Chapter 6 - Mitigating Security Threats Flashcards

1
Q

Which of the following actions is performed during system hardening?

A. MAC filtering
B. Disabling unnecessary services
C. Enabling port security
D. Configuring 802.1X authentication

A

B. Disabling unnecessary services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your manager has read about the need to uninstall unnecessary software and disable unnecessary services from a system. What is the purpose of performing these hardening techniques?

A

Reduce the attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A software vendor has found out about a critical vulnerability within their software product that causes a severe security risk to the system. The software vendor will ship which type of remedy that should be applied to systems immediately?

A

Hot-fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are planning a security assessment strategy for all systems and mobile devices used within the organization. When assessing mobile devices such as phones, what should you look for?

A

Ensure the phone is password protected
Updated
Remote wipe enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following security technologies involves controlling access to a wired or wireless network using a central authentication server such as RADIUS?

A. Port security
B. 802.1X
C. MAC filtering
D. Firewall

A

B. 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What feature of a network switch allows you to control which system can be physically connected to a specific network port by its MAC address?

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A new network administrator in the office has been reading about the company requirement that all systems have the initial security baseline applied. She is looking at a listing of 50 different policy settings that need to be applied and are wondering if there is an easy way to deploy the settings. What should she do?

A

Use a security template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of reporting mechanism should a system or application use to notify the administrator of an event that requires immediate attention?

A

Alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The software testing team is responsible for testing the applications by inputting invalid data into the fields of the applications. What is this called?

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your manager is worried about the security of the applications created by the in-house developers. From a security point of view, what recommendation would you make to the manager as the No. 1 rule for developers to follow?

A

Validate all data inputted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How should developers of programming languages such as .NET and Java deal with runtime errors occurring in an application?

A

Use exception handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of application attack involves the hacker inputting into a web site data that contains script code that will execute when the page is viewed by another visitor?

A

Cross-site scripting

XXS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your company has a primary DNS server at its head office and a secondary DNS server at two other offices around the word. What should you do to secure the DNS data?

A

Limit zone transfers to the IP addresses of the secondary servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following identifies a security concern with SMTP servers?

A. Relaying of messages
B. Zone transfers
C. E-mail spoofing
D. Invalid address assignment

A

A. Relaying of messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your manager would like to implement additional security measures on the DHCP server. What actions would you recommend?

A

Modify the scope to include only one address for each host on the network.

Configure an address reservation for each of the addresses in the DHCP scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your company is implementing a new web application that is designed to help track inventory of company assets. When reviewing the configuration of the application, you note that it requires users to log in to access the inventory site. What else should you look for?

A

Ensure the login credentials are encrypted

17
Q

You are reviewing the security configuration of a wireless access point. Which of the following settings should be configured on the access point to help keep wireless secure?

A. Change the admin password. 
B. Configure WEP. 
C. Configure WPA2. 
D. Disable MAC filtering. 
E. Configure DLP.
A

A. Change the admin password.

C. Configure WPA2.