CompTIA Security+ Questions (Lesson 1-10) Flashcards
Consider the types of zones within a network’s topology and locate the zone considered semi-trusted and requires hosts to authenticate to join.
Private network
Extranet
Internet
Anonymous
Extranet
Where should an administrator place an internet-facing host on the network?
DMZ
Bastion host
Extranet
Private network
DMZ
There are several types of security zones on a network. Analyze network activities to determine which of the following does NOT represent a security zone.
DMZ
Screened host
Wireless
Guest network
Screened host
Evaluate the typical weaknesses found in network architecture and determine which statement best aligns with a security weakness.
A company has a single network channel.
A company has many different systems to operate one service.
A company has a habit of implementing quick fixes.
A company has a flat network architecture.
A company has a flat network architecture.
Evaluate the following choices based on their potential to lead to a network breach. Select the choice that is NOT a network architecture weakness.
The network architecture is flat.
Services rely on the availability of several different systems.
The network relies on a single hardware server.
Not all hosts on the network can talk to one another.
Not all hosts on the network can talk to one another.
Identify the attack that can launch by running software against the CAM table on the same switch as the target.
MAC flooding
MAC spoofing
ARP poisoning attack
LLMNR
MAC flooding
MAC flooding is a variation of an ARP poisoning attack. While ARP poisoning is directed at hosts, MAC flooding is used to attack a switch.
Given that layer 2 does not recognize Time to Live, evaluate the potential problems to determine which of the following options prevents this issue.
ICMP
L2TP
NTP
STP
STP
Analyze the available detection techniques and determine which are useful in identifying a rogue system through software management. (Select all that apply.)
Visual inspection of ports and switches will prevent rogue devices from accessing the network.
Network mapping is an easy way to reveal the use of unauthorized protocols on the network or unusual traffic volume.
Intrusion detection and NAC are security suites and appliances that combine automated network scanning with defense and remediation suites to prevent rogue devices from accessing the network.
Wireless monitoring can reveal whether there are unauthorized access points.
Intrusion detection and NAC are security suites and appliances that combine automated network scanning with defense and remediation suites to prevent rogue devices from accessing the network.
Wireless monitoring can reveal whether there are unauthorized access points.
An attacker tricks a host within a subnet into routing through an attacker’s machine, rather than the legitimate default gateway, allowing the attacker to eavesdrop on communications and perform a Man-in-the-Middle (MitM) attack. Compare the types of routing vulnerabilities and conclude what the attacker is exploiting in this scenario.
Route injection
Denial of service
ARP poisoning
Source routing
ARP poisoning
Which statement regarding attacks on media access control (MAC) addresses accurately pairs the method of protection and what type of attack it guards against? (Select all that apply.)
MAC filtering guards against MAC snooping.
Dynamic Host Configuration Protocol (DHCP) snooping guards against MAC spoofing.
MAC filtering guards against MAC spoofing.
DAI guards against invalid MAC addresses
Dynamic Host Configuration Protocol (DHCP) snooping guards against MAC spoofing.
DAI guards against invalid MAC addresses
Compare the characteristics of a rogue Access Point (AP) in wireless networks to determine which statements correctly summarize their attributes. (Select all that apply.)
An evil twin is a rogue AP, and an attacker can use a Denial of Service (DoS) to disconnect users from the legitimate AP and connect to the evil twin.
Sometimes referred to as an evil twin, a rogue AP masquerading as a legitimate AP, may have a similar name to a legitimate AP.
An attacker can set up a rogue AP with something as simple as a smartphone with tethering capabilities.
A Denial of Service (DoS) will bypass authentication security (enabled on the AP), so it is important to regularly scan for rogue APs on the network.
An evil twin is a rogue AP, and an attacker can use a Denial of Service (DoS) to disconnect users from the legitimate AP and connect to the evil twin.
Sometimes referred to as an evil twin, a rogue AP masquerading as a legitimate AP, may have a similar name to a legitimate AP.
An attacker can set up a rogue AP with something as simple as a smartphone with tethering capabilities.
