CH 3 - Security Foundations Flashcards

1
Q

To remove malware from the network before it gets to the endpoint, you would use which of the following?

A. Packer filter
B. Application layer gateway
C. Unified threat management appliance
D. Stateful firewall

A

C.
Unified threat management appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you were on a client engagement and discovered that you left an external hard drive with essential data on it at home, which security principle would you be violating?

A. Confidentiality
B. Integrity
C. Nonrepudiation
D. Availability

A

D.
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How would you calculate risk?

A. Probability * loss value
B. Probability * mitigation factor
C. (Loss value + mitigation factor) * (loss value / probability)
D. Probability * mitigation factor

A

A.
Probability * loss value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is one factor of a defense-in-depth approach to network design?

A. Switches
B. Using Linux on the desktop
C. Optical cable connections
D. Access control lists on routers

A

D.
Access control lists on routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How would you ensure that confidentiality is implemented in an organization?

A. Watchdog processes
B. Encryption
C. Cryptographic hashes
D. Web servers

A

B.
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An intrusion detection system can perform which of the following functions?

A. Block traffic
B. Filter traffic based on headers
C. Generate alerts on traffic
D. Log system messages

A

C.
Generate alerts on traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of these would be an example of a loss of integrity?

A. User making changes to a file and saving it
B. Bad blocks flagged on disk
C. Credit cards passed in cleartext
D. Memory failures causing disk drivers to run incorrectly

A

D.
Memory failures causing disk drivers to run incorrectly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What would you use a
Security Information Event Manager (SIEM) for?

A. Aggregating and Providing search for log data
B. Managing security projects
C. Escalating security events
D. Storing open source intelligence

A

A.
Aggregating and providing search for log data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is it important to store system logs remotely?

A. Local systems can’t handle it
B. Bandwidth is faster than disks
C. Attackers might delete local logs
D. It will defend against attacks

A

C.
Attackers might delete local logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What would be necessary for a TCP conversation to be considered established by a stateful firewall?

A. Final acknowledgment message
B. Three-way handshake complete
C. Sequence numbers aligned
D. SYN message received

A

B.
Three-way handshake complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a security policy?

A. To provide high-level guidance on the role of security
B. To provide specific direction to security workers
C. To increase the bottom line of a company
D. To align standards and practices

A

A.
To provide high-level guidance on the role of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What additional properties does the Parkerian Hexad offer over the CIA triad?

A. Confidentiality, awareness, authenticity
B. Utility, awareness, possession
C. Utility, possession, authenticity
D. Possession, control, authenticity

A

C.
Utility, Possession, Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What important event can be exposed by enabling auditing?

A. System shutdown
B. Service startup
C. Package installation
D. User login

A

D.
User login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can an intrusion prevention system do that an intrusion detection system can’t?

A. Generate alerts
B. Block or reject network traffic
C. Complete the three-way handshake to bogus messages
D. Log packets

A

B.
Block or reject network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these is an example of an application layer gateway?

A. Web application firewall
B. Runtime application self-protection
C. Java applet
D. Intrusion prevention system

A

A.
Web application firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which information would a packet filter use to make decisions about what traffic to allow into the network?

A. HTTP REQUEST message
B. Ethernet type
C. UDP source port
D. SNMP OID

A

C.
UDP source port

17
Q

Which of the following products might be used as an intrusion detection system?

A. Elastic Stack
B. Prewikka
C. Snort
D. Snorby

A

C.
Snort

18
Q

Which of these isn’t an example of an attack that compromises integrity?

A. Buffer overflow
B. Man in the middle
C. Heap spraying
D. Watering hole

A

D.
Watering hole

19
Q

What type of attack could lead to a direct compromise of availability?

A. Watering hole
B. DoS
C. Phishing
D. Buffer overflow

A

B.
DoS

20
Q

What important function can EDR offer to security operations staff?

A. Host isolation
B. Malware detection
C. Remote data collection
D. All of the above

A

D.
All of the above

21
Q

Which type of security control is a firewall?

A. Administrative
B. Physical
C. Technical
D. Corrective

A

C.
Technical

22
Q

Management has been informed of a risk to PII data that results from an application being developed and managed by the company. They have chosen not to do anything with the risk. What risk management approach have they taken?

A. Risk transference
B. Risk avoidance
C. Risk mitigation
D. Risk acceptance

A

D.
Risk Acceptance

23
Q

You’ve been asked to implement a set of standards to support a policy. What type of security control are you developing?

A. Administrative
B. Corrective
C. Logical
D. Functional

A

A.
Administrative

24
Q

Your risk management team has asked for a technical control that could mitigate the risk that may be associated with insider threat. Which of these controls would work for that?

A. Security policy
B. Identity and access management (IAM) solution
C. Security standards
D. Host-based firewall

A

B.
Identity and access management (IAM) solution

25
Q

An attacker has registered the domain name facebookmailings.com which will be used to send phishing messages out. Which of the MITRE ATT&CK Framework categories would that fall into?

A. Initial access
B. Lateral movement
C. Credential access
D. Resource development

A

D.
Resource development