SEC+ B Flashcards

1
Q
A developer has just finished coding a custom web application and would like to test it for bugs by automatically injecting malformed data into it. Which of the following is the developer looking to perform?
Fuzzing
Stress Testing
Sandboxing
Normalizing
A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A security analyst has identified malware the is propagating automatically to multiple systems on the network. Which of the following types of malware is MOST likely impacting the network?
Virus
Worm
Logic Bomb
Backdoor
A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A company uses WPA2-PSK, and it appears there are multiple unauthorized devices connected to the wireless network. A technician suspects this is because the wireless password has been shared with unauthorized individuals. Which of the following should the technician implement to BEST reduce the risk of this happening in the future?
Wireless guest isolation
802.1X
WPS
MAC address blacklist
A

802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is a symmetric encryption algorithm that applies to the encryption over multiple iterations?
RC4
RSA
3DES
SHA
A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A company is implementing a remote access portal so employees can work remotely from home. The company wants to implement a solution that would securely integrate with a third party. Which of the following is the BEST solution?
SAML
RADIUS
Secure token
TACACS+
A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security admin has been conducting an account permissions review that had identified several users who belong to functional groups and groups responsible for auditing the functional groups’ actions. Several recent outages have not been able to be traced to any user. Which of the following should the security admin recommend preserving future audit log integrity?
Enforcing stricter onboarding workflow policies
Applying least privileged to user group membership
Restricting audit group membership to service accounts

A

Restricting audit group membership to service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following solutions is the BEST method for controlling data exfiltration during this project?
Require that all consultant activity be restricted to a secure VDI environment
Require the consultants to sign an agreement stating they will only use the company-provided email address for communications during the project
Require updated antivirus, USB blocking, and a host-based firewall on all consultant devices

A

Require that all consultant activity be restricted to a secure VDI environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A newly hired CSO is reviewing the company’s IRP and notices the procedures for zero-day malware attacks are being poorly executed, resulting in the CSIRT failing to address and coordinates malware removal from the system. Which of the following phases would BEST address these shortcomings?
Identification 
Lessons Learned
Recovery
Eradication
A

Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An engineer is configuring a wireless network using PEAP for the authentication protocol. Which of the following is required?
802.11n support on the WAP
X 509 certificate on the server
CCMP support on the network switch

A

X 509 certificate on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a resiliency strategy that allows a system to automatically adapt to workload changes?
Fault tolerance
Redundancy
Elasticity

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security team has completed the installation of a new server. The OS and applications have been patched and tested, and the server is ready to be deployed. Which of the following actions should be taken before deploying the new server?
Disable the default accounts
Run a penetration test on the network
Create a DMZ in which to place the server

A

Disable the default accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security engineer wants to further secure a sensitive VLAN on the network by introducing MFA. Which if the following is the BEST example of this?
PSK and PIN
RSA token and password
Fingerprint scanner and voice recognition

A

RSA taken and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proprietary information was sent by and employee to a distribution list that included external email addresses. Which of the following BEST describes the incident that occurred and the threat actor in this scenario?
Social engineering by a hacktivist
MITM attack by a script kiddie
Unintentional disclosure by an insider

A

Unintentional disclosure by an insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security analyst received and after-hours alert indicating that a large number of accounts with the suffix “admin” were locked out. The accounts were all locked out after five unsuccessful login attempts, and no other accounts on the network triggered the same alert. Which of the following is the BEST explanation for these alerts?
The standard naming convention makes administrator accounts easy to identify, and they were targeted for an attack
The admin accounts do not have rigid password complexity rules, and this made them easier to crack
The company has implemented time-of-day restrictions, and this triggered a false positive alert when the admin tried to log in

A

The standard naming convention makes administrator accounts easy to identify, and they were targeted for an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A recent security audit identified crypto-currency software installed on one user’s machine. Which of the following is the MOST likely cause of this policy violation and the BEST remediation to prevent a reoccurrence?
The user’s machine was infected with malware; implement the orgs incident response
The user installed the software on the machine; implement technical controls to enforce the written policies
Admin downloaded the software from an untested repository; add a policy that requires integrity checking for all software

A

The user installed the software on the machine; implement technical controls to enforce the written policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
The phones at a business are being replaced with the VoIP phones that get plugged in-line between the switch and PC. The voice and data networks still need to be kept separate. Which of the following would allow for this?
NAT
Intranet
Subnetting
VLAN
A

VLAN

17
Q
Which of the following models is considered an iterative approach with frequent testing
Agile
Waterfall
DevOps
Sandboxing
A

Agile

18
Q

A security analyst discovers one of the business processes, which generates 75% of the annual revenue, uses a legacy system. This creates a risk that can contribute to a 2% drop in revenue generation every quarter. Which of the following would be the BEST response to this risk?
Mitigation
Avoidance
Insurance

A

Insurance

19
Q
A new employee discovered a thumb drive with the company’s logo on it while walking in the parking lot. He was curious as to the contents and placed it into his work computer. Shortly after accessing the contents, he noticed the machine running slower, started to reboot, and displayed new icons on the screen. Which of the following types of attacks occurred?
Social Engineering
Brute force attack
MITM
DoS
A

Social Engineering

20
Q

Which of the following types of vulnerability scans returns more detailed and thorough insights into actual system vulnerabilities?
Non-credentialed
Intrusive
Credentialed

A

Credentialed

21
Q

A security analyst is determined the point of compromised after a company was hacked. The analyst checks the server logs and sees that a user account was logged in a at night, and several large, compressed files were exfiltrated. The analyst then discovers the user last logged in four years ago and was terminated. Which of the following should the security analyst recommend preventing this type of attack in the future? (Select Two)
Disable all user accounts that are not logged in to for 180 days
Enable a login banner prohibiting unauthorized use
Perform an audit of all company user accounts
Review and update the firewall settings
Restrict the compromised accounts

A

Disable all user accounts that are not logged in to for 180 days
Perform an audit of all company user accounts

22
Q
A system admin wants to secure a backup environment, so backups are less prone to ransomware attacks. The admin would like to have a fully isolated set of backups. Which if the following would be the MOST secure option for the admin to implement? 
A DMZ
An air gap
A honeypot
A VLAN
A

An air gap

23
Q

A secure engineer deploys a certificate from a commercial CA to the RADIuS server for use with the EAP-TLS wireless network. Authentication is failing, so the engineer examines the certificate’s properties: Issuer: (A commercial CA) Valid from: (yesterday’s date) Subject: CN-smithco.com Public key: RSA (2048 bits) Enhanced key usage: Client authentication Key usage: Digital signature, key encipherment (a0) Which of the following is the MOST likely cause of the failure?
The certificate is missing the proper OID
The certificate is missing wireless authentication in key usage
The certificate is self-signed

A

The certificate is missing the proper OID

24
Q

An organization uses an antivirus scanner from Company A on its firewall, an email system antivirus scanner from Company B, and an endpoint antivirus scanner from Company C. This is an example of:
Unified threat management
An OVAL system
Vendor diversity

A

vender diversity

25
Q

A NIPS admin needs to install a new signature to observe the behavior of a worm that may be spreading over SMB. Which of the following signatures should be installed on the NIPS?
DENY from ANY:ANY to ANY:445 regex’.”SMB.”
PERMIT from ANY:ANY to ANY:445 regex’. SMB.

A

DENY from ANY:ANY to ANY:445 regex’.”SMB.”

26
Q

A red team initiated a DoS attack on the management interface of a switch using a known vulnerability. The monitoring solution then raised an alert, prompting a network engineer to log in to the switch to diagnose the issue. When the engineer logged in, the red team was able to capture the credentials and subsequently log in to the switch. Which of the following actions should the network team take to prevent this type of breach from reoccurring?
Encrypt all communications with TLS 1.3
Transition from SNMPv2c to SNMPv3 with AES-256
Enable Secure Shell and Disable Telnet

A

Enable Secure Shell and Disable Telnet

27
Q

A penetration tester has unsuccessfully accessed a web server using an exploit in the user-agent string for Apache Struts. The tester then brute forces a credential that provides access to the back-end database server in a different subnet. This is an example of:
Persistence
Pivoting
Escalation of privilege

A

Pivoting

28
Q
An organization handling highly confidential information needs to update its system. Which of the following is the BEST method to prevent data compromise?
Wiping
Degaussing
Shredding 
Purging
A

Shredding

29
Q

Which of the following is the BEST example of a reputation impact identified during a risk assessment?
A bad software patch taking down the production systems
A misconfigured firewall exposing intellectual property to the internet
An attacker defacing the e-commerce portal

A

An attacker defacing the e-commerce portal

30
Q
A penetration tester is testing passively for vulnerability on a company’s network. Which of the following tools should the penetration tester use?
Zenmap
Wireshark
Nmap
Nikto
Snort
A

Nikto

31
Q

A security analyst is asked to check the configuration of the company’s DNS service on the server. Which of the following command line tools should the analyst use to perform the initial assessment?
Nslookup/dig
Tracert
Ipconfig/ifconfig

A

Nslookup/dig

32
Q
Which of the following should a company require prior to performing a penetration test?
NDA
CVE score
Data classification
List of threats
A

NDA

33
Q

Which of the following BEST explains “likelihood of occurrence”?
The chance that an event will happen regardless of how much damage it may cause
The overall impact to the orgs once all factors have been considered
The probability that a threat actor will target and attempt to exploit an organization’s systems

A

The probability that a threat actor will target and attempt to exploit an organization’s systems

34
Q

A developer is creating a new web application on a public cloud platform and wants to ensure the application can respond to increase in load while minimizing costs during periods of low usage. Which of the following strategies is MOST relevant to the use-case?
Elasticity
Redundancy
High availability

A

Elasticity

35
Q

An internal intranet sire is required to authentication users and restricts access to content to only those who are authorized to view it. The site admin previously encountered issues with credentials spoofing when using the default NTLM setting and wants to move to be a system that will be more reliant to replay attacks. Which of the following should the admin implement?
NTLMv2
TACACS+
Kerberos

A

Kerberos

36
Q

Which of the following is a component of multifactor authentication?
RADIUS
SSO
OTP

A

OTP

37
Q
A company recently experienced a security breach. The security staff determined that the intrusion was due to an out-of-date proprietary software program running on a non-compliant server. The server was imaged and copied onto a hardened VM, with the previous connections re-established. Which of the following is the NEXT step in the incident response process?
Recovery
Eradication
Lessons Learned
Containment
A

Lessons Learned