Practice Test #2 Flashcards
Which TCP/IP protocol can be used to manage and monitor all types of network devices?
A)SNMP
B) NIPS
C) SMTP
D) NIDS
SNMP
(SNMP) Simple Network Management Protocol is an industry standard for managing and monitoring printers, servers, workstations, routers, switches, IP phones, and so on. SNMP version 3 should be used because it provides encryption and integrity functionality.
While discussing incident response policies during a meeting, your boss requests a dollar figure and the amount of downtime the company would suffer if a worm infected the corporate LAN. What type of study should you conduct?
A) business impact analysis
B) vulnerability analysis
C) packet analysis
D) risk analysis
Business impact analysis
Business impact analysis is correct. Studying the effect of unfavorable events (such as a computer worm) upon business operations is referred to as a business impact analysis.
A malicious user uses an Internet chat room to issue commands to 700 compromised computers around the world. The zombies are instructed to execute a smurf attack against a web site. What type of attack is this?
A) exploitation framework
B) distributed denial-of-service
C) distributed cracker
D) distributed gargamel-elgamel attack
Distributed denial-of-service
Distributed denial of service is correct. Distributed denial of service (DDoS) attacks flood victim networks with traffic in an attempt to prevent legitimate service access. Using a botnet to execute a smurf attack does just this.
An organic food retail chain is adding six new stores within the next month. Each retail store outlet will accept cash, debit, and credit card payments. To satisfy the board of directors, the IT staff is asked to provide a solution that will ensure data transfers to unauthorized locations can be monitored and/or blocked. What kind of solutions should the IT staff investigate?
A) HSM
B) ARP
C) DLP
D) TLS
DLP
DLP is correct. Data loss prevention (DLP) ensures that private data stays private. This can be done with deep packet inspection such as data (e-mail messages, attachments) leaving an intranet or entering or leaving the cloud, data copied to media, data sent to printers, and so on.
Which security principle enables the discovery of potentially inappropriate or fraudulent activity committed by employees?
A) job rotation
B) Separation of Duties
C) mandatory vacations
D) data loss prevention
Mandatory Vacations
Mandatory vacations enable the potential discovery of irregularities in a job role by whoever fills that role while an employee is on vacation. The new person can audit previous activities or compile associated reports that uncover fraudulent activity.
A Linux firewall administrator creates a rule allowing inbound packets from 148.34.99.17 destined for TCP port 22 on 206.2.4.45. Which of the following statements regarding this firewall rule are true, assuming default ports are in use? (Choose three.)
A) successful connections from 148.34.99.17 to 206.2.4.45 will be encrypted
B) the rule applies to layer 6 of the OSI model
C) the rule allows SSH administration of 206.2.4.45
D) the rule applies to layer 4 of the OSI model
-Successful connections from 148.34.99.17 to 206.2.4.45 will be encrypted
-The rule allows SSH administration of 206.2.4.45
-The rule applies to layer 4 of the OSI model
SSH by default uses TCP port 22 to allow encrypted connections for remote administration from 148.34.99.17 targeted to the SSH host at 206.2.4.45. Port numbers apply to layer 4 (Transport) of the OSI model.
Which term describes an intentionally vulnerable computer used to track malicious activity?
A) unpatched
B) honeypot
C) logging host
D) honeynet
Honeypot
Honeypot is correct. Honeypots are left intentionally vulnerable to attract malicious attacks for logging or analytical purposes.
Which type of attack attempts to trick users into providing their legitimate web site credentials to access malicious web sites?
A) phishing
B) spam
C) Social Engineering
D) cross-site scripting
Phishing
Phishing scams often manifest themselves as web site links within official looking e-mail messages asking a user to confirm her account information or something similar. The unsuspecting user is then redirected to a malicious web site that captures the credentials she enters.
Which key is used to encrypt a file in a PKI environment?
A) session key
B) random key
C) public key
D) private key
Public key
Public key is correct. Public keys are most often used to encrypt user files directly or to generate file encryption keys that are then used to encrypt files. The mathematically related private key is used to decrypt user files. The keys can be stored in a directory (such as Microsoft Active Directory), in a protected file on a disk, or on a smart card. Storing private keys in unprotected files, such as those without password protection, is considered a poor key management practice.
Which type of SOC report focuses on the efficacy of security controls required to meet trust principles?
A) SOC 2 type 2
B) SOC 2 type 1
C) SOC 2 type 4
D) SOC 2 type 3
SOC 2 type 1
SOC 2 Type 1 is correct. SOC 2 Type 1 documents IT systems and business processes to ensure compliance with security trust requirements.
Users complain about junk mail occupying more space in their inboxes than legitimate mail. What should be used to reduce the junk mail entering user mailboxes?
