Group 10 Flashcards
Which of the following management processes allots ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?
A. Compliance
B. Configuration
C. Identity
D. Patch
Answer: B
Which of the following practices provides the development team with a definition of security and identification of threats in designing software?
A. Penetration testing
B. Stakeholder review
C. Threat modeling
D. Requirements review
Answer: C
Which of the following is a peor entity authentication method for Point-to-Point Protocol (PPP)?
A. Challenge Handshake Authentication Protocol (CHAP)
B. Message Authentication Code (MAC)
C. Transport Layer Security (TLS) handshake protocol
D. Challenge-response authentication mechanism
Answer: A
What form of attack could this represent?
A. A Denial of Service (DoS) attack against the gateway router because the router can no longer accept packets from
B. A transport layer attack that prevents the resolution of 10.102.10.6 address
C. A Denial of Service (DoS) attack against 10.102.10.2 because it cannot respond correctly to ARP requests
D. A masquerading attack that sends packets intended for 10.102.10.6 to 10.102.10.2
Answer: D
Which of the following value comparisons MOST accurately reflects the agile development approach?
A. Processes and toots over individuals and interactions
B. Contract negotiation over customer collaboration
C. Following a plan over responding to change
D. Working software over comprehensive documentation
Answer: D
Which of the following needs to be included in order for High Availability (HA) to continue operations during planned system outages?
A. Redundant hardware, disk spanning, and patching
B. Load balancing, power reserves, and disk spanning
C. Backups, clustering, and power reserves
D. Clustering, load balancing, and fault-tolerant options
Answer: D
Which of the following is the MOST effective countermeasure against Man-in-the Middle (MITM) attacks while using online banking?
A. Transport Layer Security (TLS)
B. Secure Sockets Layer (SSL)
C. Pretty Good Privacy (PGP)
D. Secure Shell (SSH)
Answer: A
According to the Capability Maturity Model Integration (CMMI), which of the following levels is identified by a managed process that is tailored from the organization’s set of standard processes according to the organization’s tailoring guidelines?
A. Level 0: Incomplete
B. Level 1: Performed
C. Level 2: Managed
D. Level 3: Defined
Answer: D
Point-to-Point Protocol (PPP) was designed to specifically address what issue?
A. A common design flaw in telephone modems
B. Speed and reliability issues between dial-up users and Internet Service Providers (ISP).
C. Compatibility issues with personal computers and web browsers
D. The security of dial-up connections to remote networks
Answer: B
Which of the following is an advantage of’ Secure Shell (SSH)?
A. It operates at the network layer.
B. It encrypts transmitted User ID and passwords.
C. It uses challenge-response to authenticate each party.
D. It uses the International Data Encryption Algorithm (IDEA) for data privacy.
Answer: C
A security engineer is designing a Customer Relationship Management (CRM) application for a third- party vendor. In which phase of the System Development Life Cycle (SDLC) will it be MOST beneficial to conduct a data sensitivity assessment?
A. Development / Acquisition
B. Initiation
C. Enumeration
D. Operation / Maintenance
Answer: B
Which of the following is a PRIMARY challenge when running a penetration test?
A. Determining the cost
B. Establishing a business case
C. Remediating found vulnerabilities
D. Determining the depth of coverage
Answer: D
Which one of the following would cause an immediate review and possible change to the security policies of an organization?
A. Change in technology
B. Change in senior management
C. Change to organization processes
D. Change to organization goals
Answer: D
An audit of an application reveals that the current configuration does not match the configuration of the originally implemented application. Which of the following is the FIRST action to be taken?
A. Recommend an update to the change control process.
B. Verify the approval of the configuration change.
C. Roll back the application to the original configuration.
D. Document the changes to the configuration.
Answer: B
What is the BEST method if an investigator wishes to analyze a hard drive which may be used as evidence?
A. Leave the hard drive in place and use only verified and authenticated Operating Systems (OS) utilities …
B. Log into the system and immediately make a copy of all relevant files to a Write Once, Read Many
…
C. Remove the hard drive from the system and make a copy of the hard drive’s contents using imaging hardware.
D. Use a separate bootable device to make a copy of the hard drive before booting the system and analyzing the hard drive.
Answer: C
Which of the following provides the GREATEST level of data security for a Virtual Private Network (VPN) connection?
A. Internet Protocol Payload Compression (IPComp)
B. Internet Protocol Security (IPSec)
C. Extensible Authentication Protocol (EAP)
D. Remote Authentication Dial-In User Service (RADIUS)
Answer: B
A. The signer verifies that the software being loaded is the software originated by the signer.
B. The vendor certifies the software being loaded is free of malicious code and that it was originated by the signer.
C. The signer verifies that the software being loaded is free of malicious code.
D. Both vendor and the signer certify the software being loaded is free of malicious code and it was originated by the signer.
Answer: A
What is the PRIMARY objective for conducting an internal security audit?
A. Verify that all systems and Standard Operating Procedures (SOP) are properly documented.
B. Verify that all personnel supporting a system are knowledgeable of their responsibilities.
C. Verify that security controls are established following best practices.
D. Verify that applicable security controls are implemented and effective.
Answer: D
What is the PRIMARY purpose for an organization to conduct a security audit?
A. To ensure the organization is adhering to a well-defined standard
B. To ensure the organization is applying security controls to mitigate identified risks
C. To ensure the organization is configuring information systems efficiently
D. To ensure the organization is documenting findings
Answer: A
Which testing method requires very limited or no information about the network infrastructure?
A. While box
B. Static
C. Black box
D. Stress
Answer: C
Which of the following is a MAJOR concern when there is a need to preserve or retain information for future retrieval?
A. Laws and regulations may change in the interim, making it unnecessary to retain the information.
B. The expense of retaining the information could become untenable for the organization.
C. The organization may lose track of the information and not dispose of it securely.
D. The technology needed to retrieve the information may not be available in the future.
Answer: C
Which of the following types of data would be MOST difficult to detect by a forensic examiner?
A. Slack space data
B. Steganographic data
C. File system deleted data
D. Data stored with a different file type extension
Answer: C
Following a penetration test, what should an organization do FIRST?
A. Review all security policies and procedures.
B. Ensure staff is trained in security.
C. Determine if you need to conduct a full security assessment.
D. Evaluate the problems identified in the test result.
Answer: D
An Intrusion Detection System (IDS) is based on the general hypothesis that a security violation is associated with a pattern of system usage which can be
A. differentiated from a normal usage pattern.
B. used to detect known violations.
C. used to detect a masquerader.
D. differentiated to detect all security violations.
Answer: A