A network manager suspects that a wireless network is undergoing a deauthentication attack. Applying knowledge of wireless network attacks, which scenario best supports the network manager’s suspicion?
A. A network experiences radio interference, which causes connectivity issues for users. The users disconnect from the network, and upon reauthenticating, they log on to an evil twin Access Point (AP).
B. An attacker creates an Access Point (AP) using a similar name as a legitimate AP, in an attempt to have users authenticate through the rogue AP in order to gain authentication information.
C. A rogue Access Point (AP) captures user logon attempts. The attacker uses this information to authenticate to the system and obtain critical data.
D. A group of users suddenly disconnects from the network. When the users reconnect, they actually connect to an evil twin Access Point (AP), which gives an attacker information about authentication.
D. A group of users suddenly disconnects from the network. When the users reconnect, they actually connect to an evil twin Access Point (AP), which gives an attacker information about authentication.
A systems administrator is building a wireless network using WPA3 technology. Which of the following would NOT be considered a main feature of WPA3?
Simultaneous authentication of equals
RC4 stream cipher with TKIP
Management protection frames
Enhanced open
RC4 stream cipher with TKIP
A company is reviewing the options for installing a new wireless network. They have requested recommendations for utilizing WEP, WPA, or WPA2. Differentiate between Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Determine which of the following statements accurately distinguishes between the options. (Select all that apply.)
WEP and WPA use RC4 with a Temporal Key Integrity Protocol (TKIP), while WPA2 uses a 24-bit Initialization Vector (IV). WPA2 combines the 24-bit IV with an Advanced Encryption Standard (AES) to add security.
WEP is the strongest encryption scheme, followed by WPA2, then WPA. WEP is difficult to crack when protected by a strong password, or if deploying enterprise authentication. WPA2 is more vulnerable to decryption due to replay attack possibilities.
WPA and WEP use RC4, while WEP uses a 24-bit Initialization Vector (IV). WPA uses a Temporal Key Integrity Protocol (TKIP), and WPA2 uses an Advanced Encryption Standard (AES) for encryption.
WPA2 is the strongest encryption scheme, followed by WPA, then WEP. WPA2 is difficult to crack if protected by a strong password, or if deploying enterprise authentication. WEP is more vulnerable to decryption due to replay attack possibilities.
WPA and WEP use RC4, while WEP uses a 24-bit Initialization Vector (IV). WPA uses a Temporal Key Integrity Protocol (TKIP), and WPA2 uses an Advanced Encryption Standard (AES) for encryption.
WPA2 is the strongest encryption scheme, followed by WPA, then WEP. WPA2 is difficult to crack if protected by a strong password, or if deploying enterprise authentication. WEP is more vulnerable to decryption due to replay attack possibilities.
A hotel guest opens their computer and logs into the Wi-Fi without prompting the guest for a username and password. Upon opening an internet browser, a splash page appears that requests the guest’s room number and last name for authentication. Which type of authentication is the hotel utilizing?
Protected
Extensive
Group
Open
Open
An Internet Service Provider’s (ISP) customer network is under a Distributed Denial of Service (DDoS) attack. The ISP decides to use a blackhole as a remedy. How does the ISP justify their decision?
A blackhole drops packets for the affected IP address(es) and is in a separate area of the network that does not reach any other part of the network.
A blackhole makes the attack less damaging to the ISP’s other customers and continues to send legitimate traffic to the correct destination.
A blackhole routes traffic destined to the affected IP address to a different network. Here, the ISP can analyze and identify the source of the attack, to devise rules to filter it.
A blackhole is preferred, as it evaluates each packet in a multi-gigabit stream against an Access Control List (ACL) without overwhelming the processing resources.
A blackhole drops packets for the affected IP address(es) and is in a separate area of the network that does not reach any other part of the network.
During the planning/scoping phase of the kill chain, an attacker decides that a Distributed Denial of Service (DDoS) attack would be the best way to disrupt the target website and remain anonymous. Evaluate the following explanations to determine the reason the attacker chose a DDoS attack.
