Q+A Flashcards

1
Q

You want to use a more secure version of FTP for transferring files. What are two options?

A

SFTP and FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is known as when traffic to a website is redirected to another illegitimate site?

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In an attempt to gain access to discarded company documents, what social engineering attack would a person implement?

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the more advanced replacement for RADIUS?

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does TACACS+ use?

A

Port 49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port does SSH use?

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does TFTP use?

A

Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You surmise that a user;s session was interrupted by an attacker who inserted malicious code into the network traffic. What attack has occurred?

A

Man-in-the-middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What algorithm depends on the inability to factor large prime numbers?

A

RSA (Rivest, Shamir, Adleman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Greg needs to centralize the authentication of multiple networking systems against a single user database. What is he trying to implement?

A

Single sign-on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What fire extinguisher should be used to put out metal fires suck as the kind created by magnesium or titanium?

A

Class D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol uses port 443?

A

HTTPS (SSL and TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You work as a network admin for your organization and use a tool to capture ICMP, HTTP, and FTP, and other packets of information. Which tool should you use.

A

Protocol Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are in charge of recycling computers. Some of the computers have hard drives that contain personally identifiable information (PII). what should be done to the hard drive before it is recycled.

A

The hard drive should be sanitized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What port and transport mechanism does TFTP use by default?

A

69 and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user receives an encrypted message that was encrypted using asymmetric cryptography. What does this recipient deed to decrypt the messagae

A

Recipient’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What tool should you use to identify network spike activity?

A

Protocol Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

One of your database servers is mission-critical. You cannot afford any downtime. What is the best item to ensure minimal downtime of the server and ensure fault tolerance of the data stored on the database server?

A

RAID (Redundant Array of Inexpensive Disks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You get an automated call from what appears to be your bank. The recording asks you to state your name and birthday and enter you account number to validate your identity. what type of attack has been perpetuated against you.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which network authentication protocol uses symmetric key cryptography, stores a shared key for each network resource and uses a Key Distribution Center (KDC)?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What port does PPTP use?

A

Port 1723

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which service uses port 49?

A

Terminal Access Controller Accesses-Control System Plus (TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What port does RDP use?

A

port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port does L2TP use?

A

Port 1701

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What kid of threat is a virus designed to format a computer’s hard drive on a specific calendar day?

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What port does Kerberos use?

A

Port 88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a hardware chip that stores encrypted keys and resided on a motherboard?

A

Trusted platform module (TMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What protocol uses port 22?

A

SSH (also SCP and SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What port does DNS use?

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An attacker uses a method that is meant to obtain information from a specific person. what type of attack is this?

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Your organization has several logins necessary to gain access to several different sets of resources. what access control method could be used to solve this problem.

A

Single Sign-on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What should you be most concerned with when transferring evidence?

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which type of cable doesn’t suffer from EMI?

A

Fiber optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is an area of the network infrastructure that enables a person to put public-facing systems into it without compromising the entire infrastructure?

A

DMZ (demilitarized zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Your high-tech server room needs a quality fire suppression system. What is the most appropriate type of fire suppression system to install?

A

Gaseous fire suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What port and transport mechanism protocol must be opened on a firewall to allow incoming SFTP connections?

A

22 and TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What grouping of computers is used to start a DDoS attack?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

You have been commissioned by a customer to implement a network access controlmodel that limits remote users network usage during normal business hours only. You create one policy that applies to all the remote users. What access control model are you using

A

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

You’re designing security for an application into it. You need to ensure that all task relating to the transfer of money you require actions by more than one user through a series of checks and balances. What access control methods should use injure?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

One where does the telnet use?

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What kind of attack would a flood guard protect from?

A

SYN attack

42
Q

What what does SFTP use ?

A

Port 22

43
Q

You have implemented an X.509 PKI. One of the private keys has been compromised before the certificate’s regular expiration date. What should you do?

A

Revoke the certificate

44
Q

What will stop network traffic when the traffic is not identified in the firewall rules set

A

Implicit deny

45
Q

Allison wishes to send a file to bob using a PKI. What type of key and Alice used he signed a file?

A

Alice’s private key

46
Q

Thumb drives can be used to compromise systems and enabled unauthorized access. in this scenario, what kind of malware was most likely installed on the thumb drive

A

Trojan

47
Q

You have been contracted to determine if network activity spikes are related to an attempt by an attacker to breach the network. The customer wants you to identify when the activity of occurs and what type of network traffic clauses the activity what type of schools should you use

A

Protocol analyzer

48
Q

Your boss has instructed you to shred some confidential documents. What threat does this mitigate?

A

Dumpster diving

49
Q

What port does FTPS use?

A

Port 989 (and 990).

50
Q

A proximity card is an example of something a user________________.

A

Has

51
Q

You have collected login information, file access information, security log files, and unauthorized security violations. What is this collection known as?

A

Audit trail

52
Q

A password would be characterized as something a user___________.

A

Knows

53
Q

You perform several wardriving routes in your company’s campus and take note of the large number on of unauthorized devices. What are these devices?

A

Rogue access points

54
Q

Users on your network or identified with tickets. What system is being used?

A

kerberos

55
Q

NTLM is an improved version of what?

A

LANMAN

56
Q

A virus is designed to format a hard drive on a specific day. What kind of threat is this?

