Chapter 1 Security Architecture (Sybex) Flashcards
Your organization experienced a security event that led to the loss and disruption of services. You were chosen to investigate the disruption to prevent the risk of it happening again. What is this process called?
A. Incident management
B. Forensic tasks
C. Mandatory vacation
D. Job rotation
A. Incident management
Explanation:
An incident is an event that could lead to loss of, or disruption, an organizations operation, services or functions. Incident management is a term describing the activities of an organization to identify, correct and analyze to prevent a future occurrence. Forensics are performed to find artifacts in an environment. Mandatory vacations and Job Rotations are administrative controls
Brett is a new CISO, and he is evaluating different controls for availability. Which set of controls should he choose?
A. RAID 1, Classification of data and load balancing
B. Digital signatures, encryption and hashes
C. Steganography, ACLs and vulnerability management
D. Checksums, DOS attacks and RAID 0
A. RAID 1, Classification of data and load balancing
Explanation:
RAID 1 is for redundancy, the data’s level of sensitivity is classified based on importance, which is correlated to security measures and who has access, and load balancers determine which server in a pool is available and route requests to that server. The other answers do not pertain
Charles has received final documentation from a compliance audit. The report suggested his organization should implement a complementary security tool to work with the firewall to detect any attempt at scanning. Which device does Charles choose?
A. RAS
B. PBX
C. IDS
D. DDT
C. IDS
Explanation:
An IDS is used to detect against intrusion from the outside untrusted network into an internal trusted network. It can be deployed to watch behind the firewall for traffic that was successful in circumventing the firewall, as well as for activity originating from inside the trusted network. A RAS (remote access service) is a combination of hardware and software to enable remote access tools connecting a client to a host computer. A private branch exchange (PBX) is a private telephone network used in a company
Nicole is the security administrator for a large governmental agency. She has implemented port security, restricted network traffic and installed NIDS, firewalls and spam filters. She thinks the network is secure. Now she wants to focus on endpoint security. What is the most comprehensive plan for her to follow?
A. Antimalware/virus/spyware, host based firewall and MFA
B. Antivirus/spam, host based IDS and TFA
C. Antimalware/virus, host based IDS and biometrics
D. Antivirus/spam, host based IDS and SSO
A. Antimalware/virus/spyware, host based firewall and MFA
Explanation:
You want to protect your endpoints from malware, viruses and spyware. A host based firewall will prevent malicious traffic, where the IDS will only report there is an intrusion. All two factor authentication (TFA) is a MFA but not all MFA is TFA
Sally’s CISO asked her to recommend an intrusion system to recognize intrusions traversing the network and send email alerts to the IT staff when one is detected. What type of intrusion system does the CISO want?
A. HIDS
B. NIDS
C. HIPS
D. NIPS
B. NIDS
Explanation:
A network based intrusion detection system (NIDS) monitors traffic traversing the network and can alert based on observing attacks and intrusions. The alerts can come in various forms, including email and text messages
Kenneth is the CISO of an engineering organization. He asked the security department to recommend a system to be placed on business critical servers to detect and stop intrusions. Which of the following will meet the CISOs requirements?
A. HIPS
B. NIDS
C. HIDS
D. NIPS
A. HIPS
Explanation:
A host based intrusion prevention system (HIPS) is an intrusion prevention system used to detect intrusions on a host system like a server and stop those intrusions from compromising a system
Paul’s company has discovered that some of his organizations employees are using personal devices, including cell phones, within highly secure areas. The CISO wants to know which employees are violating this policy. Which of the following devices can inform the CISO who is violating this policy?
A. DLP
B. WIDS
C. NIPS
D. Firewall
B. WIDS
Explanation:
Wireless intrusion detection system (WIDS) solutions can locate and identify WiFi devices as well as Bluetooth, Bluetooth Lower Energy and devices emitting cellular signals. This means a WIDS can discover a cell phone even when the WiFi and Bluetooth are not active. Network IDSs and IPSs are looking for malicious network based activity
Tom’s company discovered that some of her organizations employees are copying corporate documents to Microsoft blob cloud drives outside the control of the company. She has been instructed to stop this practice from occurring. Which of the following can stop this practice from happening?
