Practice Test 1 Flashcards
Which of the following is generally a script planted by a disgruntled employee or other malicious actor that is set to execute at a certain time?
A) Virus
B) Trojan horse
C) Logic bomb
D) Adware
C) Logic bomb
A logic bomb is simply a script that is set to execute at a certain time. Logic bombs are usually created by rogue administrators or disgruntled employees.A virus is a piece of malicious software that must be propagated through a definite user action. A Trojan horse is a piece of software that seems to be of value to the user, but in reality is malware. Adware is usually annoying advertisements that come in the form of pop-up messages in a user?s browser.
Which of the following methods of strengthening weak keys involves taking a weak initial key and feeding it to an algorithm that produces an enhanced key, which is much stronger?
A) Key streaming
B) Key repetition
C) Key exchange
D) Key stretching
D) Key stretching
Key stretching is a technique used to change weak keys into stronger ones by feeding them into an algorithm to produce enhanced keys.Key streaming involves sending individual characters of the key through an algorithm and using mathematical XOR function to change the output. Key repetition is not a valid answer or term. Key exchange involves generating and exchanging a asymmetric key used for a particular communications session, or exchanging public keys in order to use them for public key cryptography.
Which the following is a recognized way of restricting access to applications?
A) Whitelisting
B) Blacklisting
C) Greylisting
D) Filtering
B) Blacklisting
Blacklisting is a technique that involves an administrator adding undesirable or restricted software or applications to a list on content filtering devices, in group policy, or through some other type of mechanism. This ensures that users are not allowed to download, install, or execute these particular applications.Whitelisting is the opposite of blacklisting; applications that users are allowed to download, install, and execute are added to a whitelist. There is no such term as graylisting. Filtering typically involves checking traffic on a network device based upon specific characteristics. The term normally does not apply to software or applications.
Which type of network intrusion detection system (NIDS) develops a baseline of normal traffic so it can detect deviations in this traffic that might indicate an attack?
A) Rule-based system
B) Anomaly-based system
C) Signature-based system
D) Filter-based system
B) Anomaly-based system
Anomaly-based systems detect unusual network traffic patterns based upon a baseline of normal network traffic.Rule-based systems use predefined rule sets. Signature-based systems use predefined traffic signatures that are typically downloaded from a vendor. Filter-based systems, such as routers and firewalls, base detection on access control lists that specify traffic that is permitted and denied.
Which of the following types of network-connected systems can manage heating, ventilation, and air-conditioning controls?
A) Minicomputers
B) Embedded hosts
C) Supervisory control and data acquisition
D) Mainframes
C) Supervisory control and data acquisition
Supervisory control and data acquisition (SCADA) systems are used to control and manage heating, ventilation, air-conditioning, and other types of industrial and environmental systems.Minicomputers are antiquated computers that performed advanced tasks in the place of mainframe systems and are no longer widely in use. Although some SCADA systems could be embedded, embedded hosts normally refer to systems that have operating systems burned into their computer chips. Mainframe systems normally do not control industrial types of systems, such as heating, ventilation, and air-conditioning.
Which of the following uses a management information base (MIB) to provide detailed device-specific information to a central management console?
A) SMTP
B) SNMP
C) Syslog
D) ACL
B) SNMP
The Simple Network Management Protocol (SNMP) uses a management information base, or MIB, specific to each device and from which device information can be obtained.SMTP, the Simple Mail Transport Protocol, is responsible for sending e-mail. Syslog is a log server found in UNIX and Linux systems. An access control list (ACL) resides on network devices and filters traffic coming into and out of a device.
Which type of assessment is used to determine weaknesses within a system?
A) Vulnerability assessment
B) Threat assessment
C) Risk assessment
D) Penetration test
A) Vulnerability assessment
A vulnerability assessment looks for weaknesses in systems.A threat assessment looks at events that could exploit vulnerabilities. A risk assessment is a combination of assessments and is designed to assess factors, including likelihood and impact, that affect an asset. A penetration test actually attempts to exploit any found weaknesses (usually after a vulnerability assessment) to gain access to systems.
What is the biggest difference between EAP-TLS and EAP-TTLS?
