Exam A Flashcards

1
Q
QUESTION 1
 A security firm has been engaged to assess a software application. A production-like test environment, login details, production documentation and source code have been provided. Which of the following types of testing is being described? 
A. White box 
B. Gray box 
C. Black box 
D. Red teaming
A

A. White box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QUESTION 2
A user has forgotten their account password. Which of the following is the BEST recovery strategy?
A. Upgrade the authentication system to use biometrics instead.
B. Temporarily disable password complexity requirements.
C. Set a temporary password that expires upon first use.
D. Retrieve the user password from the credentials database.

A

C. Set a temporary password that expires upon first use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
QUESTION 3
All of the following are valid cryptographic hash functions EXCEPT: 
A. RIPEMD 
B. RC4 
C. SHA-512 
D. MD4
A

B. RC4 - Rivest Cypher 4 -Stream cipher is the basis for Secure Sockets Layer (SSL) and Wired Equivalent Privacy (WEP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
QUESTION 4 
When a certificate issuer is not recognized by a web browser, which of the following is the MOST common reason? 
A. Lack of key escrow 
B. Self-signed certificate 
C. Weak certificate pass-phrase 
D. Weak certificate cipher
A

B. Self-signed certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
QUESTION 5 
Which of the following PKI components identifies certificates that can no longer be trusted? 
A. CRL 
B. CA public key 
C. Escrow 
D. Recovery agent
A

A. CRL - Certificate Revocation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
QUESTION 6 
Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack? 
A. 802.1x 
B. DHCP 
C. 802.1q 
D. NIPS
A

A. 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
QUESTION 7 
MAC filtering is a form of which of the following?
A. Virtualization 
B. Network Access Control
C. Virtual Private Networking
D. Network Address Translation
A

B. Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
QUESTION 8 
Which of the following authentication protocols forces centralized wireless authentication?
A. WPA2-Personal 
B. WPA2-Enterprise 
C. WPA2-CCMP 
D. WPA2-TKIP
A

B. WPA2-Enterprise (Wi-Fi Protected Access 2- Enterprise)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
QUESTION 9 
A company that purchases insurance to reduce risk is an example of which of the following?
A. Risk deterrence 
B. Risk acceptance 
C. Risk avoidance 
D. Risk transference
A

D. Risk transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

QUESTION 10
Which of the following is a method to prevent ad-hoc configuration mistakes?
A. Implement an auditing strategy
B. Implement an incident management strategy
C. Implement a patch management strategy
D. Implement a change management strategy

A

D. Implement a change management strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
QUESTION 11 
Which of the following risks may result from improper use of social networking and P2P software? 
A. Shoulder surfing 
B. Denial of service 
C. Information disclosure 
D. Data loss prevention
A

C. Information disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
QUESTION 12 
Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence? 
A. Botnet 
B. Rootkit 
C. Logic bomb 
D. Virus
A

B. Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
QUESTION 13 
A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type? 
A. NAT 
B. NIPS 
C. NAC 
D. DMZ
A

C. NAC - Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
QUESTION 14 
Which of the following would be used for secure remote terminal access? 
A. SSH 
B. TFTP 
C. SCP 
D. SFTP
A

A. SSH - Secure Shell - 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
QUESTION 15 
Without validating user input, an application becomes vulnerable to all of the following EXCEPT:
A. buffer overflow. 
B. command injection. 
C. spear phishing. 
D. SQL injection.
A

C. spear phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION 16
After verifying that the server and database are running, Jane, the administrator, is still unable to make a TCP connection to the database. Which of the following is the MOST likely cause for this?
A. The server has data execution prevention enabled
B. The server has TPM based protection enabled
C. The server has HIDS installed
D. The server is running a host-based firewall

A

D. The server is running a host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
QUESTION 17 
Which of the following is used to detect an unknown security vulnerability? 
A. Application fuzzing 
B. Application configuration baseline 
C. Patch management 
D. ID badge
A

A. Application fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QUESTION 18
Which of the following is a best practice before deploying a new desktop operating system image?
A. Install network monitoring software
B. Perform white box testing
C. Remove single points of failure
D. Verify operating system security settings

A

D. Verify operating system security settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

QUESTION 19
Securing mobile devices involves which of the following checklists?
A. Key escrow, trust model, CRL
B. Cross-site scripting, XSRF, fuzzing
C. Screen lock, encryption, remote wipe
D. Black box, gray box, white box testing

A

C. Screen lock, encryption, remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

QUESTION 20
Which of the following steps should follow the deployment of a patch?
A. Antivirus and anti-malware deployment
B. Audit and verification
C. Fuzzing and exploitation
D. Error and exception handling

A

B. Audit and verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
QUESTION 21 
Lack of internal security resources and high availability requirements are factors that may lead a company to consider:
A. patch management. 
B. encryption. 
C. cloud computing. 
D. anti-malware sotware.
A

C. cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
QUESTION 22 
Which of the following would be used when a higher level of security is desired for encryption key storage? A. TACACS+ 
B. L2TP 
C. LDAP 
D. TPM
A

D. TPM - Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
QUESTION 23 
Which of the following is the default port for SCP and SSH? 
A. 21 
B. 22 
C. 404 
D. 443
A

B. 22 - SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
QUESTION 24 
Which of the following default ports does the hypertext transfer protocol use for non-secure network connections? 
A. 20 
B. 21 
C. 80 
D. 8080
A

C. 80 - HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
QUESTION 25 
Which of the following BEST describes using a smart card and typing in a PIN to gain access to a system? A. Biometrics 
B. PKI 
C. Single factor authentication 
D. Multifactor authentication
A

D. Multifactor authentication

26
Q

QUESTION 26
Which of the following result types would Jane, a security administrator, MOST likely look for during a penetration test?
A. Inability to gain administrative access
B. Open ports
C. Ability to bypass security controls
D. Incorrect configurations

A

C. Ability to bypass security controls

27
Q
QUESTION 27 
A small business owner has asked the security consultant to suggest an inexpensive means to deter physical intrusions at their place of business. Which of the following would BEST meet their request? 
A. Fake cameras 
B. Proximity readers 
C. Infrared cameras 
D. Security guards
A

A. Fake cameras

28
Q
QUESTION 28 
Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type? 
A. Smartcard 
B. Token 
C. Discretionary access control 
D. Mandatory access control
A

A. Smartcard

29
Q
QUESTION 29 
Which of the following devices would MOST likely have a DMZ interface? 
A. Firewall 
B. Switch 
C. Load balancer
 D. Proxy
A

A. Firewall

30
Q
QUESTION 30 
Which of the following is used to digitally sign an email? 
A. Private key 
B. Public key 
C. Sender's IP
D. Sender's MAC address
A

A. Private key

31
Q
QUESTION 31 
Pete, the company Chief Information Officer (CIO), has been receiving numerous emails from the help desk directing Pete to a link to verify credentials. Which of the following attacks is underway? 
A. Replay attack 
B. Pharming 
C. Privilege escalation 
D. Spear phishing
A

D. Spear phishing

32
Q
QUESTION 32 
Pete, a security administrator, noticed that the network analyzer is displaying packets that have all the bits in the option field turned on. Which of the following attacks is underway? 
A. X-Mas 
B. DDoS 
C. Birthday 
D. Smurf
A

A. X-Mas

33
Q
QUESTION 33 
Which of the following tools would Matt, a security administrator, MOST likely use to analyze a malicious payload? 
A. Vulnerability scanner 
B. Fuzzer 
C. Port scanner 
D. Protocol analyzer
A

D. Protocol analyzer

34
Q
QUESTION 34 
Which of the following is Jane, a security administrator, MOST likely to install in order to capture and analyze zero day exploits? 
A. Honeypot 
B. Antivirus 
C. IPS 
D. IDS
A

A. Honeypot

35
Q
QUESTION 35 
Which of the following can be implemented to detect file system variations? 
A. EXT3 
B. Hashing 
C. Encryption 
D. NIDS
A

B. Hashing

36
Q
QUESTION 36 
Which of the following threats is MOST likely to be mitigated by implementing cross-site scripting prevention tools? 
A. Resource starvation 
B. Insider threat 
C. Spear phishing 
D. Session hijacking
A

D. Session hijacking

37
Q
QUESTION 37 
An attacker has gained access to the corporate network and is attempting to brute force a password to gain access to the accounting system. Which of the following, if implemented, will protect the server? 
A. Single sign-on 
B. Password history 
C. Limit logon attempts 
D. Directory services
A

C. Limit logon attempts

38
Q
QUESTION 38 
Pete, a security administrator, wants to check user password complexity. Which of the following is the BEST tool to use? 
A. Password history 
B. Password logging 
C. Password cracker 
D. Password hashing
A

C. Password cracker

39
Q
QUESTION 39 
Which of the following can hide confidential or malicious data in the whitespace of other files (e.g. JPEGs)? 
A. Hashing 
B. Transport encryption 
C. Digital signatures 
D. Steganography
A

D. Steganography

40
Q
QUESTION 40 
Certificates are used for: (Select TWO). 
A. client authentication. 
B. WEP encryption. 
C. access control lists. 
D. code signing. 
E. password hashing.
A

A. client authentication. D. code signing.

41
Q
QUESTION 41 
When implementing SSL VPN, which of the following is the FASTEST cipher that Pete, an administrator, can use? 
A. 3DES
B. AES 
C. DES 
D. RC4
A

D. RC4

42
Q
QUESTION 42 
Which of the following network devices will prevent port scans? 
A. Firewall 
B. Load balancers 
C. NIDS 
D. Sniffer
A

A. Firewall

43
Q
QUESTION 43 
Which of the following is an operational control? 
A. Concurrent session control 
B. System security categorization 
C. Contingency planning 
D. Session locks
A

