SEC+ C Flashcards
Exploitation of a system using widely known credentials and network address that results in DoS is an example of: improper error handling default configuration untrained users lack of vendor support
Default Configurations
Given the following: (LONG TEXT) Which of the following concepts of cryptography is shown? Collision Salting Steganography Stram Cipher
Collison
The website of a bank that an organization does business with is being reported as untrusted by the organization’s web browser. A security analyst has been assigned to investigate. The analyst discovers the bank recently merged with another local bank and combined names. Additionally, the user’s bookmark automatically redirects to the website of the newly named bank. Which of the following is the MOST likely cause of the issue?
- The company’s web browser is not up to date
- The website’s certificates still has the old bank’s name
- The website was created too recently to be trusted
- The website’s certificated has expired
The Website’s certificate still has the old bank’s name
A system admin wants to enforce the use of HTTPS on a new website. Which of the following should the system admin do NEXT after generating the CSR? Install the certificates on the server Provide the public key to the CA Password protect the public key Ensure the new key is not on the CRL
Install the certificate on the server
A security analyst needs a solution that can execute potential malware in a restricted and isolated environment for analysis. In which of the following technologies is the analyst intersected? Sandboxing Staging DMZ Honeypot
Sandboxing
A security consultant is analyzing data from a recent compromise. The following data points are documented:-Removal instructions were not available from any major antivirus vendor. Which of the following types of malware is this an example of? RAT Ransomware Backdoor Keylogger Worm
Ransomware
A security analysis is investigating a security breach involving the loss of sensitive data. A user passed the information through social media as vacation photos. Which of the following methods was used to encode their data? Obfuscation Steganography Hashing Elliptic Curve
Steganography
A pass-the-hash attack is commonly used to:
Modify DNS records to point to a different domain
Modify the IP address of the targeted computer
Execute java script to capture user credentials
Laterally move across the network
Laterally move across the network
When an initialization vector is added to each encryption cycle, it is using the: ECB cipher mode MD5 cipher mode XOR cipher mode CBC cipher mode
CBC cipher mode
Which of the following is an example of the second A in the AAA model?
The encryption protocol successfully completes the handshake and establishes a connection
The one-time password is keyed in, and the login system grants access
The event log records a successful login with a type code that indicates an interactive login
A domain controller confirms membership in the appropriate group
A domain controller confirms membership in the appropriate group
A company wants to ensure confidential data from storage media is sanitized in such a way that the drive cannot be reused. Which of the following methods should the technician use? Shredding Wiping Low-level formatting Repartitioning Overwriting
Shredding
A security admin begins assessing a network with software that check for available exploits against a known database, using both credentials and external scripts A report will be compiled and used to confirm patching levels. This is an example of: Penetration testing fuzzing static code analysis vulnerability scanning
Vulnerability scanning
An attacker has gained control of several systems on the internet and is using them to attack a website, causing it to stop responding to legitimate traffic. Which of the following BEST describes the attack? MITM DNS Poisoning Buffer overflow DDoS
DDoS
When building a hosted datacenter, which of the following is the MOST important consideration for physical security within the datacenter? Security guards Cameras Secure Enclosures Biometrics
Secure Enclosures
A penetration tester was able to connect to a company’s internal network and perform scans and staged attacks for the duration of the testing period without being noticed. The SIEM did not alert the security team to the presence of the penetration tester’s devices on the network. Which of the following would provide the security team with notification in a timely manner?
Implement rogue system detection and sensors
Create a trigger on the IPS and alert the security team when unsuccessful logins occur
Decrease the correlation threshold for alerts on the SEIM
Run a credentialed vulnerability scan
Implement rogue system detection and sensors