701-750 Flashcards

1
Q

Company XYZ has encountered an increased amount of buffer overflow attacks. The programmer has been tasked to identify the issue and report any findings.

Which of the following is the FIRST step of action recommended in this scenario?

A

C.

Code Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a penetration testing method?

A

D.

Calling the target’s helpdesk, requesting a password reset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following would MOST likely involve GPS?

A

A.

Wardriving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The system administrator is reviewing the following logs from the company web server:

12: 34:56 GET /directory_listing.php?user=admin&pass=admin1
12: 34:57 GET /directory_listing.php?user=admin&pass=admin2
12: 34:58 GET /directory_listing.php?user=admin&pass=1admin
12: 34:59 GET /directory_listing.php?user=admin&pass=2admin

Which of the following is this an example of?

A

D.

Online hybrid attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A large multinational corporation with networks in 30 countries wants to establish an understanding of their overall public-facing network attack surface.

Which of the following security techniques would be BEST suited for this?

A

C.

External vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following attacks impact the availability of a system? (Choose two.)

A

A.
Smurf

D.
DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following types of technologies is used by security and research personnel for identification and analysis of new security threats in a networked environment by using false data/hosts for information collection?

A

A.

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer is found to be infected with malware and a technician re-installs the operating system. The computer remains infected with malware. This is an example of:

A

B.

a MBR infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user has plugged in a wireless router from home with default configurations into a network jack at the office. This is known as:

A

C.

a rogue access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive client files had risen far above normal.

Which of the following kind of IDS is in use?

A

D.

Anomaly based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security administrator is notified that users attached to a particular switch are having intermittent connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing attack.

Which of the following could be utilized to provide protection from this type of attack?

A

C.

Configure flood guards on the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization must implement controls to protect the confidentiality of its most sensitive data. The company is currently using a central storage system and group based access control for its sensitive information.

Which of the following controls can further secure the data in the central storage system?

A

A.

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Joe, the information security manager, is tasked with calculating risk and selecting controls to protect a new system. He has identified people, environmental conditions, and events that could affect the new system.

Which of the following does he need to estimate NEXT in order to complete his risk calculations?

A

A.

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP address in a foreign country. An investigation determines that the firewall has not been altered, and antivirus is up-to-date on the workstation.

Which of the following is the MOST likely reason for the incident?

A

D.

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security administrator must implement a network that is immune to ARP spoofing attacks.

Which of the following should be implemented to ensure that a malicious insider will not be able to successfully use ARP spoofing techniques?

A

B.

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After working on his doctoral dissertation for two years, Joe, a user, is unable to open his dissertation file. The screen shows a warning that the dissertation file is corrupted because it is infected with a backdoor, and can only be recovered by upgrading the antivirus software from the free version to the commercial version.

Which of the following types of malware is the laptop MOST likely infected with?

A

A.

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An employee connects a wireless access point to the only jack in the conference room to provide Internet access during a meeting. The access point is configured to use WPA2-TKIP. A malicious user is able to intercept clear text HTTP communication between the meeting attendees and the Internet.

Which of the following is the reason the malicious user is able to intercept and see the clear text communication?

A

C.

The malicious user is able to capture the wired communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following password attacks is MOST likely to crack the largest number of randomly generated passwords?

A

D.

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following attacks involves the use of previously captured network traffic?

A

A.

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An attacker crafts a message that appears to be from a trusted source, but in reality it redirects the recipient to a malicious site where information is harvested. The message is narrowly tailored so it is effective on only a small number of victims.

Which of the following describes this?

A

A.

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An administrator is instructed to disable IP-directed broadcasts on all routers in an organization.

Which of the following attacks does this prevent?

A

B.

Smurf

22
Q

An administrator has to determine host operating systems on the network and has deployed a transparent proxy.

Which of the following fingerprint types would this solution use?

A

D.

Passive

23
Q

An internal audit has detected that a number of archived tapes are missing from secured storage. There was no recent need for restoration of data from the missing tapes. The location is monitored by access control and CCTV systems. Review of the CCTV system indicates that it has not been recording for three months. The access control system shows numerous valid entries into the storage location during that time. The last audit was six months ago and the tapes were accounted for at that time.

Which of the following could have aided the investigation?

A

A.

Testing controls

24
Q

Methods to test the responses of software and web applications to unusual or unexpected inputs are known as:

A

D.

Fuzzing.

25
Q

Which of the following application security testing techniques is implemented when an automated system generates random input data?

A

A.

Fuzzing

26
Q

Which of the following security concepts identifies input variables which are then used to perform boundary testing?

A

D.

Fuzzing

27
Q

Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash?

A

D.

Fuzzing

28
Q

A security administrator wants to test the reliability of an application which accepts user provided parameters. The administrator is concerned with data integrity and availability.

Which of the following should be implemented to accomplish this task?

A

B.

Fuzzing

29
Q

Fuzzing is a security assessment technique that allows testers to analyze the behavior of software applications under which of the following conditions:

A

A.

Unexpected input

30
Q

Which of the following application security principles involves inputting random data into a program?

A

C.

Fuzzing

31
Q

An IT security technician is actively involved in identifying coding issues for her company.
Which of the following is an application security technique that can be used to identify unknown weaknesses within the code?

A

C.

Fuzzing

32
Q

Which of the following would Jane, an administrator, use to detect an unknown security vulnerability?

A

B.

Application fuzzing

33
Q

Which of the following pseudocodes can be used to handle program exceptions?

A
C.
If program module crashes, then restart program module.
34
Q

Which of the following is an application security coding problem?

A

A.

Error and exception handling

35
Q

Sara, an application developer, implemented error and exception handling alongside input validation.

Which of the following does this help prevent?

A

A.

Buffer overflow

36
Q

Which of the following techniques can be used to prevent the disclosure of system information resulting from arbitrary inputs when implemented properly?

A

C.

Error handling

37
Q

A program displays:

ERROR: this program has caught an exception and will now terminate.

Which of the following is MOST likely accomplished by the program’s behavior?

A

A.

Operating system’s integrity is maintained

38
Q

Which of the following is the best practice for error and exception handling?

A

A.

Log detailed exception but display generic error message

39
Q

Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?

A

D.

It should be performed on the server side.

40
Q

Which of the following is the below pseudo-code an example of?

IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT

A

B.

Input validation

41
Q

After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen:

`Please only use letters and numbers on these fields’

Which of the following is this an example of?

A

B.

Proper input validation

42
Q

In regard to secure coding practices, why is input validation important?

A

A.

It mitigates buffer overflow attacks.

43
Q

Input validation is an important security defense because it:

A

A.

rejects bad or malformed data.

44
Q

Which of the following is a common coding error in which boundary checking is not performed?

A

A.

Input validation

45
Q

One of the most consistently reported software security vulnerabilities that leads to major exploits is:

A

D.

Poor input validation.

46
Q

Without validating user input, an application becomes vulnerable to all of the following EXCEPT:

A

C.

Spear phishing.

47
Q

Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production system?

A

A.

Input validation

48
Q

The BEST methods for a web developer to prevent the website application code from being vulnerable to cross-site request forgery (XSRF) are to ____________. (Choose two.)

A

C.
validate and filter input on the server side and client side.

E.
restrict and sanitize use of special characters in input and URLs.

49
Q

After visiting a website, a user receives an email thanking them for a purchase which they did not request. Upon investigation the security administrator sees the following source code in a pop-up window:

Which of the following has MOST likely occurred?

A

C.

XSRF

50
Q

Which of the following is the BEST way to prevent Cross-Site Request Forgery (XSRF) attacks?

A

A.

Check the referrer field in the HTTP header