Final Exam Flashcards
Which of the following would enhance the security of accessing data stored in the cloud? (Select TWO)
SAML authentication
Predefined challenge questions
Transport encryption
Block level encryption
Multifactor authentication
Hashing
SAML authentication
& Multifactor authentication
The help desk received a call after hours from an employee who was attempting to log into the payroll server remotely. When the help desk returned the call the next morning, the employee was able to log into the server remotely without incident. However, the incident occurred again the next evening. Which of the following BEST describes the cause of the issue?
The password expired on the account and needed to be reset
The employee does not have the rights needed to access the database remotely
The employee’s account was locked out and needed to be unlocked
Time-of-day restrictions prevented the account from logging in
Time-of-day restrictions prevented the account from logging in
A company has a data classification system with definitions for “Private” and “Public”. The company’s security policy outlines how data should be protected based on type. The company recently added the data type “Proprietary”.
Which of the following is the MOST likely reason the company added this data type?
Expanded authority of the privacy officer
More searchable data
Better data classification
Reduced cost
Better data classification
Security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation.
Given these requirements, which of the following technologies should the analyst recommend and configure?
Kerberos services
LDAP Services
CHAP services
NTLM services
Kerberos services
Multiple organizations operating in the same vertical want to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?
OpenID connect
RADIUS federation
SAML
OAuth
Shibboleth
RADIUS federation
Joe, a security administrator, needs to extend the organization’s remote access functionality to be used by staff while traveling. Joe needs to maintain separate access control functionalities for internal, external, and VOIP services.
Which of the following represents the BEST access technology for Joe to use? (Choose Two)
Diameter
Radius
TACASC+
Kerberos
Radius
& TACASC+
A security administrator is evaluating three different services: radius, diameter, and Kerberos.
Which of the following is a feature that is UNIQUE to Kerberos?
It provides single sign-on capability
It uses XML for cross-platform interoperability
It provides authentication services
It uses tickets to identify authenticated users
It uses tickets to identify authenticated users
A company stores highly sensitive data files used by the accounting system on a server file share. The accounting system uses a service account named accounting-svc to access the file share. The data is protected will a full disk encryption, and the permissions are set as follows:
File system permissions: Users = Read Only
Share permission: accounting-svc = Read Only
Given the listed protections are in place and unchanged, to which of the following risks is the data still subject?
Remote exfiltration of data using domain credentials
Disclosure of sensitive data to third parties due to excessive share permissions
Theft of physical hard drives and a breach of confidentiality
Exploitation of local console access and removal of data
Exploitation of local console access and removal of data
A security analyst is investigating a suspected security breach and discovers the following in the logs of the potentially compromised server:
Question_Chap12_Q29-1.JPG
Which of the following would be the BEST method for preventing this type of suspected attack in the future?
Implement account lockout settings
Implement time-of-day restrictions on this server
Implement password expirations
Implement restrictions on shared credentials
Implement password expirations
During an application design, the development team designed a LDAP module for single sign-on communication with the company’s access control database. This is an example of which of the following?
Identification
Application control
Data in-transit
Authentication
Authentication
A systems administrator is configuring a system that uses data classification labels. Which of the following will the administrator need to implement to enforce access control?
Rule-based access control
Role-based access control
Mandatory access control
Discretionary access control
Mandatory access control
Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based authentication with its users. The company uses SSL-inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication.
Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?
Use of smartcards that store x.509 keys, signed by a global CA
Use of a third-party, SAML-based authentication service for attestation
Use of active directory federation between the company and the cloud-based service
Use of OATH between the user and the service and attestation from the company domain
Use of active directory federation between the company and the cloud-based service
A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?
Audit file access times
Implement time-of-day restrictions
Require swipe-card access to enter the lab
Secretly install a hidden surveillance camera
Require swipe-card access to enter the lab
An organization’s employees currently use three different sets of credentials to access multiple internal resources. Management wants to make this process less complex.
Which of the following would be the BEST option to meet this goal?
Single sign-on
Secure token
Transitive trust
Federation
Single sign-on
A security administrator is tasked with implementing centralized management of all network devices. Network administrators will be required to logon to network devices using their LDAP credentials. All command executed by network administrators on network devices must fall within a preset list of authorized commands and must be logged to a central facility.
Which of the following configuration commands should be implemented to enforce this requirement?
CN=company, CN=com, OU=netadmin, DC=192.32.10.233
LDAP server 10.55.199.3
SYSLOG SERVER 172.16.23.50
TACAS server 192.168.1.100
CN=company, CN=com, OU=netadmin, DC=192.32.10.233
A new intern in the purchasing department requires read access to shared documents. Permissions are normally controlled through a group called “Purchasing”, however, the purchasing group permissions allow write access.
