Exam H Flashcards

1
Q

Which of the following is being used when a message is buried within the pixels of an image?
A. Steganography B. Block cipher C. Encryption D. Hashing

A

A. Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Elliptic curve cryptography: (Select TWO)

A. is used in both symmetric and asymmetric encryption.
B. is used mostly in symmetric encryption.
C. is mostly used in embedded devices.
D. produces higher strength encryption with shorter keys.
E. is mostly used in hashing algorithms.

A

C. is mostly used in embedded devices.D. produces higher strength encryption with shorter keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following would an antivirus company use to efficiently capture and analyze new and unknown malicious attacks?
A. Fuzzer B. IDS C. Proxy D. Honeynet

A

D. Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is used to translate a public IP to a private IP?
A. NAT
B. CCMP
C. NAC
D. VLAN
A

A. NAT - Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it important for a penetration tester to have established an agreement with management as to which systems and processes are allowed to be tested?A. Penetration test results are posted publicly, and some systems tested may contain corporate secrets.B. Penetration testers always need to have a comprehensive list of servers, operating systems, IP subnets, and department personnel prior to ensure a complete test.C. Having an agreement allows the penetration tester to look for other systems out of scope and test them for threats against the in-scope systems.D. Some exploits when tested can crash or corrupt a system causing downtime or data loss.

A

D. Some exploits when tested can crash or corrupt a system causing downtime or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An administrator wants to minimize the amount of time needed to perform backups during the week. It is also acceptable to the administrator for restoration to take an extended time frame. Which of the following strategies would the administrator MOST likely implement?
A. Full backups on the weekend and incremental during the week
B. Full backups on the weekend and full backups every day
C. Incremental backups on the weekend and differential backups every day
D. Differential backups on the weekend and full backups every day

A

A. Full backups on the weekend and incremental during the week

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following can be used in code signing?A. AES B. RC4 C. GPG D. CHAP

A

C. GPG - GNU Privacy Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sara, an administrator, disables the beacon function of an access point. Which of the following is accomplished by this?
A. The AP stops broadcasting radio frequencies.
B. The SSID is not broadcasted by the AP.
C. The AP presence is undetectable by wireless sniffers.
D. Wireless clients are now required to use 2.4 GHz.

A

B. The SSID is not broadcasted by the AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Jane, an administrator, needs to transfer DNS zone files from outside of the corporate network. Which of the following protocols must be used?
A. TCP B. ICMP C. UDP D. IP

A

A. TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common access cards use which of the following authentication models?
A. PKI B. XTACACS C. RADIUS D. TACACS

A

A. PK I- Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following does a second authentication requirement mitigate when accessing privileged areas of a website, such as password changes or user profile changes?
A. Cross-site scripting B. Cookie stealing C. Packet sniffing D. Transitive access

A

B. Cookie stealing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following should Sara, a security technician, educate users about when accessing the company wireless network?
A. IV attacks B. Vishing C. Rogue access points D. Hoaxes

A

C. Rogue access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pete, a security technician, has implemented data loss prevention on a company laptop. Which of the following does this protect against?
A. Connecting the company laptop to external data networks
B. Use of USB drives for legitimate operational purposes
C. Use of unencrypted USB drives for gray box testing
D. Removal of company information without authorization

A

D. Removal of company information without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sara, an IT security technician, needs to be able to identify who is in possession of a stolen laptop. Which of the following BEST addresses her need?A. Remote sanitization B. Remote wipe C. GPS tracking D. Traceroute

A

C. GPS tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION 15Which of the following will allow Sara, an IT security technician, to effectively identify a zero-day attack on her systems?A. Anti-malwareB. Antivirus signaturesC. Host software baselineD. Virtualization

A

C. Host software baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

QUESTION 16Mike, an IT security technician, needs to recommend an authentication mechanism which has a high probability of correctly identifying a user. Which of the following BEST meets this need?A. Separation of dutiesB. BiometricsC. PasswordsD. Access control list

A

B. Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QUESTION 17Jane receives a spreadsheet via email and double clicks the attachment executing another program inside the spreadsheet. Which of the following types of malware was executed?A. SpywareB. RootkitC. TrojanD. Botnet

A

C. Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

QUESTION 18Which of the following ports does DNS operate on, by default?A. 23B. 53C. 137D. 443

A

B. 53 DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

QUESTION 19Pete, the system administrator, is concerned about unauthorized access at all entrances into the building. PIN pad readers have been installed, but users have developed the habit of holding the door for others behind them. Which of the following would BEST prevent this?A. Install mantraps at every unmanned entrance.B. Replace the PIN pad readers with card readers.C. Implement video and audio surveillance equipment.D. Require users to sign conduct policies forbidding these actions.