A DDoS attack can launch via covert channels
DDoS attacks utilize botnets
A DDoS attack creates a backdoor to a website
DDoS attacks use impersonation
DDoS attacks utilize botnets
Given knowledge of load balancing and clustering techniques, which configuration provides consistent performance and partial fault tolerance for applications like streaming audio and video services?
Active/Passive clustering
Active/Active clustering
First in, First out (FIFO) clustering
Fault tolerant clustering
Active/Passive clustering
Which statement best describes the difference between session affinity and session persistence?
With persistence, once a client device establishes a connection, it remains with the node that first accepted its request, while an application-layer load balancer uses session affinity to keep a client connected by setting up a cookie.
Session affinity makes node scheduling decisions based on health checks and processes incoming requests based on each node’s load. Session persistence makes scheduling decisions on a first in, first out (FIFO) basis.
With session affinity, when a client establishes a session, it remains with the node that first accepted its request, while an application-layer load balancer uses persistence to keep a client connected by setting up a cookie.
Session persistence makes scheduling decisions based on traffic priority and bandwidth considerations, while session affinity makes scheduling decisions based on which node is available next.
With session affinity, when a client establishes a session, it remains with the node that first accepted its request, while an application-layer load balancer uses persistence to keep a client connected by setting up a cookie.
Analyze the following scenarios and determine which best simulates the use of a content filter. (Select all that apply.)
A system has broken down a packet containing malicious content, and erases the suspicious content, before rebuilding the packet.
A high school student is using the school library to do research for an assignment and cannot access certain websites due to the subject matter.
A system administrator builds a set of rules based on information found in the source IP address to allow access to an intranet.
A system administrator blocks access to social media sites after the CEO complains that work performance has decreased due to excessive social media usage at work.
A high school student is using the school library to do research for an assignment and cannot access certain websites due to the subject matter.
A system administrator blocks access to social media sites after the CEO complains that work performance has decreased due to excessive social media usage at work.
Which statement regarding attacks on media access control (MAC) addresses accurately pairs the method of protection and what type of attack it guards against? (Select all that apply.)
MAC filtering guards against MAC snooping.
Dynamic Host Configuration Protocol (DHCP) snooping guards against MAC spoofing.
MAC filtering guards against MAC spoofing.
DAI guards against invalid MAC addresses
Dynamic Host Configuration Protocol (DHCP) snooping guards against MAC spoofing.
DAI guards against invalid MAC addresses - Dynamic Address resolution protocol Inspection (DAI)
Note:
DHCP snooping inspects traffic arriving on access ports to ensure that a host is not trying to spoof its MAC address.
DAI allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings.
A networking administrator is reviewing available security products to further fine-tune the existing firewall and appliance settings. An administrator should analyze which system logs in order to tune firewall rulesets and remove or block suspect hosts and processes from the network?
Network-based intrusion detection system (NIDS)
Unified threat management (UTM) product
Network-based intrusion prevention system (IPS)
Network behavior and anomaly detection (NBAD) product
Network-based intrusion detection system (NIDS)
Analyzing NIDS logs allows an administrator to tune firewall rulesets, remove or block suspect hosts and processes from the network, or deploy additional security controls to mitigate any identified threats.
Compare and contrast the characteristics of the various types of firewalls and select the correct explanation of a packet-filtering firewall.
An ACL only allows the minimum amount of traffic required for the operation of valid network services and no more
A firewall that maintains stateful information about the connection between two hosts
A firewall that analyzes HTTP headers and the HTML code to identify code that matches a pattern
A stand-alone firewall implemented with routed interfaces or as a virtual wire transparent firewall
An ACL only allows the minimum amount of traffic required for the operation of valid network services and no more
Which of the following solutions best addresses data availability concerns that may arise with the use of application-aware next-generation firewalls (NGFW) and unified threat management (UTM) solutions?
