Exam B Flashcards
QUESTION 1Which of the following malware types typically disguises itself within another piece of software, requires user interaction, and does not execute on a specific date?A. Logic BombB. TrojanC. WormD. Botnet
B. Trojan
QUESTION 2Which of the following is MOST commonly identified as an ARP spoofing attack where no email is sent, and flags within the TCP packet are irrelevant?A. Xmas attackB. Spam attackC. Man-in-the-middle attackD. DDoS attack
C. Man-in-the-middle attack
QUESTION 3Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?A. WhalingB. ImpersonationC. Privilege escalationD. Spear phishing
A. Whaling
QUESTION 4Which of the following is an attack where Pete spreads USB thumb drives throughout a bank’s parking lot in order to have malware installed on the banking systems?A. TailgatingB. Replay attackC. VirusD. Social engineering
D. Social engineering
QUESTION 5Which of the following attacks significantly relies on staff members wanting to be helpful and supportive of each other?A. SpoofingB. TailgatingC. Dumpster divingD. Xmas attack
B. Tailgating
QUESTION 6Which of the following is an attacker attempting to discover open wireless access points?A. War drivingB. Packet sniffingC. War chalkingD. Initialization vector
A. War driving
QUESTION 7Which of the following protocols provides Pete, an administrator, with the HIGHEST level of security for device traps?A. ICMPB. SNMPv3C. SSHD. IPSec
B. SNMPv3 - Simple Network Management Protocol - v3 (161 udp)
QUESTION 8Which of the following is designed to serve as a risk mitigation strategy?A. Personally owned devicesB. Disaster recovery planC. Calculate proper ROID. Zero day exploits
B. Disaster recovery plan
QUESTION 9Who should be contacted FIRST in the event of a security breach?A. Forensics analysis teamB. Internal auditorsC. Incident response teamD. Software vendors
C. Incident response team
QUESTION 10Which process will determine maximum tolerable downtime?A. Business Continuity PlanningB. Contingency PlanningC. Business Impact AnalysisD. Disaster Recovery Plan
C. Business Impact Analysis
QUESTION 11Which of the following provides the MOST protection against zero day attacks via email attachments?A. Anti-spamB. Anti-virusC. Host-based firewallsD. Patch management
A. Anti-spam
QUESTION 12Which of the following access controls enforces permissions based on data labeling at specific levels?A. Mandatory access controlB. Separation of duties access controlC. Discretionary access controlD. Role based access control
A. Mandatory access control
QUESTION 13A username provides which of the following?A. BiometricsB. IdentificationC. AuthorizationD. Authentication
B. Identification
QUESTION 14Use of group accounts should be minimized to ensure which of the following?A. Password securityB. Regular auditingC. Baseline managementD. Individual accountability
D. Individual accountability
QUESTION 15Privilege creep among long-term employees can be mitigated by which of the following procedures?A. User permission reviewsB. Mandatory vacationsC. Separation of dutiesD. Job function rotation
A. User permission reviews
QUESTION 16In which of the following scenarios is PKI LEAST hardened?A. The CRL is posted to a publicly accessible location.B. The recorded time offsets are developed with symmetric keys.C. A malicious CA certificate is loaded on all the clients.D. All public keys are accessed by an unauthorized user.
C. A malicious CA certificate is loaded on all the clients.
QUESTION 17A database server has been compromised via an unpatched vulnerability. An investigation reveals that an application crashed at the time of the compromise. Unauthorized code appeared to be running, although there were no traces of the code found on the file system. Which of the following attack types has MOST likely occurred?A. Zero day exploitB. SQL injectionC. LDAP injectionD. Buffer overflow
D. Buffer overflow
QUESTION 18Which of the following would Sara, a security administrator, utilize to actively test security controls within an organization?A. Penetration testB. BaseliningC. Code reviewD. Vulnerability scan
A. Penetration test
QUESTION 19Which of the following assessments would Pete, the security administrator, use to actively test that an application’s security controls are in place?A. Code reviewB. Penetration testC. Protocol analyzerD. Vulnerability scan
B. Penetration test
QUESTION 20Which of the following would Jane, a security administrator, take advantage of to bypass security controls and gain unauthorized remote access into an organization?A. Vulnerability scanB. Dumpster divingC. VirtualizationD. Penetration test
D. Penetration test
QUESTION 21Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?A. Penetration testB. Code reviewC. Vulnerability scanD. Brute Force scan
C. Vulnerability scan
QUESTION 22The finance department is growing and needs additional computers to support growth. The department also needs to ensure that their traffic is separated from the rest of the network. Matt, the security administrator, needs to add a new switch to accommodate this growth. Which of the following MUST Matt configure on the switch to ensure proper network separation?A. Implicit denyB. VLAN managementC. Access control listsD. Flood guards
B. VLAN management
QUESTION 23Pete, the security administrator, wants to ensure that only secure protocols are being used to transfer and copy files. Which of the following protocols should he implement?A. SMTPB. SCPC. FTPD. HTTPS
B. SCP - Secure Copy Protocol
QUESTION 24Sara, a security administrator, has recently implemented a policy to ban certain attachments from being sent through the corporate email server. This is an example of trying to mitigate which of the following?A. SQL injectionB. LDAP injectionC. Cross-site scriptingD. Malicious add-ons
D. Malicious add-ons