Chapter 3 (Sybex) Flashcards
You decided to start a new consulting business. You began the risk analysis process and developed employee policies and research and test third party security. What is the riskiest problem for SOHO?
A. Mobile devices
B. Email
C. Training
D. Guidelines
A. Mobile devices
Explanation:
Mobile devices present the weakest security link. Every mobile device represents a potential vector of compromise by attackers. Even with passwords, facial recognition, thumbprint scanners, and remote wipe capabilities, BYOD remains a vulnerability for many organizations.
A new program that you are in charge of requires replacing legacy hardware and software. These applications will touch three major operational systems in the company. You establish security requirements and engage with the infrastructure and networking. What is your next step?
A. Document all requirements, both technical and non technical
B. Organize a tabletop exercise with all the technical personnel.
C. Communicate the security requirements with all stakeholders
D. Meet with database and application consultants for migration advice
C. Communicate the security requirements with all stakeholders
Explanation:
After you have established security requirements when replacing legacy equipment, those requirements need to be escalated and communicated to all stakeholders in the project
You are helping develop a security awareness policy that focuses on social engineering and email safety. You are working on a section that helps employees avoid malware downloads via phishing. What would not be beneficial in this policy?
A. Not using public WiFi on mobile devices
B. Using antimalware and anti phishing software
C. Using digital certificates
D. Not sharing personal information in email?
A. Not using public WiFi on mobile devices
Explanation:
Public Wifi can be dangerous if not used correctly, but it would not be as important in this policy making situation. Public WiFi rules and guidelines would belong in your Internet usage policy
You are in a large scale enterprise organization, and your IT administrators do not have time to manually distribute certificates to mobile devices. What is the best protocol to use?
A. MDM
B. ICMP
C. RDP
D. SCEP
D. SCEP
Explanation:
The Simple Certificate Enrollment Protocol (SCEP) is a standard protocol used for certificates. It is mostly used for certificate based authentication where access to WiFi, VPN and email is deployed using certificates. Advantages are no intervention by users and secure encrypted network communication
Your staff wants to use Bluetooth on their networked mobile devices, and you were asked to be the Bluetooth administrator. What type of network are you implementing?
A. MAN
B. LAN
C. WLAN
D. PAN
D. PAN
Explanation:
Bluetooth is described as a personal area network (PAN). A PAN is used to create a network to connect and share data with devices that are close together. A network of a PC, a phone, printer and wireless headphones would be a PAN. A MAN is a metropolitan area network, a LAN is local, and a WLAN is a wireless
You work for a university and are monitoring your dedicated faculty wireless network. You have configured WiFi profiles to deploy wireless network settings to users in your organization, but you still see many unauthorized mobile devices connected to the network. Malicious activity has been reported. Your IT security manager suggested adding contextual authentication. Which of the following falls in that category?
A. GPS
B. IDS
C. MAC Filtering
D. Bluetooth
A. GPS
Explanation: A common contextual authentication method is using a geographic location or the time of day. If a professor typically accesses their account during their planning period while in a certain location like their office or classroom, any login attempt that falls outside those parameters will fail
Some employees were issued NFC capable corporate phones. As part of the security department, you are tasked with recommending how to use these devices securely. Which answer should be included in your recommendation?
A. Keeping patches up to date
B. Turning off pairing mode
C. Turning off discovery mode
D. Turning on NFC when not in use
A. Keeping patches up to date
Explanation:
Keeping your near field communication capable device up to date and off when not in use are two recommendations that should be mentioned. Like most things in cyber; if you do not need it, turn it off to shrink your attack surface
You are employed in a high risk geographically diverse production environment. Which of these options would best reason to deploy link encryption to reduce risk?
A. Link encryption provides better flow confidentiality and routing
B. Link encryption encrypts routing information and is often used with satellite communication
C. Link encryption is used for message confidentiality
D. Link encryption is implemented for better traffic integrity
A. Link encryption provides better flow confidentiality and routing
Explanation:
Link encryption is a way to secure your data by encryption the information at the Data Link layer as it is transmitted between two points
Instead of having salespeople travel back to the corporate office to upload customer information and to download a new electronic marketing materials, upper management tasked the IT department with recommending a secure but simple to use solution. This solution should enable the salespeople to remain in the field but utilize internet access to transfer the necessary information to and from the corporate office. All salespeople are familiar with using a web browser. What solution best suites this need?
A. A VPN solution using SSL/TLS via a web browser
B. A VPN solution using an application solution with IPSec
C. A VPN solution using a web browser with WAF
D. A VPN solution using an application solution with HIDS
A. A VPN solution using SSL/TLS via a web browser
Explanation:
A VPN using SSL/TLS via a web browser is likely the best solution. It provides secure communication with the corporate office as well as ease of use because it uses a web browser interface
You were tasked with choosing the correct encryption for your mobile device management program. Which asymmetric encryption algorithm is best suited for mobile devices?
A. AES
B. ECC
C. IDEA
D. Serpent
B. ECC
Explanation:
The Elliptic Curve Cryptography (ECC) algorithm is ideal for mobile devices because it requires less computational power to calculate yet is considered very secure. AES encryption is commonly used in wireless security, processor security, file encryption and SSL/TLS. IDEA was used in Pretty Good Privacy (PGP) v2.0 and Serpent encryption was a runner up to AES but has not been patented
You deployed containers to bundle and run applications in your production environment. You need a way to manage the containers and to ensure that there is no downtime. If one container goes down, another one needs to spin up. Which technology will allow you to not spin up machines manually in case of a failure?