A) PKI
B) port scanner
C) TLS
D) spam filtering
Spam filtering
Spam filtering is correct. Junk e-mail is called spam, and it can be reduced by configuring spam filtering software.
You must determine which TCP port a custom seismic activity application uses in order to configure a firewall rule allowing access to the program. The application is running on a host named ROVER that also runs other custom network applications. Users connect to an internal web site, which in turn connects to ROVER to use the custom application. How can you find out which TCP port the custom application uses?
A) generate activity to the seismic activity app and capture the traffic
B) run a port scan against ROVER
C) run the NETSTAT -P TCP command
D) ping ROVER
Generate activity to the seismic activity app and capture the traffic
Generate activity to the seismic activity app and capture the traffic is correct. Using a protocol analyzer (packet sniffer) such as Wireshark or the Linux tcpdump command to capture the relevant network traffic from the web site to ROVER will reveal the TCP port being used by examining the TCP packet header. This enables technicians to use the port number to configure application or network-based firewall rules correctly.
To increase response time to your public web site, you decide to purchase three network load-balancing appliances to match your three web servers. Your web site is registered with the name www.faroutwidets.com using IP address 216.76.0.55. What IP addresses should the public interface of each load balancer assume?
A) 216.76.0.55, 216.76.0.55, 216.76.0.55
B) 216.76.0.52, 216.76.0.53, 216.76.0.54
C) 216.76.0.56, 216.76.0.57, 216.76.0.58
D) 216.76.0.55, 216.76.0.56, 216.76.0.57
216.76.0.55, 216.76.0.55, 216.76.0.55
216.76.0.55, 216.76.0.55, 216.76.0.55 is correct. Network load balancers (NLBs) should accept client requests to the requested service (216.76.0.55); thus, they must all be configured to listen on the same virtual IP address. Incoming client requests are then distributed to the least busy backend web servers. When multiple load balancers are used, active/active configurations mean all load balancers are active simultaneously. Active/passive means only one load balancer is active; the passive node becomes active when the active node goes down.
Which technique can easily reveal internal business procedures and computing configurations?
A) shoulder surfing
B) phishing
C) tailgating
D) dumpster diving
Dumpster Diving
Dumpster diving is correct. Dumpster diving involves analyzing discarded documentation to learn about a company’s operations, view employee names and e-mail addresses, and so on.
You are modifying a script that retrieves computer statistics remotely in an enterprise network. The script has a .PS1 file extension and contains statements such as this:
Get-Service | Where{$_.status –eq "Running"}What type of script is this?
A) shell scripting
B) batch file
C) powershell
D) python script
PowerShell
PowerShell is correct. Microsoft PowerShell uses a verb-noun type of syntax and is used by network administrators to manage computers.
A technician connects to an Internet SMTP host using the telnet command and issues the following commands: Helo smtp1.acme.ca Mail from:president@whitehouse.gov Rcpt to:billgates@microsoft.com Data:Subject:Linux versus Windows Hi Bill. Please take note that open source software is set to achieve world dominance. Thanks. – The Pres ``` How can these two users prevent this type of attack? (Choose two.)
A) exchange public key
B) disable SMTP on smtp1.acme.ca
C) Uninstall telnet from all computers
D) digitally sign e-mails using private key
-Exchange public key
-Digitally sign e-mails using private key
Exchange public keys and digitally sign e-mails using private keys are correct. A private key is used by the sender to generate a unique signature for an e-mail message. The recipient uses the related sender public key to verify the validity of the signature. Spoofed SMTP messages cannot have a valid digital signature, since hackers will not have access to the sender’s private key.
Social engineering breaches which of the following?
A) intimidation
B) trust
C) authority
D) familiarity
Trust
Trust is correct. Social engineering is a breach of trust in which victims are lured into trusting the validity of the person or company they are in communication with.
Which concept exposes employees to varying job roles to increase their overall knowledge of the business?
A) Separation of Duties
B) job rotation
C) mandatory vacations
D) least privilege
Job Rotation
Job rotation is correct. Job rotation enables employees to learn about various business roles, which is beneficial to the organization.
A user reports that when he connects to a secured website at https://www.fakeacmewidgets.com, the web address changes to http://www.fakeredirect.uk, but the website content looks the same. The user has never noticed this URL change before. What type of attack does this behavior indicate?
A) DoS
B) ARP poisoning
C) cross-site scripting
D) DNS poisoning
DNS poisoning
DNS poisoning is correct. DNS poisoning can redirect requests for a legitimate web site address to another web server that may gather personal user information such as account numbers or passwords.
Chandra is a software developer. She has just completed a web application for a hardened e-commerce web site. What should be done before the application goes live?
A) ping the website to ensure it is functional
B) use security fuzzing
C) patch the web server
D) test the PKI code in the web application
Use security fuzzing
Use security fuzzing is correct. Security fuzzing is a process by which sample data is passed to the application to test its security and functionality.
Two users agree on a passphrase that is used to encrypt communications between their cell phones. Which of the following best describes this type of key?
A) private
B) public
C) asymmetric
D) symmetric
Symmetric
Symmetric is correct. When the same key is used to encrypt and decrypt, this is called symmetric encryption.
Which of the following are considered benefits of server virtualization? (Choose two.)
A) centralized data storage
B) faster network access
C) cheaper software licensing
D) efficient application of software updates
-Centralized data storage
-Efficient application of software updates
Efficient application of software updates and centralized data storage are correct. Because virtualized servers could be running on the same physical host, patch deployment is efficient. Virtualized servers often use shared disk storage, thus centralizing data and making backups quicker and easier.
Which two activities commonly result from hacker-controlled botnets consisting of many infected computers?
A) DDoS
B) spam
C) ransomware
D) spyware
-DDoS
-Spam
DDoS and Spam are correct. Botnets are collections of computers under hacker control. Spam messages or distributed denial of service (DDoS) attacks are easily launched from botnets because of the number of controlled computers. DDoS mitigators use techniques such as up-to-date IP reputation databases to detect attacks.
Which type of security testing does not provide any information at all to testers?
A) partially known environment
B) known environment
C) laterally known environment
D) unknown environment
Unknown environment
Unknown environment security testing does not provide any information on software coding, network layout or addressing, phone numbers, usernames, and so on. Testers must piece together relevant data to construct a picture of what they are testing.
What can be done to harden a public e-commerce web server, assuming default ports are being used? (Choose two.)
A) do not use an administrative account to run the web server
B) do not use TCP port 80 or 443
C) install an SSL certificate and enable PKI
D) install a PKI certificate and enable TLS
-Do not use an administrative account to run the web server
-Install a PKI certificate and enable TLS
Install a PKI certificate and enable TLS and Do not use an administrative account to run the web server. are correct. You can enable TLS and install a PKI certificate on a web server. Web servers run with a user account, and this should be a limited account with limited system privileges in case the web server is compromised by an attacker.
What can be used to prevent malicious e-mail file attachments from being opened by users?
A) antivirus software
B) anti-spam software
C) host-based firewall
D) pop-up blocker
Antivirus software
Antivirus software running on user computers can detect infected file attachments sent via e-mail.
An unsuspecting user downloads a free hard disk optimization program. A few days later, her bank notifies her that her credit card has been used in another country. Which type of malware is most likely responsible for this security breach?
A) worm
B) spam
C) trojan
D) zombie
Trojan
Trojans present themselves as useful, benign software when in fact they are malicious code. A downloaded disk optimization program could contain a keylogger that captures credit card information that a user types in.
An attacker enters an office building and plugs his laptop into an unused network jack behind a plant in the reception area. He is then connected to the LAN, where he initiates an ARP poisoning attack. How could this have been prevented? (Choose two.)
A) use a strict IPSec policy for all LAN computers
B) update all virus scanners
C) disable unused switch ports
D) use a strict firewall policy on the perimeter firewall
-Use a strict IPSec policy for all LAN computers
-Disable unused switch ports
IPSec can be used to ensure that network traffic is accepted only from appropriate computers. For example, a LAN could use PKI certificates with IPSec—traffic from computers without a trusted PKI certificate would simply be dropped. Switch ports not in use should be disabled to prevent unauthorized network connectivity.
You have been tasked with ensuring that sensitive data is properly removed from decommissioned storage devices. Which term describes what must be done?
A) stapling
B) data sanitization
C) key escrow
D) pinning
Data sanitization
Data sanitization is a technique used to ensure that data remnants cannot be retrieved from used storage media.
An employee signs a document stating that company e-mail may be used only to conduct business; personal messages are forbidden. What type of policy is this?
A) e-mail retention
B) acceptable use
C) storage retention
D) disaster recovery
Acceptable Use
A document stating how company assets can and cannot be used is an acceptable use policy.
A retail sales clerk is not allowed to maintain related bookkeeping records for accounting purposes. Which security principle does this apply to?
A) job rotation
B) due diligence
C) Separation of Duties
D) least privilege
Separation of Duties
To reduce the possibility of fraud, no single business task and its bookkeeping should be performed by a single person.
Which Linux command can be used to capture network traffic?
A) chmod
B) tcpdump
C) head
D) grep
Tcpdump
The tcpdump command can be used to capture network traffic. Command line parameters control through which network interface capturing occurs and whether captured traffic is displayed on the screen or written to a file.