Practice Test #4 Flashcards
Several users have received HTML-based e-mail spam that send them to a malicious website when they click any of the images or links in the message. Which of the following security techniques should you implement?
A) make sure client anti-malware signatures are up to date
B) use a policy to disable HTML images in the e-mail client
C) use a web browser to read HTML messages
D) use a web-caching proxy server
Use a policy to disable HTML images in the e-mail client
Use a policy to disable HTML images in the e-mail client is correct. If the HTML images are not from a trusted source, you can set your e-mail clients to not load HTML images by default. Use a policy to enable this feature for all clients on your network.
As part of your business continuity planning, you need to consider the security and validity of stored data in several large databases used by your organization. Which of the following data security concepts deals with making sure that data is not corrupted or tampered with in any way?
A) integrity
B) privacy
C) confidentiality
D) availability
Integrity
Integrity ensures that your data is consistent and never modified by unauthorized persons or manipulated in any intentional or accidental manner.
Which of the following is the primary reason for an organization to use a third party to perform penetration testing on its networks instead of having its internal network administrators perform the testing?
A) to check on administrators who are on mandatory vacations
B) to perform attacks while the network is in live production
C) to ensure there is no previous knowledge of system that could cause bias
D) to conduct an audit of current network administrators
To ensure there is no previous knowledge of system that could cause bias
Hiring a third-party company to perform penetration testing on an organization’s networks ensures that the testing simulates a live attack by an unbiased user who is not familiar with the network.
You are configuring laptops for your organization’s sales engineers, who will be visiting customer sites to perform technical integration and troubleshooting of your organization’s products installed there. The laptops contain several proprietary applications that should not be distributed outside of your organization. Which of the following actions should you take to help secure the contents of the laptops?
A) enable a Screensaver password
B) provide a hardware locking cable
C) full-disk encryption
D) enable a BIOS password
Full-disk encryption
You can encrypt the contents of the laptops’ hard drives so that they can’t be accessed without a passphrase or other measure entered by the sales engineers.
A user on your wireless network has had her login credentials stolen. Your wireless network uses encryption and authentication, and after searching the access logs, you cannot find any evidence of the user accessing the wireless network for the time period the user claims she was connected. Which of the following is the most likely issue?
A) there is a rogue access point
B) the user is running a legacy 802.11 protocol
C) a war driving attack took place
D) the user did not authenticate
There is a rogue access point
A hacker has set up an open wireless access point in the vicinity of your wireless network, and the user has unknowingly connected to it. The hacker was able to analyze the network data to discover the user’s credentials.
A malicious internal user was discovered using network traffic capture software from his workstation to perform an on-path attack against other users on your network. Which of the following activities was the malicious user most likely performing?
A) spoofing the organization’s domain name
B) capturing login names and passwords for websites
C) domain kiting
D) attacking the primary router with a flood of ping requests
Capturing login names and passwords for websites
The user was capturing network data as it passed over the network, most likely looking for user logins and passwords that were unprotected and sent in clear text.
Which of the following is generally a paper-based type of exercise in which participants discuss a scenario to discern weaknesses in a plan?
A) simulation
B) tabletop
C) risk assessment
D) checklist
Tabletop
A tabletop exercise requires the involved parties to gather and step through a scenario to discern weaknesses in the plan. Tabletop exercises are generally paper-based, meaning that no actual steps are undertaken.
Several of your users have reported a virus attack on their workstations, and their home data directories have been deleted. Comparing the log files from the workstations, you realize the attacks all occurred at the exact same time. Which of the following malware types could be the issue?
A) backdoor
B) macro virus
C) logic bomb
D) rootkit
Logic bomb
A logic bomb program will not activate until a specific trigger is set off (for example, reaching a specific time or date or starting a program a specific number of times).
Which of the following actions should you take if you discover a flaw within your web application that allows root access to the system through command injection?
A) completely re-architect the application for the next major version
B) do not publish the issue but resolve it in the next major version
C) resolve the issue and release a hotfix
D) advise end users not to use command injection
Resolve the issue and release a hotfix
Resolve the issue and release a hotfix is correct. Because this is a serious security flaw, you should resolve it as soon as possible and release a hotfix to your customers to prevent them from being exploited by the flaw.
Your organization currently has only two external public IP addresses available but needs to share these IPs with several internal hosts that require external IP addresses for connectivity. Which of the following should you implement?
A) router
B) firewall with no services running
C) security device with NAT capabilities
D) DHCP server
Security device with NAT capabilities
Using network address translation (NAT) on a firewall device, you can share an external address with several internal IP addresses of devices protected by the firewall.
You have thoroughly researched and documented a disaster recovery plan for your organization. What should you do next as part of your business continuity and disaster recovery planning?