A. Kubernetes
B. Instantiation
C. Rollback
D. Tiagra
A. Kubernetes
Explanation:
Kubernetes provides a framework to run resilient distributed systems. It takes care of scaling systems, failovers and load balancing and it can even be configured to kill containers that fail a health check
A governmental agency purchases new computers for its employees and wants to ensure that the computers boot loader process is protected from rootkits loading during startup. What protection mechanism requires UEFIs Secure Boot Process and TPM encryption to work together to ensure that an OS is allowed to load and to specify which parts of the process are allowed to execute?
A. Early Launch Antimalware
B. Integrity Measurement Architecture
C. Measured Launch
D. Attestation Services
C. Measured Launch
Explanation:
Measured Launch is a boot loader protection mechanism and relies on UEFIs Secure Boot and TPM encryption to ensure that an OS is allowed to load and specify which parts are allowed to execute. It is sometimes referred to as a measured boot
As a security engineer, you discovered that some of your computers are still using BIOS for hardware initialization. What security feature is missing from BIOS that is available using UEFI?
A. Loads boot loader
B. Setting system clock
C. Secure boot
D. Initializes system hardware components
C. Secure boot
Explanation:
Secure Boot is a security feature available in Unified Extensible Firmware Interface (UEFI). It only allows OS boot loaders certified by the software vendor
A company outsources payroll and is concerned about whether the right technical and legal agreement needs to be set in place about the data. Which type of interoperability agreement can you use to make sure the data is encrypted while in transit and at rest?
A. BPA
B. MOU
C. ISA
D. NDA
C. ISA
Explanation:
An interconnection security agreement (ISA) specifically identifies the technical requirements for secure connections (NIDS or NIPS) and ensures that the data is encrypted properly. A BPA is a business partnership agreement and an MOU is a memorandum of understanding between two parties that need to work together. An NDA is a nondisclosure agreement or confidentiality that is signed by two parties and outlines confidential material, or information that the parties need to share with each other.
You travel a great deal for work. What tool would you use to find a hidden infrared camera in your hotel room?
A. Fuzzer
B. Metal detector
C. Tethering
D. Smartphone
D. Smartphone
Explanation:
Smartphones today have very advanced technology, including system on a chip (SOC) embedded architecture. A SOC can include a primary CPR, graphics processor, flash memory, and voltage regulator. The cameras on modern smartphones are so sophisticated that they can pick up on infrared light and the illuminating light from IR cameras
Because of your facility’s geolocation and its propensity for hurricanes, you are tasked with finding another data processor facility to provide you with a location in case of a natural disaster. You are negotiating a contract with an organization with HVAC, power, water and communication but no hardware. What kind of facility are you building?
A. PLC
B. Warm Site
C. Safety Instrumented System
D. Cold Site
D. Cold Site
Explanation:
A cold site has infrastructure only, perhaps four walls and heating/ventilation and air conditioning (HVAC). A warm site is between two buildings - a building with HVAC, running water and power and after a backup, these assets are ready to be networked and have the business up and running in a reasonable amount of time.
A PLC is an industrial computer with a high degree of reliability capable of running a program without interruption in a 24/7/365 environment and can sometimes be found in an HVAC. A Safety Instrumented System is used specifically on crittical systems. It is made up of sensors, logic solvers and control elements. The logic solver drives the control elements to the state required to provide a safe state if the inputs indicate an abnormal situation
Sarah has been added to the operations team to conduct the annual business impact analysis (BIA) evaluation with a focus on new cloud infrastructure. She has been charged with updating this document. This BIA will identify which of the following?
A. The impact of vulnerabilities to the organization
B. How best to reduce threats efficiently
C. The exposure to loss within the organization
D. How to bring about change based on the impact to operations
C. The exposure to loss within the organization
Explanation:
The BIA is a process that identifies critical functions within a business that predicts what the end results will be if there is a disruption. Potential effects includes the loss of data or backups, equipment, and revenue, loss of staff, reputational damage and other types of business losses. Business impact analysis is an important stage in developing a disaster recovery (DR) plan that will ensure operation of a company’s infrastructure and applications in case of a major outage. A comprehensive disaster recovery BIA report is one of the most crucial elements required to devise an emergency response strategy
You need a hardware solution that will provide your employees with a secure way to store digital certificates and private keys. The solution must be mobile. Which of the following options best suits your needs?
A. PKI Token
B. PKI Badge
C. Token Ring
D. RAID
A. PKI Token
Explanation:
A PKI token is a hardware device used to store digital certificates and private keys., The encryption and decryption are performed on the hardware itself.
You completed the inventory of your existing virtual web applications and must sort them in order of priority. Your list is quite long and if you do not prioritize, it will be difficult to know which application to focus on first. What would not be a category rating?
A. Normal
B. Baseline
C. Serious
D. Critical
B. Baseline
Explanation:
A critical application would be externally facing and have customer information that needs protecting. These applications would need to be managed and tested first because they would be targeted by attackers. Serious applications may be internal or external and have sensitive information. Normal applications would be at the bottom of the list and would be included in tests only after critical and serious applications are fully tested