701-750 Flashcards
Company XYZ has encountered an increased amount of buffer overflow attacks. The programmer has been tasked to identify the issue and report any findings.
Which of the following is the FIRST step of action recommended in this scenario?
C.
Code Review
Which of the following is a penetration testing method?
D.
Calling the target’s helpdesk, requesting a password reset
Which of the following would MOST likely involve GPS?
A.
Wardriving
The system administrator is reviewing the following logs from the company web server:
12: 34:56 GET /directory_listing.php?user=admin&pass=admin1
12: 34:57 GET /directory_listing.php?user=admin&pass=admin2
12: 34:58 GET /directory_listing.php?user=admin&pass=1admin
12: 34:59 GET /directory_listing.php?user=admin&pass=2admin
Which of the following is this an example of?
D.
Online hybrid attack
A large multinational corporation with networks in 30 countries wants to establish an understanding of their overall public-facing network attack surface.
Which of the following security techniques would be BEST suited for this?
C.
External vulnerability scan
Which of the following attacks impact the availability of a system? (Choose two.)
A.
Smurf
D.
DDoS
Which of the following types of technologies is used by security and research personnel for identification and analysis of new security threats in a networked environment by using false data/hosts for information collection?
A.
Honeynet
A computer is found to be infected with malware and a technician re-installs the operating system. The computer remains infected with malware. This is an example of:
B.
a MBR infection.
A user has plugged in a wireless router from home with default configurations into a network jack at the office. This is known as:
C.
a rogue access point.
Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive client files had risen far above normal.
Which of the following kind of IDS is in use?
D.
Anomaly based
A security administrator is notified that users attached to a particular switch are having intermittent connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing attack.
Which of the following could be utilized to provide protection from this type of attack?
C.
Configure flood guards on the switch.
An organization must implement controls to protect the confidentiality of its most sensitive data. The company is currently using a central storage system and group based access control for its sensitive information.
Which of the following controls can further secure the data in the central storage system?
A.
Data encryption
Joe, the information security manager, is tasked with calculating risk and selecting controls to protect a new system. He has identified people, environmental conditions, and events that could affect the new system.
Which of the following does he need to estimate NEXT in order to complete his risk calculations?
A.
Vulnerabilities
A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP address in a foreign country. An investigation determines that the firewall has not been altered, and antivirus is up-to-date on the workstation.
Which of the following is the MOST likely reason for the incident?
D.
Zero-day
A security administrator must implement a network that is immune to ARP spoofing attacks.
Which of the following should be implemented to ensure that a malicious insider will not be able to successfully use ARP spoofing techniques?
B.
IPv6
After working on his doctoral dissertation for two years, Joe, a user, is unable to open his dissertation file. The screen shows a warning that the dissertation file is corrupted because it is infected with a backdoor, and can only be recovered by upgrading the antivirus software from the free version to the commercial version.
Which of the following types of malware is the laptop MOST likely infected with?
A.
Ransomware
An employee connects a wireless access point to the only jack in the conference room to provide Internet access during a meeting. The access point is configured to use WPA2-TKIP. A malicious user is able to intercept clear text HTTP communication between the meeting attendees and the Internet.
Which of the following is the reason the malicious user is able to intercept and see the clear text communication?
C.
The malicious user is able to capture the wired communication.
Which of the following password attacks is MOST likely to crack the largest number of randomly generated passwords?
D.
Rainbow tables
Which of the following attacks involves the use of previously captured network traffic?
A.
Replay
An attacker crafts a message that appears to be from a trusted source, but in reality it redirects the recipient to a malicious site where information is harvested. The message is narrowly tailored so it is effective on only a small number of victims.
Which of the following describes this?
A.
Spear phishing
An administrator is instructed to disable IP-directed broadcasts on all routers in an organization.
Which of the following attacks does this prevent?
B.
Smurf
An administrator has to determine host operating systems on the network and has deployed a transparent proxy.
Which of the following fingerprint types would this solution use?
D.
Passive
An internal audit has detected that a number of archived tapes are missing from secured storage. There was no recent need for restoration of data from the missing tapes. The location is monitored by access control and CCTV systems. Review of the CCTV system indicates that it has not been recording for three months. The access control system shows numerous valid entries into the storage location during that time. The last audit was six months ago and the tapes were accounted for at that time.
Which of the following could have aided the investigation?
A.
Testing controls
Methods to test the responses of software and web applications to unusual or unexpected inputs are known as:
D.
Fuzzing.
Which of the following application security testing techniques is implemented when an automated system generates random input data?
A.
Fuzzing
Which of the following security concepts identifies input variables which are then used to perform boundary testing?
D.
Fuzzing
Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash?
D.
Fuzzing
A security administrator wants to test the reliability of an application which accepts user provided parameters. The administrator is concerned with data integrity and availability.
Which of the following should be implemented to accomplish this task?
B.
Fuzzing
Fuzzing is a security assessment technique that allows testers to analyze the behavior of software applications under which of the following conditions:
A.
Unexpected input
Which of the following application security principles involves inputting random data into a program?
C.
Fuzzing
An IT security technician is actively involved in identifying coding issues for her company.
Which of the following is an application security technique that can be used to identify unknown weaknesses within the code?
C.
Fuzzing
Which of the following would Jane, an administrator, use to detect an unknown security vulnerability?
B.
Application fuzzing
Which of the following pseudocodes can be used to handle program exceptions?
C. If program module crashes, then restart program module.
Which of the following is an application security coding problem?
A.
Error and exception handling
Sara, an application developer, implemented error and exception handling alongside input validation.
Which of the following does this help prevent?
A.
Buffer overflow
Which of the following techniques can be used to prevent the disclosure of system information resulting from arbitrary inputs when implemented properly?
C.
Error handling
A program displays:
ERROR: this program has caught an exception and will now terminate.
Which of the following is MOST likely accomplished by the program’s behavior?
A.
Operating system’s integrity is maintained
Which of the following is the best practice for error and exception handling?
A.
Log detailed exception but display generic error message
Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?
D.
It should be performed on the server side.
Which of the following is the below pseudo-code an example of?
IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT
B.
Input validation
After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:
`Please only use letters and numbers on these fields’
Which of the following is this an example of?
B.
Proper input validation
In regard to secure coding practices, why is input validation important?
A.
It mitigates buffer overflow attacks.
Input validation is an important security defense because it:
A.
rejects bad or malformed data.
Which of the following is a common coding error in which boundary checking is not performed?
A.
Input validation
One of the most consistently reported software security vulnerabilities that leads to major exploits is:
D.
Poor input validation.
Without validating user input, an application becomes vulnerable to all of the following EXCEPT:
C.
Spear phishing.
Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?
A.
Input validation
The BEST methods for a web developer to prevent the website application code from being vulnerable to cross-site request forgery (XSRF) are to ____________. (Choose two.)
C.
validate and filter input on the server side and client side.
E.
restrict and sanitize use of special characters in input and URLs.
After visiting a website, a user receives an email thanking them for a purchase which they did not request. Upon investigation the security administrator sees the following source code in a pop-up window:
Which of the following has MOST likely occurred?
C.
XSRF
Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?
A.
Check the referrer field in the HTTP header