A) create backup copies of the plan and store them offsite
B) have a plan approved by the CEO of the company
C) test your plan
D) store the plan in a locked safe
Test your plan
Your disaster recovery plan (DRP) must be tested to ensure that it properly meets your business continuity objectives during a real-life scenario. After testing your plan, you can revise it based on your testing results.
Which of the following aspects of your company’s network or systems does not provide redundancy in the event of a failure?
A) redundant power supplies on a server
B) dual fiber cabling for the network backbone
C) redundant routers for the same ISP
D) RAID 5 hard drive systems on a server
Redundant routers for the same ISP
Although you have redundancy at the router level, if your Internet service provider (ISP) communications fail, there are no backup communications. You should have at least one more communication line to a different ISP.
You are developing a web application and are performing testing of the input fields for web forms. Which of the following techniques can you use to make sure that operating system commands cannot be inserted into your web forms and executed?
A) transitive access
B) escaping
C) cross-site scripting
D) fuzzing
Escaping
Escaping is a secure coding technique that ensures that any system commands are not processed and executed as actual commands; instead, they are only recognized as text.
You are reviewing your organization’s business contracts with third-party hardware service vendors and checking the estimated time for vendors to respond to service calls and repair failed hardware. Which of the following factors is the most important in these calculations?
A) MTBF
B) MTTR
C) RPO
D) RTO
MTTR
The mean time to repair (MTTR) is the average length of time from the moment a device or service fails until it is repaired. For a failed server part, your service vendor may state that they can provide a new replacement part within 4 hours, but in other cases, this could be 24 to 48 hours.
Your organization’s e-mail server has been flagged by a third-party anti-spam service as a possible source of spam messages. Which of the following is most likely the issue?
A) using insecure versions of POP and IMAP for retrieving messages
B) out-of-date anti-spam signatures
C) using TLS for SMTP connections
D) open relay on SMTP port 25
Open relay on SMTP port 25
If you allow Simple Mail Transfer Protocol (SMTP) relay on port 25, any mail client outside of your network can send mail through your server, and this is often exploited by spammers.
Which of the following is not a valid privacy role within an organization that is required to comply with the GDPR?
A) data protection officer
B) data processor
C) data assessor
D) data controller
Data assessor
The General Data Protection Regulation (GDPR) does not designate a data assessor privacy role.
You are suspicious that a specific computer on your network has a Trojan that is allowing backdoor access by a remote intruder. Which of the following actions can help you track down the information transmitted to the remote user and the user’s address?
A) check the antivirus logs
B) run a port scan on your firewall
C) monitor traffic from that specific computer with a traffic capture and analysis tool
D) run a performance baseline test on the system
Monitor traffic from that specific computer with a traffic capture and analysis tool
A tool like Wireshark, a common protocol analyzer, can capture and allow analysis of network traffic. Each individual network packet can be analyzed to decode its header information (where the packet originated and its destination) and also the content of the packet.
You have a small office consisting of about 25 users. You need to utilize mail encryption to allow specific users to encrypt outbound e-mail messages, but you do not need an expensive onsite encryption server. Which of the following applications can you implement?
A) HTTPS
B) POP/IMAP
C) WPA3
D) PGP
PGP
Pretty Good Privacy (PGP) provides a low-cost or open-source alternative for allowing users to encrypt their e-mail messages. Technically, neither PGP nor web of trust is Public Key Infrastructure (PKI), since it is all peer-to-peer certificate trust and management, versus a centralized certificate authority (CA).
Which of the following concepts helps prevent the situation where a compromise of one secret key or message leads to a compromise of previous confidential messages?
A) perfect forward secrecy
B) blockchain
C) symmetric cryptography
D) steganography
Perfect forward secrecy
Perfect forward secrecy (PFS) is designed, through the utilization of complex cryptographic protocols, to prevent the situation where a compromise of one secret key or message leads to a compromise of previous confidential messages.
After an incident, to prevent further unauthorized access to users’ smartphones when they are not in the presence of the user, which of the following security control policies should you implement?
A) using MDM to enforce a lock after five minutes of inactivity
B) clean desk policy
C) password history and rotation
D) screen privacy guard
Using MDM to enforce a lock after five minutes of inactivity
By using mobile device management (MDM) to enforce automatic locking of users’ mobile devices after five minutes of inactivity, you ensure that users’ smartphones are not accessible if they are away from them for a lengthy period of time. The users must authenticate to their device to unlock it.
Your organization communicates client healthcare data to several medical centers within the United States. Which of the following regulatory compliance policies applies to your organization concerning the protection and confidentiality of client health data?
A) HIPAA
B) PCI DSS
C) GDPR
D) sarbanes-oxley
HIPAA
HIPAA is correct. The Health Insurance Portability and Accountability Act (HIPAA) is a set of compliance regulations for the protection of confidential patient data in the medical, healthcare, and health insurance industries.
