Practice Exam 1 Flashcards
Which of the following refers to the connection of events based on some common basis?
Correlation
A manufacturing company has hired a third-party team to discover and exploit it system vulnerabilities on two subnets used by devices in a tire manufacturing plant. Prior to the technical testing portion of the engagement, team members scanned public social media posts of plan employees and discovered specific versions of network infrastructure equipment in use at that plant.
After the testing, what phrase should testers include in the documented findings that are presented to the manufacturing company?
-Penetration tested a partially known environment
-Vulnerability scanned an unknown environment
-Penetration tested an unknown environment
-Vulnerability scanned a partially known environment
Penetration tested a partially known environment.
Something about the environment is known, makes it “partially known”.
Testers are attempting to identify and exploit discovered vulnerabilities, makes it “penetration testing”
What technique is used to identify and track patterns in human emotions, opinions, or attitudes that may be present in data?
Sentiment analysis
Your web application developers come to you and request affinity scheduling from the load balancers. Why does a web application benefit from affinity scheduling?
Affinity scheduling can allow a user to stay logged in to a session instead of opening a new session each time they are sent to a new server host.
Affinity scheduling sends each subsequent request to the same web server, allowing the server to track session state even though HTTP/HTTPS is a stateless protocol
Which of the following is an older form of attack where a malicious/compromised website places invisible controls on a page, giving users the impression they are clicking some safe item that actually is an active control for something malicious?
Clickjacking
This attack is almost never seen anymore as it’s easy to detect this type of attack
Which of the following is a software or a hardware appliance responsible for balancing user requests and network traffic among several different physical or virtualized hosts?
Load Balancer
What capability is used to check the origin of an email sender?
DNS
For which of the following should employees receive training to establish how they are to treat information of differing sensitivity levels?
Information classification
An organization’s information classification policy outlines what level of security protections certain data receives and instructs employees on how to treat sensitive data
Which of the following statements best defines the recovery point objective (RPO)?
The maximum allowable amount of data (measured in time) that the organization can afford to lose during a disaster or an incident
You have been tasked with conducting a security assessment of hosts on a n IP subnet. The subnet hosts run a variety of services including HTTP and SQL databases. When configuring the vulnerability scan, you enter a number of sets of valid credentials that will be used when probing hosts. After running the scan and reviewing the results, a colleague suggests the scan results are useless since the credentials were known.
Which IT security concept validates the scan results?
Zero Trust
This concept requires security experts to consider the insider threat; not to trust users and IT systems behind firewalls on internal networks
Which correctly describes the incident response team?
Personnel designated to respond to an incident
What role does the blue team play in exercises and competitions?
Defensive actions
Which of the following statements is not true about PUPs (potentially unwanted programs)?
PUPs are usually installed by worms.
PUPs are usually bundled with legitimate apps by third-party download sites and not spread by worms. Example- you may download and install a photo editing app but it also installs a browser toolbar that you don’t really want.
You have been tasked with planning a solution where cryptographic key generation and web application cryptographic operations are centralized on the network. What should you implement?
HSM
A network hardware security module (HSM) is a tamper-proof security device connected to the network that can perform cryptographic operations for many network hosts
You are preparing to begin an IT technical penetration test of a web application server. Which tasks relate to the reconnaissance phase of the testing?
Identify the web administrator
The reconnaissance phase focuses on learning as much as possible about the target. Knowing the web administrator can lead attackers to scour the web for anything related to that person
Which of the following terms indicates the length of time a device is expected to last in operation, and only a single, definitive failure will occur and will require that the device be replaced rather than repaired?
mean time to failure
The MTTF is the length of time a device is expected to last in operation
You get a new batch of servers into your network operations center. After you install the initial operating system (OS), what is your first step in applying system hardening to the servers?
Closing unused ports and disabling unused services
This reduces the attack vector and can prevent future vulnerabilities
Which of the following is the biggest risk involved in cloud computing?
Lack of control
lack of control over data and the infrastructure
Which type of cloud service is usually operated by a third-party provider that sells or rents “pieces” of the cloud to different entities, such as small businesses or large corporations, to use as they need?
Public
A public cloud is operated by a third-party provider who leases the space in the cloud to anyone who needs it
You are asked to prepare a brief to senior management about insider threats. You detail the use of data loss prevention (DLP) as a major factor in identifying and protecting against insider threats. What is the primary reason DLP can protect against these threats?
Prevention of sensitive data being transferred in an unauthorized manner
DLP is designed to prevent sensitive data from being moved unto storage that could allow it to be transferred outside an organization, or to prevent sensitive data from being sent via email
To reduce the configuration management burden of user devices, your manager has decided a security monitoring solution must be implemented where technician stations can scan and query user devices on demand. The installation, configuration, and maintenance of security monitoring software on user devices is not desirable. What type of device security monitoring solution should be considered?
Agentless
An agentless solution does not require software running on user devices. Instead, security actions can be initiated from servers or technician stations
Which of the following terms represents the manufacturer’s best guess (based on historical data) regarding how much time will pass between major failures of a component produced by that manufacturer?
Mean time between failures
MTBF represents the manufacturer’s best guess (based on historical data) regarding how much time will pass between major failures of that component. This is assuming that more than one failure will occur, which means that the component will be repaired, rather than replaced
You are part of a penetration testing red team that will attempt to discover and exploit IT service vulnerabilities. Due to the sensitive nature of data on the network to be pen tested, the red team has been asked to sign a legal document. Which document is the most likely to be signed?
Non-disclosure agreement
An NDA is common with penetration testing teams. It assures the data custodians that any sensitive data exposed during the testing will not be disclosed to third parties under any circumstances
Which of the following solutions allow applications that users can download, install, and execute to be added to a safe list?
Whitelisting
Applications that users are allowed to download, install, and execute are added a whitelist (“allow list”) by an administrator. The opposite of blacklisting