A. DLP
B. NIDS
C. NIPS
D. Firewall
A. DLP
Explanation:
DLP systems are designed to examine data as it moves off the host system looking for unauthorized transfers.
Troy must decide about his organizations file integrity monitoring (FIM). Standalone FIM generally means file analysis only. Another option is to integrate it with the host so that Troy can detect threats in other areas, such as memory or an I/O. For the integration, which of the following does Troy need to use?
A. HIDS
B. ADVFIM
C. NIDS
D. Change management
A. HIDS
Explanation:
Some more advanced FIM solutions are part of a host based intrusion detection system (HIDS). As a general rule, they can detect threats in other areas, not just files
Lisa is building a network intrusion detection system (NIDS). What can NIDS do with encrypted network traffic?
A. Look for viruses
B. Examine contents of email
C. Bypass VPN
D. Nothing
D. Nothing
Explanation:
Encrypted packets are not processed by most intrusion detection devices. Other potential issues with NIDSs are high speed network data overload, tuning difficulties and signature deployment lag time
What system is used to collect and analyze data logs from various network devices and to report detected security events?
A. Syslog server
B. NIPS
C. WIPS
D. SIEM Systems
D. SIEM Systems
Explanation:
A SIEM system is used to collect logs from various devices on a network and to analyze those logs, looking for security issues. Because a SIEM can review logs from various devices, it gets a holistic view of actions going on over the network, as opposed to a single appliance analyzing only traffic flowing through it.
The IT department decided to implement a security appliance in front of their web servers to inspect HTTP/HTTPS/SOAP traffic for malicious activity. Which of the following is the best solution to use?
A. Screened host firewall
B. Packet filter firewall
C. DMZ
D. WAF
D. WAF
Explanation:
A WAF is used to inspect OSI Layer 7 data for malicious activity. HTTP/HTTPS/SOAP are all web application protocols that operate at OSI Layer 7.
A security audit was conducted for your organization. It found that a computer plugged into any Ethernet port in its shipping facility was able to access network resources without authentication. You are directed to fix this security issue. Which standard, if implemented, could resolve this issue?
A. 802.1x
B. 802.3
C. 802.1q
D. 802.11
A. 802.1x
Explanation:
The 802.1x standard from IEEE provides for port-based network access control. It provides a means of authenticating devices that attempt to connect to the network. Based on authentication, the Ethernet port can be placed in the appropriate VLAN for that device. If a device does not authenticate, the port could be placed into a quarantined VLAN or configure for Internet access only
Your CISO is concerned with unauthorized network access to the corporate wireless network. You want to set a mechanism in place that not only authenticates the wireless devices but also requires them to meet a predefined corporate policy before allowing them on the network. What technology best performs this function?
A. HIDS
B. NAC
C. Software agent
D. NIPS
B. NAC
Explanation:
Not only can NAC authenticate network devices, but it can also ensure the enforcement of corporate policies governing these devices. If a system is not in compliance with the corporate policy, the device can be quarantined until such time when the policy failures are remediated
David’s security team is implementing NAC for authentication as well as corporate policy enforcement. The team wants to install software on the devices to perform these tasks. In the context of NAC, what is this software called?
A. Program
B. Process
C. Agent
D. Thread
C. Agent
Explanation:
The software installed on dev ices tha t will connect to the network using NAC is called an agent. A program is a set of instructions that allow for a certain kind of digital operation
Grace is investigating the encryption of data at rest and data in transit and trying to determine which algorithm is best in each situation. Which of the following does not contain data at rest?
A. SAN
B. NAS
C. SSD
D. VPN
D. VPN
Explanation:
Data at rest is stored on a device. A VPN contains data moving, which means in transit
Your employees need internal access while traveling to remote locations. You need a service that enables them to securely connect back to a private corporate network from a public network to log into a centralized portal. You want the traffic to be encrypted. Which of the following is the best tool?
A. WiFi
B. VPN
C. RDP
D. NIC
B. VPN
Explanation:
A virtual private network (VPN) enables employees to access sensitive data and systems on mobile devices while away from the secure corporate network.
