Practice Test #1 Flashcards
In which order should the following items be conducted?
A) business impact analysis, ALE, risk analysis
B) risk analysis, ALE, business impact analysis
C) ALE, risk analysis, business impact analysis
D) ALE, business analysis, risk analysis
ALE, risk analysis, business impact analysis
ALE, risk analysis, business impact analysis is correct. The ALE is a dollar figure used in quantitative risk analysis to prioritize risks; therefore, it cannot be calculated after a risk analysis. The business impact analysis can occur only after risks have been identified.
While you’re on vacation, you want your assistant, Claude, to manage existing user accounts. You grant Claude the ability only to reset user passwords and modify group memberships. Which security principle have you observed?
A) authorization
B) authentication
C) most privilege
D) least privilege
Least privilege
Least privilege is correct. The concept of least privilege states that only needed rights to perform a certain task should be given and no more.
You have approved ten new smartphones for your employees. The phones will be used to run web apps specific to your business. The web apps store data on the mobile devices. What can be done to secure these devices? (Choose two.)
A) use mobile device encryption
B) set the appropriate NTFS file permissions
C) enable SSL for web mini-apps
D) use screen locking
-Use mobile device encryption
-use screen locking
Use mobile device encryption and use screen locking are correct. Encrypting saved data on the mobile device will protect the data if the device is compromised, lost, or stolen. A screen lock requires a PIN to use the device, and it’s highly useful to protect the device from unauthorized use.
Which type of planning relates to the recovery of a specific system?
A) business impact analysis
B) risk assessment
C) disaster recovery plan
D) communication plan
Disaster Recovery Plan
Disaster recovery plan is correct. A disaster recovery plan provides step-by-step procedures to return a failed system to a functional state in as little time as possible.
Which of the following are true regarding virtual machines? (Choose two.)
A) virtual machines must use shared disk storage
B) compromised virtual machines imply a compromised physical host
C) the MAC address for virtual network cards is configurable
D) virtual machine network cards can be configured on their own VLAN
-The MAC address for virtual network cards is configurable
-Virtual machine network cards can be configured on their own VLAN
The MAC address for virtual network cards is configurable and virtual machine network cards can be configured on their own VLAN are correct. The MAC (Media Access Control) address (for example, 00-26-B9-C5-2A-F1) for virtual network cards is configurable. Virtual network cards can be configured with a VLAN ID, which means they can communicate only with other virtual machine network cards configured with the same VLAN ID.
Which term best describes computers under the control of a single malicious user?
A) botnet
B) compromised
C) owned
D) zombie
Botnet
Botnets are computers running malicious software (each computer is called a zombie) that are under malicious user control.
What type of attack targets senior management in an attempt to have them divulge sensitive information?
A) vishing
B) spear-phishing
C) whaling
D) phishing
Whaling
Whaling is correct. Whaling targets high-profile end users such as corporate executives.
What type of system would be used for monitoring and notification of real-time data at a manufacturing site?
A) cloud computing
B) virtualization
C) SNMP
D) SCADA
SCADA
(SCADA) Supervisory Control and Data Acquisition consists of hardware and software components to acquire data, monitor equipment, and notify of any hazardous conditions that may exist. The data is gathered and manipulated in real-time. SCADA is often used in industrial control system (ICS) environments.
Your users have home directories on server ALPHA. You have set the security such that users have full control over file permissions in their own home directories. Which term best describes this configuration?
A) role-based access control
B) discretionary access control
C) mandatory access control
D) user account control
Discretionary access control
Discretionary access control is correct. Discretionary access control (DAC) gives the resource owner (the user owns his or her home directory and its contents) control of assigning permissions to that resource.
You must harden six Linux servers on a small departmental network. What should you check for? (Choose two.)
A) SSH daemons
B) enabled unneeded daemons
C) linux patches
D) apache daemons
-Enable unneeded daemons
-linux patches
Enabled unneeded daemons and Linux patches are correct. Linux operating systems must be patched to ensure they are secure. Running unnecessary daemons (services) increases the attack surface.
Tanya wants to impress her computer science friends by gaining access to a server housed in a nearby central office owned by the local telephone carrier. She begins by researching the local telephone carrier on the Internet. Later that evening, Tanya sifts through the garbage bins on the local telephone carrier’s premises and discovers printed memos and server configuration documentation. Tanya succeeds in gaining access to a local telephone carrier’s server. What led to her success?
A) dumpster diving
B) impersonation
C) shoulder surfing
D) tailgating
Dumpster Diving
Dumpster diving entails digging through discarded items and trash in search of meaningful information such as passcodes, e-mail addresses, server names, network documentation, and so on.
When you’re collecting digital evidence, which of the following data types is considered the most volatile and should therefore be captured first?
