SEC+ A Flashcards
Which of the following are disadvantages of full backups (select three)
They rely on other backups for recovery
They require the most storage
They demand the most bandwidth
They have the slowest recovery time
They are impossible in virtual environments
They are time-consuming to complete
They require the most storage
They have the slowest recovery time
They are time-consuming to complete
A network admin is configuring a honeypot in a company's DMZ. To provide a method for hackers to access the system easily, the company needs to configure a plaintext authentication method that will send only the username and passwords to a service un the honeypot. Which of the following protocols should the company use? OAthu PAP RADIUS Shibboleth
PAP
A security analyst has been to implement secure protocols to prevent cleartesxt credentials from being transmitted over the internal network. Which of the following protocols is the security analyst MOST likely to implement? (Select TWO) SNMPv3 S/MIME DNSSEC SSH SFTP
SSH
SFTP
Which if the following controls does a mantrap BEST represent? Deterrent Detective Physical Corrective
Physical
Which of the following is the main difference between symmetric and asymmetric cryptographic algorithms?
The use of PKI in symmetric algorithms
HSM-based key generation
Only one key used in symmetric algorithms
Random vs pseudo-random key generation
Only one key used in symmetric algorithms
When conducting a penetration test, a pivot is use to describe a scenario in which:
The penetration tester uses pass-the-hash- to gain access to a server via SMB, and then uses this server to SSH to another server
A penetration tester is able to download the Active Directory database after exploiting an unpatched vulnerability on the domain
The vulnerability scanner reveals a flaw in SMB signing, which can be used to send a nectar recon tool to one of there servers on the network
The penetration tester is able to access the datacenter or network closet by using a lockpick
The penetration tester uses pass-the-hash to gain access to a server via SMB, and then uses this server to SSH to another server
A user reports she is receiving emails that appear to be from organizations to which she belongs, but the emails contain links to websites that do not belong to those organizations. Which of the following security scenarios does the describe?
A hacker is using Ann’s social media information to create a spear phishing attack
The DNS servers for the organizations have been hacked and are pointing to malicious sites
The company’s mail system has changed the organization’s links to point to a proxy server for security
Her computer is infected with adware that has changed the email links
A hacker is using Ann’s social media information to create a spear phishing attack
A company is looking for an all-in-one solution to provide identification, authentication, authorization, and accounting services. Which of the following technologies should the company use? Diameter SAML Kerberos CHAP
Diameter
A company has forbidden the use of external media within its headquarter location. A security analyst is working on adding additional repositories to a server in the environment when the analyst notices some odd procedures running on the system. (See Original Sheet) Given this output, which of the following security issues has been discovered? A misconfigured HIDS A malware Installation A policy violation The activation of a Trojan
A malware installation
A security analyst from a large organization has been instructed to use another, more effective scanning tool. After installing the tool on her desktop, she started a full vulnerability scan. After running the scan for eight hours, she finds that there were no vulnerabilities identified. Which of the following is the MOST likely cause of not receiving any vulnerabilities on the network?
The org has a zero tolerance policy against applying cybersecurity best practices
The org had a proactive approach to patch management principles and practices
The security analyst credentials did not allow full admin rights for the scanning tool
The security analyst just recently applied operating system level patches
Buffer overflow can be avoided using proper:
The security analyst credentials did not allow full admin rights for the scanning tool
Buffer overflow can be avoided using proper: Memory leak prevention Memory reuse Input validation Implementation of ASLR
Input validation
An org’s CIO read an article that identified leading hacker trends and attacks, one of which is the alteration of URLs to IP addresses resulting in users being redirected to malicious websites. To reduce the changes of this happening in the organization, which of the following secure protocols should be implemented? DNSSEC IPSec LDAPS HTTPS
DNSSEC
A security admin has created a new group policy object that utilizes the trusted platform module to compute a hash of system files and compare the value to a known-good value. Which of the following security concepts is this an example of? Integrity measurement Secure baseline Sandboxing Immutable systems
Integrity Measurement
Given the following output: NMAP –P 80 –script hostmap-bfk.nse company.com starting NMAP 6.46 NMAP scan report for company.com Port State Service 80/TCP open http Host script results hostmap-bfk hosts: web1.company.com… Which of the following BEST describes the scanned environment?
A host was identified as a web server that is hosting multiple domains
A host was scanned, and web-based vulnerabilities were found
A connection was established to a domain, and several redirect connections were identified
A web shell was planted in company.com’s content management system
A host was identified as a web server that is hosting multiple domains
A security analyst needs to determine why the wireless network appears to be randomly connecting and disconnecting. He notes that only the expected SSID appears. And the WAP.MAC address matches. Given that the WAP connection has to be confirmed, which of the following is MOST likely the type of wireless attack being seen? Evil twin Disassociation Rogue AP Brute force
Disassociation