A) EAP-TTLS needs server and client certificates; EAP-TLS only needs server certificates
B) EAP-TTLS can use unsigned certificates; EAP-TLS must have third-party signed certificates
C) EAP-TLS can use unsigned certificates; EAP-TTLS must have third party signed certificates
D) EAP-TLS needs server and client certificates, EAP-TTLS only needs server certificates
D) EAP-TLS needs server and client certificates, EAP-TTLS only needs server certificates
EAP-TLS needs server and client certifcates; EAP-TTLS only needs server certifcates.The EAP standard does not define the use of signed or unsigned certificates, although most implementations require signed certificates.
Which of the following enables a user to provide one set of credentials to the system and use those credentials throughout other interconnected systems?
A) Multifactor authentication
B) Single-factor authentication
C) Single sign-on
D) Pass-through authentication
C) Single sign-on
Single sign-on is a method of authentication that enables a user to provide one set of credentials and use them throughout an interconnected network. Both Kerberos and Sesame protocols allow single sign-on.Multifactor authentication refers to the use of several different factors to authenticate to a system, such as something you know, something you are, and something you have. Multifactor authentication can be used in a single sign-on environment but is not necessarily required. Single-factor authentication uses only one factor, such as something you know, to authenticate to a system. It can also be used in a single sign-on environment but is not required. Pass-through authentication can appear to be similar to single sign-on, but it requires all individual systems simply to accept credentials passed from another system without a unified approach.
All of the following are characteristics of the RADIUS authentication protocol, EXCEPT:
A) RADIUS encrypts user passwords during the authentication process
B) RADIUS accepts earlier forms of authentication protocols, such as PAP
C) RADIUS uses UDP port 1812
D) RADIUS uses TCP port 1812
D) RADIUS uses TCP port 1812
RADIUS does not use TCP.All of these are characteristics of the RADIUS protocol.
Which of the following security controls allows connectivity to a network based on the system?s hardware address?
A) WEP encryption
B) MAC address filtering
C) Disabling SSID broadcast
D) WPA2 encryption
B) MAC address filtering
Filtering by the MAC address ensures that only specific systems can access the wireless network based on the MAC address generally presented by the network card. That address is added into a list of systems that can connect (or not).Encryption technologies cannot stop specific systems from entering the network on its own. Disabling the SSID broadcast cannot stop systems from connecting if they determine the SSID through other means.
Which of the following DES/AES encryption modes is considered the weakest?
A) ECB
B) CBC
C) OFB
D) CTR
A) ECB
With ECB mode, a given piece of plaintext will always produce the same corresponding piece of ciphertext. This predicability makes it weak.While CBC, OFB, and CTR mode go about the processes in different ways, these modes lack ECB’s predicability, adding strength to the underlying cryptosystem.
Which of the following can cause a successful attack on a system when a user enters malicious code or characters into a form field on a Web application?
A) Lack of restrictive permission on the web form
B) Lack of input validation
C) Lack of adequate memory in a buffer
D) Lack of properly formatted HTML
B) Lack of input validation
A lack of input validation in the Web form field may allow certain types of attacks to take place when a user enters malicious or incorrect characters in the form.Permissions do not affect the quality or type of input in the field, only who can access and perform actions on the form. Adequate memory in a buffer cannot perform input validation functions. Properly formatted HTML cannot perform input validation on a form field.
Which of the following fire suppression chemicals was banned in 1987 and can no longer be used in data centers?
A) Water
B) Halon
C) Carbon dioxide
D) FM-200
B) Halon
Halon is a dangerous chemical that was previously used in data centers to suppress fires. However, it was banned in 1987 because it is also dangerous to human beings.Water is still used to combat certain classes of fires. Carbon dioxide is used to combat both liquid and electrical fires. FM-200 has generally replaced Halon in data center fire suppression systems.
All of the following types of social engineering attacks might go undetected by the victim, except:
A) Shoulder surfing
B) Tailgating
C) Dumpster diving
D) Coercion
D) Coercion
Coercion attacks generally require direct confrontation with the victim, so they are usually detected.All of these attacks may go undetected by the victim, because they may not require any direct interaction with the target and can be performed subtly by the attacker without the victim noticing.
An attack in which an attacker attempts to disconnect a victim?s wireless host from its access point is called a(n) __________.
A) Spoofing
B) Deauthentication attack
C) Replay attack
D) Initialization vector attack
B) Deauthentication attack
A deauthentication attack involves sending specially-crafted traffic to both a wireless client and an access point, in the hopes of causing them to deauthenticate with each other and disconnect.A spoofing attack involves impersonating a wireless client or access point, either through its IP or MAC address. A replay attack involves the reuse of intercepted non-secure credentials to gain access to a system or network. Initialization vector (IV) attacks involve attempting to break WEP keys by targeting their weak IVs.