Roberts employees complain that when they connect to the network through the VPN, they cannot view their social media posts and pictures. What most likely has been implemented?
A. Split tunnels
B. DNS tunneling
C. ARP cache
D. Full tunnels
D. Full tunnels
Explanation:
In a full tunnel, all network traffic is forced to go through the VPN. Depending on how its configured, you may only have access to the internal network while the VPN is active. Split VPN tunnels only partially encrypt traffic
Robin’s company is merging with another healthcare organization. The stakeholders are discussing the security aspects of combining digital communications. The main agreed upon criterion for compliance and security is protecting the sharing of the business’s domains. What is the best option for this organization?
A. DNSSEC
B. TLS
C. SSL 2.0
D. Keeping both entities separate
A. DNSSEC
Explanation:
DNSSEC strengthens authentication using digital signatures based on public/private key cryptography. With DNSSEC, you have data origin authentication as well as data integrity
You are a network security administrator for a SOHO. Your staff tends to work from coffee shops without understanding the need for a VPN. You must show them why this can be dangerous. What network traffic packets are commonly captured and used in a replay attack?
A. Packet headers
B. Authentication
C. FTP
D. DNS
B. Authentication
Explanation:
Authentication traffic is the most commonly captured and reused network traffic used in a replay attack. If an attacker is able to replay the stream of authentication packets correctly, they gain access to the same systems as the original user
Sally needs to implement a network security device at the border of her corporate network and the Internet. This device filters network traffic based on source and destination IP addresses, source and destination port numbers and protocols. Which network security device best suits her needs?
A. Packet filter firewall
B. Proxy server
C. HSM
D. DMZ
A. Packet filter firewall
Explanation:
A packet filter firewall inspects packets traversing the network and allows you to control the traffic based on source and destination IP, source and destination port and the protocol utilized for communication. A proxy server is a server application or appliance that acts as an intermediary for requests from client machines looking for resources.
The IT security department was tasked with recommending a single security device that can perform various security functions. The security functions include antivirus protection, antispyware, a firewall and an IDP. What device should the IT security department recommend?
A. Next generation firewall
B. Unified threat management system
C. Quantum proxy
D. Next generation IDP
B. Unified threat management system
Explanation:
A unified threat management (UTM) system is a single device that provides multiple security functions, including antivirus protection, antispyware, a firewall and an IDP. A concern with using a UTM is that it could become a single point of failure.
One of your network administrators reports that they cannot connect to a device on the local network using its IP address. The device is up and running with an IP address of 10.0.0.5. Other hots can communicate with the device. The default gateway is 10.0.0.1 and your local IP address is 10.0.0.3. What is the best type of scan to run to find the MAC of the offending machine?
A. ARP
B. NAT Gateway
C. IPConfig
D. IFConfig
A. ARP
Explanation:
An Address Resolution Protocol (ARP) scan is performed to learn MAC addresses. You run an ARP request to query the MAC address of a device with a known IP Address. When the ARP reply is received, you populate the ARP table, which maps the IP to a MAC.
Ronald has architected his network to hide the source of a network connection. What device has he most probably used?
A. Proxy firewall
B. Internet gateway
C. Layer 3 switch
D. Bastion host
A. Proxy firewall
Explanation:
A proxy firewall is also known as an application level gateway firewall. It is used primarily to hide the source off a network connection. This allows you to hide the true source of the traffic.
The IT group within your organization wants to filter requests between clients and their servers. They want to place a device in front of the servers’ that act as a go between for the clients and the servers. This device receives the request from clients and forwards the request to the servers. The server will reply to the request by sending the reply to the device, then the device will forward the reply to the clients. What device best meets this description?
A. Firewall
B. NIDS
C. Reverse proxy
D. Proxy
C. Reverse proxy
Explanation:
A reverse proxy performs the function mentioned in the question. As traffic intended for the servers goes through the reverse proxy, it can provide filtering of malicious traffic destined for the servers. A proxy sits in front of clients, receiving their requests and forwarding them on to the destination.
