Dion P Exam Flashcards
You are working as a wireless networking technician and running a wireless controller to aid in network administration. Your supervisor has requested that you implement a centralized authentication service. Which of the following devices should you install and configure if you want to decrease the amount of time spent administering the network while still providing a centralized authentication service for your users?
A. RADIUS Server
B. Layer 3 Switch
C. VPN Concentrator
D. Proxy Server
A. RADIUS Server
Explanation:
OBJ-1.5: A Remote Authentication Dial-In User Service (RADIUS) server will enable the wireless clients to communicate with a central server to authenticate users and authorize their access to the requested service or system. None of the other options presented are designed to support centralized authentication services by themselves, but instead, use a protocol like RADIUS to perform those functions.
A small office has an Internet connection that drops out at least two times per week. It often takes until the next day for the service provider to come out and fix the issue. What should you create with the service provider to reduce this downtime in the future?
A. MOU
B. NDA
C. AUP
D. SLA
D. SLA
Explanation:
What information should be recorded on a chain of custody form during a forensic investigation?
A. The list of individuals who made contact with files leading to the investigation
B. Any individual who worked with evidence during the investigation
C. The law enforcement agent who was first on the scene
D. The list of former owners/operators of the workstation involved in the investigation
B. Any individual who worked with evidence during the investigation
Explanation:
OBJ-2.8: Chain of custody forms list every person who has worked with or who has touched the evidence that is a part of an investigation. These forms record every action taken by each individual in possession of the evidence. Depending on the organization’s procedures, manipulation of evidence may require an additional person to act as a witness to verify whatever action is being taken. While the chain of custody would record who initially collected the evidence, it does not have to record who was the first person on the scene (if that person didn’t collect the evidence). The other options presented by the question are all good pieces of information to record in your notes, but it is not required to be on the chain of custody form.
Dion Training is trying to define key performance indicators for their recently released voucher management system. The CIO has stated that the voucher management system must be able to detect and repair any voucher database record integrity issues within 30 seconds. To monitor this requirement, the analysts have created a metric to measure the number of record integrity issues and another metric to measure the time it took to repair those records. Which of the following types of key performance indicators would these metrics be classified as?
A. Usability
B. Reliability
C. Scalability
D. Availability
B. Reliability
Explanation:
OBJ-4.1: Reliability metrics measure the ability of a system to perform without error or to avoid, detect, and/or repair component or integrity failures. Scalability metrics measure the ability of a system to handle an increase in workload while maintaining a consistent level of performance. Availability metrics measure the probability that a system will be operating as expected at any given point in time. The most common availability metric used is known as uptime. Usability metrics measure the effectiveness, efficiency, and satisfaction of users working with a given system.
As part of the reconnaissance stage of a penetration test, Kumar wants to retrieve information about an organization’s network infrastructure without causing an IPS alert. Which of the following is his best course of action?
A. Use a nmap ping sweep
B. Perform a DNS zone transfer
C. Use a nmap stealth scan
D. Perform a DNS brute force attack
D. Perform a DNS brute force attack
Explanation:
OBJ-2.4: The best course of action is to perform a DNS brute-force attack. The DNS brute-force attack queries a list of IPs and typically bypasses IDS/IPS systems that do not alert on DNS queries. A ping sweep or a stealth scan can be easily detected by the IPS, depending on the signatures and settings being used. A DNS zone transfer is also something that often has a signature search for it and will be alerted upon since it is a common attack technique.
OBJ-2.4: The best course of action is to perform a DNS brute-force attack. The DNS brute-force attack queries a list of IPs and typically bypasses IDS/IPS systems that do not alert on DNS queries. A ping sweep or a stealth scan can be easily detected by the IPS, depending on the signatures and settings being used. A DNS zone transfer is also something that often has a signature search for it and will be alerted upon since it is a common attack technique.