A) DVD-ROM disk contents
B) RAM contents
C) USB flash drive contents
D) hard disk contents
RAM contents
RAM contents is correct. Because RAM (random access memory) is reliant on electricity, its contents must be captured first because they will be erased when the machine is powered off.
An attacker calls the front desk of a branch office and tells the receptionist he is the senior network engineer working on an approaching e-mail server upgrade. He then asks the receptionist for her e-mail password. What type of attack is this?
A) email
B) social engineering
C) telephone
D) on-path
Social Engineering
Social engineering is correct. Social engineering refers to human trickery and is a big problem. Attackers will often study the business, its processes, and its employees so that they can convince victims of their authenticity.
You are the IT person for a shipping company, Ace Shipping, Inc. One of Ace Shipping’s warehouses has received a new 802.11b/g/n wireless router. Users at the warehouse use laptops, tablet PCs, and smart phones. You would like to restrict access to the wireless network. Which of the following are true? (Choose two.)
A) tablet PCs have a MAC address
B) smartphones cannot connect to a WLAN
C) tablet PCs cannot connect to a WLAN
D) smartphones have a MAC address
-Tablet PCs have a MAC address
-Smartphones have a MAC address
Tablet PCs have a MAC address and Smart phones have a MAC address are correct. Tablet PCs and smart phones (and laptops) have MAC addresses for their wireless network cards; therefore, MAC address filtering can be used to restrict access to the wireless router.
Leslie is projecting timelines to complete various analysis reports. Which list presents the correct order in which each analysis should be performed?
A) threat, vulnerability
B) threat, risk
C) business impact, risk
D) risk, threat
Threat, risk
Threat, risk is correct. Threat analysis identifies how vulnerable a party is to specific threats, the likelihood of those threats occurring, and their impact. Because a risk assessment relies on organizing threats to maximize potential opportunity, it cannot be conducted before a threat assessment.
Which type of attack exploits a website’s trust of a user session?
A) cross-site request forgery
B) DoS
C) directory traversal
D) cross-site scripting
Cross-site request forgery
Cross-site request forgery attacks trusted user sessions to web servers. For example, victims may click an innocent-looking link in an e-mail message that sends unauthorized commands to a website that the victim is authenticated to use.
You are a Linux server administrator. You need to list the last 10 entries in a text-based firewall log file. Which command should you use?
A) Is
B) chmod
C) tail
D) head
Tail
The tail command by default shows the last 10 lines of a file unless otherwise specified. For example, to view the last 3 lines of a file, you could use this: tail firewalllog.txt –n 3.
Scheduled packet capturing occurs on your network daily from 15:00 to 17:00. You have been asked to open yesterday’s capture and filter out any ping packets. What protocol should you filter by?
A) ICMP
B) TCP
C) UDP
D) IGMP
ICMP
(ICMP) Internet Control Message Protocol reports on network congestion and reachability. Utilities such as ping and tracert use ICMP as their transport mechanism.
You are present at the scene of a digital crime. You need to ensure that evidence is gathered, documented, and stored in such a way that it will not affect admissibility in a court of law. Which legal standard should you adhere to?
A) legal hold
B) chain of custody
C) order of volatility
D) data sovereignty
Chain of custody
Chain of custody is correct. The chain of custody requires evidence to be gathered in a legal manner, documented, and securely stored at all times
Examine the exhibit. An administrator configures a NAT router with a public IP address of 192.168.4.253/24 and an internal IP address of 10.0.0.253/24. When he tests connectivity to external networks, the client stations do not connect and eventually time out. What is the problem?
A) the subnet mask should be 255.0.0.0
B) NAT requires client software to be installed
C) the default gateway must be configured
D) NAT cannot route from one private IP network to another private IP network
The default gateway must be configured
The default gateway must be configured is correct. NAT (Network Address Translation) requires internal devices to set their default gateway address to match the NAT router’s internal IP address. Traffic destined for other networks is then sent to the NAT device, where the packets assume the public IP address of the NAT router. It is important to change default settings for all types of routing devices.
Which of the following scenarios best defines fail secure?
A) a server blocks connections when log files run out of disk space
B) a clustered mail server fails over to another cluster node
C) a busy server redirects a user request to an idle server
D) a firewall appliance allows all traffic through when a component fails
A server blocks connections when log files run out of disk space
A server blocks connections when log files run out of disk space is correct. Fail secure means the system will remain secure even in the event of a failure, such as running out of disk space for logging.
Which of the following encryption algorithms is considered the strongest?
A) WEP 128-bit
B) SHA-1
C) DES
D) RSA 1024-bit
RSA 1024-bit
RSA 1024-bit is correct. RSA (Rivest, Shamir, Adelman) 1024-bit is a secure asymmetric encryption algorithm.
