Mitigating Security Threats Flashcards
You have enabled encryption for cloud-based virtual machine hard disks. To which term does this configuration apply?
Availability
Integrity
Confidentiality
Confidentiality
Encryption of data at rest or network transmissions provides confidentiality in that only possessors of a decryption key can return the cipher text to its original plain text form
Your manager suggests using laptop hardware to store cryptographic keys that are used to protect disks in a Windows 10 laptop. Which type of hardware is required to implement this plan?
HSM
Load balancer
TPM
TPM
Trusted platform module (TPM) security firmware is embedded in some computer systems and supports boot process integrity and the storage of cryptographic keys used by that machine
You have decided to use a centralized hardware solution for storing cryptographic keys. The keys will be used to protect data at rest. Which type of hardware is required to implement this plan?
HSM
Load balancer
TPM
HSM
A hardware security module (HSM) is an appliance that is used to securely store cryptographic secrets that can be accessed by multiple hosts. In the cloud, managed HSM solutions are referred to as HSM as a service (HSMaaS)
Your Windows laptop has a single disk containing operating system files and data. The machine does not support TPM, and a local cryptographic key must be used to encrypt and decrypt the drive. What should you configure?
HSM
Group policy
A removable USB drive containing the key
A removable USB drive containing the key
Many disk encryption solutions allow the decryption key to be provided through a removable USB drive, which is often used in place of trusted platform module (TPM) firmware key storage
To which OSI model layer do port numbers apply?
Network
Session
Transport
Transport
Layer 4 of the Open Systems Interconnect (OSI) model is the transport layer, which can use User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) port numbers to identify a network service running on a host. Port numbers are layer 4 addresses
You are attempting to use SSH to remotely manage a running Linux server hosted in the cloud, but the connection is never made. Standard TCP port numbers are being used. What is the most likely cause of the problem?
Port 23 traffic is blocked.
Port 389 traffic is blocked.
Port 22 traffic is blocked.
Port 22 traffic is blocked.
Secure Shell (SSH) is commonly used to remotely manage network equipment as well as Unix and Linux hosts. The standard SSH port number is TCP port 22
You are part of a penetration testing team hired to test an organization’s network security. The first phase of the test involves reconnaissance to discover which network services might be exposed to the Internet. Which tool should be used to complete this phase as quickly as possible?
Vulnerability scanner
HSM
Port scanner
Port scanner
Port scanners can scan a single host or multiple hosts for open ports
Your load balancer is configured with a TLS certificate and contacts backend web application servers listening on TCP port 8081. Users must be able to access the web application using standard TCP port numbers in their web browsers. Which listening port should you configure on the load balancer?
25
80
443
443
TCP port 443 is the standard HTTPS port. Users do not have to enter in the port number in their web browser address bar when standard port numbers for HTTP and HTTPS are in use
Your IoT video surveillance device allows remote management connections over HTTPS. To increase security, you want to use a nonstandard port number exposed to the Internet for managing the IoT device. What should you configure?
Port forwarding
TLS
Load balancer
Port forwarding
Port forwarding enables a device to listen on a configured port number for an external interface, which is then sent internally to devices using either the same or a different port number. In this case, a port number other than 443 (HTTPS) should be used to increase security. If you’re using a web browser to connect to IoT devices, the port number will have to follow the IP address or hostname after a full colon (:), such as https://mydevice.local:2000
What should you recommend to harden a Linux computer that is currently configured and being used in the following way?
.The computer administrator signs in using the default root account.
.Remote SSH management is done using the default port number.
.For confidentiality purposes, file hashes of customer financial transaction data have been generated on a local disk volume where the source data is also stored.
Use the sudo command, change port 22 to a nonstandard port, and encrypt customer data.
Change port 22 to a nonstandard port and regenerate updated customer data file hashes.
Change port 80 to a nonstandard port and regenerate updated customer data file hashes.
Use the sudo command, change port 22 to a nonstandard port, and encrypt customer data.
The sudo command is used to run other commands with escalated privileges when you’re not logged in using the root account (logging in as root is not recommended for security reasons). Changing default port numbers, such as TCP 22 for SSH, is one way to harden network services. Hashing customer data files can be used to determine whether the data has been tampered with, but encryption ensures that only authorized parties can even read customer data
You need to apply security settings to the registry on a Windows server. Which command should you use?
cipher
certutil
regedit
regedit
The Windows regedit command enables Windows administrators to view and modify registry entries, import and export registry settings, and set permissions to different parts of the registry
An application named APP1 runs on a domain-joined Windows server named SERVER1. When APP1 runs, it reads and writes to a specific registry key. You need to harden APP1’s access to the registry. What should you do?
Create a service account for APP1 and assign the service account the appropriate registry permissions using regedit.exe.
Create a service account for SERVER1 and assign the service account the appropriate registry permissions using regedit.exe.
Create a service account for APP1 and add it as a member to the Domain Admins group.
Create a service account for APP1 and assign the service account the appropriate registry permissions using regedit.exe.
Software requiring specific permissions can be configured to use a service account, which can then be granted specific permissions to parts of the Windows registry using the regedit.exe tool
You need to use a command line tool to disable the Windows AutoRun feature in the Windows registry on Microsoft Windows Server Core computers. You have exported the appropriate registry settings to a file named DISABLEAUTORUN.REG. Which command should you issue on Server Core computers?
cipher disableautorun.reg
msconfig disableautorun.reg
regedit disableautorun.reg
regedit disableautorun.reg
The regedit command can be used to manipulate the Windows registry, including importing .reg files
Which regedit.exe command line parameter is used to export a registry subkey?
regedit /S
regedit /Export
regedit /E
regedit /E
The /E switch for the regedit command means “export.” A filename must also be specified
Your organization uses Windows desktop computers. You need to implement an efficient solution for deploying updates to the Windows computers. What should you deploy?
HSM
WSUS
TLS
WSUS
Windows Server Update Services (WSUS) is a Windows Server role designed to provide updates to internal Windows hosts instead of all internal Windows hosts pulling down updates