A

Logic bomb

57
Q

Voice recognition is an example of something a user _______________.

A

does

58
Q

Besides applying patches, what is the most important aspect of hardening and operating system.?

A

Disabling unnecessary services

59
Q

Users are required to login to the network. They use the smartcard to do so. What type of key does the smartcard use to login to the network.?

A

Private key

60
Q

You want to secure down a passing between two points on an IP Network. What method should you use to protect from all but the most sophisticated APT’s?

A

Transport encryption

61
Q

Mantraps can be used to prevent what type of social engineering attack?

A

Tailgating

62
Q

What is it when an application accepts more input and it was originally expecting?

A

Buffer overflow

63
Q

Your organization implement a policy in which accounting staff needs to be crossed trained in various banking software to detect possible fraud. What is this an example of?

A

Job rotation

64
Q

Which attack is best described as an attacker capturing part of the communication, and then later sending some or all that communication to a server while pretending to be the original client?

A

Replay attack

65
Q

What work is SNMP use?

A

Port 161 (and 162).

66
Q

What port is required by an E commerce website server running SSL?

A

Port 443 (inbound).

67
Q

Which inbound port must be opened on a server to a allow the user to log in remotely?

A

3389

68
Q

What port does syslog use?

A

Port 514.

69
Q

What are Bcrypt and PBKDF2 examples of?

A

Key lengthening software.

70
Q

You look through some graphic files and discover that confidential information has been encoded into the files. These files are being sent to a sister company outside your organization. What is this an example of?

A

steganography

71
Q

You check the application log of your web server and see that someone attempted unsuccessfully to enter the text test; etc/password into an HTML form fields. What attack was attempted?

A

Command injection

72
Q

Your boss has asked you to reduce an AP’s Power setting, and place the AP in the center of your building. What reconnaissance method is your boss trying to prevent?

A

Wardriving

73
Q

You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?

A

Evil twin.

74
Q

What is it known as when resources that are not given access are denied default?

A

Implicit deny

75
Q

One of your users complains that files are being randomly renamed and deleted. The last action the user talk was to download and install a new screen saver on the computer. The user says that the file activity started immediately after installation of the screen saver what would be the best description for the screensaver?

A

Trojan horse

76
Q

The IT director asks you to protect the server’s data from unauthorized access and disclosure. What is this an example of?

A

Confidentiality

77
Q

What programming technique can stop buffer overflow attacks?

A

Input validation.

78
Q

Your organization uses a type of cryptography that provides that security but uses smaller key sizes and utilizes logarithms that are calculated against a finite field. What type of cryptography does your organization use ?

A

Elliptic curve.

79
Q

What is used to validate whether trust is in place and accurate by returning responses of: “good”, “unknown”, or “revoked”?

A

Online Certificates Status Protocol (OCSP).

80
Q

What protocol uses port 19?

A

CHARGEN

81
Q

You’ve completed the deployment of PKI with a new organization’s network. Legally you’re required to implement a way to provide description keys to a governmental third party on an as needed basis. What should you implement?

A

Key escrow.

82
Q

You’re the security of Administrator for the company ABC Accouning, inc. The IT director has given rights to you allowing you to review logs and update Network Devices only. Other rights are given out to the network administrators for the areas that fall within their job description. What kind of access control is this?

A

Least privilege.

83
Q

Your LAN is isolated from the Internet by a perimeter network. You suspect that someone is trying to gather information about your LAN. The IT director asks you to gather as much information about the attacker as possible while preventing the attacker from knowing that the attempts has been detected. What is the best method to accomplish this?

A

Deploy a honeypot in the perimeter network.

84
Q

What port does RADIUS use?

A

Port 1812 (and 1813).

85
Q

The security company you work for has been contracted to discern the security level of a software application. The company building the application has given you the login details, production documentation, a test environment, and the source code. That testing type is present?

A

White-box testing

86
Q

You notice that a computer is communicating with an unknown IRC server, and it is also scanning older systems on your network. What threat have you discovered?

A

Botnet

87
Q

What transport protocol and port number does Secure Shell use?

A

TCP (Transmission Control Protocol) Port 22

88
Q

You and several others in the IT team are deciding on an access control model. The IT director wants to implement the strictest access control model available, ensuring that data is kept as secure as possible. What access control model should you and your IT team use?

A

Mandatory Access Control

89
Q

What is software designed to gain admin-level control over a computer system?

A

Rootkit

90
Q

What port does LDAP over TLS/SSL use?

A

Port 636

91
Q

What port does LDAP use?

A

Port 389

92
Q

What enables an attacker to hide the presence of malicious code by altering its Registry entries?

A

Rootkit

93
Q

What protocol uses port 53?

A

DNS

94
Q

What port does SSL use?

A

Port 443

95
Q

You investigate an executive’s laptop to find a system-level kernel module that is modifying the operating system’s functions. What is this an example of?

A

Rootkit

96
Q

What is the service provided by message authentication code?

A

Integrity

97
Q

A fingerprint is an example of something a user _________.

A

is

98
Q

What protocol uses port 514?

A

Syslog

99
Q

What protocol makes use of a supplicant authenticator, and authentication server?

A

802.1X

100
Q

What social engineering attack relies on impersonation in an attempt to gain personal information?

A

Phishing