PFS 1-50 Flashcards
A security analyst is reviewing the following output from a system:
TCP 192.168.10.10:80 192.168.1.2:60101 TIME WAIT
TCP 192.168.10.10:80 192.168.1.2:60102 TIME WAIT
TCP 192.168.10.10:80 192.168.1.2:60103
TIME WAIT
TCP 192-168.10.10:80 192.168.1.2:60104 TIME WAIT
TCP 192.168.10.10:80 192.168.1-2:60105
TIME WAIT
TCP 192.168.10.10:80 192.168.1.2:60106 TIME WAIT
TCP 192.166.10.10:80 192.168.1.2:60107
TIME WAIT
TCP 192.168.10.10:80 192.168.1.2:60108 TIME WAIT
TCP 192.168.10.10:80 192.168.1.2:60109 TIME WAIT
TCP 192.168.10.10:80 192.168.1.2:60110 TIME_ WAIT
Which of the following is MOST likely being observed?
A.) ARP poisoning
B.) Man in the middle
C.) Denial of service
D.) DNS poisoning
C. Denial of Service
A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analvst include in this documentation? (Choose two.)
A The order of volatility
B A CRC32 checksum
C The provenance of the artifacts
D The vendor’s name
E The date and time
F A warning banner
C The provenance of the artifacts
E The date and time
Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?
A CVSS
B SIEM
C SOAR
D CVE
A. CVSS
A penetration tester is fuzzing an application to identify where the EIP of the stack is located on memory. Which of the following attacks is the penetration tester planning to execute?
A Race condition
B Pass the hash
C Buffer overflow
D XSS
C. Buffer Overflow
A security engineer is reviewing log files after a third party discovered usernames and passwords for the organization’s accounts. The engineer sees there was a change in the IP address for a vendor website one week earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?
A Man-in-the-middle
B Spear-phishing
C Evil twin
D DNS poisoning
D. DNS Poisoning
A company recently decided to allow its employees to use their personally owned devices for tasks like checking email and messaging via mobile applications. The company would like to use MDM, but employees are concerned about the loss of personal data. Which of the following should the IT department implement to BEST protect the company against company data loss while still addressing the employees’ concerns?
A Enable the remote wiping option in the MDM software in case the phone is stolen.
B Configure the MDM software to enforce the use of PINs to access the phone
C Configure MDM for FDE without enabling the lock screen.
D Perform a factory reset on the phone before installing the company’s applications.
B. Configure the MDM software to enforce the use of PINs to access the phone
A SOC operator is analyzing a log file that contains the following entries:
[06-Apr-2021-18:00:061 GET /index.php/.
/../etc/passwd
[06-Apr-2021-18:01:071 GET /index.php/
/.. /etc/shadow
[06-Apr-2021-18:01:261 GET /index.php/../../../../../../../.etc/passwd
[06-Apr-2021-18: 02:16] GET /index.php?varl-;cat /etc/passwd;&var2-7865tgydk
[06-Apr-2021-18: 02:561 GET /index.php?varl=;cat /etc/shadow; §var2-7865tgydk
Which of the following explains these log entries?
A SQL injection and improper input-handling attempts
B Cross-site scripting and resource exhaustion attempts
C Command injection and directory traversal attempts
D Error handling and privilege escalation attempts
C. Command injection and directory traversal attempts
An analyst visits an Internet forum looking for information about a tool. The analyst finds a thread that appears to contain relevant information. One of the posts says the following.
Make Notes
Hello everyone,
I am having the same problem with my server. Can you help me?
<script type-“text/javascript” src-http://website.com/user.js>
Onload=sqlexec () ;
</script>
Thank you,
Joe
Which of the following BEST describes the attack that was attempted against the forum readers?
A SQLi attack
B DLL attack
C XSS attack
D API attack
C. XSS attack
A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the organization’s executives determine their next course of action?
A An incident response plan
B A communication plan
C A disaster recovery plan
D A business continuity plan
D. A business continuity plan
A security analyst is concerned about traffic initiated to the dark web from the corporate LAN. Which of the following networks should the analyst monitor?
A SETP
B AIS
C Tor
D lOC
C. Tor
If a current private key is compromised, which of the following would ensure it cannot be used to decrypt all historical data?
A Perfect forward secrecy
B Elliptic-curve cryptography
C Kev stretching
D Homomorphic encryption
A. Perfect forward secrecy
After gaining access to a dual-homed (i.e., wired and wireless) multifunction device by exploiting a vulnerability in the device’s firmware, a penetration tester then gains shell access on another networked asset. This technique is an example of.
A privilege escalation.
B footprinting.
C persistence.
D pivoting
D. Pivoting
A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?
A Testing input validation on the user input fields
B Performing code signing on company-developed software
C Performing static code analysis on the software
D Ensuring secure cookies are used
B. Performing code signing on company-developed software
Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure access is granted properly?
A API integrations
B Auditing
C Resource policies
D Virtual networks
A. API integrations
An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has been given the documentation only available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
A Bug bounty
B Black-box
C Gray-box
D White-box
C. Gray-box
An organization wants to implement a biometric system with the highest likelihood that an unauthorized user will be denied access. Which of the following should the organization use to compare biometric solutions?
A FRR
B Difficulty of use
C Cost
D FAR
E CER
D. FAR
A security administrator is trying to determine whether a server is vulnerable to a range of attacks. After using a tool, the administrator obtains the following output:
HIP/1.0 200 OK
Content-Type: text/html
Server: Apache
root:s9fyf983#:0:1:System Operator: /:/bin/bash daemon:*:1:1:: /tmp:
userl:fi@su3FF: 183:100:user: /home/users/userl: /bin/bash
Which of the following attacks was successfully implemented based on the output?
A Memory leak
B Race conditions
C SQL injection
D Directory traversal
D. Directory traversal
A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process. Which of the following methods would BEST accomplish this goal?
A Salting the magnetic strip information
B Encrypting the credit card information in transit
C Hashing the credit card numbers upon entry
D Tokenizing the credit cards in the database
D. Tokenizing the credit cards in the database
After a recent ransomware attack on a company’s system, an administrator reviewed the log files. Which of the following control types did the administrator use?
A Compensating
B Detective
C Preventive
D Corrective
B. Detective
Which of the following roles would most likely have direct access to the senior management team?
A Data custodian
B Data owner
C Data protection officer
D Data controller
D. Data controller