Chapter 6 - Mitigating Security Threats Flashcards
Which of the following actions is performed during system hardening?
A. MAC filtering
B. Disabling unnecessary services
C. Enabling port security
D. Configuring 802.1X authentication
B. Disabling unnecessary services
Your manager has read about the need to uninstall unnecessary software and disable unnecessary services from a system. What is the purpose of performing these hardening techniques?
Reduce the attack surface
A software vendor has found out about a critical vulnerability within their software product that causes a severe security risk to the system. The software vendor will ship which type of remedy that should be applied to systems immediately?
Hot-fix
You are planning a security assessment strategy for all systems and mobile devices used within the organization. When assessing mobile devices such as phones, what should you look for?
Ensure the phone is password protected
Updated
Remote wipe enabled
Which of the following security technologies involves controlling access to a wired or wireless network using a central authentication server such as RADIUS?
A. Port security
B. 802.1X
C. MAC filtering
D. Firewall
B. 802.1X
What feature of a network switch allows you to control which system can be physically connected to a specific network port by its MAC address?
MAC filtering
A new network administrator in the office has been reading about the company requirement that all systems have the initial security baseline applied. She is looking at a listing of 50 different policy settings that need to be applied and are wondering if there is an easy way to deploy the settings. What should she do?
Use a security template
What type of reporting mechanism should a system or application use to notify the administrator of an event that requires immediate attention?
Alarm
The software testing team is responsible for testing the applications by inputting invalid data into the fields of the applications. What is this called?
Fuzzing
Your manager is worried about the security of the applications created by the in-house developers. From a security point of view, what recommendation would you make to the manager as the No. 1 rule for developers to follow?
Validate all data inputted
How should developers of programming languages such as .NET and Java deal with runtime errors occurring in an application?
Use exception handling
What type of application attack involves the hacker inputting into a web site data that contains script code that will execute when the page is viewed by another visitor?
Cross-site scripting
XXS
Your company has a primary DNS server at its head office and a secondary DNS server at two other offices around the word. What should you do to secure the DNS data?
Limit zone transfers to the IP addresses of the secondary servers.
Which of the following identifies a security concern with SMTP servers?
A. Relaying of messages
B. Zone transfers
C. E-mail spoofing
D. Invalid address assignment
A. Relaying of messages
Your manager would like to implement additional security measures on the DHCP server. What actions would you recommend?
Modify the scope to include only one address for each host on the network.
Configure an address reservation for each of the addresses in the DHCP scope.