You are modifying the backup schedule for the thirteen Windows and seven Unix servers in your server room. Full backups will occur Saturdays at 9:00 A.M. and incremental backups will occur every weekday starting at 7:00 P.M. Each server contains an average of 400GB of data. Backup tapes are stored in a safe down the hall in the IT manager’s office. What problems exist with this scenario?
A) there is not enough time to perform incremental backups if the start time is 7:00pm
B) backup tapes should be stored offsite
C) incremental backups must be used with differential backups
D) differential backups can be used only with full backups
Backup tapes should be stored offsite
Backup tapes should be stored offsite is correct. Backup tapes (or a verified copy of them) must be stored at an alternate location in case of fire or flood damage, to name just a few possibilities. Organizational data files as well as virtual machine snapshots are often stored on backup media, including in the cloud.
Examine the illustration. You cannot connect to http://lachance.mooo.com from your client workstation. What is the problem?
A) the URL must begin with www
B) the subnet mask is incorrect
C) client workstation DNS server configurations should not point to 127.0.0.1
D) the default gateway and the DHCP server cannot use the same IP address
Client workstation DNS server configurations should not point to 127.0.0.1
Client workstations do not normally run DNS server software, and 127.0.0.1 is a local loopback IP address. Workstations should be pointing to a functional DNS server running elsewhere. To verify that returned DNS results from the server have not been tampered with, DNSSEC can be used to digitally sign DNS records. DNS settings can be verified on a Windows station with the ipconfig command and on a Linux station with the ifconfig command.
Which of the following is an example of adhering to the concept of chain of custody when seizing computer equipment?
A) generating file hashes
B) encrypting external USB hard disk contents
C) emptying the window recycle bin
D) applying operating system updates
Generating file hashes
File hashes are unique per file and are used to ensure that the original data has not been modified; a modified file generates a different unique hash value.
Departmental managers complain that they cannot quickly allocate more storage as their department needs dictate. Regulations require data to be store on-premises. Which cloud service model and cloud type would address this scenario?
A) PaaS, private
B) SaaS, community
C) SECaaS, public
D) IaaS, private
IaaS private
IaaS, private is correct. Infrastructure as a service (IaaS) encompasses network and storage infrastructure. Private clouds run on-premises.
Under what circumstances might a risk be acceptable? (Choose the best answer.)
A) the ARO is less than the cost of mitigating the risk
B) the SLE is less than the cost of mitigating the risk
C) the ALE is more than the cost of mitigating the risk
D) the ALE is less than the cost of mitigating the risk
The ALE is less than the cost of mitigating the risk
The ALE is less than the cost of mitigating the risk is correct. ALE (annual loss expectancy) is a dollar figure derived from the SLE (single loss expectancy) and the ARO (annual rate of occurrence).
Which are the two symmetric encryption algorithms in the list?
A) MD5
B) RSA
C) blowfish
D) RC4
-Blowfish
-RC4
Blowfish and RC4 are correct. Blowfish and RC4 are both symmetric algorithms. Symmetric algorithms use the same key for encryption and decryption.
A malicious user, Daniel, gains access to a corporate Wi-Fi network where two other users are exchanging data. Daniel captures network traffic between the two communicating victims, modifies it, and sends it back on the network. How could this type of attack be prevented?
A) computer authentication using PKI
B) hard disk encryption
C) computer authentication using ARP
D) jumbo frames
Computer authentication using PKI
Public Key Infrastructure (PKI) certificates from a trusted source could be configured on the two computers. Network traffic from hosts not using a trusted PKI certificate could then be ignored.
Which of the following statements are true? (Choose two.)
A) steganography hides communications
B) steganography scrambles communications
C) encryption hides communications
D) encryption scrambles communications
-Steganography hides communications
-Encryption scrambles communications
Encryption scrambles communications and steganography hides communications are correct. Encryption scrambles, or encrypts, data with a public key. A private key is used to decrypt the data. Steganography attempts to conceal the fact that any communication is taking place by placing messages or files within other files. For example, a text document could be hidden within a JPG image file.
Which type of attack downgrades HTTPS connections to HTTP?
A) SQL injection
B) DDoS
C) SSL stripping
D) cross-site scripting
SSL stripping
SSL stripping is considered an HTTPS downgrade attack, whereby a malicious user intercepts user HTTPS requests. The attacker makes an HTTPS connection to the requested site, but the client connection to the attacker, unknown to the client, is still HTTP, thus is not encrypted.
You are a Linux server administrator. You need to view the first 10 entries in a text-based application log file. Which command should you use?
A) head
B) tail
C) ls
D) chmod
Head
Head is correct. The head command shows the first 10 lines in a text file. You can also specify a different number of lines to display from a file like this: head file1.txt –n 5.