Which of the following algorithms won the U.S. government?sponsored competition to become the Advanced Encryption Standard (AES)?
A) Blowfish
B) Twofish
C) Rijindael
D) RC4
C) Rijindael
Rijindael was selected as the winner of the NIST competition and became the U.S. government?s Advanced Encryption Standard (AES).Twofish, another symmetric algorithm, was one of the five finalists for the competition, but it did not win. Blowfish is also symmetric algorithm, but was not considered in the competition to be the AES. RC4 is a symmetric streaming cipher commonly seen in WEP and SSL implementations. It was not one of the finalists involved in the AES competition.
Which of the following policy settings prevent a user from rapidly changing passwords and cycling through his or her password history to reuse a password?
A) Password history
B) Maximum password age
C) Minimum password age
D) Password complexity
C) Minimum password age
The minimum password age setting is used to force users to use a password for a minimum amount of time before they are allowed to change it. This prevents them from rapidly cycling through the password history to reuse an older password.Password history simply records a previous number of passwords, so that they cannot be reused in the system. The maximum password age is used to expire a password after a certain time period. Password complexity enforces the use of longer password lengths and character spaces, increasing password strength.
You have received reports that a number of hosts in your company’s internal network are sluggish and unresponsive. After troubleshooting other items, you decide to use a sniffer to examine the network traffic coming into the host. You see that massive amounts of ICMP broadcasts are being sent on the network. The switch is having trouble processing all of this traffic, due to repeated ICMP replies, causing it to slow down. Which of the following is the most likely explanation for this?
A) Flood attack
B) Malware attack
C) Man-in-the-middle attack
D) Phishing attack
A) Flood attack
A flood is a type of network attack based upon confusing a switch with ICMP traffic.Malware would not cause a large volume of ICMP segments to be sent to a host. A man-in-the-middle attack attempts to break into an existing communications session, and is not a denial-of service attack. A phishing attack is a form of social engineering attack using e-mail.
Which of the following terms indicates the length of time a device is expected to last in operation, and only a single, definitive failure will occur and will require that the device be replaced rather than repaired?
A) Mean time between failures
B) Mean time to recovery
C) Mean time to failure
D) Mean time to replace
C) Mean time to failure
The mean time to failure (MTTF) is the length of time a device is expected to last in operation. In MTTF, only a single, definitive failure will occur and will require that the device be replaced rather than repaired.Mean time between failures (MTBF) represents the manufacturer?s best guess (based on historical data) regarding how much time will pass between major failures of that component. This assumes that more than one failure will occur, which means that the component will be repaired, rather than replaced. Mean time to recovery (MTTR) is the amount of time it takes for a hardware component to recover from failure. Mean time to replace is not a valid term.
What is the second step in the incident response life cycle?
A) Containment, eradication, and recovery
B) Preparation
C) Post-incident activity
D) Detection and analysis
D) Detection and analysis
Detection and analysis is the second step of the incident response life cycle.In order, the steps of the incident response life cycle are preparation; detection and analysis; containment, eradication, and recovery; and post-incident activity.
Which of the following statements best describes the relationship between the elements of risk?
A) Threat actors initiate vulnerabilities
B) Threats exploit vulnerabilities
C) Threats cause impact to vulnerabilities
D) Threat actors create vulnerabilities in assets
B) Threats exploit vulnerabilities
Threats exploit vulnerabilities.The relationship between the elements of risk are as follows: threat actors initiate threats, which in turn exploit vulnerabilities.
During which stage of a secure development model would you normally find steps such as secure code review, fuzzing, and vulnerability assessments?
A) Security testing
B) Secure design
C) Security requirements
D) Secure implementation
A) Security testing
During the secure testing phase of the secure software development model, software is measured or tested against security, functional, and performance requirements. This may include secure code review, application fuzzing, and vulnerability assessments, as well as penetration testing.In the secure design stage, different security functionality is designed into the application. In the security requirements stage, requirements for different security functions are determined. During secure implementation of software, security requirements are validated as implemented in the application.
Which of the following utilities are specifically used to diagnose DNS issues? (Select Two)
A) dig B) Nmap C) Kali D) nslookup E) ping
A) dig
D) nslookup
Both dig and nslookup are designed to query DNS servers.One might argue that Nmap and ping might be used to diagnose DNS, but neither of them are specifically for DNS queries. Kali is a Linux distro, not a utility.up