Exam H Flashcards
Which of the following is being used when a message is buried within the pixels of an image?
A. Steganography B. Block cipher C. Encryption D. Hashing
A. Steganography
Elliptic curve cryptography: (Select TWO)
A. is used in both symmetric and asymmetric encryption.
B. is used mostly in symmetric encryption.
C. is mostly used in embedded devices.
D. produces higher strength encryption with shorter keys.
E. is mostly used in hashing algorithms.
C. is mostly used in embedded devices.D. produces higher strength encryption with shorter keys.
Which of the following would an antivirus company use to efficiently capture and analyze new and unknown malicious attacks?
A. Fuzzer B. IDS C. Proxy D. Honeynet
D. Honeynet
Which of the following is used to translate a public IP to a private IP? A. NAT B. CCMP C. NAC D. VLAN
A. NAT - Network Address Translation
Why is it important for a penetration tester to have established an agreement with management as to which systems and processes are allowed to be tested?A. Penetration test results are posted publicly, and some systems tested may contain corporate secrets.B. Penetration testers always need to have a comprehensive list of servers, operating systems, IP subnets, and department personnel prior to ensure a complete test.C. Having an agreement allows the penetration tester to look for other systems out of scope and test them for threats against the in-scope systems.D. Some exploits when tested can crash or corrupt a system causing downtime or data loss.
D. Some exploits when tested can crash or corrupt a system causing downtime or data loss.
An administrator wants to minimize the amount of time needed to perform backups during the week. It is also acceptable to the administrator for restoration to take an extended time frame. Which of the following strategies would the administrator MOST likely implement?
A. Full backups on the weekend and incremental during the week
B. Full backups on the weekend and full backups every day
C. Incremental backups on the weekend and differential backups every day
D. Differential backups on the weekend and full backups every day
A. Full backups on the weekend and incremental during the week
Which of the following can be used in code signing?A. AES B. RC4 C. GPG D. CHAP
C. GPG - GNU Privacy Guard
Sara, an administrator, disables the beacon function of an access point. Which of the following is accomplished by this?
A. The AP stops broadcasting radio frequencies.
B. The SSID is not broadcasted by the AP.
C. The AP presence is undetectable by wireless sniffers.
D. Wireless clients are now required to use 2.4 GHz.
B. The SSID is not broadcasted by the AP.
Jane, an administrator, needs to transfer DNS zone files from outside of the corporate network. Which of the following protocols must be used?
A. TCP B. ICMP C. UDP D. IP
A. TCP
Common access cards use which of the following authentication models?
A. PKI B. XTACACS C. RADIUS D. TACACS
A. PK I- Public Key Infrastructure
Which of the following does a second authentication requirement mitigate when accessing privileged areas of a website, such as password changes or user profile changes?
A. Cross-site scripting B. Cookie stealing C. Packet sniffing D. Transitive access
B. Cookie stealing
Which of the following should Sara, a security technician, educate users about when accessing the company wireless network?
A. IV attacks B. Vishing C. Rogue access points D. Hoaxes
C. Rogue access points
Pete, a security technician, has implemented data loss prevention on a company laptop. Which of the following does this protect against?
A. Connecting the company laptop to external data networks
B. Use of USB drives for legitimate operational purposes
C. Use of unencrypted USB drives for gray box testing
D. Removal of company information without authorization
D. Removal of company information without authorization
Sara, an IT security technician, needs to be able to identify who is in possession of a stolen laptop. Which of the following BEST addresses her need?A. Remote sanitization B. Remote wipe C. GPS tracking D. Traceroute
C. GPS tracking
QUESTION 15Which of the following will allow Sara, an IT security technician, to effectively identify a zero-day attack on her systems?A. Anti-malwareB. Antivirus signaturesC. Host software baselineD. Virtualization
C. Host software baseline
QUESTION 16Mike, an IT security technician, needs to recommend an authentication mechanism which has a high probability of correctly identifying a user. Which of the following BEST meets this need?A. Separation of dutiesB. BiometricsC. PasswordsD. Access control list
B. Biometrics
QUESTION 17Jane receives a spreadsheet via email and double clicks the attachment executing another program inside the spreadsheet. Which of the following types of malware was executed?A. SpywareB. RootkitC. TrojanD. Botnet
C. Trojan
QUESTION 18Which of the following ports does DNS operate on, by default?A. 23B. 53C. 137D. 443
B. 53 DNS
QUESTION 19Pete, the system administrator, is concerned about unauthorized access at all entrances into the building. PIN pad readers have been installed, but users have developed the habit of holding the door for others behind them. Which of the following would BEST prevent this?A. Install mantraps at every unmanned entrance.B. Replace the PIN pad readers with card readers.C. Implement video and audio surveillance equipment.D. Require users to sign conduct policies forbidding these actions.
A. Install mantraps at every unmanned entrance.
Jane, a network administrator, has configured a 48-port switch to isolate four different departments. Which of the following has Jane MOST likely configured on the switch?
A. NAC B. 802.1x C. VLAN D. DMZ
C. VLAN
A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?
A. Block cipher B. Stream cipher C. CRC D. Hashing algorithm
A. Block cipher
Pete, a security auditor, has detected clear text passwords between the RADIUS server and the authenticator. Which of the following is configured in the RADIUS server and what technologies should the authentication protocol be changed to?A. PAP, MSCHAPv2
B. CHAP, PAP
C. MSCHAPv2, NTLMv2
D. NTLM, NTLMv2
A. PAP, MSCHAPv2 (Password Authentication Protocol, Microsoft Challenge-Handshake Authentication Protocol v2)
Which of the following BEST describes a SQL Injection attack?
A. The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.
B. The attacker attempts to have the receiving server run a payload using programming commonly found on web servers.
C. The attacker overwhelms a system or application, causing it to crash and bring the server down to cause an outage.
D. The attacker overwhelms a system or application, causing it to crash, and then redirects the memory address to read from a location holding the payload.
A. The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.
QUESTION 25Which of the following is a hardware-based security technology included in a computer?A. Symmetric key B. Asymmetric key C. Whole disk encryption D. Trusted platform module
D. Trusted platform module