Pocket Prep 3 Flashcards
Under GDPR, what does data ownership entail?
A. Only responsibility for data
B. Responsibility for and possession of data
C. Only possession of data
D. Responsibility for, encryption of, and posession of data
B. Responsibility for and possession of data
Explanation:
Data ownwership refers to both possession and repsonsibility. While encryption is important for maintaining privacy, data ownership does not inherently imply encryption
Which of the following is the code that results from compiling source code from a high level lanaguage like Java and is the intermeediary between machine code and source code?
A. Byte
B. Script
C. Unknown environment
D. Object oriented
A. Byte
Explanation:
Byte code is the intermediary code that results from compiling source code.
Script code is a generic term for code in a script file. Computer scripts are written in scripting languages like Bash, Python and Powershell
Object oritented programming is a type of programming where code is using data objects
Which of the following is NOT a default SMTP port?
A. 645
B. 25
C. 587
D. 465
A. 645
Explanation:
The default port for SMTP is 25. Versions of SNMP that uses SSL/TLS use ports 587 and 465. 645 is not a default SMTP port
In TPM, which type of key is stored in persistent memory and is installed by the manufacturer?
A. Storage key
B. SRK
C. AIK
D. EK
D. EK
Explanation:
A Trusted Platform Module chip provides services for protecting keys and encrypting drives. The Endorsement Key (EK) is installed by the manufacturer and contains a public/private key pair
Software may, at times, have functionality that is not initially enabled. This is done so that the service is not available to an attacker unless the user enables functionality. What type of security principle does this illustrate?
A. Security by default
B. Security by design
C. Security by accident
D. Security by deployment
A. Security by default
Explanation:
Security by default means that, without changes, a system uses secure settings. For example, some server products have plaintext network protocols like FTP and HTTP disabled by default.
Security by design deals with security principles being incoludeed in the coding and design of a systems
Which technology provides a system with a separate CPU that keeps the system protected even if the kernel is compromised?
A. Secure enclave
B. ASLR
C. TPM
D. XN bit
A. Secure enclave
Explanation:
A secure enclave is a part of a system that cannot be compromised even if the operating system kernel is comprmised. It aims to minimize the amount of time that data is unencrypted when it is being used.
Which of the following is one of the primary issues with symmetric encryption?
A. Key management
B. Speed
C. Reliability
D. Ciphertext cannot be decrypted
A. Key management
Explanation:
The three primary issues with symmetric encryption:
- Key Distribution - Symmetric encryption requires shared keys that encrypt plaintext and decrypt ciphertext to be distributred over a securre out of band channel to remain secure
- Key Management - As the number of participants that need to exchange keys increases with symmetric encryption, key management gets more complex.
- Only provides confidentiality
Which of the following tools is used fo reverse engineering software?
A. Metasploit
B. Nessus
C. diStorm3
D. Burp Suite
C. diStorm3
Explanation:
There are many software tools to help reverse engineer software, such as Apktool, dex2jar, diStorm3, edb-bugger
A security analyst is looking at a routers firmware to see if there are any vulnerabilities on backdoors. What tool should they use for analyzing this?
A. Ghidra
B. Binwalk
C. Foremost
D. ssdeep
B. Binwalk
Explanation:
Binwalk is a tool in Linux that is used for searching, analyzing and reverse engineering firmware images. It is useful for checking the security of network and IoT devices.
Hex Dump is a tool for analyzing binary data in a user specified format. Foremost is a tool for recovering files from a drive. The ssdeep utility is used for computing hashes
Which is a bidding process document issued by an organization that outlines their requirements for a supplier to potentially fulfill?
A. RFP
B. MOU
C. ISA
D. SLA
A. RFP
Explanation:
An RDP (request for proposal) is a bidding process document an organization issues that outlines their requirements for a supplier. It details the specifics of a product or service the organization wants to purchase. Suppliers use the RFP as a guideline for submitting a formal proposal
What advantage does ECC have over RSA?
A. Ability to use larger key sizes
B. Reduced storage and transmission requirements
C. Combability with older hardware
D. Greater level of security
B. Reduced storage and transmission requirements
Explanation:
The primary benefit of ECC is its efficient. It can use smaller key sizes but still have the same security level as RSA
‘
RSA is able to use large key sizes, has good compatibility with older systems, and has comparable levels of security to ECC
A company has numerous compensating controls on users endpoint devices. They now want to add more controls that monitor the whole network. Which of the following technologies will help them with that?
A. Host based firewall
B. EDR
C. HIDS
D. EUBA
D. EUBA
Explanation:
User and Entity Behavior Analysis (UEBA) is a technique for detecting anomalies on a network. For example, an increase in traffic above normal levels could indicate a threat.