C. Contingency planning

44
Q
QUESTION 44 
Which of the following is a hardware based encryption device? 
A. EFS 
B. TrueCrypt 
C. TPM 
D. SLE
A

C. TPM - Trusted Platform Module

45
Q
QUESTION 45 
Which of the following is the MOST important step for preserving evidence during forensic procedures? 
A. Involve law enforcement 
B. Chain of custody 
C. Record the time of the incident 
D. Report within one hour of discovery
A

B. Chain of custody

46
Q
QUESTION 46 
Employees of a company have received emails that fraudulently claim to be from the company's security department. The emails ask the employees to sign-on to an Internet website to verify passwords and personal information. This is an example of which type of attack?
A. Spam 
B. Pharming 
C. Man-in-the-middle 
D. Vishing
A

B. Pharming

47
Q
QUESTION 47 
A company has implemented software to enforce full disk and removable media encryption for all computers. Which of the following threats can still expose sensitive data on these computers? 
A. Spam 
B. Botnet infection 
C. Stolen laptop 
D. Header manipulation
A

B. Botnet infection

48
Q
QUESTION 48 
Which of the following MOST interferes with network-based detection techniques? 
A. Mime-encoding 
B. SSL 
C. FTP 
D. Anonymous email accounts
A

B. SSL - Secure Sockets Layer -

49
Q
QUESTION 49 
Which of the following secure coding concepts can prevent the unintentional execution of malicious code entered in place of proper commands? 
A. Patch management 
B. Proper exception handling 
C. Code reviews 
D. Input validation
A

D. Input validation

51
Q
QUESTION 51 
A system administrator decides to use SNMPv3 on the network router in AuthPriv mode. Which of the following algorithm combinations would be valid? 
A. AES-RC4 
B. 3DES-MD5 
C. RSA-DSA 
D. SHA1-HMAC
A

B. 3DES-MD5 - Triple Data Encryption Standard / Message Digest 5

52
Q
QUESTION 52 
Which of the following are encryption algorithms that can use a 128-bit key size? (Select TWO). 
A. AES 
B. RC4 
C. Twofish 
D. DES 
E. SHA2
A

A. AES - Advanced Encryption Standard C. Twofish - a symmetric key block cipher

53
Q

QUESTION 53
Unsolicited address items and messages are discovered on a Chief Information Officer’s (CIO’s) smartphone. Additionally, files on an administrator’s smartphone are changed or missing. Which of the following BEST describes what may have happened?
A. The CIO and the Administrator were both bluesnarfed.
B. The CIO and the Administrator were both bluejacked.
C. The CIO was bluejacked and the Administrator was bluesnarfed.
D. The CIO was bluesnarfed and the Administrator was bluejacked.

A

C. The CIO was bluejacked and the Administrator was bluesnarfed.

54
Q
QUESTION 54 
Which of the following devices, connected to an IDS, would allow capture of the MOST traffic? 
A. Switch 
B. Router 
C. Firewall 
D. Hub
A

D. Hub

55
Q
QUESTION 55 
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue? 
A. Spam filter 
B. Protocol analyzer 
C. Web application firewall 
D. Load balancer
A

B. Protocol analyzer

56
Q

QUESTION 57
Jane, a user, brings in a laptop from home and gets certificate warnings when connecting to corporate intranet sites. These warnings do not occur when using any of the companies’ workstations. Which of the following is MOST likely the issue?
A. The laptop needs to VPN to bypass the NAC.
B. The corporate intranet servers do not trust the laptop.
C. The laptop’s CRL enrollment has expired.
D. The user’s certificate store does not trust the CA.

A

D. The user’s certificate store does not trust the CA.

57
Q

QUESTION 49 Which of the following secure coding concepts can prevent the unintentional execution of malicious code entered in place of proper commands? A. Patch management B. Proper exception handling C. Code reviews D. Input validation

A

D. Input validation

58
Q
QUESTION 58 
Which of the following mitigates the loss of a private key in PKI? (Select TWO). 
A. Certificate reissue 
B. Key rotation 
C. Key escrow 
D. Auto enrollment 
E. Recovery agent
A

C. Key escrow E. Recovery agent

59
Q
QUESTION 59 
Which of the following specifications would Sara, an administrator, implement as a network access control? 
A. 802.1q 
B. 802.3 
C. 802.11n 
D. 802.1x
A

D. 802.1x

60
Q
QUESTION 56 
Which of the following devices can be used to terminate remote user's established SSL or IPSec tunnels? (Select TWO).
A. NIDS 
B. HIPS 
C. VPN concentrator 
D. Hub E. Firewall
A

C. VPN concentrator E. Firewall

61
Q
QUESTION 60 
Which of the following malware types propagates automatically, does not typically hide, requires user interaction, and displays marketing ads? 
A. Logic bombs 
B. Rootkits 
C. Spyware 
D. Worms
A

D. Worms