Many users within your organization clicked on emails that, while looking legitimate, are malicious. Malicious code executes once the email is opened, infecting the users system with malware. What could be implementing on the email server to help prevent such emails from reaching the end user?
A. Firewall
B. Spam filters
C. WAF
D. Forward proxy
B. Spam filters
Explanation:
Spam filters inspect and filter malicious emails before they reach the end user. A basic firewall does not examine emails for malicious content.
Your network administrator, George, reaches out to you to investigate why your ecommerce site went down twice in the past three days. Everything looks good on your network, so you reach out to your ISP. You suspect an attacker set up botnets that flood your DNS server with invalid requests. You find this out by examining your external logging service. What is this type of attack called?
A. DDoS
B. Spamming
C. IP Spoofing
D. Containerization
A. DDoS
Explanation:
A DoS attack is a single source computer system initiating the attack. A DDoS attack is much more orchestrated enlisting the help of hundreds/thousands of other source computers to completely overload the system
Aarons end users are having difficulty signing into the network. The investigation of the situation leads him to believe it is which type of attack?
A. Port scanning
B. DDoS
C. Pass the hash
D. Trojan
B. DDoS
Explanation:
DoS and DDoS are attacks that do not give unauthorized access but rather block legitimate users from access. Typically attackers generate large volumes of packets or requests, overwhelming a target system
A network engineer must configure a router on the network remotely. What protocol should be used to ensure a secure connection?
A. Telnet
B. FTP
C. HTTP
D. SSH
D. SSH
Explanation:
SSH encrypts the data being to and from the router, ensuring that if an attacker captures the traffic, the attacker cannot read it. The other protocols send traffic in clear text that can be read, if captured
Ian has joined a company that licenses a third party’s software and email service that is delivered to end users through a browser. What type of organization does Ian work for?
A. IaaS
B. SaaS
C. PaaS
D. BaaS
B. SaaS
Explanation:
SaaS providers use an Internet enabled streaming service or web application to give end users access to software that would have to be installed locally or on a server.
You are a security analyst with an enterprise global financial organization. The company just experienced an advanced persistent threat (APT) type of attack that was traced to ransomware delivered to end users via a phishing campaign. One of your IT analysts forwarded the email to the phishing@mycompany.com address. You want to rip open the ransomware to see what it does and what asset it touches. What do you build?
A. Cloud sandbox
B. A container
C. SLA
D. A hypervisor
A. Cloud sandbox
Explanation:
A sandbox is an environment that is used for opening files or running programs without interfering with production environments. It is used to test software as safe or unsafe. A cloud sandbox adds another layer of security than an on premises sandbox as it is completely separate from your corporate network
Cody configured the application programming interface (API) connection between your web application that manages retail transactions and your bank. This connection must be as secure as possible. Because the API connection will handle financial transactions, what is the best choice for securing the API if it is well designed?
A. SOAP
B. HTTPS
C. REST
D. XML
A. SOAP
Explanation:
There are two web service formats: SOAP and RREST. Simple Object Access protocol (SOAP) is used for interchanging data in a distributed environment. Representational State Transfer (REST) is an architectural style for hypermedia systems. Of the two, SOAP has extensions for specific security concerns, where as REST focuses on how to deliver and consume.
Aniket is looking for a web server to process requests sent by XML. What is the best technology to use for this?
A. REST
B. SOAP
C. Ajax
D. XSS
C. Ajax
Explanation:
Asynchronous JavaScript and XML is a pattern where web pages use web services using JavaScript and XML. It is used to create fast dynamic web pages, enabling parts of a web page to update, rather than reloading the entire page
The Cisco switch port you are using for traffic analysis and troubleshooting has a dedicated SPAN port that is an error disabled state; what is the procedure to re enable it after you enter priv exec mode?
A. Issue the no shutdown command on the error disabled interface
B. Issue the shutdown and then the no shutdown command on the error-disabled interface
C. Issue the no error command on the error disabled interface
D. Issue the no error disable command on the error-disabled interface
B. Issue the shutdown and then the no shutdown command on the error-disabled interface
Explanation:
A switched port analyzer (SPAN) port is a dedicated port on a switch that takes a mirrored copy of a network from within the switch to be sent to a destination. That destination is typically a monitoring device. The proper way to bring a switch port out of the error disabled state is to go to the interface and issue the shutdown and then the no shutdown commands.