Endpoint Detection Response, Host Based Intrusion Detection Systems and host based firewalls run on end user systems
Which is NOT a single protocol but a framework for port based access control?
A. EAP
B. PAP
C. CHAP
D. RDP
A. EAP
Explanation:
Extensible Authentication Protocol (EAP) is not a single protocol but a suite, or framework, for port based access control.
Which type of encryption simultaneously assures confidentiality and authenticity of data?
A. Hash based message authentication code
B. AES
C. DES
D. Authentication encryption with associated data
D. Authentication encryption with associated data
Explanation:
Authentication Encryption with Associated Data (AEAD) encrypts data with a symmetric key and generates an authentication tag that can verify the data’s authenticity.
What authentication protocol involves the server sending a random string to request authentication and the client encrypting that string with a password?
A. PAP
B. PEAP
C. EAP
D. CHAP
D. CHAP
Explanation:
Challenge Handshake Authentication Protocol involves the server sending a random string to request authentication and the client encrypting that string with a password. The client then sends the encrypted string back to the server. If the server can decrypt the string successfully with the password, authentication is successful
A company wants to have granular control over applications that run on mobile devices. What type of solution enables this?
A. MFA
B. MAM
C. NFC
D. HSM
B. MAM
Explanation:
Mobile Application Management is a software that secures the mobile environment on devices used for business purposes. It allows IT admins to enforce corporate policies on these devices
A company has released a new web application. However, when a user accesses a certain link, an error message is generated that mentions the web applications platform. What type of issue should be addressed in this situation?
A. Poor exception handling
B. Broken Authentication
C. Unsecure references
D. Improper headers
A. Poor exception handling
Explanation:
When a web application in production encounters an error, it should have a default error page that does not give public users any insight into the underlying architecture of the application. Detailed error information should only be shown in development environments
An attacker has embedded themselves between two communicating devices within a companys network. He impersonates each device to the other in an attempt to change and eavesdrop on communications
What type of attack is this?
A. Reverse engineering attack
B. Meet in the middle attack
C. On path attack
D. Factoring attack
C. On path attack
Explanation:
On path attack, known previously as man in the middle is when an attacker eavesdrops on communications and changes their content. During the execution of this attack, an attacker pretends to be one of the parties in the communication.
Diffie Hellman is highly vulnerable to on path attacks
A factoring attack attempts to break down, or factor, the large numbers that the RSA algorithm uses to protect and encrypt the data. It is this resistance to detection that makes the asymmetric algorithms like RSA function, but, ultimately, devices like quantum computing may render them obsolete. This is due to the ability to factor the numbers at impossibly fast speeds, enabling the algorithms to be cracked quickly with ease
A company is considering options for their data classification, labeling and tagging. They want to implement a standard from an attribute based access control system that is decoupled from the application or local machine. Which solution will help with this?
A. XUL
B. XSS
C. XSLT
D. XACML
D. XACML
Explanation:
The eXtensible Access Control Markup Language (XACML) is an XML based language for access control policies. It can be used to exchange access control policies between different systems
Which of the following is an XML based protocol specification that web services use for one way transmission between endpoints?
A. LDAP
B. SOAP
C. COBOL
D. SSH
B. SOAP
Explanation:
Web servers typically use Simple Object Access Protocol (SOAP) to exchange structured information. SOAP uses Extensible Markup Language (XML) , which is insecure by itself, but when implemented with Web Services Security, can provide additional security for web services. WS Security has three primary mechanisms to provide integrity: SOAP message signing, encrypting the SOAP message signing, encrypting the SOAL messages for confidentiality, and attaching security tokens to ensure a senders identity is genuine
Bob is a security engineer at Acme Inc. He deploys a network of partially vulnerable machines to distract attackers from his production networks. What term best describes the network Bob deployed to distract attackers?
A. Honeypots
B. Honeynets
C. SAST box
D. CMDB
B. Honeynets
Explanation:
A honeynet is a partially vulnerable network for baiting or distracting attackers from a real network
A honeypot is a vulnerable system deployed with the intent of attracting attackers. Honeypots arte common tools in security research
A payment processing company and a data storage company draft a formal agreement specifying they will use standards based communication and support specific transaction codes to ensure their systems work properly together. This agreement is an example of which of the following?
A. IA
B. ISA
C. MOU
D. SLA
A. IA
Explanation:
An interoperability agreement is a formal agreement between two or more organizations defining technical information like communications protocols and how the businesses work together
All of the following are relevant information sources for day to day security threats except:
A. NIST
B. NSA
C. CISA
D. Microsoft
A. NIST
Explanation:
The National Institute of Standards and Technology (NIST) website provides standards and guidelines for various aspects of technology and security, but does not provide real time information on cyber threats