35
A security analyst is investigating a potential security incident and notices a large amount of data being transferred from a company server to an unknown IP address. What type of threat is most likely being encountered?
Data exfiltration
36
Which of the following is a characteristic of a full backup?
It backs up all data and marks each file as being backed up
37
A company is developing a new web application and wants to ensure it is secure. Which of the following would be the BEST approach?
Conduct a penetration test
38
A company has suffered a data breach and the investigation revealed that an insider was responsible. What type of threat does this represent?
Insider threat
39
Which of the following is a security disadvantage of using peer-to-peer (P2P) networks?
They can be used to distribute malware
40
Which of the following is a critical step in the patch management process?
Test patches before deployment
41
Which of the following is an example of a physical security control?
42
A security analyst is conducting a penetration test and has gained access to a system. The analyst now wants to ensure they maintain access to the system, even if the system is rebooted. What technique should the analyst use?
Implementing a backdoor
43
Which of the following is a benefit of using a Host-based Intrusion Detection System (HIDS) over a Networkbased Intrusion Detection System (NIDS)?
It can detect attacks that a NIDS cannot, such as attacks that occur within encrypted traffic
44
A company is planning to implement a system that will require users to provide two forms of identification from different categories (something they know, something they have, something they are). What type of authentication is this?
Multifactor authentication
45
Which of the following is the most secure method for securely disposing of SSD drives?
Physical destruction
46
A security analyst has detected a number of failed login attempts on a server from a single IP address. What type of attack is most likely being attempted?
Brute force attack
47
A user reports that their computer has been running slowly and they have been receiving pop-up ads while browsing the internet. What type of malware is most likely causing these symptoms?
Adware
48
Which of the following is an advantage of using a Security Information and Event Management (SIEM) system?
It provides real-time analysis of security alerts
49
A company uses a secure protocol for transferring files between systems. This protocol also allows for management and manipulation of directories on the remote system. What protocol is the company using?
SFTP
50
What are the key concepts of the CIA triad in cybersecurity?
Non-repudiation Integrity Availability