Practice Test 5 Flashcards

1
Q

What is the best countermeasure against social engineering?

AAA protocols
User authentication
Strong passwords
User education

A

User education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following violates the principle of least privilege?

Onboarding process
Improperly configured accounts
Shared accounts for privileged users
Time-of-day restrictions

A

Improperly configured accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An e-commerce store app running on an unpatched web server is an example of:

Architecture/design weakness
Risk acceptance
Vulnerable business process
Security through obscurity

A

Vulnerable business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The purpose of a downgrade attack is to make a computer system fall back to a weaker security mode which makes the system more vulnerable to attacks.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A situation in which an application fails to properly release memory allocated to it or continually requests more memory than it needs is called:

Memory leak
Buffer overflow
DLL injection
Integer overflow

A

Memory leak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?

Buffer overflow
Pointer dereference
Memory leak
Integer overflow

A

Integer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A situation in which an application writes to or reads from an area of memory that it is not supposed to access is referred to as:

DLL injection
Buffer overflow
Memory leak
Integer overflow

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following terms describes an attempt to read a variable that stores a null value?

Integer overflow
Pointer dereference
Buffer overflow
Memory leak

A

Pointer dereference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources is known as:

DLL
ISO
EXE
INI

A

DLL

A dynamic link library (DLL) is a shared program module with ordered code, methods, functions, enums and structures that may be dynamically called by an executing program during run time. ADLLusually has a file extension ending in .dll.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the terms listed below describes a type of attack that relies on executing a library of code?

Memory leak
DLL injection
Pointer dereference
Buffer overflow

A

DLL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“In the IT industry, the term ““System sprawl”” is used to describe poor hardware resource utilization.”

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An effective asset management process provides countermeasures against: (Select all that apply)

System sprawl
Race conditions
Undocumented assets
Architecture and design weaknesses
User errors
A

System sprawl
Undocumented assets
Architecture and design weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero-day attack exploits:

New accounts
Patched software
Vulnerability that is present in already released software but unknown to the software developer
Well known vulnerability

A

Vulnerability that is present in already released software but unknown to the software developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:

Antivirus
Firewall
Antispyware
Malware

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following applies to a request that doesn’t match the criteria defined in an ACL?

Group policy
Implicit deny rule
Transitive trust
Context-aware authentication

A

Implicit deny rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stateless inspection is a firewall technology that keeps track of network connections and based on the collected data determines which network packets should be allowed through the firewall.

True
False

A

False

17
Q

Which of the answers listed below refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet?

VPN concentrator
Load balancer
Managed switch
Multilayer switch

A

VPN concentrator

18
Q

VPNs can be either remote-access (used for connecting networks) or site-to-site (used for connecting a computer to a network).

True
False

A

False

19
Q

Which of the IPsec modes provides entire packet encryption?

Tunnel
Payload
Transport
Default

A

Tunnel

20
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is known as:

Protected mode
Tunnel mode
Transport mode
Safe mode

A

Transport mode

21
Q

Which part of the IPsec protocol suite provides authentication and integrity?

CRC
AH
SIEM
AES

A

AH

Authentication Header (AH) is a protocol and part of the Internet ProtocolSecurity(IPsec) protocol suite, which authenticates the origin of IP packets (datagrams) and guarantees the integrity of the data.

22
Q

Which of the IPsec protocols provides authentication, integrity, and confidentiality?

AES
SHA
AH
ESP

A

ESP

An EncapsulatingSecurityPayload (ESP) is a protocol within the IPSec for providing authentication, integrity and confidentially of network packets data/payload in IPv4 and IPv6 networks.ESPprovides message/payload encryption and the authentication of a payload and its origin within the IPSec protocol suite.

23
Q

Which of the terms listed below describes a type of VPN that alleviates bottlenecks and conserves bandwidth by allowing users simultaneously make use of both the VPN and public network links?

Tethering
Split tunnel
Load balancing
Full tunnel

A

Split tunnel

24
Q

Examples of secure VPN tunneling protocols include: (Select 2 answers)

bcrypt
SCP
IPsec
WEP
TLS
A

IPsec

TLS

25
Q

“The term ““Always-on VPN”” refers to a type of persistent VPN connection the starts automatically as soon as the computer detects a network link.”

True
False

A

True