Questions 101-125 Flashcards
Perspective clients want to see sample reports from previous penetration tests. What should you do next? A. Decline but, provide references. B. Share full reports with redactions. C. Share reports, after NDA is signed. D. Share full reports, not redacted.
B. Share full reports with redactions.
Which regulation defines security and privacy controls for Federal information systems and organizations? A. EU Safe Harbor B. HIPPA C. NIST-800-53 D. PCI-DSS
C. NIST-800-53
During a security audit of IT processes, an IS auditor found that there were no documented security
procedures. What should the IS auditor do?
A. Create a procedures document
B. Conduct compliance testing
C. Terminate the audit
D. Identify and evaluate existing practices
D. Identify and evaluate existing practices
Which of these options is the most secure procedure for storing backup tapes?
A. In a climate controlled facility offsite
B. On a different floor in the same building
C. In a cool dry environment
D. Inside the data center for faster retrieval in a fireproof safe
A. In a climate controlled facility offsite
You are using NMAP to resolve domain names into IP addresses for ping sweep later.
Which of the following commands looks for IP addresses?
A. >host -t a hackeddomain.com
B. >host -t ns hackeddomain.com
C. >host -t soa hackeddomain.com
D. >host -t AXFR hackeddomain.com
A. >host -t a hackeddomain.com
You’ve just been hired to perform a pen test on an organization that has been subjected to a large-scale attack.
The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk.
What is one of the first things you should do when given the job?
A. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.
B. Start the wireshark application to start sniffing network traffic.
C. Interview all employees in the company to rule out possible insider threats.
D. Establish attribution to suspected attackers.
A. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.
Which of the following is a component of a risk assessment? A. Logical interface B. DMZ C. Physical security D. Administrative safeguards
C. Physical security
It is a vulnerability in GNU’s bash shell, discovered in September of 2014, that gives attackers access to run
remote commands on a vulnerable system. The malicious software can take control of an infected machine,
launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?
A. Rootshock
B. Shellbash
C. Shellshock
D. Rootshell
C. Shellshock
Which of the following incident handling process phases in responsible for defining rules, collaborating human
workforce, creating a back-up plan, and testing the plans for an organization?
A. Recovery phase
B. Identification phase
C. Preparation phase
D. Containment phase
C. Preparation phase
What is the most common method to exploit the “Bash Bug” or “ShellShock” vulnerability?
A. SYN Flood
B. Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
C. SSH
D. Manipulate format strings in text fields
B. Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
A medium-sized healthcare IT business decides to implement a risk management strategy.
Which of the following is NOT one of the five basic responses to risk?
A. Delegate
B. Avoid
C. Accept
D. Mitigate
A. Delegate
To maintain compliance with regulatory requirements, a security audit of the systems on a network must be
performed to determine their compliance with security policies. Which one of the following tools would most
likely be used in such an audit?
A. Port scanner
B. Protocol analyzer
C. Intrusion Detection System
D. Vulnerability scanner
D. Vulnerability scanner
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion
Detection Systems (IDS) of the network of an organization that has experienced a possible breach of security.
When the investigator attempts to correlate the information in all of the logs, the sequence of many of the
logged events do not match up.
What is the most likely cause?
A. The attacker altered or erased events from the logs.
B. Proper chain of custody was not observed while collecting logs.
C. The security breach was a false positive.
D. The network devices are not all synchronized.
D. The network devices are not all synchronized.
The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will
require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore
the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the
SLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?
A. $1320
B. $146
C. $440
D. $100
B. $146
It is an entity or event with the potential to adversely impact a system through unauthorized access,
destruction, disclosure, denial of service or modification of data.
Which of the following terms best matches the definition?
A. Risk
B. Attack
C. Vulnerability
D. Threat
D. Threat