Which of the following is the best method to mitigate DNS attacks?
A) encrypting host files
B) encrypting DNS lookups
C) secure authenticated zone transfers
D) using reverse DNS resolution
Secure authenticated zone transfers
Domain Name Service (DNS) poisoning attacks can be mitigated by ensuring that your DNS server updates its information only from authoritative sources by proper authentication or the use of secure communications.
As the company’s technical executive, you are researching risk management strategies and have identified several security-related issues that need to be communicated to the organization. Which of the following mediums should you use to ensure issues are communicated effectively and users are held accountable?
A) social media posting
B) company-wide memo via e-mail
C) signed organizational policies
D) hard-copy rulebook available from human resources
Signed organizational policies
For the most effective risk management and training, organizational policies must be created, distributed, and signed in order to educate your employees on how to conduct their day-to-day activities while being vigilant about security.
You are creating a business continuity and disaster recovery plan for your organization. Which of the following aspects of your plan examines your organization’s most critical business functions and how they will be affected during a disaster?
A) business impact analysis
B) escalation plan
C) contingency plan
D) risk analysis
Business impact analysis
Business impact analysis is correct. The business impact analysis (BIA) examines the loss of revenue, legal obligations, and customer service interruption that can arise as the result of a disaster.
Which of the following is considered the most volatile type of medium when acquiring and preserving data for an investigation?
A) disk
B) RAM
C) firmware
D) paper
RAM
Random-access memory (RAM) is extremely volatile, meaning that if power is lost or removed from the memory, it loses its contents. This makes it incredibly important that, if at all possible, systems that are isolated after an event are not powered down.
After performing a site survey of your current wireless network, you discover that the range of the network is well beyond what is required for your facility. Which of the following controls is the best option to mitigate the issue and prevent users outside of your facility from accessing the wireless network?
A) transmit on a narrow-band frequency
B) lower the power of wireless transmission on your access points
C) remove the access points closest to the outside walls
D) Extend the antennas of your access points
Lower the power of wireless transmission on your access points
You can limit the power level of transmissions on your wireless network to control the range and speed of wireless access. This way, you can limit the range of your access point coverage to just the needed areas of your location.
Which of the following is a packet-capture utility natively built into most modern Linux distributions, but is also included in some macOS and Windows ports?
A) tcpdump
B) winhex
C) Wireshark
D) curl
Tcpdump
Tcpdump is a packet-capture utility built into most modern Linux distributions but is also found in some macOS and Windows ports. It’s used to view network packets and to output to a file.
After a recent hacking attack on your web server, you have discovered that the hacker exploited a security flaw within the underlying operating system running on the server. Which of the following was the most likely cause?
A) you upgraded to the latest major version of the OS when it is released
B) you didn’t update the web application software to resolve the issue
C) you didn’t use your firewall to block port access to the exploit
D) you didn’t apply an OS patch to resolve the issue
You didn’t apply an OS patch to resolve the issue
Keep your operating system up to date with the latest software updates or patches. If a security flaw is discovered, the OS vendor will release a patch as quickly as possible to resolve the issue.
You are performing a risk analysis of the critical servers in your organization that accept, process, and store customer data. Which of the following risks can result in the biggest impact to customer data?
A) theft of a network switch
B) failed hard drive on a RAID system
C) hacking attempt on your firewall
D) virus attack that corrupts files on a server
Virus attack that corrupts files on a server
If a virus infects one of your servers that stores customer data, the files can be corrupted if you do not have a proper backup of the data.
You are developing a proposal for a new authentication solution for a gaming service; the company has requested a two-factor authentication method utilizing a mobile app along with a traditional username and password combination. Which of the following is the most likely solution?
A) one-way hash
B) TOTP
C) PKI
D) SSL
TOTP
(TOTP) Time-based one-time passwords allow users to log in to a system with a username and password combination and then a one-time token, generally generated from a separate device.
After a recent tailgating incident where an unauthorized person followed an employee into your company’s access-controlled facility, which of the following mitigation techniques should you implement to prevent future attacks originating from this and other types of social engineering?
A) acceptable use policy
B) security guard
C) awareness training
D) security passes
Awareness training
You can improve security by providing user training on the different types of social engineering attacks and how to prevent them.
Your company’s web server is currently under network attack. After checking the firewall logs, you notice that the server is receiving an abnormal amount of network traffic from several different source IP addresses. Which of the following attacks is the most likely cause?
A) on-path attack
B) spoof attack
C) denial-of-service attack
D) distributed denial-of-service attack
Distributed denial-of-service attack
A distributed denial-of-service (DDoS) attack comes from several different source IP addresses.