701-750 Flashcards
Company XYZ has encountered an increased amount of buffer overflow attacks. The programmer has been tasked to identify the issue and report any findings.
Which of the following is the FIRST step of action recommended in this scenario?
C.
Code Review
Which of the following is a penetration testing method?
D.
Calling the target’s helpdesk, requesting a password reset
Which of the following would MOST likely involve GPS?
A.
Wardriving
The system administrator is reviewing the following logs from the company web server:
12: 34:56 GET /directory_listing.php?user=admin&pass=admin1
12: 34:57 GET /directory_listing.php?user=admin&pass=admin2
12: 34:58 GET /directory_listing.php?user=admin&pass=1admin
12: 34:59 GET /directory_listing.php?user=admin&pass=2admin
Which of the following is this an example of?
D.
Online hybrid attack
A large multinational corporation with networks in 30 countries wants to establish an understanding of their overall public-facing network attack surface.
Which of the following security techniques would be BEST suited for this?
C.
External vulnerability scan
Which of the following attacks impact the availability of a system? (Choose two.)
A.
Smurf
D.
DDoS
Which of the following types of technologies is used by security and research personnel for identification and analysis of new security threats in a networked environment by using false data/hosts for information collection?
A.
Honeynet
A computer is found to be infected with malware and a technician re-installs the operating system. The computer remains infected with malware. This is an example of:
B.
a MBR infection.
A user has plugged in a wireless router from home with default configurations into a network jack at the office. This is known as:
C.
a rogue access point.
Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive client files had risen far above normal.
Which of the following kind of IDS is in use?
D.
Anomaly based
A security administrator is notified that users attached to a particular switch are having intermittent connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing attack.
Which of the following could be utilized to provide protection from this type of attack?
C.
Configure flood guards on the switch.
An organization must implement controls to protect the confidentiality of its most sensitive data. The company is currently using a central storage system and group based access control for its sensitive information.
Which of the following controls can further secure the data in the central storage system?
A.
Data encryption
Joe, the information security manager, is tasked with calculating risk and selecting controls to protect a new system. He has identified people, environmental conditions, and events that could affect the new system.
Which of the following does he need to estimate NEXT in order to complete his risk calculations?
A.
Vulnerabilities
A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP address in a foreign country. An investigation determines that the firewall has not been altered, and antivirus is up-to-date on the workstation.
Which of the following is the MOST likely reason for the incident?
D.
Zero-day
A security administrator must implement a network that is immune to ARP spoofing attacks.
Which of the following should be implemented to ensure that a malicious insider will not be able to successfully use ARP spoofing techniques?
B.
IPv6
After working on his doctoral dissertation for two years, Joe, a user, is unable to open his dissertation file. The screen shows a warning that the dissertation file is corrupted because it is infected with a backdoor, and can only be recovered by upgrading the antivirus software from the free version to the commercial version.
Which of the following types of malware is the laptop MOST likely infected with?
A.
Ransomware
An employee connects a wireless access point to the only jack in the conference room to provide Internet access during a meeting. The access point is configured to use WPA2-TKIP. A malicious user is able to intercept clear text HTTP communication between the meeting attendees and the Internet.
Which of the following is the reason the malicious user is able to intercept and see the clear text communication?
C.
The malicious user is able to capture the wired communication.
Which of the following password attacks is MOST likely to crack the largest number of randomly generated passwords?
D.
Rainbow tables
Which of the following attacks involves the use of previously captured network traffic?
A.
Replay
An attacker crafts a message that appears to be from a trusted source, but in reality it redirects the recipient to a malicious site where information is harvested. The message is narrowly tailored so it is effective on only a small number of victims.
Which of the following describes this?
A.
Spear phishing