1-50 Security plus questions Flashcards
A company is considering implementing a BYOD policy. What is the most significant security risk to consider?
Possible data leakage
A security analyst observes a huge amount of ICMP echo reply (ping) traffic coming from multiple sources to a
single destination within the network. What type of attack is most likely occurring?
Smurf attack
Which protocol is vulnerable to sniffing attacks because it transmits usernames and passwords in cleartext?
B. FTP
A company has a policy that requires all mobile devices to be encrypted. What is the primary purpose of this
policy?
To prevent data loss if a device is physically lost or stolen
A cybersecurity analyst is reviewing a series of failed login attempts on the company’s user portal. The attempts
appear to be using common usernames and passwords. Which type of attack is most likely being attempted?
Brute force attack
Which of the following symmetric encryption algorithms is considered to be the most secure?
AES
What does a rootkit primarily target?
Operating system
A cybersecurity analyst has discovered that an attacker has been moving laterally within the network. What is
the BEST next step?
Contain the compromise
Which of the following is considered an example of a technical control?
Firewall
A company has implemented a system to centralize the management of user credentials. What is this system
known as?
Identity and Access Management (IAM)
What is the primary purpose of a Web Application Firewall (WAF)?
Protect against SQL injection and XSS attacks
What is the main difference between a worm and a virus?
A virus requires user action to spread, while a worm can spread by itself
Which of the following is a type of public key infrastructure (PKI) attack where the attacker redirects the user to
a malicious website that appears to be legitimate?
Pharming attack
A system administrator finds a file on a user’s desktop that appears to contain a list of passwords for various
company systems. What type of attack has likely occurred?
Credential harvesting
A company has implemented a system that uses a single secure private key to encrypt and decrypt messages.
What type of encryption system is this?
Symmetric encryption
A security analyst is examining logs and notices a large number of HTTP GET and POST requests from an IP
address that doesn’t belong to the company. What type of attack is likely occurring?
SQL injection
A DDoS attack is overwhelming the company’s website. Which of the following would be the most effective way
to mitigate this attack?
Implement rate limiting
What is the primary purpose of a VLAN?
To separate network traffic
Which of the following is a risk associated with cloud computing?
Vendor lock-in
An employee receives an email that appears to be from the CEO asking for sensitive company information. What
type of attack is this an example of?
Whaling