A. Economic
B. Detection time
C. Downtime
D. Data integrity
E. Recovery time
A. Economic
D. Data integrity
Explanation:
While all the above options should be included in your report to management, due to the nature of your company’s work, the economic impact of the business should be your top factor. This would include any possible liability and damage that will be done to the company’s reputation. Data integrity would be the second most important factor to highlight in your report since an APT may have stolen significant amounts of money by altering your financial documentation and accounts data integrity. Downtime, recovery time and detection time are important for understanding the broader cybersecurity concern and remediation but are not going to be the primary concern for accounting firms executives
Which of the following types of information is protected by rules in the United States that specify the minimum frequency of vulnerability scanning required for devices that process it?
A. Medical Records
B . Drivers License Number
C. Insurance Records
D. Credit Card Data
D. Credit Card Data
Explanation:
OBJ-4.3: The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes. The PCI Standard is mandated by the card brands but administered by the Payment Card Industry Security Standards Council. As part of PCI DSS compliance, organizations must conduct internal and external scans at prescribed intervals on any devices or systems that process credit card data. HIPAA protects medical and insurance records, but this law doesn’t define a frequency for vulnerability scanning requirements. Driver’s license numbers are considered PII, but again, there is no defined frequency scanning requirement regarding protecting PII under law, regulation, or rule.
Dion Training is developing a new digital contracting system to allow their corporate customers to create orders online. Once the customer creates their order, they will need to digitally sign the contract. The algorithm should use logarithmic and modulus math to create the digital signature, and the speed of generating the digital signature should be prioritized over the speed of verifying the digital signature. Which of the following cryptographic algorithms would best meet these requirements?
A. DSA
B. PBKDF2
C. ECDSA
D. RSA
A. DSA
Explanation:
OBJ-3.6: The digital signature algorithm (DSA) is a cryptographic algorithm that uses logarithmic and modulus math to generate and verify digital signatures. The DSA is faster than RSA at generating digital signatures, but it is slower than RSA when verifying them. Rivest, Shamir, and Adleman (RSA) is an asymmetric algorithm that uses the complexity of factoring large prime numbers to provide security. Elliptic-Curve Digital Signature Algorithm (ECDSA) is an asymmetric algorithm that utilizes the properties of elliptic curves to provide comparable levels of protection as RSA with a much smaller key size. Password-Based Key Derivation Function 2 (PBKDF2) is a form of key stretching that utilizes a hash-based message authentication code (HMAC), the input password, and a salt value to create a more secure derived key.
You are searching a Linux server for a possible backdoor during a forensic investigation. Which part of the file system should you search for evidence of a backdoor related to a Linux service?
A. /etc/passwd
B/ $HOME/.ssh/
C. /etc/xinetd.conf
D. /etc/shadow 0
B/ $HOME/.ssh/
Explanation:
OBJ-2.9: Linux services are started by xinetd, but some new versions use sytemctl. Therefore, the /etc/xinetd.conf should be analyzed for any evidence of a backdoor being started as part of the Linux services. Both the /etc/passwd and /etc/shadow files contain configurations specifically associated with individual user accounts. The /home/.ssh directory contains SSH keys for SSH-based logins.
Which of the following is a security concern with using a cloud service provider and could result in a data breach caused by data remnants?
A. On Demand
B. Rapid Elasticity
C. Resource Pooling
D. Metered Service
B. Rapid Elasticity
Explanation:
OBJ-1.2: Rapid elasticity can be a security threat to your organization’s data due to data remanences. Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase it. So, when a cloud resource is deprovisioned and returned to the cloud service provider, it can be issued to another organization for use. If the data was not properly erased from the underlying storage, it could be exposed to the other organization. For this reason, all cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.
Dion Training wants to transform protected data into an unreadable format before storing it in their database. The CTO wants to utilize a technology like those used to protect the local user passwords in the /etc/shadow file of a Linux system. Which of the following cryptographic techniques should the company utilize to meet this requirement?
