maybe this one? Flashcards
A penetration tester has written an application that performs a bit-by- bit XOR 0xFF operation on
binaries prior to transmission over untrusted media. Which of the following BEST describes the action
performed by this type of application?
Encryption
A company wants to ensure confidential data storage media is sanitized in such a way that the drive
cannot be reused. Which of the following methods should the technician use?
Shredding
A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is
looking for information about software versions on the network. Which of the following techniques is
the intruder using?
Banner grabbing
Which of the following specifically describes the exploitation of an interactive process to access
otherwise restricted areas of the OS?
Pivoting
When developing an application, executing a preconfigured set of instructions is known as:
A stored procedure
A network administrator needs to allocate a new network for the R&D group. The network must not be
accessible from the internet, regardless of the network firewall or other external misconfigurations.
Which of the following settings should the network administrator implement to accomplish this?
Enable protected ports on the switch
An application was recently compromised after some malformed data came in via a web form. Which of
the following would MOST likely have prevented this?
Input validation
When attackers use a compromised host as a platform for launching attacks deeper into a company’s
network, it is said that they are:
Pivoting
A new Chief Information Officer has been reviewing the badging procedures and decides to write a
policy that all employees must have their badges rekeyed at least annually. Which of the following
controls BEST describes this policy?
Administrative
Which of the following refers to the term used to restore a system to its operational state?
RPO
A security manager is creating an account management policy for a global organization with sales
personnel who must access corporate network resources while traveling all over the world. Which of the
following practices is the security manager MOST likely to enforce with the policy? (Select TWO)
Password complexity
Group-based access control
Which of the following would provide additional security by adding another factor to a smart card?
PIN
A security analyst is mitigating a pass-the- hash vulnerability on a Windows infrastructure. Given the
requirement, which of the following should the security analyst do to MINIMIZE the risk?
Disable NTLM
14.) A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The
main culprit of CPU utilization is the antivirus program. Which of the following issues could occour if left
unresolved?(Select TWO)
DoS attack
Resource exhaustion
A company has a data classification system with definitions for “Private” and “Public.” The company’s
security policy outlines how data should be protected based on type. The company recently added the
data type “Proprietary” which of the following is the MOST likely reason the company added this data
type.
More searchable data
A computer emergency response team is called at midnight to investigate a case in which a mail server
was restarted. After an initial investigation, it was discovered that email is being exfiltrated through an
active connection. Which of the following is the NEXT step the team should take?
Perform a containment procedure by disconnecting the server
A security engineer must install the same x.509 certificate on three different servers. The client
application that connects to the server performs a check to ensure the certificate matches the host
name. Which of the following should the security engineer use?
Certificate chaining
Which of the following BEST describes an important security advantage yielded by implementing vendor
diversity?
Resiliency
20.) Which of the following differentiates a collision attack from a rainbow table attack?
A rainbow table attack performs a hash lookup
Ransomware is detected on a database administrators workstation. Which of the following forensic
procedures should be performed FIRST to mitigate the threat?
Capture volatile memory
Ann, a new security specialists, is attempting to access the internet using the company’s open wireless
network. The wireless network is not encrypted, however, once associated, Ann cannot access the
internet or other resources. In an attempt to troubleshoot, she scans the wireless network with NMAP
and discovers the firewall is the only other device on the wireless network. Which of the following BEST
describes the company’s wireless network situation?
The company uses VPN to authenticate and encrypt connections and traffic
RJ-45 ports have been implemented on an embedded system to allow engineers more convenient
access. The network administrator has concerns regarding placing the equipment on the internal
network and exposing the devices. Which of the following would BEST meet both concerns if the
equipment is placed on the internal network?
Create a separate network segment for the equipment that only the engineers can access
Which of the following threats is BEST mitigated by application hardening and patching rather than
security training?
Software exploits
A security administrator generates a key pair and sends one key inside a request file to a third party. The
third party sends back a signed file. In this scenario, the key sent to the third party is called a:
Public key
An attacker drives past a company, captures the name of the WiFi network and locates a coffee shop
near the company. The attacker creates a mobile hotspot with the same name as the company’s WiFi.
Which of the following Best describes this wireless attack?