Signature-based detection system
Secure web gateway (SWG)
Network-based intrusion prevention system (IPS)
Active or passive test access point (TAP)
Secure web gateway (SWG)
While complex NGFW and UTM solutions provide high confidentiality and integrity, lower throughput reduces availability. One solution to this is to treat security solutions for server traffic differently from that for user traffic. An SWG acts as a content filter, which applies user-focused filtering rules and also conducts threat analysis.
A system administrator wants to install a mechanism to conceal the internal IP addresses of hosts on a private network. What tool can the administrator use to accomplish this security function?
NAT gateway
Reverse proxy server
Virtual firewall
Access Control List (ACL)
NAT gateway
Which of the following are types of log collection for SIEM? (Select all that apply.)
Log aggregation
Firewall
Agent-based
Listener/Collector
Agent-based
Listener/Collector
??? Class Midterm exam
Log aggregation - RIGHT
Packet capture - RIGHT
Agent-based - RIGHT
Listener/Collector - RIGHT
OSINT - RIGHT
Agent-less based - WRONG
A network administrator wants to use a proxy server to prevent external hosts from connecting directly with application servers. Which proxy server implementation will best fit this need?
Transparent proxy server
Non-transparent proxy server
Caching proxy server
Reverse proxy server
Reverse proxy server
Compare and analyze the types of firewalls available to differentiate between them. Choose the answer with the most correct description.
Packet filtering firewalls operate at layer 5 of the OSI model, while circuit-level stateful inspection firewalls operate at layer 3.
An appliance firewall is also known as a stateful multilayer inspection or a deep packet inspection. An application aware firewall is a stand-alone hardware firewall that performs the function of a firewall only.
A packet filtering firewall maintains stateful information about a connection between two hosts and implements an appliance firewall as a software application running on a single host.
An application firewall can analyze the HTTP headers to identify code that matches a pattern, while an appliance firewall monitors all traffic passing into and out of a network segment.
An application firewall can analyze the HTTP headers to identify code that matches a pattern, while an appliance firewall monitors all traffic passing into and out of a network segment.
Evaluate the functions of a Network-Based Intrusion Detection System (NIDS) and conclude which statements are accurate. (Select all that apply.)
Training and tuning are fairly simple, and there is a low chance of false positives and false negatives.
A NIDS will identify and log hosts and application activity that the administrator can use to analyze and take further action.
Training and tuning are complex, and there is a high chance of false positive and negative rates.
A NIDS will identify attacks and block the traffic to stop the attack. The administrator will be able to review the reports for future prevention.
A NIDS will identify and log hosts and application activity that the administrator can use to analyze and take further action.
Training and tuning are complex, and there is a high chance of false positive and negative rates.
Security information and event management (SIEM) collect data inputs from multiple sources. Which of the following is NOT one of the main types of log collection for SIEM?
Agent-based
Listener/collector
Sensor (sniffer)
Artificial intelligence (AI)
Artificial intelligence (AI)
A network administrator conducts a network assessment to determine where to implement a network intrusion detection system (NIDS). Which sensor deployment option is most ideal if the admin is concerned about system overloads and resiliency in the event of power loss?
A. Passive test access point (TAP)
B. Active test access point (TAP)
C, Aggregation test access point (TAP)
D. Switched port analyzer (SPAN)/mirror port
A. Passive test access point (TAP)
With a passive TAP, the monitor port receives every frame—corrupt, malformed, or not—and load does not affect copying.
Because it performs an active function, an active TAP becomes a point of failure for the links in the event of power loss. When deploying an active TAP, it is important to use a model with backup power options.
Artificial intelligence (AI) and machine learning are especially important during which security information and event management (SIEM) task?
Packet capture
Analysis and report review
Data aggregation
Log collection
Analysis and report review
Note:
SIEM software can link individual events or data points (observables) into a meaningful indicator of risk, or Indicator of Compromise (IOC). Many SIEM solutions use artificial intelligence (AI) and machine learning as the basis for automated analysis.
Which of the following considerations is most important when employing a signature-based intrusion detection system?
The system may produce false positives and block legitimate activity.
