DION DECK Flashcards

1
Q

Why might an organization be particularly concerned about introducing automation tools that become single points of failure during secure operations?

A

Compromised availability leading to operational disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To improve security at their law firm, Norah, a security analyst wants to implement a system that will selectively block or allow traffic based on the nature of the communication. Which firewall type would be MOST effective for this purpose?

A

Layer 7 firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which method accurately demonstrates the authentication process used in WPA2 Personal mode

A

Using a passphrase to generate a pairwise master key (PMK).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lexicon, an AI company, wants to implement a security measure to identify and evaluate potential threats to their systems and networks. Which of the following is an example of a managerial security control that the company could implement?

A

Risk assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

For ensuring the security of an HTTP application like WordPress or Magento against threats like SQL injection or cross-site scripting, which monitoring tool or method would be MOST appropriate?

A

Web application firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When sending an encrypted message to Dion Training, a client would use which of the following to ensure only Dion Training can decrypt and read the message?

A

Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An investment firm allows a fluctuation of up to 10% in the value of its high-risk investment portfolio compared to the expected return on investment, but immediate action is required if this threshold is exceeded. This 10% fluctuation represents an example of:

A

Risk tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When considering user interactions with a web service, which of the following are the security measures that involve the secure creation and transfer of identifiers as well as enforcing inactivity limits to prevent unauthorized access?

A

Session management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following terms emphasizes the mathematical structure used to scramble data so that only a specific key can unscramble it?

A

Encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dion Training has recently implemented a new web portal for their customers. During a routine security review, the IT team notices that some suspicious activities have been logged. An unknown user attempted to access the system with a strange pattern: when requesting a particular user file, instead of the usual URL structure ( /users/[username]/profile ) the system registered requests like ( /users/../admin/config ). Within a short span of time, several such patterns were identified, each trying to reach different sensitive files and directories. Given this information, which of the following types of attack is the user MOST likely attempting?

A

Attempting to access files outside of directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ravid is evaluating an attack that has occurred on his organization’s system. He sees that the attacker entered a lot of data into the the area of memory in the API that temporarily stores user input. What type of attack did Travid discover?

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following terms BEST describe the affirmation of the validation of the accuracy and thoroughness of compliance-related reports?

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following BEST describes the Software Development Life Cycle (SDLC) in application security?

A

It emphasizes the integration of security in software creation and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following BEST explains the difference between an Agent-based and Agentless NAC?

A

Agent based NACs use additional software to authenticate users, while Agentless NACs use network level protocols to authenticate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly