601-650 Flashcards
Which of the following can only be mitigated through the use of technical controls rather that user security training?
B.
Zero-day
The security administrator is observing unusual network behavior from a workstation. The workstation is communicating with a known malicious destination over an encrypted tunnel. A full antivirus scan, with an updated antivirus definition file, does not show any signs of infection.
Which of the following has happened on the workstation?
A.
Zero-day attack
Which of the following types of application attacks would be used to identify malware causing security breaches that have NOT yet been identified by any trusted sources?
A.
Zero-day
Which of the following may cause Jane, the security administrator, to seek an ACL work around?
A.
Zero-day exploit
Matt, an IT administrator, wants to protect a newly built server from zero day attacks.
Which of the following would provide the BEST level of protection?
A.
HIPS
Joe, a user, in a coffee shop is checking his email over a wireless network. An attacker records the temporary credentials being passed to Joe’s browser. The attacker later uses the credentials to impersonate Joe and creates SPAM messages.
Which of the following attacks allows for this impersonation?
D.
Session hijacking
How often, at a MINIMUM, should Sara, an administrator, review the accesses and rights of the users on her system?
A.
Annually
Which of the following types of logs could provide clues that someone has been attempting to compromise the SQL Server database?
A.
Event
Ann, the security administrator, received a report from the security technician, that an unauthorized new user account was added to the server over two weeks ago.
Which of the following could have mitigated this event?
A.
Routine log audits
A security administrator needs to determine which system a particular user is trying to login to at various times of the day.
Which of the following log types would the administrator check?
D.
Security
The security administrator is analyzing a user’s history file on a Unix server to determine if the user was attempting to break out of a rootjail.
Which of the following lines in the user’s history log shows evidence that the user attempted to escape the rootjail?
A.
cd ../../../../bin/bash
A security technician is attempting to improve the overall security posture of an internal mail server.
Which of the following actions would BEST accomplish this goal?
B.
Disabling unnecessary services
A vulnerability assessment indicates that a router can be accessed from default port 80 and default port 22.
Which of the following should be executed on the router to prevent access via these ports? (Choose two.
C.
SSH service should be disabled
D.
HTTP service should disabled
During a routine audit a web server is flagged for allowing the use of weak ciphers.
Which of the following should be disabled to mitigate this risk? (Choose two.)
A.
SSL 1.0
F.
TLS 1.0
A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389 are in a `listening’ state. No other ports are open.
Which of the following services should be disabled to ensure secure communications?
B.
HTTP
Joe analyzed the following log and determined the security team should implement which of the following as a mitigation method against further attempts?
Host 192.168.1.123
[00: 00: 01]Successful Login: 015 192.168.1.123 : local
[00: 00: 03]Unsuccessful Login: 022 214.34.56.006 : RDP 192.168.1.124
[00: 00: 04]UnSuccessful Login: 010 214.34.56.006 : RDP 192.168.1.124
[00: 00: 07]UnSuccessful Login: 007 214.34.56.006 : RDP 192.168.1.124
[00: 00: 08]UnSuccessful Login: 003 214.34.56.006 : RDP 192.168.1.124
D.
Hardening
The Chief Technology Officer (CTO) wants to improve security surrounding storage of customer passwords.
The company currently stores passwords as SHA hashes.
Which of the following can the CTO implement requiring the LEAST change to existing systems?
A.
Smart cards
An auditor’s report discovered several accounts with no activity for over 60 days. The accounts were later identified as contractors’ accounts who would be returning in three months and would need to resume the activities.
Which of the following would mitigate and secure the auditors finding?
A.
Disable unnecessary contractor accounts and inform the auditor of the update.
An administrator notices that former temporary employees’ accounts are still active on a domain.
Which of the following can be implemented to increase security and prevent this from happening?
D.
Run a last logon script to look for inactive accounts.
How must user accounts for exiting employees be handled?
A.
Disabled, regardless of the circumstances