Qs probably on da test Flashcards
Lisa periodically runs a vulnerability scans on the organization’s network. Lately, she has been receiving many false positives. Which of the following actions can reduce false positives?
Run the scans as credentialed scans
Run the scans as non credentialed scans
Run the scans using passive recon
Run the scans using active recon
Run the scans as credentialed scans
Obj: 1.7 Technique used in sec assements
Security professionals are preforming a pen test on your network. After compromising a server, they use the compromised server to launch additional attacks within the network. Which of the following best describes this activity
Privilege Escalation
Black Box Testing
Pivoting
Persistence
Pivoting
Pivoting refers to the technique used by attackers to move deeper into a network after gaining initial access. It typically involves the use of a compromised system as a launchpad to access other parts of the network that are not directly reachable from the attacker’s position
the access control system needs to protect data based on the document type
Students | Private | Students
Faculty Compensation | Private | Compensation
Internal Phone Lists | Private | Employee
Which of the following models will they implement?
DAC
MAC
Role-BAC
ABAC
MAC
It uses security levels. MAC is the only one thatu utlizies secuirty levels
3.8 Implement authentiction and authorization solutions
Security Experts want to reduce risks associated with updating critical Operating systems. Which of the following will best meet this goal?
Implement a change management policy
Implement patches when they are released
Use only trusted operating systems
Implement operating systems with secure configurations
Implement a change management policy
Change management policy helps reduce risks assoc with making changes to system, including updating
5.3 Explain the importance of policy’s to org security
Lisa is a database administrator. She received a phone call from someone identifying himself as a representative from a known hardware vendor. He said he’s calling customers to inform them of a problem with database servers they’ve sold, but he said the problem only affects servers running a specific operating system version. He asks Lisa what operating system versions the company is running on their database servers. Which of the following best describes the tactic used by the caller in this scenario?
Prepending
Tailgating
Pharming
Smishing
Prepending
social engineering tactic of prepending by setting up a scenario that has a better chance of victim giving out information
1.1 Compare and Contrast different types of social engineering techniques
Your organization’s security policy states that administrators should follow the principle of least priveldge. Which of the following administrators are following the policy?
Account Audits
Risk Assessment
Vulnerability Assessment
Threat Assessment
Account Audits
Account audits verify users have the permissions they need for the job, but no more
3.7 implement identity and account
Bart recently hooked up a switch incorrectly causing a switching loop problem, which took down part of the organizations network. Management wants to implement a solution that will prevent this from occurring in the future. Which of the following is the best choice to meet this need?
Flood Guard
SNMPv3
SRTP
RSTP
RSTP
Rapid Spanning Tree Protocol prevents switching loop problems and provides loop protection
3.3 implement secure network designs
Management within your org has defined a use case to support confidentiality of data stored in a database. Which of the following solutions will best meet this need?
hashing
Digital Signature
Encryption
Smart Card
Encryption
hashing is integrity
2.8 Summarize the basics of cryptographic concepts
While reviewing logs for a web app, a secuirty analyst notices that it has crashed several time’s reporting a memory error. Shortly after it crashes, the logs show malicious code that isn’t part for a known app. Which of the following is most likely occurring?
Buffer Overflow
ARP Poisoning
Privilege Escalation
Replay
Privledge Escalation
1.3, analyze potential indicators associated with application tasks
Lisa has been hired as a pen tester by your org to test the security of a web server. She decides to start by Foot printing the server. Which of the following tools will best help her in this phase?
SIEM
Netcat
Tcpdump
Gray Box Testing
Netcat
Netcat can be used for outspringing a system during recon stage of pen testing
If you see ` OR 1=1; on the exam, it’s an SQL injection
If you see ` OR 1=1; on the exam, it’s an SQL injection
RC4 is the only stream cipher covered
RC4 is the only stream cipher covered
Asymmetric encryption is also known as public key cryptography
Two keys are used in public key cryptography
Instantly match integrity and hashing on the exam
MD5 and SHA are the most common hash functions used
▪ Policies are generic
▪ Procedures are specific