Practice Qs SEC+ Flashcards
Which of the following describes the difference between a worm and a virus?
- Worms are self-replicating.
- Viruses are self-replicating.
- Worms are often malicious.
- Viruses are often malicious.
Worms are self-replicating.
Which one of the following is not an example of a denial-of-service attack?
- Gargomel
- Smurf
- Teardrop
- Fraggle
Gargomel
Which one of the following is not a type of phishing attack?
- Spear phishing
- Whaling
- Wishing
- Smishing
Wishing.
At your place of employment, you are rushing to the door with your arms full of bags. As you approach, the woman before you scans her badge to gain entrance while holding the door for you, but not without asking to see your badge. What did she just prevent?
- Phishing
- Tailgating
- Whaling
- Door diving
Tailgaiting.
Which of the following is an effective way to get information in crowded places such as airports, conventions, or supermarkets?
- Shoulder surfing
- Phishing
- Vishing
- Reverse social engineering
Shoulder Surfing.
Which one of the following is designed to execute malicious actions when a certain event occurs or a specific time period elapses?
Logic bomb
Spyware
Botnet
DDoS
Logic Bomb
Which one of the following best describes a polymorphic virus?
A virus that attacks the boot sector and then attacks the system files
A virus that infects EXE files
A virus that changes its form each time it is executed
A virus inserted into a Microsoft Office document such as Word or Excel
A virus that changes its form each time it is executed.
You discover you are unable to access files on your computer. A message appears asking for payment to allow for the recovery of your files. Which of the following is most likely?
Your files have been moved to a remote server.
Your files have been copied.
Your files have been deleted.
Your files have been encrypted.
Your files have been encrypted.
Which of the following types of attacks can result from the length of variables not being properly checked in the code of a program?
Buffer overflow
Denial of service
Replay
Spoofing
Buffer overflow
Which one of the following is a best practice to prevent code injection attacks?
Implementing the latest security patches
Session cookies
Using unbound variables
Input validation
Input validation
You are the security administrator for a bank. The users are complaining about the network being slow. It is not a particularly busy time of the day, however. You capture network packets and discover that hundreds of ICMP packets have been sent to the host. What type of attack is likely being executed against your network?
Spoofing
Man-in-the-middle attack
Denial-of-service attack
Password attack
Denial-of-service attack
An initialization vector should be which of the following?
Unique and unpredictable
Repeatable and random
Repeatable and unique
Unique and predictable
Unique and unpredictable
How do relationship and capability pertain to understanding specific threat actors?
They are characteristics associated with building a threat profile.
They describe attributes that apply equally to all threats.
They are the two most important attributes when analyzing threat actors.
They indicate the likelihood of vulnerabilities being discovered.
They are characteristics associated with building a threat profile.
With which of the following is a “low and slow” attack most associated?
OSINT
Ransomware
Script kiddies
APT
APT
After conducting a vulnerability assessment, which of the following is the best action to perform?
Disable all vulnerable systems until mitigating controls can be implemented
Contact the network team to shut down all identified open ports
Organize and document the results based on severity
Immediately conduct a penetration test against identified vulnerabilities
Organize and document the results based on severity
You are conducting a penetration test on a software application for a client. The client provides you with details around some of the source code and development process. What type of test will you likely be conducting?
Both Black and White box
Vulnerability
White box
Black box
White box
Which of the following is a reason to conduct a penetration test?
To test the adequacy of security measures put in place
To passively test security controls
To steal data for malicious purposes
To identify the vulnerabilities
To test the adequacy of security measures put in place
Which one of the following best describes a penetration test?
A passive evaluation and analysis of operational weaknesses using tools and techniques that a malicious source might use
A technique used to identify hosts and their associated vulnerabilities
The monitoring of network communications and examination of header and payload data
An evaluation mimicking real-world attacks to identify ways to circumvent security
An evaluation mimicking real-world attacks to identify ways to circumvent security
Which one of the following best describes the four primary phases of a penetration test?
Planning, discovery, attack, reporting
Exploit, escalation, pivot, persistence
Discovery, attack, pivot, reporting
Planning, exploit, attack, persistence
Planning, discovery, attack, reporting
Your team is tasked with conducting a vulnerability assessment and reports back with a high number of false positives. Which of the following might you recommend to reduce the number of false positives?
Have the team run a vulnerability scan using noncredentialed access
Have the team run a vulnerability scan using credentialed access
Have the team run a port scan across all ports
Have the team run a port scan across all common ports
Have the team run a vulnerability scan using credentialed access
Which of the following are potential impacts of a race condition?
System malfunction
Denial of service
All answers are correct
Escalated privileges
All answers are correct
Which one of the following is the term given to a fraudulent wireless access point that is configured to lure connections to it?
NFC
ARP replay attack
Bluejacking
Evil twin
Evil twin
A small IT consulting firm has installed new wireless routers across all your small regional offices. Within days, you learn that you are unable to access the administrative interfaces of these routers due to an incorrect password. Which one of the following is most likely the reason?
The wireless routers are not powered on.
The wireless routers have been placed on end-of-life by the manufacturer and are no longer supported for remote login.
The wireless routers have been designed to allow improper input handling, resulting in failed password input.
The wireless routers were set up with the default configuration, which included a default password that was never changed.
The wireless routers were set up with the default configuration, which included a default password that was never changed.
You identify a system that becomes progressively slower over a couple days until it is unresponsive. Which of the following is most likely the reason for this behavior?
Improper error handling
Untrained user
Race condition
Memory leak
Memory leak
Which of the following is a use for a VPN concentrator?
Load balancing
Internet connectivity
Intrusion detection
Remote access
Remote access
If the organization requires a firewall feature that controls network activity associated with DoS attacks, which of the following safeguards should be implemented?
Loop protection
Flood guard
Implicit deny
Port security
Flood Guard
Wired traffic must be encrypted because there is concern about protecting the security of login and password information for internal high-level users. Which technology should you implement?
NAT
VPN
VLAN
DMZ
VPN
Which of the following are uses for proxy servers? (Choose all correct answers.)
Internet connectivity
Intrusion detection
Web content caching
Load balancing
Internet connectivity
Web content caching
Load balancing
If the organization requires a switch feature that makes additional checks in Layer 2 networks to prevent STP issues, which of the following safeguards should be implemented?
Flood guard
Implicit deny
Port security
Loop protection
Loop protection
You are setting remote access for users and want to be sure a secure channel is used. Which technology should you implement?
NAT
VLAN
DMZ
VPN
VPN
Which of the following uses a secure cryptoprocessor that accelerates cryptographic processes and provides strong access authentication for critical application encryption keys?
Full disk encryption
Hardware security module
Public key infrastructure
File-level encryption
Hardware security module (HSM)
You have recently had problems with clients in one particular area of the network not being able to connect to a server. Which of the following tools should you use to begin troubleshooting?
Ping
Nslookup
Netstat
Telnet
ping
You have been tasked with testing the strength of user passwords. Which of the following tools is the best choice to help accomplish this task?
Nmap
Brutus
OpenPuff
Metasploit
Brutus
Which of the following is used for penetrating testing and risk assessments?
Banner grabbing
Configuration compliance scanner
Honeypot
Exploitation framework
Exploitation framework
Which of the following is used to help troubleshoot network issues by gathering packet-level information across the network?
Data sanitation tools
Protocol analyzer
Vulnerability scanner
Port scanner
Protocol analyzer
You have recently had problems with clients not being able to resolve domain names correctly. Which of the following tools should you use?
Nslookup
Netstat
Ifconfig
Ping
nslookup
It has been reported that some weak user passwords from your organization have shown up on the Internet. Which of the following tools would provide information to confirm or deny this allegation?