A. Rekeying
B. Crypto shredding
C. Cryptographic obfuscation
D. Key rotation
C. Cryptographic obfuscation
Explanation:
OBJ-3.7: Cryptographic obfuscation is used to transform protected data into an unreadable format. For example, the Linux user passwords stored in the /etc/shadow file are obfuscated to protect them. Crypto shredding is used to destroy a decryption key to effectively destroy the data that key was used to protect. This technique ensures that the data will remain encrypted if the key is fully destroyed and the encryption algorithm itself remains secure. Key rotation is the process of purposely changing keys periodically to mitigate against brute force attacks and key disclosure compromises. During key rotation, the previous key is also revoked and invalidated. Rekeying is the process of changing an individual key during a communication session. Most communication protocols use session key rekeying to protect the data being transmitted. A rekeying is normally triggered based on the volume of data communicated or the amount of time since the last rekeying.
Dion Training is building a secure messaging application and wants to add a security control to ensure the integrity of the messages being transmitted. Which of the following cryptographic algorithms would BEST provide integrity to the messages being sent?
A .MD5
B. SHA-256
C. AES
D. ECC
B. SHA-256
Explanation:
OBJ-3.6: To ensure integrity, you should always use a hashing function. SHA-256 and MD5 are both hashing functions, but SHA-256 is more secure. Secure Hashing Algorithm (SHA-256) is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length 256-bit hash digest value to be used for authenticating the original message. Message Digest Algorithm (MD5) is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length 128-bit hash digest value to be used for authenticating the original message. MD5 can be easily brute-forced and has a high chance of collision. The advanced encryption standard (AES) is a cryptographic algorithm used to perform symmetric data encryption using a 128-bit, 192-bit, or 256-bit key. Elliptic curve cryptography is a public-key cryptographic algorithm based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller key sizes compared to non-elliptic curve cryptography methods while still providing the equivalent level of security. ECC is heavily used in mobile devices and low-powered device encryption.
An independent cybersecurity researcher has contacted your company to prove a buffer overflow vulnerability exists in one of your applications. Which technique would have been most likely to identify this vulnerability in your application during development?
A. Pair programming
B. DYnamic code analysis
C. Static code analysis
D. Manual Peer Review
C. Static code analysis
Explanation:
OBJ-1.3: Buffer overflows are most easily detected by conducting a static code analysis. Manual peer review or pair programming methodologies might have been able to detect the vulnerability. Still, they do not have the same level of success as a static code analysis using proper tools. DevSecOps methodology would also improve the likelihood of detecting such an error but still rely on human-to-human interactions and human understanding of source code to detect the fault. Dynamic code analysis also may have detected this if the test found exactly the right condition. Still, again, a static code analysis tool is designed to find buffer overflows more effectively.
A company wants to install a multidomain certificate to support both of its domains, diontraining.com and yourcyberpath.com. Which of the following allows a digital certificate to include multiple names to support multiple domain certificates in a PKI implementation?
A. SAN
B. OU
C. CN
D. C
A. SAN
Explanation:
The subject alternative name (SAN) is a digital certificate that allows a host to be identified by multiple hostnames or domains names. Certs that use a SAN are referred to as multi domain certs. The common name is the FQDN of the server that was issued a digital cert in a PKI implementation. The organizational unit describes the division or department within the organiz
You need to determine the best way to test operating system patches in a lab environment before deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches before deployment?
A. Sandboxing
B. Purchase additional workstations
C. Virtualization
D. Bypass testing and deploy patches directly into the production environment
C. Virtualization
Explanation:
OBJ-3.2: When you have a limited amount of hardware resources to utilize but have a requirement to test multiple operating systems, you should set up a virtualized environment to test the patch across each operating system before deployment. You should never deploy patches directly into production without testing them first in the lab. Virtualization will allow the organization to create a lab environment without significant costs. Purchasing additional workstations would be costly and more time-consuming to configure.