SEC+ Revision Questions Mitigating Security Threats Flashcards

1
Q

The web developers at your company are testing their latest web site code before going live to ensure that it is robust and secure. During their testing they provide malformed URLs with
additional abnormal parameters as well as an abundance of random data. What term describes their actions?
A. Cross-site scripting
B. Fuzzing
C. Patching
D. Debugging

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of disabling unneeded network services on a computer is referred to as what?
A. Patching
B. Fuzzing
C. Hardening
D. Debugging

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are on a conference call with your developers, Serena and Thomas, discussing the security of your new travel site. You express concern over a recent article describing how user submissions to web sites may contain malicious code that runs locally when others simply read the post. Serena suggests validating user input before allowing the user submissions. Which problem might validation solve?
A. Cross-site scripting
B. Fuzzing
C. Hardening
D. Patching

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following lessens the success of dictionary password attacks?

A. Password complexity requirements
B. Account lockout threshold
C. Password hints
D. Enforce password history

A

Password complexity requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A RADIUS server is used to authenticate your wireless network users. While creating a new user account, you notice there are many more user accounts than actual users. What should be done?
A. Delete all accounts not linked to a user.
B. Disable all accounts not linked to a user.
C. Verify how accounts are used and then delete unnecessary accounts.
D. Verify how accounts are used and then disable unnecessary accounts.

A

Verify how accounts are used and then disable unnecessary accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The 802.11n wireless network in your department must be layer 2 secured. You would like to control which specific wireless devices are allowed to connect. How can you do this?
A. SIM card
B. NetBIOS computer name
C. MAC address
D. IP address

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the best definition of the IEEE 802.1x standard?
A. It defines a group of wireless standards.
B. It defines the Ethernet standard.
C. It defines network access control only for wireless networks.
D. It defines network access control for wired and wireless networks.

A

It defines network access control for wired and wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are hardening a Linux computer and have disabled SSH in favor of Telnet. You ensure passwords are required for Telnet access. Identify your error.
A. Secure Telnet should have public key authentication enabled.
B. Only strong passwords should be used with Telnet.
C. SSH should have been used instead of Telnet.
D. The Telnet port should have been changed from 23 to 8080.

A

SSH should have been used instead of Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

As the IT director of a high school using Group Policy and Active Directory, you plan the appropriate standard security settings for newly deployed Windows 7 workstations. Some teachers require modifications to these settings because of the specialized software they use. Which term refers to the standardized security parameters?
A. Initial baseline configuration
B. Principle of least privilege
C. Sysprepped image
D. Local security policy

A

Initial baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The periodic assessment of security policy compliance is referred to as what?
A. Remediation
B. Hardening
C. Continuous security monitoring
D. Trend analysis

A

Continuous security monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are a Windows Server 2012 administrator. You install and configure the Network Policy Server (NPS) role and configure health policies that require all connecting clients to have firewall and spyware software enabled. Clients violating these health policies will receive an IP address placing them on a restricted subnet containing servers with client firewall and spyware software to install. What term accurately refers to the role the servers on this restricted subnet play?
A. Isolation
B. Remediation
C. Validation
D. Authentication

A

Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IT security personnel respond to the repeated misuse of an authenticated user’s session cookie on an e-commerce web site. The affected user reports that they occasionally use the site but not for the transactions in question. The security personnel decide to reduce the amount of time an authentication cookie is valid. What type of attack have they responded to?
A. DoS
B. Dictionary
C. Privilege escalation
D. Cross-site request forgery

A

Cross-site request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network administrator places a network appliance on the DMZ network and configures it with various security thresholds, each of which will notify the IT group via e-mail. The IT group will then adhere to the incident response policy and take action. What will be triggered when any of these thresholds is violated?
A. Alarm
B. Alert
C. Remediation
D. Input validation

A

Alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user reports repeated instances of Windows 7 slowing down to the point where they can no longer be productive. You view the Windows Event Viewer logs for the past month and notice an exorbitant amount of SMTP traffic leaving the local machine each morning between
10 A.M. and 11 A.M. What type of analysis was performed to learn of this anomaly?
A. Forensic
B. Trend
C. Network statistical
D. Vulnerability

A

B. Trend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Roman is developing an application that controls the lighting system in a large industrial complex. A piece of code calls a function that controls a custom-built circuit board. While running his application, Roman’s application fails repeatedly because of unforeseen circumstances. Which secure coding guideline did Roman not adhere to?
A. Packet encryption
B. Digital signatures
C. Error handling
D. Hardening

A

C. Error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can be done to harden the Windows operating system? (Choose three.)
A. Disable system restore points.
B. Disable unnecessary services.
C. Patch the operating system.
D. Configure EFS.
E. Disable Group Policy.