The system must create a valid baseline signature of normal activity.
Signatures and rules must be kept up to date to protect against emerging threats.
Signatures and rules must be able to detect zero-day attacks.
Signatures and rules must be kept up to date to protect against emerging threats.
Analyze each statement and determine which describes a fundamental improvement on traditional log management that security information and event management (SIEM) offers.
SIEM is completely automated; it requires no manual data preparation.
SIEM logs ensure non-repudiation, whereas other logs cannot link a specific user to an action.
SIEM can perform correlation, linking observables into meaningful indicators of risk or compromise.
SIEM addresses the issue of sheer volume of alerts, using machine learning to facilitate threat hunting.
SIEM can perform correlation, linking observables into meaningful indicators of risk or compromise.
Note:
SIEM correlates individual events or data points (observables) into a meaningful indicator of risk, or Indicator of Compromise (IOC). Correlation is the principal factor distinguishing it from basic log management.
Security orchestration, automation, and response (SOAR) is a solution to the problem of the volume of alerts overwhelming analysts’ ability to respond. A security engineer may implement SOAR as a standalone technology or integrate it with a SIEM, using machine/deep learning techniques to enrich data for use in incident response and threat hunting.
A team is building a wireless network, and the company has requested the team to use a Wired Equivalent Privacy (WEP) encryption scheme. The team has developed a recommendation to utilize a different encryption scheme based on the problems with WEP. Analyze the features of WEP to determine what problems to highlight in the recommendation.
WEP has the option to use either a 64-bit or a 128-bit key, which is not secure enough for the company. Packets use a checksum to verify integrity that is too difficult to compute.
WEP allows for a 256-bit key but is still not secure. The Initialization Vector (IV) is not sufficiently large, thus is not always generated using a sufficiently random algorithm.
WEP only allows the use of a 128-bit encryption key and is not secure. The Initialization Vector (IV) is too large to provide adequate security.
WEP only allows the use of a 64-bit key, which is not secure enough for the company. The Initialization Vector (IV) is often not generated using a sufficiently random algorithm.
WEP allows for a 256-bit key but is still not secure. The Initialization Vector (IV) is not sufficiently large, thus is not always generated using a sufficiently random algorithm.
Compare and contrast the characteristics of the various types of firewalls and select the correct explanation of a packet filtering firewall.
A stand-alone firewall implemented with routed interfaces or as a virtual wire transparent firewall
A firewall that analyzes HTTP headers and the HTML code to identify code that matches a pattern
An administrator configures an Access Control List (ACL) to deny access to IP addresses
A firewall that maintains stateful information about the connection
An administrator configures an Access Control List (ACL) to deny access to IP addresses
Which security related phrase relates to the integrity of data?
Availability
Modification
Confidentiality
Risk
Modification
An engineer looks to implement security measures by following the five functions in the National Institute of Standards and Technology (NIST) Cybersecurity Framework. When documenting the “detect” function, what does the engineer focus on?
Evaluate risks and threats
Install, operate, and decommission assets
Ongoing proactive monitoring
Restoration of systems and data
Ongoing proactive monitoring
How might the goals of basic network management not align with the goals of security?
Management focuses on confidentiality and availability.
Management focuses on confidentiality over availability.
Management focuses on integrity and confidentiality.
Management focuses on availability over confidentiality.
Management focuses on availability over confidentiality.
Any external responsibility for an organization’s security lies mainly with which individuals?
The senior executives
Tech staff
Managers
Public relations
The senior executives
The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the “respond” function?
Evaluate risks, threats, and vulnerabilities.
Perform ongoing, proactive monitoring.
Implement resilience to restore systems.
Identify, analyze, and eradicate threats.
Identify, analyze, and eradicate threats.
A company has an annual contract with an outside firm to perform a security audit on their network. The purpose of the annual audit is to determine if the company is in compliance with their internal directives and policies for security control. Select the broad class of security control that accurately demonstrates the purpose of the audit.
