Mock exam 2 - Qs got wrong Flashcards

1
Q

Order of the risk response process

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What service can be used to bring shadow IT back under the corporate policy?

A

A cloud access security broker (CASB).

A CASB monitors user activities, notifies administrators about significant events, performs malware prevention and detection, and enforces compliance with security policies.

A CASB should report risks, see any shadow IT from one platform. Also use DLP to protect against data leaks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can you use secure cookies for?

A

To block vulnerabilities like XSS and session hijacking.

Why/how because they travel only over secure channels like HTTPS and can contain additional attributes including flags like ‘secure’ and ‘httponly’.

The Secure flag forces the cookie to only transmit over secure connections like https

Preventing cross-sited scripting can be done by preventing JavaScript from tampering with the cookie bia using the HttpOnly flag, blocking JavaScript.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What device do you install to ensure the computers on the network meet an org’s security policies.

A

NAC - network access control. Chekcs host for any devices connecting to the network, can allow or deny or place in quarantine.

Can be enforced based on location of the network user, group membership or other criteria.

MAC filtering is a form of NAC (MAC = Media Access Control).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When implementing a security solution for mobile devices, which two common use cases are of primary concern

A

** Lower power devices** - should use crypotgraphic techniques that need less time to encrypt and decrypt.

Low latency is a concern with any cipher. As = time plain text is input to cipher text being generated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two options are threat vectors used against vulnerable software?

Client-based
Default Credentials
Unsupported systems/apps
Agentless

A

Client-based, Agentless

Client-based attacks exploit vulnerabilities to aquire info. (Doesn’t need software).

Agentless uses web apps and services to aquire info from a computer or mob device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What use case involves the implementation of predefined policies and controls to enforce security standards and best practices

A

Guard rails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you use to incorporate SAML and SSO into a web app?

A

Shibboleth = is an SSO system that uses an ID provider and hardwareAuth is OAuth - which can grant an app limited access to a 3rd party site.

Uses SAML (Security Assertion markup Language) which defines security authorizations on web pages as opposed to web page elements in HTML.

Open ID connect provides the auth for OAuth. It doesn’t work with SAML. A secure token is used by Open ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 2 concepts associates with the zero trust data plan

A

Implicit trust zones
Subject/system.

Control plans manages users and devices on a network
Data plane manages movement of data in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a secure network, what is the default access control config for the firewalls you deploy

A

Explicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary goal of buffer overflow attacks

A

Memory injection - to put more info than can fit into an allocated area of memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is pharming

A

attacke redirects a web stie’s traffic to another, bogus site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Matching agreement names and their characteristics

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the charateristics of an emphermal credential

A

Temporary, short-lived
Can be revoked on demand
and automatically after a predefined period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two disadvantaes of using a cold site

A

Recovery time
Testing availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What port is telnet traffic on

17
Q

Key benefit of automation and scripting

A

Enforcing baselines = consistent application of predefined security and config across an org infrastructure

18
Q

For an SD-WAN (Software-defined WAN), what two actions do you use to secure it

A

Selecting effective controls

Conducting regular vulnerability scans

19
Q

Types of access control
Classifications of access control

20
Q

what is a rooted mobile device

A

A rooted mobile device, particularly an Android device, has gained superuser or administrative access, similar to jailbreaking an Apple device. This allows users to make modifications and changes to the device’s operating system that would otherwise be restricted by the manufacturer or carrier.