CyberBook Flashcards

1
Q

Company needs to validate its updated incident response plan using a real world scenario.

A

Tabletop exercise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security analyst is evaluating solutions to deploy additional layers of security to a web application. What is the most obvious solution?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Help desk technician receives an email from a CIO he knows to be on vacation asking for documents. What should the technician do to validate the authenticity of the email?

A

Check the metadata in the email header of the received path in reverse order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacker sends multiple SYN packets from multiple sources. What is this and the best way to defend.

A

Botnet; enable DDoS protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack that establishes a connection, which allows remote commands to be executed. What is this and the best way to defend.

A

RAT; Disable remote access services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attack self propagates and compromises SQL databases suing well known credentials as it moves through the network.

A

Worm; Change default passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacker uses hardware to remotely monitor a users’ input activity to harvest credentials.

A

Keylogger; Implement 2FA using push notification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attackers embed hidden access in a internally developed application that bypasses account login.

A

Backdoor; code review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

URL filtering can be used in a network on what device to perform what type of action.

A

Webserver to prevent users from accessing unauthorized websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brownouts are causing power loss for several seconds on servers. What is the best course of action to mitigate this.

A

UPS; undisrupted power supply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Users are presented with a banner at login stating they are not entitled to reasonable expectation of privacy access.

A

AUP; acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Best solution to install on stations to prevent sensitive information from being sent in email from workstations.

A

DLP; data loss prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

security analysis assessing programs are deployed in a runtime environment and sent back to the developer if issues are found.

A

Dynamic Code Review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Company wants customers to be able to login with the same PAP (sid and password) for a trusted third-party organization.

A

Federation implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

User wanted to VPN to the company network for work over the weekend but couldn’t. By Monday everything worked fine, what was the issue?

A

Time-based logins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Company is forced to continue using legacy software to support critical services..

A

Lack of vendor support.

17
Q

Port 53

A

DNS; Domain name server uses Port 53

18
Q

Port 23

A

Telnet

19
Q

Port 25

A

SMTP

20
Q

Port 69

A

TFTP; trivial file transfer protocol

21
Q

Port 443

A

HTTPS

22
Q

Cost-effective physical control to enforce USB removable media restriction policy.

A

GPO; Group Policy Objects that will restrict access to authorized USB removable media.