Q17 Flashcards

1
Q
Which of the following is the best response after detecting and verifying an incident?
A.   Contain it.
B.    Report it.
C.   Remediate it.
D.   Gather evidence.
A

A. Contain it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following are denial-of-service attacks? (Choose three.)
A.   Teardrop
B.    Smurf
C.   Ping of death
D.   Spoofing
A

A. Teardrop
B. Smurf
C. Ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A web server hosted on the Internet was recently attacked, exploiting a vulnerability in the operating system. The operating system vendor assisted in the incident investigation and verified the vulnerability was not previously known. What type of attack was this?
A.   Botnet
B.    Zero-day exploit
C.   Denial-of-service
D.   Distributed denial-of-service
A

B. Zero-day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Of the following choices, which is the most common method of distributing malware?
A.   Drive-by downloads
B.    USB flash drives
C.   Ransomware
D.   Unapproved software
A

A. Drive-by downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Of the following choices, what indicates the primary purpose of an intrusion detection system (IDS)?
A.   Detect abnormal activity
B.    Diagnose system failures
C.   Rate system performance
D.   Test a system for vulnerabilities
A

A. Detect abnormal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is true for a host-based intrusion detection system (HIDS)?
A. It monitors an entire network.
B. It monitors a single system.
C. It’s invisible to attackers and authorized users.
D. It cannot detect malicious code.

A

B. It monitors a single system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following is a fake network designed to tempt intruders with unpatched and unprotected security vulnerabilities and false data?
A.   IDS
B.    Honeynet
C.   Padded cell
D.   Pseudo flaw
A

B. Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Of the following choices, what is the best form of anti-malware protection?
A. Multiple solutions on each system
B. A single solution throughout the organization
C. Anti-malware protection at several locations
D. One-hundred-percent content filtering at all border gateways

A

C. Anti-malware protection at several locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When using penetration testing to verify the strength of your security policy, which of the following is not recommended?
A. Mimicking attacks previously perpetrated against your system
B. Performing attacks without management knowledge
C. Using manual and automated attack tools
D. Reconfiguring the system to resolve any discovered vulnerabilities

A

B. Performing attacks without management knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
What is used to keep subjects accountable for their actions while they are authenticated to a system?
A.   Authentication
B.    Monitoring
C.   Account lockout
D.   User entitlement review
A

B. Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
What type of a security control is an audit trail?
A.   Administrative
B.    Detective
C.   Corrective  
D.   Physical
A

B. Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following options is a methodical examination or review of an environment to ensure compliance with regulations and to detect abnormalities, unauthorized occurrences, or outright crimes?
A.   Penetration testing
B.    Auditing
C.   Risk analysis
D.   Entrapment
A

B. Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
What can be used to reduce the amount of logged or audited data using nonstatistical methods?
A.   Clipping levels
B.    Sampling
C.   Log analysis
D.   Alarm triggers
A

A. Clipping levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following focuses more on the patterns and trends of data than on the actual content?
A.   Keystroke monitoring
B.    Traffic analysis
C.   Event logging
D.   Security auditing
A

B. Traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What would detect when a user has more privileges than necessary?
A.   Account management
B.    User entitlement
C.   audit Logging
D.   Reporting
A

B. User entitlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly