CyberBook Flashcards
Company needs to validate its updated incident response plan using a real world scenario.
Tabletop exercise.
A security analyst is evaluating solutions to deploy additional layers of security to a web application. What is the most obvious solution?
HTTPS
Help desk technician receives an email from a CIO he knows to be on vacation asking for documents. What should the technician do to validate the authenticity of the email?
Check the metadata in the email header of the received path in reverse order.
An attacker sends multiple SYN packets from multiple sources. What is this and the best way to defend.
Botnet; enable DDoS protection.
Attack that establishes a connection, which allows remote commands to be executed. What is this and the best way to defend.
RAT; Disable remote access services.
Attack self propagates and compromises SQL databases suing well known credentials as it moves through the network.
Worm; Change default passwords.
Attacker uses hardware to remotely monitor a users’ input activity to harvest credentials.
Keylogger; Implement 2FA using push notification.
Attackers embed hidden access in a internally developed application that bypasses account login.
Backdoor; code review.
URL filtering can be used in a network on what device to perform what type of action.
Webserver to prevent users from accessing unauthorized websites.
Brownouts are causing power loss for several seconds on servers. What is the best course of action to mitigate this.
UPS; undisrupted power supply.
Users are presented with a banner at login stating they are not entitled to reasonable expectation of privacy access.
AUP; acceptable use policy
Best solution to install on stations to prevent sensitive information from being sent in email from workstations.
DLP; data loss prevention.
security analysis assessing programs are deployed in a runtime environment and sent back to the developer if issues are found.
Dynamic Code Review.
Company wants customers to be able to login with the same PAP (sid and password) for a trusted third-party organization.
Federation implementation.
User wanted to VPN to the company network for work over the weekend but couldn’t. By Monday everything worked fine, what was the issue?
Time-based logins.