Managerial
Technical
Physical
Compensating
Managerial
The _____ requires federal agencies to develop security policies for computer systems that process confidential information.
Sarbanes-Oxley Act (SOX)
Computer Security Act
Federal information Security Management Act (FISMA)
Gramm-Leach-Bliley Act (GLBA)
Computer Security Act
After a poorly handled security breach, a company updates its security policy to include an improved incident response plan. Which of the following security controls does this update address?
Compensating
Deterrent
Corrective
Detective
Corrective
The IT department head returns from an industry conference feeling inspired by a presentation on the topic of cybersecurity frameworks. A meeting is scheduled with IT staff to brainstorm ideas for deploying security controls by category and function throughout the organization. Which of the following ideas are consistent with industry definitions? (Select all that apply.)
A. Deploy a technical control to enforce network access policies.
B. Deploy an operational control to monitor compliance with external regulations.
C. Schedule quarterly security awareness workshops as a preventive control to mitigate social engineering attacks.
D. Deploy agents to file servers to perform continuous backups to cloud storage as a corrective control to mitigate the impact of malware.
A. Deploy a technical control to enforce network access policies.
C. Schedule quarterly security awareness workshops as a preventive control to mitigate social engineering attacks.
D. Deploy agents to file servers to perform continuous backups to cloud storage as a corrective control to mitigate the impact of malware.
Which of the following has a cyber security framework (CSF) that focuses exclusively on IT security, rather than IT service provisioning?
A. National Institute of Standards and Technology (NIST)
B. International Organization for Standardization (ISO)
C. Control Objectives for Information and Related Technologies (COBIT)
D. Sherwood Applied Business Security Architecture (SABSA)
A. National Institute of Standards and Technology (NIST)
A company technician goes on vacation. While the technician is away, a critical patch released for Windows servers is not applied. According to the National Institute of Standards and Technology (NIST), what does the delay in applying the patch create on the server?
Control
Risk
Threat
Vulnerability
Vulnerability
A system analyst is tasked with searching the dark web for harvested customer data. Because these sites cannot be found in a standard website search, what must the analyst have in order to search for the harvested information?
The Onion Router (TOR)
Dark web search engine
Dark Website URL
Open Source Intelligence (OSINT)
Dark Website URL
Which of the following can be a true insider threat? (Select all that apply.)
A. Former employee
B. Contractor
C. Customer
D. White hat hacker
Former employee
Contractor
One aspect of threat modeling is to identify potential threat actors and the risks associated with each one. When assessing the risk that any one type of threat actor poses to an organization, what are the most critical factors to profile? (Select all that apply.)
A. Education
B. Socioeconomic status
C. Intent
D. Motivation
C. Intent
D. Motivation
An unknowing user with authorized access to systems in a software development firm installs a seemingly harmless, yet unauthorized program on a workstation without the IT department’s sanction. Identify the type of threat that is a result of this user’s action.
A. Unintentional insider threat
B. Malicious insider threat
C. Intentional attack vector
D. External threat with insider knowledge
A. Unintentional insider threat
A contractor has been hired to conduct security reconnaissance on a company. The contractor browses the company’s website to identify employees and then finds their Facebook pages. Posts found on Facebook indicate a favorite bar that employees frequently visit. The contractor visits the bar and learns details of the company’s security infrastructure through small talk. What reconnaissance phase techniques does the contractor practice? (Select all that apply.)
Open Source Intelligence (OSINT)
Scanning
Social engineering
Persistence
Open Source Intelligence (OSINT)
Social engineering
What is Open Source Intelligence (OSINT)?
A. Obtaining information, physical access to premises, or even access to a user account through the art of persuasion
B. The means the organization will take to protect the confidentiality, availability, and integrity of sensitive data and resources
C. Using web search tools and social media to obtain information about the target
D. Using software tools to obtain information about a host or network topology
D. Using software tools to obtain information about a host or network topology
A security engineer is investigating a potential system breach. When compiling a report of the incident, how does the engineer classify the actor and the vector?
