SEC+_continued Flashcards
______ a section of a network that is isolated from the rest of the netwrok with firewalls.
DMZ (De-Militartized Zone)
Kerberos, SESAME & Active Directory are ______ _______ _______.
three technologies that provide single sign-on authentication.
SESAME (Secure European for Application in a Multi-vendor Environment) is a _____ - ____ _____ ______.
single sign-on technology addressed to issues in Kerberos and is based on public key cryptography.
RSA is an example of ?
Asymmetric cryptography with “authentication”
- RSA is the de facto standard for digital signatures.
- Factor large prime numbers.
What decrypts incoming traffic, examines that traffic and re-encrypts it before it goes back out on the network?
SSL decryptors
What alleviates the load on the processor during encryption, it also transfers the encryption process to a separate device, typically a PCI card for encryption?
SSL/TLS accelerators
IMAP (Internet Message Access protocol) port?
Port 143
Your company has recently purchased several computers that have TPM hardware. Which technology works with this hardware?
IPSEC
Management has decided to purchase a new appliance firewall that will be installed between the public and private networks owned by your company. Which type of firewall is also referred to as an appliance firewall?
Hardware
You need to implement an authentication system that verifies the identity of the users through their eyes? Which type of authentication should you implement?
A retinal scan
A load balancer is a device that distributes network or application traffic across a cluster of servers. Which load balancer scheduling algorithm is used to keep a host connected with the same resource throughout an entire session?
- Affinity-based
- Round-robin
- Active-Passive
- Active-Active
Affinity-based scheduling ensures that all requests from the user during the session are sent to the same instance.
A WAP (Wireless Access Point) is a point of entry/exit for radio-based signals to a network. Which component is used to identify WAPs on a network and is not effective network security when turned off?
- Signal Strength
- Bandwidth selection/width
- SSID
- Antenna Type and Placement
SSID is used to identify a WAP on a network. Turning off a Service Set Identifier (SSID) doesn’t effectively protect a network from attack because the SSID is still sent in plaintext, allowing anyone to sniff it.
Which GPS technology creates a virtual fence around a location and detects mobile devices from entering into that fence?
- Context-aware authentication
- Geolocation
- Containerization
- Geofencing
Geofencing uses a virtual fence around a location and detects mobile devices when entering that fence.
A vulnerability scanner is a program designed to probe a system for misconfiguration, old software versions, and other weaknesses. Which type of vulnerability scanner is used to perform a broad sweep for vulnerabilities on more than one host across the network?
- Application vulnerability scanners
- Host vulnerability scanner
- Network vulnerability scanner
- Configuration Compliance Scanner
A network vulnerability scanner performs a broad sweep for vulnerabilities on more than one host across the network.
Which command provides a list of hops that traffic transverses as it is routed to the remote target?
- nmap
- traceroute
- arp
- tcpdump
The traceroute command lists hops and uses ICMP to build a trace of the packet in route, so if ICMP is blocked on any device, traceroute will be unable to provide information for that device..
Which term is used when a malicious or suspicious event does not trigger a rule on the IDS/IPS?
- anomaly
- behavioral
- false negative
- false positive
A false negative should be reported as they do not trigger a rule, but it should because it has captured a malicious event.
Which protocol is used to securely transfer files between a client and a server over port 22?
- SFTP
- FTP
- HTTPS
- SNMP
Secure File Transfer Protocol (SFTP) runs over port 22 and is used to securely transfer files from a client to a server.
Credentials should be protected at the level in which they’re accessed. Which protocols are a major security concern because they send credentials in plaintext?
- SMTP
- Telnet
- FTP
- SFTP
- HTTPS
SMTP sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
Telnet sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
FTP sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
Which is a security extension for voice and video communications that uses encryption, message authentication, integrity checks, and protection replay?
- SRTP
- LDAPS
- S/MIME
- SSH
SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features such as encryption, message authentication, integrity checks, and protection replay.
What is a baselining?
- a document stipulating constrains and practices that a user must agree to for access to an organization’s network
- a measurement used when a system changes from its original baseline
- an organization’s secure starting point after fixing any security issues
- an organization’s insecure starting point before fixing any security issues
An organization’s baseline starts from a secure posture after fixing any security issues.
Data exfiltration refers to an attacker who is is attempting to export data from a system. How can an admin protect against data exfiltration?
- periodically check for weak settings or misconfigurations on a device
- up-to-date configurations
- weak encryption algorithms
- firewalls without default-deny rules
Devices should be periodically checked for weak or misconfigured settings because most security controls rely on good configurations to perform properly.