You were asked to recommend a solution to intercept and mirror network traffic and analyze its content for malicious activity while not interacting with the host computer. Of the following, which is the best solution?
A. System scanner
B. Application scanner
C. Active vulnerability scanner
D. Passive vulnerability scanner
D. Passive vulnerability scanner
Explanation:
A passive vulnerability scanner can intercept network traffic and analyze its content for malicious activity while not interfering with the host computer. A system scanner and application scanner are both active that do interact with a host computer and because they do so, could cause a host computer to crash
One of Robert’s objectives and key results (OKRs) for the upcoming year is to modernize the IT strategy by adopting a virtual cloud and taking advantage of new features and storage. He understands that once intellectual property is in the cloud, he could have less visibility and control as a consumer. What else is a major security concern for important data stored in the public cloud versus a private cloud?
A. Cost effectiveness
B. Elastic use
C. Being on demand
D. Data remnants
D. Data remnants
Explanation:
Not only do you have the business issue of lost data by attacks or by accident, you also must consider whether the vendor van verify that your data was securely deleted on demand and that remnants of the data are not still in the cloud for others to see. The public cloud is more cost effective and utilizes elasticity to scale machines. Both public and private can deploy assets on demand, so the biggest security concern would be public data remnants.
Your news organization is dealing with a recent defacement of your website and secure web server. The server was compromised around a three day holiday weekend while most of the IT staff was not at work. The network diagram, in the order from the outside in, consists of the Internet, IDS, SSL accelerator, web server farm, internal firewall and internal network. You attempt a forensic analysis, but all the web server logs have been deleted and the internal firewall logs shows no activity. As the security administrator, what do you do?
A. Review sensor placement and examine the external firewall logs to find the attack
B. Review the IDS logs to determine the source of the attack
C. Correlate all the logs from all the devices to find where the organization was compromised
D. Reconfigure the network and put the IDs between the SSL accelerator and server farm to better determine the cause of future attacks
A. Review sensor placement and examine the external firewall logs to find the attack
Explanation:
If you place an IDS sensor somewhere in your network for intrusion detection, your end goal is important. If you want to see what threats are being aimed at your organization from the Internet, you place the IDS outside the firewall. If you want to see potentially malicious internal traffic that you have inside tthe perimeter of your network, you place the monitor between the firewall and internal LAN.
After merging with a newly acquired company, Gavin comes to work Monday morning to find a metamorphic worm from the newly acquired network spreading through the parent organization. The security administrator isolated the worm using a network traffic access point (TAP) mirroring all the new network traffic and found it spreading on TCP port 445. What does Gavin advise the administrator do to immediately minimize the attack?
A.
Jonathan is a senior architect who has submitted the budget requests to the CISO to upgrade their security landscape. One item to purchase in the new year is a SIEM. What is the primary function of a SIEM tool?
A. Blocking malicious users and traffic
B. Monitoring the network
C. Automating DNS servers
D. Monitoring servers
D. Monitoring servers
Explanation:
A SIEM monitors servers on your network, ideally providing a real time analysis of security incidents and events
Janet has critical files and intellectual property on several filesystems and needs to be alerted if these files are altered by either trusted insiders abusing their privilege or malware. What should she implement?
A. FIM
B. PCI
C. DNS
D. TCP
A. FIM
Explanation:
File integrity monitoring is a security technique used to secure IT infrastructure and business data. If an attacker or malicious insider generates changes to application files, operating system files and log files, FIM can detect these changes.
You are configuring SNMP on a Windows server. You have found that you are currently running SNMPv2c. Why would you want to upgrade to SNMPv3?
A. Cryptographic security system
B. Party based security system
C. Easier to set up
D. Support UDP
A. Cryptographic security system
Explanation:
SNMP v3 adds encryption and authentication, which can be used together or separately