Evil twin
A developer needs to store sensitive employee information on a backend database. The sensitive
database records must be accessed by a public web server in the DMZ. Which of the following should be
implemented to secure the sensitive information stored in the database?
Store the sensitive records using irreversible encryption
To protect the confidentiality of a VPN session key, the administrator copies the key to a USB drive and
ships it overnight to a remote location. This type of key exchange is BEST described as:
Out-of- band
A company is experiencing problems with performance and downtime because application updates and
patching are being conducted on production systems during business hours. Users and other IT staff are
not being notified of the updates. Which of the following should be instituted to BEST resolve the
problems?
Change management
A Linux server using TCP wrappers is utilized in a SCADA environment. Which of the following entries
should be placed in the hosts.allow file to allow access on port 22 for a client at 192.168.14.127?
In.ssh 192.168.14.127
A service desk manager is developing an SLA to be used with a new customer. As part of the SLA, various
metrics regarding uptime, responsiveness, and remediation are being identified. Given the manager’s
unfamiliarity with the products being supported, which of the following metrics would be MOST
important to solicit from the customer to determine how much downtime should be expected?
MTBF, MTTF
Members of a production team have been using the username and password of Ann, and employee, to
log into their workstations because Ann has elevated privileges. The administrator wants to prevent
unauthorized users from logging in with false credentials, while still allowing Ann to continue to utilize
her provided equipment. Which of the following should the administrator configure to achieve this?
Authorized workstations
A company needs to adopt a single tenant CSP due to strict regulatory compliance issues. The company
wants the CSP to be available at all times and accessible from anywhere over the internet. Which of the
following solutions should the company adopt?
Private cloud
A security administrator spots the following log entry fragment on a web server:
GET /home.aspx?id=
alert(document.cookie)
Which of the following types of attacks was attempted?
Cross-site scripting
A systems administrator wants to install a new PKI certificate on a web server. The administrator creates
a CSR. Which of the following should the administrator send to the CA to issue a trusted certificate?
The web server’s public key
A malicious user attempts to access a company’s wireless network from the parking lot. Upon launching
the wireless network from the parking lot. Upon launching the wireless scanner, the malicious user
activates the SSID decloak feature and views many other SSID’s. However, the company’s SSID does not
appear as an available network in the tool. Which of the following is preventing the malicious user form
scanning the company’s wireless network?
Low-power directional antennas
A new security policy being implemented requires all email within the organization be digitally signed by
the author using PGP. Which of the following would needs to be created for each user?
A public and private key
While responding to an incident on a Linux server, the administrator needs to disable unused services.
Which of the following commands can be used to see processes that are listening on a TCP port?
Lsof
An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized while the
computer is in use. Which of the following can be implemented
Cluster tip wiping
Which of the following access controls enforces permissions based on data labeling at specific levels?
Mandatory access control
A security technician would like an application to use random salts to generate short lived encryption
leys during the secure communication handshake process to increase communication security. Which of
the following concepts would BEST meet this goal?
Symmetric Encryption Keys
Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets
to a competitor. Joe had already been working for two hours before leaving the premises.
A security technician was asked to prepare a report of files that had changed since last night’s integrity
scan.
Which of the following could the technician use to prepare the report? (Select TWO).
MD5
HMAC
A breach at a credit card company resulted in customers credit card information being exposed . The
company has conducted a full forensic investigation and identified the source of the breach. Which of
the following should the company do NEXT?
Implement damage and loss control procedures
A security administrator discovered that all communication over the company’s encrypted wireless
network is being captured by savvy employees with a wireless sniffing tool and is then being decrypted
in an attempt to steal other employee’s credentials. Which of the following technology is MOST likely in
use on the company’s wireless?
WEP 128-PSK
An administrator is implementing a new management system for the machinery on the company’s
production line. One requirement is that the system only be accessible while within the production
facility. Which of the following will be the MOST effective solution in limiting access based on this
requirement?
Access control list
Which of the following is a security concern regarding users bringing personally-owned devices that they
connect to the corporate network?
Lack of controls in place to ensure that the devices have the latest system patches and signature files
Which of the following offerings typically allows the customer to apply operating system patches?
Infrastructure as a service
A thief has stolen mobile device and removed its battery to circumvent GPS location tracking. The device
user is a four digit PIN. Which of the following is a mobile device security control that ensures the
confidentiality of company data?
