80 Questions from Wilfredo Flashcards
An organization is moving to a new data center. Management has issued a mandate to fix some of the existing security deficiencies in the organization. The following requirements have been set by the management team: Requirement 1: the solution must be able to enforce segregation of critical system Requirement 2: the solution must be able to provide SSL inspection for our user’s web traffic Requirement 3: provide a single network entry point for external applications Requirement 4: enable availability of external networks Drag and drop the BEST security solutions to meet the above requirements
Requirement 1: VLANs Requirement 2: WAF Requirement 3: Reverse Proxy Requirement 4: Forward Proxy
Question 5 An insurance company has a number of disparate web-based applications, which include a CRM, broker portal, and policy system. Some of the applications are hosted internally on the network and other externally as SaaS. Brokers can access the solution through either a mobile, tablet, or full desktop browsers as they are constantly on the move. Broker feedback has come back with the following requirements enhancements for the next release of the solution: Requirement 1: provide limited functionality on the website using a social media account Requirement 2: provide SSO between each of the applications Requirement 3: authorize internal web services on the ESB Requirement 4: support step-up authentication for any changes to PII in the application.
Requirement 1: oAuth Requirement 2: SAML Requirement 3: WS-Federation Requirement 4: Active Director
Encryption algorithms?
DES, 3DES, AES, SEAL
Hashing algorithms?
MD5, SHA
A security administrator is seeking to establish awareness of emerging threats, and use threat information to build a robust SOC. Which of the following will BEST help the security administrator accomplish this goal? (Select THREE
A. Security conferences
B. RFI’s to industry peers
E. Threat intelligence feeds
While conducting a forensic investigation, a security engineer is asked to secure a smartphone. Based on the make and model, the engineer knows the device supports internal memory cards, wireless, and Bluetooth connections. Which of the following are the MOST suitable best practices to follow? (Select TWO) A. Secure a reliable internet connection for the device B. Pair the device with the examination laptop C. Seal the device into a faraday bag D. Provide a reliable power source to the device E. Immediately power off the device F. Detach the memory card from the device
aNSWER: B AND D
The IT department is charged with developing a solution that will enable all employees to quickly reach other employees and communicate securely amongst them in real time. The solution must implement encrypted file transfer and voice communication and must integrate with the existing email and calendaring system. Which of the following MUST the solution implement to ensure employees can make educated decisions about when to contact other employees? A. Messaging B. Presence C. Peer-to-peer D. Social Media
B. PRESENCE
A company security administrator attempts to perform a factory reset on the phone issued to a fired employee. The administrator receives an error that the device is not available. Which of the following is likely the reason why the reset failed?
A. The employee has disabled network connectivity to the phone
The online banking credentials of the Chief Executive Officer (CEO) of a research company were recently compromised. Despite the fact that banks no longer require frequent password changes, the CEO frequently changed this password. Now, because of the experience, the CEO questions the value of routine password changes at the company. Which of the following communicates the BEST approach for the company’s security policies?
C. The nature of the research company’s threat may be different from banks, so the company should consider the specific threats it needs to address.
The Chief Information Security Officer (CISO) informs the team that since the organization will sign a NDA with any potential suppliers, the most current industry evaluation should include details of tests performed by the supplier’s auditors and the associated results. Based on the requirements provided by the CISO, which of the following reports should be requested in the RFP?
B. SOC 2
An IT manager has received the following email from the Chief Information Officer (CIO): On a recent business trip, I sat next to another executive and we talked about a new teleconferencing solution that his organization had recently switched to. He said switching to it saved them lots of money and that it worked much better than their current solution and had a lot of new features. I know we utilize a solution that is hosted in-house, but I’d like you to evaluate this is a potential solution.
Based on the information above, which of the following actions should the IT manager take to collaborate within the organization and evaluate the security of a potential solution?
C. Work with the telecom manager to determine if the alternative provides an equivalent security posture compared to the existing solution, if it provides an equivalent feature set, and what the result of a cost/benefit analysis is.
The finance department for an online shopping website has discovered that a number of customers were able to purchase goods and services without any payments. Further analysis conducted by the security investigations team indicated that the website allowed customers to update a payment amount for shipping. A specially crafted value could be entered and cause a roll over, resulting in the shipping cost being subtracted from the balance and in some instances resulted in a negative balance. As a result, the system processed the negative balance as zero dollars. Which of the following BEST describes the application issue?
C. Integer overflow
A security analyst has been asked to perform a risk assessment on a human resources overflow and give a recommendation to improve the security. While performing the analysis, the security analyst finds the human resources department needs to quickly share employee information with a third-party vendor in an ongoing fashion. The human resources manager is concerned that any modification to the workflow will prevent the data from being received in time. At the end of the assessment which of the following is the BEST solution?
B. Recommend a cloud storage service for collaboration
Security architects often have to design systems for environments where different stakeholders have competing requirements. In addition to internal influences and competitors, which of the following often has a major effect on mandatory system design features?
D. D. Regulatory entities
A security engineer is analyzing security differences between commercial products. The engineer is implementing one-time password authentication schemes that are based on software or hardware tokens where the secret key is shared between the server and the token. Which of the following BEST describes the main design differences?
B. Software token devices must implement encryption techniques to emulate an equivalent security level as hardware tokens.
During a routine vulnerability assessment, the following command was successful: echo “vrfy perl –e
print “hi” x 500 ` ` “ | nc www.company.com 25 Which of the following vulnerabilities is being exploited?
A. Buffer overflow directed at a specific host MTA
A company develops a wide array of proprietary software for its clients utilizing an agile development methodology. Many of the company’s prominent products use various open source libraries. Recently, a vulnerability in an open source security library allowed malicious attackers to bypass certificate revocation lists to compromise secure data. Which of the following is BEST implemented to help prevent this in the future?
D. The company should include the open source libraries in its code review process at regular intervals during the SDLC.
A security administrator is assisting law enforcement in collecting evidence of a computer crime. The administrator has access to the latest forensics tools. The computer system being examined is still running and has not been tampered with since law enforcement arrived. The security administrator needs to collect as much information as possible before transporting the computer to a laboratory. Which of the following is the BEST order in which to proceed?
D. Image RAM, image the HDD/SSD while running the OS, copy system NVRAM, shutdown the system for transport
A bank is looking to provide a service to allow customers to view their account balances without logging into the Internet banking portal. The bank sees the benefit in reducing the number of authentication calls for low-risk, high-load transactions. The primary goal would be to improve overall performance and provide new functionality to customers. As part of the project, the bank wants to enable this access capability through mobile devices and browsers. Which of the following solutions will meet the bank’s requirements?
C. Enable an API call utilizing OAuth
A public utility company has recently seen an increase in spear phishing attacks that have occurred against targeted employees. The company is relatively small and uses manual processes to monitor such attacks. The company then receives a report that the public website has been defaced with hacktivist comments. The company cannot isolate the server, as certain components are used to process payments via the public website, but quickly remediates the defacement. Which of the following MOST likely occurred in addition to the defacement?
B. The email system was compromised