Which of the following would be the BEST course of action?
Modify all the shared files with read only permissions for the intern
Remove all permissions for the shared files
Create a new group that has only read permissions for the files
Add the intern to the “Purchasing” group
Create a new group that has only read permissions for the files
A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile devices prior to providing the user with a captive portal login.
Which of the following should the systems administrator configure?
L2TP with MAC filtering
RADIUS federation
WPA2-CCMP with PSK
EAP-TTLS
RADIUS federation
A system administrator needs to implement 802.1x whereby when a user logs into the network, the authentication server communicates to the network switch and assigns the user to the proper VLAN.
Which of the following protocols should be used?
Kerberos
RADIUS
MSCHAP
LDAP
RADIUS
Joe notices there are several user accounts on the local network generating spam with embedded malicious code.
Which of the following technical control should Joe put in place to BEST reduce these incidents?
Account lockout
Least privilege
Group Based Privileges
Password complexity
Account lockout
Ann, a security administrator, wants to ensure credentials are encrypted in transit when implementing a RADIUS server for SSO.
Which of the following are needed given these requirements? (Select TWO)
Elliptic curve
Private key
DES
Shared key
Public key
MD5
Private key
& Public key
A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements:
- All access must be correlated to a user account.
- All user accounts must be assigned to a single individual.
- User access to the PHI data must be recorded.
- Anomalies in PHI data access must be reported.
- Logs and records cannot be deleted or modified.
Which of the following should the administrator implement to meet the above requirements? (Select three.)
Implement usage auditing and review.
Perform regular permission audits and reviews.
Enable account lockout thresholds.
Copy logs in real time to a secured WORM drive.
Eliminate shared accounts.
Create a standard naming convention for accounts.
Implement time-of-day restrictions.
Implement usage auditing and review.
& Perform regular permission audits and reviews.
& Eliminate shared accounts.
A company offers SaaS, maintaining all customers’ credentials and authenticating locally. Many large customers have requested the company offer some form of federation with their existing authentication infrastructures.
Which of the following would allow customers to manage authentication and authorizations from within their existing organizations?
“Implement SAML so the company’s services may accept assertions from the customers’ authentication servers.”
“Provide customers with a constrained interface to manage only their users’ accounts in the company’s active directory server.
“Use SOAP calls to support authentication between the company’s product and the customers’ authentication servers.
“Provide a system for customers to replicate their users’ passwords from their authentication service to the company’s.
“Implement SAML so the company’s services may accept assertions from the customers’ authentication servers.”
Which of the following is the proper order for logging a user into a system from the first step to the last step?
Authorization, identification, authentication
Identification, authentication, authorization
Authentication, identification, authorization
Identification, authorization, authentication
Authentication, identification, authorization
Identification, authentication, authorization
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?
Owner
User
Administrator
System
Administrator
A penetration tester finds that a company’s login credentials for the email client were being sent in clear text.
Which of the following should be done to provide encrypted logins to the email server?
Enable an SSL certificate for IMAP services.
Enable SSH and LDAP credentials.
Enable IPSec and configure SMTP.
Enable MIME services and POP3.
Enable an SSL certificate for IMAP services.
A security administrator has been assigned to review the security posture of the standard corporate system image for virtual machines. The security administrator conducts a thorough review of the system logs, installation procedures, and network configuration of the VM image. Upon reviewing the access logs and user accounts, the security administrator determines that several accounts will not be used in production.
Which of the following would correct the deficiencies?
Host hardening
Disable remote login
Mandatory access controls
Disabling services
Host hardening
A company’s loss control department identifies theft as a recurring loss type over the past year. Based on the department’s report, the Chief Information Officer (CIO) wants to detect theft of datacenter equipment.
Which of the following controls should be implemented?
Mantraps
Motion detectors
Cameras
Biometrics
Motion detectors
New magnetic locks were ordered for an entire building. In accordance with company policy, employee safety is the top priority.
In case of a fire where electricity is cut, which of the following should be taken into consideration when installing the new locks?
Fail secure
Fail safe
Fault tolerance
Redundancy
Fail safe
An audit report has identify a weakness that could allow unauthorized personnel access to the facility at its main entrance and from there gain access to the network.
Which of the following would BEST resolve the vulnerability?
Mantrap
Air gap
Bollards
Faraday cage
Mantrap
An organization requires users to provide their fingerprints to access an application. To improve security, the application developers intend to implement multifactor authentication.
Which of the following should be implemented?
Use a camera for facial recognition
Require a palm geometry scan
Have users sign their name naturally
Implement iris recognition
Have users sign their name naturally