Full device encryption
The security administrator is analyzing a user’s history file on a Unix server to determine if the user was
attempting to break out of a rootjail. Which of the following lines in the user’s history log shows
evidence that the user attempted to escape the rootjail?
cd ../../../../bin/bash
Due to issues with building keys being duplicated and distributed, a security administrator wishes to
change to a different security control regarding a restricted area. The goal is to provide access based
upon facial recognition. Which of the following will address this requirement?
Place a guard at the entrance to approve access.
Anne an employee receives the following email:
From: Human Resources
To: Employee
Subject: Updated employee code of conduct
Please click on the following link: http//external.site.com/codeofconduct.exe to review the updated
code of conduct at your earliest convenience.
After clicking the email link, her computer is compromised. Which of the following principles of social
engineering was used to lure Anne into clicking the phishing link in the above email?
Familiarity
Which of the following is an XML based open standard used in the exchange of authentication and
authorization information between different parties?
SAML
A security administrator must implement a network that is immune to ARP spoofing attacks. Which of
the following should be implemented to ensure that a malicious insider will not be able to successfully
use ARP spoofing techniques?
IPv6
Although a vulnerability scan report shows no vulnerabilities have been discovered, a subsequent
penetration test reveals vulnerabilities on the network. Which of the following has been reported by the
vulnerability scan?
False negative
A company used a partner company to develop critical components of an application. Several
employees of the partner company have been arrested for cybercrime activities. Which of the following
should be done to protect the interest of the company?
Perform a penetration test against the application
A recently installed application update caused a vital application to crash during the middle of the
workday. The application remained down until a previous version could be reinstalled on the server, and
this resulted in a significant loss of data and revenue.
Which of the following could BEST prevent this issue from occurring again?
Application patch management
A systems administrator has implemented PKI on a classified government network. In the event that a
disconnect occurs from the primary CA, which of the following should be accessible locally from every
site to ensure users with bad certificates cannot gain access to the network?
A CRL
The loss prevention department has purchased a new application that allows the employees to monitor
the alarm systems at remote locations. However, the application fails to connect to the vendor’s server
and the users are unable to log in. Which of the following are the MOST likely causes of this issue?
(Select TWO).
URL filtering
Firewall rules
Which of the following steps in incident response procedures entails of the incident and identification of
knowledge gained that can be applied to future handling of incidents?
Lessons learned
Which of the following protocols operates at the HIGHEST level of the OSI model?
SCP
An administrator implements SELinux on a production web server. After implementing this, the web
server no longer serves up files from users’ home directories. To rectify this, the administrator creates a
new policy as the root user. This is an example of which of the following? (Select Two).
Enforcing SELinux in the OS kernel is mandatory access control
The policy added by the root user is rule-based access control
Which of the following documents outlines the technical and security requirements of an agreement
between organizations?
ISA
Which of the following is a penetration testing method?
Calling the target’s helpdesk, requesting a password reset
Which of the following types of technologies is used by security and research personnel for
identification and analysis of new security threats in a networked environment by using false data/hosts
for information collection?
Honeynet
When confidentiality is the primary concern, and a secure channel for key exchange is not available,
which of the following should be used for transmitting company documents?
Asymmetric
A new web server has been provisioned at a third party hosting provider for processing credit card
transactions. The security administrator runs the netstat command on the server and notices that ports
80, 443 and 3389 are in listening state. No other ports are open. Which of the following services should
be disabled to ensure secure communications?
HTTP
A security administrator must implement a network that is immune to ARP spoofing attacks. Which of
the following should be implemented to ensure that a malicious insider will not be able to successfully
use ARP spoofing techniques?
IPv6
After working on his doctoral dissertation for two years, Joe, a user, is unable to open his dissertation
file. The screen shows a warning that the dissertation file is corrupted because it is infected with a
backdoor, and can only be recovered by upgrading the antivirus software from the free version to the
commercial version. Which of the following types of malware is the laptop MOST likely infected with?
Ransomware
The loss prevention department has purchased a new application that allows the employees to monitor
the alarm systems at remote locations. However, the application fails to connect to the vendor’s server
and the users are unable to log in. Which of the following are the MOST likely causes of this issue?