A

A. Install mantraps at every unmanned entrance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Jane, a network administrator, has configured a 48-port switch to isolate four different departments. Which of the following has Jane MOST likely configured on the switch?
A. NAC B. 802.1x C. VLAN D. DMZ

A

C. VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?
A. Block cipher B. Stream cipher C. CRC D. Hashing algorithm

A

A. Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to?A. PAP, MSCHAPv2
B. CHAP, PAP
C. MSCHAPv2, NTLMv2
D. NTLM, NTLMv2

A

A. PAP, MSCHAPv2 (Password Authentication Protocol, Microsoft Challenge-Handshake Authentication Protocol v2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following BEST describes a SQL Injection attack?
A. The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.
B. The attacker attempts to have the receiving server run a payload using programming commonly found on web servers.
C. The attacker overwhelms a system or application, causing it to crash and bring the server down to cause an outage.
D. The attacker overwhelms a system or application, causing it to crash, and then redirects the memory address to read from a location holding the payload.

A

A. The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

QUESTION 25Which of the following is a hardware-based security technology included in a computer?A. Symmetric key B. Asymmetric key C. Whole disk encryption D. Trusted platform module

A

D. Trusted platform module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A password history value of three means which of the following?
A. Three different passwords are used before one can be reused.
B. A password cannot be reused once changed for three years.
C. After three hours a password must be re-entered to continue.
D. The server stores passwords in the database for three days.

A

A. Three different passwords are used before one can be reused.

27
Q

QUESTION 20Which of the following is a MAIN objective of implementing a clean desk user policy?A. Coax users into accepting cloud computing as a viable option.B. Enforce notions that other users cannot be trusted.C. Verify that user accounts are strong and complex.D. Ensure that no sensitive data is left unsupervised.

A

D. Ensure that no sensitive data is left unsupervised.

28
Q

QUESTION 27Which of the following devices is BEST suited for servers that need to store private keys?A. Hardware security moduleB. Hardened network firewallC. Solid state disk driveD. Hardened host firewall

A

A. Hardware security module

29
Q

QUESTION 28A targeted email attack sent to Sara, the company’s Chief Executive Officer (CEO), is known as which of the following?A. WhalingB. BluesnarfingC. VishingD. Dumpster diving

A

A. Whaling

30
Q

QUESTION 29In regards to secure coding practices, why is input validation important?A. It mitigates buffer overflow attacks.B. It makes the code more readable.C. It provides an application configuration baseline.D. It meets gray box testing standards.

A

A. It mitigates buffer overflow attacks.

31
Q

QUESTION 30A security administrator needs to determine which system a particular user is trying to login to at various times of the day. Which of the following log types would the administrator check?A. FirewallB. ApplicationC. IDSD. Security

A

D. Security

32
Q

QUESTION 31If Pete, a security administrator, wants to ensure that certain users can only gain access to the system during their respective shifts, which of the following best practices would he implement?A. Separation of dutiesB. Time of day restrictionsC. Implicit deny ruleD. Least privilege

A

B. Time of day restrictions

33
Q

QUESTION 32Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?A. RegistrationB. CAC. CRLD. Recovery agent

A

C. CRL - Certificate Revocation List

34
Q

QUESTION 33Which of the following application security testing techniques is implemented when an automated system generates random input data?A. FuzzingB. XSRFC. HardeningD. Input validation

A

A. Fuzzing

35
Q

QUESTION 34Which of the following can be used by a security administrator to successfully recover a user’s forgotten password on a password protected file?A. Cognitive passwordB. Password sniffingC. Brute forceD. Social engineering

A

C. Brute force

36
Q

QUESTION 35Which of the following BEST describes a protective countermeasure for SQL injection?A. Eliminating cross-site scripting vulnerabilitiesB. Installing an IDS to monitor network trafficC. Validating user input in web applicationsD. Placing a firewall between the Internet and database servers

A

C. Validating user input in web applications

37
Q

QUESTION 36Which of the following BEST describes a common security concern for cloud computing?A. Data may be accessed by third parties who have compromised the cloud platformB. Antivirus signatures are not compatible with virtualized environmentsC. Network connections are too slowD. CPU and memory resources may be consumed by other servers in the same cloud

A

A. Data may be accessed by third parties who have compromised the cloud platform

38
Q

QUESTION 37Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?A. Logic bombB. WormC. TrojanD. Adware

A

C. Trojan

39
Q

QUESTION 38Which of the following should be considered to mitigate data theft when using CAT5 wiring?A. CCTVB. Environmental monitoringC. Multimode fiberD. EMI shielding

A

D. EMI shielding

40
Q

QUESTION 39To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?A. ManagementB. AdministrativeC. TechnicalD. Operational

A

C. Technical

41
Q

QUESTION 40Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?A. Connect the WAP to a different switch.B. Create a voice VLAN.C. Create a DMZ.D. Set the switch ports to 802.1q mode.

