5 Flashcards
Grace recently completed a risk assessment of her organization’s exposure to data breaches and determined that there is a high level of risk related to the loss of sensitive personal information. She is considering a variety of approaches to managing this risk.
Grace’s first idea is to add a web application firewall to protect her organization against SQL injection attacks. What risk management strategy does this approach adopt?
Risk avoidance
Risk acceptance
Risk mitigation
Risk transference
Risk mitigation
Kevin recently identified a new security vulnerability and computed its CVSS base score as 6.5. Which risk category would this vulnerability fall into?
Low
Medium
High
Critical
Medium
Alaina wants to maintain chain of custody documentation and has created a form. Which of the following is not a common element on a chain of custody form?
Signature of the person transferring the item
Item identifier number
Signature of the person receiving the item
Method of transport
Method of transport
Gary wants to use secure protocols for email access for his end users. Which of the following groups of protocols should he implement to accomplish this task?
POPS, IMAPS, HTTPS
SPF, POPS, IMAPS
DMARC, DKIM, SPF
DKIM, DMARC, HTTPS
POPS, IMAPS, HTTPS
Alaina has implemented WPA2 and uses enterprise authentication for access points in infrastructure mode. What encryption protocol is her network using?
WEP
IV
TKIP
CCMP
CCMP
Glenn recently obtained a wildcard certificate for *. mydomain.com. Which one of the following domains would not be covered by this certificate?
core.mydomain.com
mydomain.com
dev.www.mydomain.com
mail.mydomain.com
dev.www.mydomain.com
Nick wants to display the ARP cache for a Windows system. What command should he run to display the cache?
arpcache -show
arp -d
showarp
arp /a
arp /a
Jim wants to view log entries that describe actions taken by applications on a CentOS Linux system. Which of the following tools can he use on the system to view those logs?
logger
tail
syslog-ng
journalctl
journalctl
Fran’s organization uses a Type I hypervisor to implement an IaaS offering that it sells to customers. Which one of the following security controls is least applicable to this environment?
The provider must maintain security patches on the hypervisor.
Customers must maintain security patches on guest operating systems.
Customers must manage security groups to mediate network access to guest operating systems.
The provider must maintain security patches on the host operating system.
The provider must maintain security patches on the host operating system.
Precompiled SQL statements that only require variables to be input are an example of what type of application security control?
Encoding data
Appropriate access controls
Parameterized queries
Input validation
Parameterized queries
Kevin discovered that his web server was being overwhelmed by traffic, causing a CPU bottleneck. Using the interface offered by his cloud service provider, he added another CPU to the server. What term best describes Kevin’s action?
Vertical scaling
Elasticity
High availability
Horizontal scaling
Vertical scaling
Olivia wants to install a host-based security package that can detect attacks against the system coming from the network, but she does not want to take the risk of blocking the attacks since she fears that she might inadvertently block legitimate traffic. What type of tool could she install that will meet this requirement?
A data loss prevention tool
A host intrusion prevention system
A host firewall
A host intrusion detection system
A host intrusion detection system
Frank is concerned about the admissibility of his forensic data. Which of the following is not an element he should be concerned about?
Whether the forensic source data has remained unaltered
Whether the forensic information includes a timestamp
Whether the evidence is relevant to the case
Whether the practices and procedures would survive review by experts
Whether the forensic information includes a timestamp
Nicole accidentally types www.smazon.com into her browser and discovers that she is directed to a different site loaded with ads and pop-ups. Which of the following is the most accurate description of the attack she has experienced?
Pharming
Typosquatting
Hosts file compromise
DNS hijacking
Typosquatting
Ryan is planning to conduct a vulnerability scan of a business-critical system using dangerous plug-ins. What would be the best approach for the initial scan?
Run the scan during business hours.
Do not run the scan to avoid disrupting the business.
Run the scan against production systems to achieve the most realistic results possible.
Run the scan in a test environment.
Run the scan in a test environment.
Lucca is prototyping an embedded system and wants to use a device that can run a full Linux operating system so that he can install and use a firewall and other security software to protect a web service he will run on it. Which of the following solutions should he use?
An FPGA
An Arduino
None of the above
A Raspberry Pi
A Raspberry Pi