Camouflage
Tcpdump
Cain and Abel
SolarWinds
Cain and Abel
Which of the following is used to identify the level of aggressive attention directed at a network and to study and learn from an attacker’s common methods of attack?
Vulnerability scanner
Configuration compliance scanner
Banner grabbing
Honeypot
Honeypot
You are required to check user permissions for the finance group that includes specific registry keys. Which of the following should you choose?
Content filter
Audit user permissions
DNS
HTTPS
Audit user permissions
Which of the following is associated with certificate issues?
Release of private or confidential information
Prevention of legitimate content
Algorithm mismatch error
Unauthorized transfer of data
Algorithm mismatch error
You are required to implement a solution to identify baseline deviations for varying workloads across different days. Which of the following should you choose?
Alarms
Static baselining
Alerts
Dynamic baselining
Dynamic baselining
Recently, some employees have fallen victim to social engineering. Which of the following is the best way to manage this personnel issue?
Awareness training
Termination
A new policy
Written warning
Awareness training
It has been reported that some clear-text passwords are being transmitted within your organization. Which of the following can mitigate this situation?
Auditing of user permissions
DNS
Content filtering
HTTPS
HTTPS
Which of the following best describes data exfiltration?
Algorithm mismatch error
Prevention of legitimate content
Release of private or confidential information
Unauthorized transfer of data
Unauthorized transfer of data
An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown malicious attacks from the network layer up through the application layer. Which of the following fulfills this requirement?
Whitelisting
Encryption
DLP
HIPS
HIPS
Which of the following types of antivirus scanning looks for instructions or commands that are not typically found in application programs?
Pattern matching
Heuristic
Static
Manual
Heuristic
Which of the following is useful in preventing users and attackers from executing unauthorized applications but does not prevent malicious code from executing?
Application whitelisting
Patch management
DLP
Malware inspection filter
Application whitelisting
An organization is looking to add a layer of security by maintaining strict control over the devices employees are approved to use. Which of the following fulfills this requirement?
HIPS
Encryption
DLP
Whitelisting
DLP
Advanced malware tools use which of the following analysis methods?
Context based
Static analysis
Manual analysis
Signature analysis
Context based
A Windows system is software DEP-enabled. An attacker runs an exploit that injects code into a program, and the program uses known memory space. What will the result be?
The malware code will run because it was injected into a known process.
The machine will automatically blue-screen and shut down.
The malware will be blocked from running the injected code.
The code will run with limited functionality.
The malware will be blocked from running the injected code.
Which of the following enables decentralized authentication through trusted agents?
Transitive trusts
Key management
Credential management
Data ownership
Transitive trusts
An organization wants to be sure that certain application data is protected. Which of the following fulfills this requirement?
Lockout
Blacklisting
Whitelisting
Encryption
Encryption
An organization is looking for a mobile solution that will allow data to be deleted if a device is lost or stolen. Which of the following fulfills this requirement?
Passcode policy
Remote wipe
Voice encryption
GPS tracking
Remote wipe
Which of the following are used as a most basic form of security in handheld devices? (Choose two correct answers.)
Passcode
Encryption
PIN
Fingerprint biometrics
PIN
Passcode
Which of the following is included in a BYOD, CYOD, or COPE policy?
Data ownership
Transitive trusts
Credential management
Key management
Data Ownership
An organization is looking to add a layer of security and maintain strict control over the apps employees are approved to use. Which of the following fulfills this requirement?
Encryption
Lockout
Whitelisting
Blacklisting
Whitelisting
Which of the following is necessary to implement an effective BYOD, CYOD, or COPE program? (Choose two correct answers.)
Infrastructure considerations
Legal considerations
Storage limitations
Key management
Infrastructure considerations
Legal considerations
Which standard port is used to establish an FTP connection?
21
443
80
8250
21
Which of the following is a protocol that incorporates enhanced security features for VoIP (Voice over IP) or video network communications?
HTTPS
LDAPS
NTP
SRTP
SRTP