A

B. Create a voice VLAN.

42
Q

QUESTION 41Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).A. 10.4.4.125B. 10.4.4.158C. 10.4.4.165D. 10.4.4.189E. 10.4.4.199

A

C. 10.4.4.165D. 10.4.4.189

43
Q

QUESTION 42Which of the following transportation encryption protocols should be used to ensure maximum security between a web browser and a web server?A. SSLv2B. SSHv1C. RSAD. TLS

A

D. TLS - Transport Layer Security

44
Q

QUESTION 43Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk?A. Incident managementB. Clean desk policyC. Routine auditsD. Change management

A

D. Change management

45
Q

QUESTION 44Which of the following is a difference between TFTP and FTP?A. TFTP is slower than FTP.B. TFTP is more secure than FTP.C. TFTP utilizes TCP and FTP uses UDP.D. TFTP utilizes UDP and FTP uses TCP.

A

D. TFTP utilizes UDP (69) and FTP uses TCP(20/21)(Trivial File Transfer Protocol, File Transfer Protocol)

46
Q

QUESTION 45Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?A. XSSB. SQL injectionC. Directory traversalD. Packet sniffing

A

D. Packet sniffing

47
Q

QUESTION 46Which of the following would MOST likely ensure that swap space on a hard disk is encrypted?A. Database encryptionB. Full disk encryptionC. Folder and file encryptionD. Removable media encryption

A

B. Full disk encryption

48
Q

QUESTION 47Configuring the mode, encryption methods, and security associations are part of which of the following?A. IPSecB. Full disk encryptionC. 802.1xD. PKI

A

A. IPSec - Internet Protocol Security

49
Q

QUESTION 48A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?A. ConfidentialityB. AvailabilityC. Succession planningD. Integrity

A

B. Availability

50
Q

QUESTION 49Which of the following should Matt, a security administrator, include when encrypting smartphones? (Select TWO).A. Steganography imagesB. Internal memoryC. Master boot recordsD. Removable memory cardsE. Public keys

A

B. Internal memoryD. Removable memory cards

51
Q

QUESTION 50A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?A. RADIUSB. TACACS+C. KerberosD. LDAP

A

B. TACACS+ - Terminal Access Controller Access-Control System Plus 49

52
Q

QUESTION 51Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?A. Business continuity planningB. Continuity of operationsC. Business impact analysisD. Succession planning

A

D. Succession planning

53
Q

QUESTION 52Which of the following protocols is used to authenticate the client and server’s digital certificate?A. PEAPB. DNSC. TLSD. ICMP

A

C. TLS - Transport Layer Security

54
Q

QUESTION 53Which of the following is an example of multifactor authentication?A. Credit card and PINB. Username and passwordC. Password and PIND. Fingerprint and retina scan

A

A. Credit card and PIN

55
Q

QUESTION 54After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen: `Please only use letters and numbers on these fields’ Which of the following is this an example of?A. Proper error handlingB. Proper input validationC. Improper input validationD. Improper error handling

A

B. Proper input validation

56
Q

QUESTION 55Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected?A. Application designB. Application securityC. Initial baseline configurationD. Management of interfaces

A

C. Initial baseline configuration

57
Q

QUESTION 56A marketing employee requests read and write permissions to the finance department’s folders. The security administrator partially denies this request and only gives the marketing employee read-only permissions. This is an example of which of the following?A. Job rotationB. Separation of dutiesC. Least privilegeD. Change management

A

C. Least privilege

58
Q

QUESTION 57Sara, a company’s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?A. Acceptable Use PolicyB. Physical security controlsC. Technical controlsD. Security awareness training

A

D. Security awareness training

59
Q

QUESTION 58Users at a company report that a popular news website keeps taking them to a web page with derogatory content. This is an example of which of the following?A. Evil twinB. DNS poisoningC. VishingD. Session hijacking

A

B. DNS 53 poisoning

60
Q

QUESTION 59Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees to have secure remote access to certain internal network services such as file servers?A. Packet filtering firewallB. VPN gatewayC. SwitchD. Router

A

B. VPN gateway

61
Q

QUESTION 60Which of the following could cause a browser to display the message below? “The security certificate presented by this website was issued for a different website’s address.”A. The website certificate was issued by a different CA than what the browser recognizes in its trusted CAs.B. The website is using a wildcard certificate issued for the company’s domain.C. HTTPS://127.0.01 was used instead of HTTPS://localhost.D. The website is using an expired self-signed certificate.

A

C. HTTPS://127.0.01 was used instead of HTTPS://localhost.