A

B. Disable unnecessary services.
&
C. Patch the operating system.
&
D. Configure EFS.

17
Q

You are configuring a fleet of Windows 7 laptops for traveling employees, some of whom prefer using USB mice. It is critical that the machines are as secure as possible. What should you configure? (Choose three.)
A. Disable USB ports.
B. Require USB device encryption.
C. Enable and configure the Windows firewall.
D. Install and configure antivirus software.
E. Enable a power management scheme.

A

B. Require USB device encryption.
&
C. Enable and configure the Windows firewall.
&
D. Install and configure antivirus software.

18
Q

A shipment of new Windows computers has arrived for Accounting department employees. The computers have the operating system preinstalled but will require additional financial software. In which order should you perform all of the following?
A. Join the Active Directory domain.
B. Apply all operating system patches.
C. Ensure the virus scanner is up to date.
D. Log in to the Active Directory domain to receive Group Policy security settings.
E. Install the additional financial software.

A

C, B, A, D, E

19
Q

Which of the following items can help prevent ARP cache poisoning? (Choose three.)
A. Use 802.1x security.
B. Disable ARP.
C. Patch the operating system.
D. Configure the use of digital signatures for all network traffic.
E. Disable unused switch ports.

A

A. Use 802.1x security.
&
D. Configure the use of digital signatures for all network traffic.
&
E. Disable unused switch ports.

20
Q

Your intranet provides employees with the ability to search through an SQL database for their past travel expenses once they have logged in. One employee from the IT department discovers that if they enter an SQL string such as SELECT * FROM EXPENSES WHERE EMPID = ‘x’=’x’;, it returns all employee travel expense records. What secure coding guideline was ignored?
A. SQL injection prevention
B. Input validation
C. Disabling of SQL indexes
D. User authentication

A

B. Input validation

21
Q

You capture and examine network traffic weekly to ensure the network is being used properly. In doing so, you notice traffic to TCP port 53 on your server from an unknown IP address. After reviewing your server logs, you notice repeated failed attempts to execute a zone transfer to your server. What type of attack was attempted?
A. ARP poisoning
B. Cross-site scripting
C. DNS poisoning
D. MAC flooding

A

C. DNS poisoning

22
Q

A network security audit exposes three insecure wireless routers using default configurations. Which security principle has been ignored?
A. Application patch management
B. Device hardening
C. Input validation
D. Principle of least privilege

A

B. Device hardening

23
Q

Which of the following standards must authenticate computing devices before allowing network access?
A. Router
B. Hub
C. IEEE 802.1x
D. IEEE 802.11n

A

C. IEEE 802.1x

24
Q

What will prevent frequent repeated malicious attacks against user account passwords?
A. Minimum password age
B. Password hints
C. Password history
D. Account lockout

A

D. Account lockout

25
Q

Which item would best apply a standard security baseline to many computers?
A. A disk image of the operating system
B. Security templates distributed through Group Policy
C. Password settings distributed through Group Policy
D. Security templates distributed through a local security policy

A

B. Security templates distributed through Group Policy

26
Q

After patching and hardening your computers, how would you determine whether your computers are secure?
A. Performance baseline
B. Security templates
C. Penetration testing
D. Password cracking

A

C. Penetration testing

27
Q

While hardening a Windows server, you decide to disable a number of services. How can you ensure that the services you are disabling will not adversely affect other services?
A. Run the net start ‘service name’ / dep command.
B. Disable the services, let the system run for a few days, and then check the Event Viewer logs.
C. Right-click the service and choose Show Dependency Chain.
D. Double-click the service and view the Dependencies tab.

A

D. Double-click the service and view the Dependencies tab.

28
Q

Your company uses Microsoft IIS to host multiple intranet web sites on a two-node cluster. All sites store their configuration and content on drive C: and log files are stored on D:. All sites share a common application pool. The IT director has asked that you ensure a single hacked web site will not adversely affect other running web sites. What should you do?
A. Move each web site configuration to a separate hard disk.
B. Move each web site content to a separate hard disk.
C. Configure each web site to use its own application pool.
D. Add a third node to the two-node cluster.

A

C. Configure each web site to use its own application pool.

29
Q

You are developing your Windows 8.1 enterprise rollout strategy. IT security policies have been updated to reflect the company’s stricter security standards. Which of the following will harden Windows 8.1? (Choose two.)
A. Use a Class C IP address.
B. Configure log archiving.
C. Configure USB device restrictions.
D. Disable unused services.

A

C. Configure USB device restrictions.
&
D. Disable unused services.

30
Q

How can you prevent rogue machines from connecting to your network?
A. Deploy an IEEE 802.1x configuration.
B. Use strong passwords for user accounts.
C. Use IPv6.
D. Deploy an IEEE 802.11 configuration.

A

A. Deploy an IEEE 802.1x configuration.

31
Q

What can be done to secure the network traffic that is generated when administering your wireless router?
A. Use HTTPS with IPv6.
B. Use HTTP with PKI.
C. Use HTTP with IPv6.
D. Use HTTPS with PKI.

A

D. Use HTTPS with PKI.

32
Q

Your company is upgrading to a new office suite. The spreadsheet application must only trust macros digitally signed by the company certificate authority. You have servers installed in a single Windows Active Directory domain. What should you configure to ensure macro security on all stations is configured properly?
A. Configure the spreadsheet application on each computer to trust company macros.
B. Create an EFS PKI certificate for signing the macros.
C. Use Group Policy to enforce the described application configuration baseline.
D. Use Group Policy to distribute macros to all stations.

A

C. Use Group Policy to enforce the described application configuration baseline.

33
Q

Aidan is creating a Linux operating system image that will be used to deploy Linux virtual machines from a template. After patching the operating system, he installs the required application software, installs and updates the anti-malware software, creates the image, and stores it on the imaging server. What did Aidan forget to do?
A. He forgot to Sysprep the installation before capturing the image.
B. He forgot to patch the application software.
C. He forgot to turn on anti-malware real-time monitoring.
D. He forgot to encrypt the hard drive.

A

B. He forgot to patch the application software.

34
Q

You are the founder of Acme Data Mining. The business focuses on retrieving relevant consumer habits from various sources, and that data is then sold to retailers. Because of the amount of data that must be processed, you must implement the fastest possible solution. Which type of technology should you implement?
A. SQL
B. NoSQL
C. SATA
D. NoSATA

A

B. NoSQL

35
Q

You have been asked to develop secure web application for a wine home brewing retailer. The app will read and write to a back-end database for customer transactions. The database has rules in place to check that data is valid. The web site uses HTTPS. What else should be done to further secure the web app?
A. Use JavaScript for server-side data validation.
B. Use PKI.
C. Use a VPN.
D. Use JavaScript for client-side data validation.

A

D. Use JavaScript for client-side data validation.

36
Q

Your company has issued Android-based smart phones to select employees. Your manager asks you to ensure that data on the smart phones is protected. How do you address your manager’s concerns?
A. Implement SCADA, screen locking, device encryption, and anti-malware, and disable unnecessary software on the phones.
B. Implement PKI VPN authentication certificates, screen locking, device encryption, and anti-malware, and disable unnecessary software on the phones.
C. Implement screen locking, device encryption, patching, and anti-malware, and disable unnecessary software on the phones.
D. Implement HTTPS, screen locking, device encryption, and anti-malware, and disable unnecessary software on the phones.

A

C. Implement screen locking, device encryption, patching, and anti-malware, and disable unnecessary software on the phones.

37
Q

While hardening your home office network, you decide to check that the firmware in all your network devices is updated. To which of the following devices would this apply?
A. Smart TV, gaming console, printer, HVAC, wireless router
B. Refrigerator, printer, wireless router, electrical outlets, printer
C. HVAC, fire extinguisher, gaming console, printer, wireless router
D. Gaming console, Android devices, Apple iOS devices, printers, fire extinguisher

A

A. Smart TV, gaming console, printer, HVAC, wireless router

38
Q

Which enterprise-class items within your organization should be patched regularly? (Choose all that apply.)
A. Mainframes
B. Thin clients
C. Public cloud virtualization hosts
D. IP addresses

A

A. Mainframes
&
B. Thin clients

39
Q
A