Threat
Vulnerability
Risk
Exploit
Threat
An IT manager in the aviation sector checks the industry’s threat intelligence feed to keep up on the latest threats and ensure the work center implements the best practices in the field. What type of threat intelligence source is the IT manager most likely accessing?
Open Source Intelligence (OSINT)
An Information Sharing and Analysis Center (ISAC)
A vendor website, such as Microsoft’s Security Intelligence blog
A closed or proprietary threat intelligence platform
An Information Sharing and Analysis Center (ISAC)
A Department of Defense (DoD) security team identifies a data breach in progress, based on some anomalous log entries, and take steps to remedy the breach and harden their systems. When they resolve the breach, they want to publish the cyber threat intelligence (CTI) securely, using standardized language for other government agencies to use. The team will transmit threat data feed via which protocol?
Structured Threat Information eXpression (STIX)
Automated Indicator Sharing (AIS)
Trusted Automated eXchange of Indicator Information (TAXII)
A code repository protocol
Trusted Automated eXchange of Indicator Information (TAXII)
Identify the command that can be used to detect the presence of a host on a particular IP address.
ipconfig
ifconfig
ip
ping
ping
A network manager needs a map of the network’s topology. The network manager is using Network Mapper (Nmap) and will obtain the visual map with the Zenmap tool. If the target IP address is 192.168.1.1, determine the command within Nmap that will return the necessary data to build the visual map of the network topology.
nmap -sn –ipconfig 192.168.1.1
nmap -sn –ifconfig 192.168.1.1
nmap -sn –traceroute 192.168.1.1
nmap -sn –nslookup 192.168.1.1
nmap -sn –traceroute 192.168.1.1
A system administrator must scan the company’s web-based application to identify which ports are open and which operating system can be seen from the outside world. Determine the syntax that should be used to yield the desired information if the administrator will be executing this task from a Linux command line.
netstat -a
nmap -O
nmap -sS 10.1.0.0/24
netstat -n
nmap -O
Select the appropriate methods for packet capture. (Select all that apply.)
Wireshark
Packet analyzer
Packet injection
tcpdump
Wireshark
tcpdump
Analyze and eliminate the item that is NOT an example of a reconnaissance technique.
Initial exploitation
Open Source Intelligence (OSINT)
Social engineering
Scanning
Initial exploitation
Select the statement which best describes the difference between a zero-day vulnerability and a legacy platform vulnerability.
A legacy platform vulnerability is typically unpatchable, while a zero-day vulnerability may be exploited before a developer can create a patch for it.
A zero-day vulnerability is unpatchable, while a legacy platform vulnerability can always be patched, once detected.
A zero-day vulnerability can be mitigated by responsible patch management, while a legacy platform vulnerability cannot likely be patched.
A legacy platform vulnerability can always be mitigated by responsible patch management, while a zero-day vulnerability does not yet have a patch solution.
A legacy platform vulnerability is typically unpatchable, while a zero-day vulnerability may be exploited before a developer can create a patch for it.
Examine each attack vector. Which is most vulnerable to escalation of privileges?
Software
Operating System (OS)
Applications
Ports
Operating System (OS)
An outside security consultant updates a company’s network, including data cloud storage solutions. The consultant leaves the manufacturer’s default settings when installing network switches, assuming the vendor shipped the switches in a default-secure configuration. Examine the company’s network security posture and select the statements that describe key vulnerabilities in this network. (Select all that apply.)
A. The network is open to third-party risks from using an outside contractor to configure cloud storage settings.
B. The default settings in the network switches represent a weak configuration.
C. The use of network switches leaves numerous unused ports open.
D, The recommended settings in the network switches represent secured protocols.
A. The network is open to third-party risks from using an outside contractor to configure cloud storage settings.
B. The default settings in the network switches represent a weak configuration.
Encryption vulnerabilities allow unauthorized access to protected data. Which component is subject to brute-force enumeration?
A. An unsecured protocol
B. A software vulnerability
C. A weak cipher
D. A lost decryption key
C. A weak cipher