URL filtering
Firewall Rules
Joe must send Ann a message and provide Ann with assurance that he was the actual sender. Which of
the following will Joe need to use to BEST accomplish the objective?
His private key
Which of the following protocols is MOST likely to be leveraged by users who need additional
information about another user?
LDAP
A retail store uses a wireless network for its employees to access inventory from anywhere in the store.
Due to concerns regarding the aging wireless network, the store manager has brought in a consultant to
harden the network. During the site survey, the consultant discovers that the network was using WEP
encryption. Which of the following would be the BEST course of action for the consultant to
recommend?
Change the encryption used so that the encryption protocol is CCMP-based.
A security team has established a security awareness program. Which of the following would BEST prove
the success of the program?
Metrics
Which of the following should an administrator implement to research current attack methodologies?
Honeypot
After analyzing and correlating activity from multiple sensors, the security administrator has determined
that a group of very well organized individuals from an enemy country is responsible for various
attempts to breach the company network, through the use of very sophisticated and targeted attacks.
Which of the following is this an example of?
Advanced persistent threat
Which of the following types of attacks involves interception of authentication traffic in an attempt to
gain unauthorized access to a wireless network?
IV attack
Alice, a security analyst, is reviewing logs from hosts across the Internet which her company uses to
gather data on new malware. Which of the following is being implemented by Alice’s company?
Honeynet
A company is looking to improve their security posture by addressing risks uncovered by a recent
penetration test. Which of the following risks is MOST likely to affect the business on a day-to- day basis?
Lack of antivirus software
Which system should you implement if you want to create a file system access control model where you
can label files as “Secret” Confidential”
Restricted
Unclassified
Trusted OS
Bob, an employee, was escorted from the company premises due to suspicion of revealing trade secrets
to a competitor. Bob had already been working for two hours before leaving the premises. A security
technician was asked to prepare a report of files that had changed since last night;s integrity scan. Which
of the following could the technician use to prepare the report? (Select TWO).
MD5
HMAC
Which is the hardest to crack and requires both parties to exchange the encryption key before
communicating?
One-time pads
Bob needs to send Sally a digitally signed and encrypted email. Which algorithms and keys is used to
complete these actions?
Sally’s public key to encrypt using 3DES, Bob’s private key to sign using SHA
order to digitally sign your emails with PGP, what needs to be created first?
A public and private key
85.) If you need to look at a former employee’s email for a court case but the emails have been deleted, you
should take a look at your?
Data retention policies
Which of the following can be used to ensure that sensitive records stored on a backend server can only
be accessed by a front end server with the appropriate record key?
File encryption
In Kerberos, the Ticket Granting Ticket (TGT) is used for which of the following?
Authentication
In order to secure additional budget, a security manager wants to quantify the financial impact of a one-
time compromise. Which of the following is MOST important to the security manager?
SLE
A security technician is implementing PKI on a Network. The technician wishes to reduce the amount of
bandwidth used when verifying the validity of a certificate. Which of the following should the technician
implement?
CRL
An access point has been configured for AES encryption but a client is unable to connect to it. Which of
the following should be configured on the client to fix this issue?
CCMP
A company wants to improve its overall security posture by deploying environmental controls in its
datacenter. Which of the following is considered an environmental control that can be deployed to meet
this goal?
Proximity readers
Ann, a security administrator, is strengthening the security controls of the company’s campus. Her goal
is to prevent people from accessing open locations that are not supervised, such as around the receiving
dock. She is also concerned that employees are using these entry points as a way of bypassing the
security guard at the main entrance. Which of the following should Ann recommend that would BEST
address her concerns?
Build fences around campus with gate entrances
A security administrator is responsible for ensuring that there are no unauthorized devices utilizing the
corporate network. During a routine scan, the security administrator discovers an unauthorized device
belonging to a user in the marketing department. The user is using an android phone in order to browse
websites. Which of the following device attributes was used to determine that the device was
unauthorized?
A MAC address
A security administrator is notified that users attached to a particular switch are having intermittent
connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing attack.
Which of the following could be utilized to provide protection from this type of attack?
Configure flood guards on the switch
A software security concern when dealing with hardware and devices that have embedded software or
operating systems is:
The vendor may not have a method for installation of patches