Having up-to-date configurations decreases the chance of data exfiltration.
Which deployment model allows a device to be used only for business and is paid for by the organization?
- COBO
- COPE
- CYOD
- BYOD
Corporate-Owned Business Only (COBO) deployment allows a device to be used solely for business and is paid for by the organization.
Port security uses MAC addresses to control access to ports on a switch. Which variant of port security allows specific MAC addresses to an assigned port?
- Static learning
- Sticky learning
- Anti-Spoofing
- Dynamic learning
Static learning controls access to ports by using specific MAC addresses. This method is helpful when using fixed and dedicated hardware.
Which of the following information does a context-aware authentication mechanism use?
- facial recognition
- fingerprint
- connection method
- location of the device
- requested resources
- specific user
- devices in use
Context-aware authentication mechanisms use the CONNECTION METHOD of the device to allow or block access.
Context-aware authentication mechanisms use the LOCATION OF THE DEVICE to allow or block access.
Context-aware authentication mechanisms use the REQUESTED RESOURCE to allow or block access.
Context-aware authentication mechanisms use a SPECIFIC USER of the device to allow or block access.
Context-aware authentication mechanisms checks the DEVICE IN USE to allow or block access.
Which type of firewall is best for protection of employee and customer data, and can look at specific actions of a packet, including applications that it’s tied to?
- Application-based firewalls
- Classic firewalls
- Stateful Firewalls
- Network-based firewalls
An application firewall can see more information in a packet header, such as specific actions within a packet that pertain to an application.
NIDS/NIPS are Network-based and can detect unauthorized network or host use. Which NIDS/NIPS component creates, stores, and inspects traffic from an offline copy?
- Passive sensor
- Out-of-band
- In-band
- Inline sensor
Passive sensors monitor network traffic and make an offline storage copy of the traffic. There it is examined for suspicious behaviors and activities.
What is a SIEM?
- is a connector between two or more separate network segments
- a network device used to manage and store encryption keys
- a real-time analysis system that aggregates, stores, and correlates data from applications and network hardware
- a part of a switch or firewall that translates telecommunication protocols to other common networking protocols for smooth sending/receiving
Security Information and Event Management (SIEM) is a system that aggregates, stores, and correlates data from network sources into one central repository for analysis purposes.
People are the weakest link in network security. An Acceptable Use Policy (AUP) can help to remedy this issue. Which can be included in an AUP as a means to control what software is installed on a device?
- social engineering
- personal email
- social media
- unauthorized software
An unauthorized software AUP means to control the types of software on a system as it may introduce security or legal risks to the organization.
Which mechanisms are used on the data link layer to drop packets caught in a loop?
- MAC filtering
- STP
- OSPF
- ACLs
Spanning Tree Protocol is a mechanism that prevents loops from multiple active paths between stations.
Which of the following is a characteristic of ANT technology?
- works by transmitting a band of electromagnetic energy beyond the red end of the visible color spectrum
- mainly used in connecting wireless devices, such as mice, keyboards, and other peripherals
- connects devices via a cable for data transfer
- primarily used in sports and fitness sensors to provide individual performance reports
ANT technology is primarily used in sports and fitness sensors to provide individual performance reports.
Proxy servers are used for security, logging, and caching. Which type of proxy is used on the server-side to accept/deny requests from external clients, and provides web application security?
- Application proxy
- Transparent proxy
- Reverse proxy
- Forward proxy
A reverse proxy is a server-side concept for caching static HTTP content when the server accepts requests from external clients.
Which ports are used for the secure version of IMAP and POP?
- IMAP uses 110, POP uses 143
- IMAP uses 993, POP uses 995
- IMAP uses 995, POP uses 993
- IMAP uses 143, POP uses 110
IMAP uses TCP port 993, while POP uses TCP port 995 for securely retreiving email messages from the email server.
Which protocol is used for digitally signing and encrypting emails?
- MIME
- SRTP
- SSH
- S/MIME
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted protocol for sending digitally signed and encrypted emails.
Which firewall rule should be used to allow only specific IP addresses, thus blocking and treating all other traffic as suspicious?
- deny all
- allow all
- implicit deny
- explicit deny
The ‘implicit deny’ security stance treats everything not given specific and selective permission as suspicious.
What is a SCAP scan?
- an automated tool that checks a computer or application configurations for compliance purposes
- a tool that attackers use to find vulnerabilities in a system
- a tool for capturing network traffic to view traffic patterns
- a tool used to identify, destroy, and purge data in decommissioned devices
SCAP (Security Content Automation Protocol) was developed to automate configuration checks for compliance purposes.
