Exam A Flashcards
QUESTION 1 A security firm has been engaged to assess a software application. A production-like test environment, login details, production documentation and source code have been provided. Which of the following types of testing is being described? A. White box B. Gray box C. Black box D. Red teaming
A. White box
QUESTION 2
A user has forgotten their account password. Which of the following is the BEST recovery strategy?
A. Upgrade the authentication system to use biometrics instead.
B. Temporarily disable password complexity requirements.
C. Set a temporary password that expires upon first use.
D. Retrieve the user password from the credentials database.
C. Set a temporary password that expires upon first use.
QUESTION 3 All of the following are valid cryptographic hash functions EXCEPT: A. RIPEMD B. RC4 C. SHA-512 D. MD4
B. RC4 - Rivest Cypher 4 -Stream cipher is the basis for Secure Sockets Layer (SSL) and Wired Equivalent Privacy (WEP).
QUESTION 4 When a certificate issuer is not recognized by a web browser, which of the following is the MOST common reason? A. Lack of key escrow B. Self-signed certificate C. Weak certificate pass-phrase D. Weak certificate cipher
B. Self-signed certificate
QUESTION 5 Which of the following PKI components identifies certificates that can no longer be trusted? A. CRL B. CA public key C. Escrow D. Recovery agent
A. CRL - Certificate Revocation list
QUESTION 6 Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack? A. 802.1x B. DHCP C. 802.1q D. NIPS
A. 802.1x
QUESTION 7 MAC filtering is a form of which of the following? A. Virtualization B. Network Access Control C. Virtual Private Networking D. Network Address Translation
B. Network Access Control
QUESTION 8 Which of the following authentication protocols forces centralized wireless authentication? A. WPA2-Personal B. WPA2-Enterprise C. WPA2-CCMP D. WPA2-TKIP
B. WPA2-Enterprise (Wi-Fi Protected Access 2- Enterprise)
QUESTION 9 A company that purchases insurance to reduce risk is an example of which of the following? A. Risk deterrence B. Risk acceptance C. Risk avoidance D. Risk transference
D. Risk transference
QUESTION 10
Which of the following is a method to prevent ad-hoc configuration mistakes?
A. Implement an auditing strategy
B. Implement an incident management strategy
C. Implement a patch management strategy
D. Implement a change management strategy
D. Implement a change management strategy
QUESTION 11 Which of the following risks may result from improper use of social networking and P2P software? A. Shoulder surfing B. Denial of service C. Information disclosure D. Data loss prevention
C. Information disclosure
QUESTION 12 Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence? A. Botnet B. Rootkit C. Logic bomb D. Virus
B. Rootkit
QUESTION 13 A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type? A. NAT B. NIPS C. NAC D. DMZ
C. NAC - Network Access Control
QUESTION 14 Which of the following would be used for secure remote terminal access? A. SSH B. TFTP C. SCP D. SFTP
A. SSH - Secure Shell - 22
QUESTION 15 Without validating user input, an application becomes vulnerable to all of the following EXCEPT: A. buffer overflow. B. command injection. C. spear phishing. D. SQL injection.
C. spear phishing.
QUESTION 16
After verifying that the server and database are running, Jane, the administrator, is still unable to make a TCP connection to the database. Which of the following is the MOST likely cause for this?
A. The server has data execution prevention enabled
B. The server has TPM based protection enabled
C. The server has HIDS installed
D. The server is running a host-based firewall
D. The server is running a host-based firewall
QUESTION 17 Which of the following is used to detect an unknown security vulnerability? A. Application fuzzing B. Application configuration baseline C. Patch management D. ID badge
A. Application fuzzing
QUESTION 18
Which of the following is a best practice before deploying a new desktop operating system image?
A. Install network monitoring software
B. Perform white box testing
C. Remove single points of failure
D. Verify operating system security settings
D. Verify operating system security settings
QUESTION 19
Securing mobile devices involves which of the following checklists?
A. Key escrow, trust model, CRL
B. Cross-site scripting, XSRF, fuzzing
C. Screen lock, encryption, remote wipe
D. Black box, gray box, white box testing
C. Screen lock, encryption, remote wipe
QUESTION 20
Which of the following steps should follow the deployment of a patch?
A. Antivirus and anti-malware deployment
B. Audit and verification
C. Fuzzing and exploitation
D. Error and exception handling
B. Audit and verification
QUESTION 21 Lack of internal security resources and high availability requirements are factors that may lead a company to consider: A. patch management. B. encryption. C. cloud computing. D. anti-malware sotware.
C. cloud computing.
QUESTION 22 Which of the following would be used when a higher level of security is desired for encryption key storage? A. TACACS+ B. L2TP C. LDAP D. TPM
D. TPM - Trusted Platform Module
QUESTION 23 Which of the following is the default port for SCP and SSH? A. 21 B. 22 C. 404 D. 443
B. 22 - SSH
QUESTION 24 Which of the following default ports does the hypertext transfer protocol use for non-secure network connections? A. 20 B. 21 C. 80 D. 8080
C. 80 - HTTP