Application Data & Host Security Flashcards
You suspect that your server has been compromised because it has been running slow and is unresponsive. Using a network analyzer, you also notice that large amounts of network data are being sent out from the server. Which of the following is the most likely cause?
A. The server has a rootkit installed.
B. The server requires an operating system update.
C. The server is infected with spyware.
D. The server is part of a botnet.
D. If your system has been infected with a worm or virus and has become part of a botnet, at certain times it may take part in distributed denial-of-service attacks on another system on the Internet and may exhibit slow responsiveness and a large amount of network data being sent out of the system.
As part of your security baselining and operating system hardening, you want to make sure you protect yourself from vulnerabilities in your operating system software. Which of the following tasks should you perform?
A. Update antivirus signature files.
B. Install any patches or OS updates.
C. Use an encrypted file system.
D. Use a host-based intrusion detection system.
B. The most recent software updates and patches for your operating system will contain the latest bug and exploit fixes. This prevents known bugs and weakness in the operating system from being exploited.
You suspect that your server has been infected with a rootkit malware program. Which of the following actions would be most effective at removing the rootkit software?
A. Install antispyware software.
B. Disable the BIOS of the computer system and
reboot.
C. Install the latest operating system update patch.
D. Reinstall the operating system.
D. The most effective way to remove a rootkit is to reinstall the operating system. Simply running antivirus or antispyware software might not remove embedded rootkit files that can be hidden from security software.
A user has brought a virus-infected laptop into the facility. It contains no antivirus protection software and hasn’t been hooked up to the network yet. What’s the best way to fix the laptop?
A. Get the laptop on the network and download antivirus software from a server.
B. Boot the laptop with an antivirus boot CD.
C. Get the laptop on the network and download antivirus software from the Internet.
D. Connect the laptop to another computer and clean it up from there.
B. If a computer is infected with a virus, do not connect it to a network or you run the risk of the virus infecting other computers and servers. Use an antivirus program on a boot CD to clean the virus off the laptop before connecting it to the network.
You are creating a standard security baseline for all users who use company mobile phones. Which of the following is the most effective security measure to protect against unauthorized access to the mobile device?
A. Enforce the use of a screen lock password.
B. Enable the GPS chip.
C. Install personal firewall software.
D. Automatically perform a daily remote wipe.
A. To prevent unauthorized access to the device in the event it is lost or stolen, you can enable a screen lock password. The user will not be able to access the device until he enters the password.
Your network has had a history of problems with users downloading software from the Internet that contains Trojan horse software with back-door access. Which of the following security mechanisms will help detect Trojan horse software activity?
A. Antispam software
B. Pop-up blocker
C. Host firewall software
D. Adware detection
C. A host-based firewall software program can detect abnormal network activity and alert the user that network connections are trying to send data outbound from your system.
A security patch for your OS was released about a week after you applied the latest operating system service pack. What should you do?
A. Wait until the release of the next full service pack.
B. Download the patch only if you experience problems with the OS.
C. Do nothing—the security patch was probably included with the service pack.
D. Download and install the security patch.
D. Even though you just installed the latest service pack, a security vulnerability might have recently been discovered, requiring that you install a new security patch. You will not be protected from the vulnerability if you do not install the security patch, and it might be too dangerous to wait for it to be included in the next service pack.
Your application firewall is indicating that some type of HTTP worm is trying to infect one of your database servers, which also seems to be running an HTTP web server on port 80. This server does not need any type of web services. What should be done?
A. Install antivirus software.
B. Change the web server to use a different port.
C. Disable the web server.
D. Update your firewall software to the latest version.
C. Any application or service that is not needed by the server should be disabled or uninstalled. Leaving services enabled, such as a web server, could make the server vulnerable to web server attacks, including HTTP-based worms.
To protect the confidentiality of web user browsing history and web site credentials, which of the following security baseline policies should you enable for all user web browsers?
A. Block third-party cookies.
B. Periodically delete the browser cache.
C. Enforce SSL.
D. Disable JavaScript.
A. Third-party cookies are typically from advertising sites not related to the specific site you are browsing. By blocking these cookies, you will protect any identifying information in your web browsing history from being leaked to third-party companies.
You have recently installed antivirus software on several client workstations and performed a full scan of the systems. One of the systems was infected with a virus less than an hour after the installation of the software. Which of the following is the most likely
issue?
A. The virus was already pre-existing on the system.
B. Antivirus signatures need to be updated.
C. The virus could only be blocked by a pop-up
blocker.
D. Operating system software was out of date.
B. Your antivirus software is installed with a default database of virus signatures. It may be several months out of date, and it is a best practice to immediately run the signature file update to make sure you are running with the latest signatures, or else it may miss detecting a newly identified virus.
Your e-mail server has been listed on a spam black list because a large amount of spam is being relayed through it. Which of the following actions should you take?
A. Enable SMTP relay.
B. Use an antispam filter.
C. Disable SMTP relay.
D. Use SMTP relay authentication.
D. By using authenticated SMTP relay, you allow only authorized mail servers and clients to connect to your e-mail server to send and relay messages
You are implementing input validation for a web application that connects to a back-end database. Which of the following techniques can you use to ensure your input validation is working properly?
A. Testing input of known valid characters
B. Fuzzing
C. Escaping out command characters
D. SQL injection
B. Fuzzing is a testing technique that enters random, unexpected character sequences into application input forms to test how well they validate input. Fuzzing makes sure that all types of input data are tested to make sure they don’t crash your application, or cause exceptions that lead to security vulnerabilities.
While testing exception handling with a web application, you encounter an error that displays a full URL path to critical data files for the application. Which of the following types of vulnerabilities would this application be susceptible to?
A. Buffer overflow
B. Session hijacking
C. Cross-site scripting
D. Directory traversal
D. Directory traversal is a vulnerability that allows an attacker who knows the details of an application server’s directory tree to manually traverse the directory using input commands in the URL location bar or input forms in the application. Error messages should never display the full paths of files to prevent hackers discovering the directory structure.
Your web application currently checks authentication credentials from a user’s web browser cookies before allowing a transaction to take place. However, you have had several complaints of identity theft and unauthorized purchases from users of your site. Which of the following is the mostly likely cause?
A. Cross-site scripting
B. Session hijacking
C. Header manipulation
D. Lack of encryption
B. Session hijacking occurs when a malicious hacker is able to access your session cookie and then use the session information to make unauthorized requests as the target user.
To protect your users while web surfing, you create a web browser configuration baseline that will be applied to all of your users in your organization. Which of the following components should you block by default?
A. Unsigned ActiveX controls
B. JavaScript
C. Search engines
D. Web browsing history
A. Although ActiveX controls are required for many web sites to run correctly, you should never allow users to download unsigned ActiveX controls. If they are not properly signed and authenticated, they are most likely malicious.