**an automated tool that checks a computer or application configurations for compliance purposes
Proxy servers are used for security, logging, and caching. Which type of proxy provides an anonymous browser experience to any user on the internet?
- Web proxy
- Content-filtering proxy
- Open proxy
- Caching proxy
An OPEN PROXY is a forwarding proxy server that is accessible by any Internet user by concealing their IP address while browsing the web.
Which is the newest protocol that addresses existing vulnerabilities in managing devices on an IP-based network?
- SNMPv1
- SNMPv3
- NTP
- LDAPS
SNMPv3 addresses the vulnerabilities of previous versions that came with managing devices on an IP-based network.
Which term is used to install and run an app that hasn’t been authorized or approved by the device’s official app store?
- Carrier Unlocking
- Custom firmware
- Rooting/Jailbreaking
- Sideloading
Sideloading is the installing and running of apps on mobile devices that haven’t been authorized or approved by the device’s official app store.
Which load balancing schema has a secondary load balancer take over in the event that the primary fails?
- Active-Active
- Round-robin
- Affinity-based
- Active-Passive
Active-Passive refers to a load balancing schema in which a secondary load balancer takes over in the event that the primary fails.
Which is attached to a computer as a way to manage and store encryption keys for cryptographic functions?
- Media Gateway
- bridge
- HSM (Hardware Module Security)
- SSL Decryptors
HSM is a combination of hardware and software/firmware that is attached or contained inside a computer and used to provide cryptographic functions for tamper protection and increased performance.
Port security uses MAC addresses to control access to ports on a switch. Which variant of port security learns which MAC addresses are allowed as they connect?
- Static learning
- OSPF
- Sticky learning
- Dynamic learning
Dynamic learning controls access to ports by learning which MAC addresses should be used as they connect. This method is useful for a small number of machines.
Which of the following tools is designed to detect, log, and can automatically respond to unauthorized network or host use?
- IDS
- HIDS/HIPS
- NIDS/NIPS
- IPS
IPS mostly have the same functionality as IDS, except that they add in the ability to respond to unauthorized behaviors.
The technology that involves dividing a mobile device into a series of containers is known as?
- Storage segmentation
- Full device encryption
- Remote wipe
- Containerization
In the context of Mobile Device Management (MDM), containerization is the technology to segment the mobile data into a series of containers. One container could be for personal data, while another is for work-related material.
Which is true of biometrics?
- Biometrics can be used to unlock some mobile devices by using the location of the device.
- Biometrics uses the connection method to unlock some mobile devices.
- Biometrics can be used to unlock some mobile devices by using the owner’s fingerprint.
- Biometrics can be used to unlock some mobile devices by using the owner’s face.
- Biometrics is not a strong security feature.
Some mobile devices have built-in biometrics methods, like fingerprint recognition, that can be used for unlocking the screen.
Some mobile devices have built-in biometrics methods, like facial recognition, that can be used for unlocking the screen.
Biometrics is not a strong security feature; it’s a convenience feature, as biometrics sensors have proven to be hackable.
You have been asked to make recommendations on which IPSEC mode your organization should implement on it’s VPN . In addition, you need to implement the appointment protocol. You decide to use IPSEC in tunnel mode with the AH protocol. Which payload is produced by this configuration?
An encapsulated packet that is digitally signed.
**IPSEC in “tunnel mode” with the “AH” (Authentication Header) produces an encapsulated packet that is digitally signed.
**AH digitally sign packets for authentication purposes.
You are working on a new security system for a US military installation that is only accessed by military personnel. Which certificate-based authentication system should you integrate?
CAC (Common Access Cards) is a certificate based smart card issued by the DOD to military personnel and contractors.
Gaining unauthorized access to the data center by using another users credentials is an example of which option?
PIGGYBACKING - act of gaining unauthorized access to a facility by using another user’s access credentials.
**mantrap - refers to a set of double doors that are generally monitored by a security guard.
**turnstile - is a type of gate that allows movement in a single direction at a time.
You need to ensure that several confidential files are not changed. You decide to use an algorithm to create message digests for the confidential files. Which algorithm should you use?
Secure Hash Algorithm (SHA) is a hashing algorithm that creates a message digest which can be used to determine whether a file has been changed since he message was created. An unchanged message should create the same message degest on multiple passes through a hashing algorithm.
**Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Internationiol Data Encryption Algorithm (IDEA) are secret key encryption standard that are used to encrypt files.