SEC+ Revision Questions Security Assessments and Audits Flashcards
As part of your security audit you would like to see what type of network traffic is being transmitted on the network. Which type of tool should you use?
A. Protocol analyser
B. Port scanner
C. Vulnerability scanner
D. Password cracker
A. Protocol analyser
A network consists of 250 computers. You must determine which machines are secure and which are not. Which type of tool should you use?
A. Protocol analyser
B. Port scanner
C. Vulnerability scanner
D. Password cracker
C. Vulnerability scanner
You would like to focus and track malicious activity to a particular host in your DMZ. What should you configure?
A. Honeynet
B. Honeypot
C. DMZ tracker
D. Web server
B. Honeypot
Which of the following would you employ to determine which TCP and UDP ports on a host are open?
A. Vulnerability scanner
B. Packet sniffer
C. Performance Monitor
D. Port scanner
D. Port scanner
Which procedure identifies assets, threats, and risks and also determines methods to minimize the impact of these threats?
A. Risk analysis
B. Vulnerability assessment
C. Port scanning
D. Network mapper
A. Risk analysis
A technician must identify deviations from normal network activity. Which task must she first perform?
A. Trend analysis
B. Baseline analysis
C. Performance monitoring
D. Risk analysis
B. Baseline analysis
A developer analyses source code to ensure there are no errors or potential security risks. Which term best identifies this activity?
A. Risk assessment
B. Patch management
C. Debugging
D. Code review
D. Code review
A Windows computer has not been patched nor have the unnecessary services been disabled. Which of the following statements is true regarding security?
A. The computer will perform faster.
B. The computer has a large attack surface.
C. The computer has a small attack surface.
D. The computer will perform slower.
B. The computer has a large attack surface.
A network security auditor simulates various network attacks against a corporate network. Which term best defines this procedure?
A. Vulnerability analysis
B. Network mapping
C. Penetration testing
D. Risk assessment
C. Penetration testing
Your manager asks you to configure a collection of purposely vulnerable hosts in a DMZ for the purpose of tracking hacking attempts. What term best describes what you are configuring?
A. Honeynet
B. Honeypot
C. Firewall
D. Proxy server
A. Honeynet
You run a vulnerability scan on subnet 192.168.1.0/24. The results state TCP ports 135 through 139 are open on most hosts. What does this refer to?
A. File and Print Sharing
B. Web server
C. Mail server
D. Remote Desktop Protocol
A. File and Print Sharing
You are a network consultant in charge of creating a wireless network infrastructure for a hotel. Toward the end of the implementation your team evaluates the project to ensure it meets the original stated requirements. What is this called?
A. Penetration testing
B. Risk assessment
C. Design review
D. Code review
C. Design review
After careful log examination you realize somebody has hacked into your WEP-secured home wireless network. What can you do to further secure wireless traffic?
A. Use WPA2 Enterprise
B. Use WPA2 PSK
C. Disable SSID broadcasting
D. Change the SSID name
B. Use WPA2 PSK
What should be done to ensure your network security is effective?
A. Patch all operating systems
B. Update the BIOS on all systems
C. Periodically test network security controls
D. Upgrade to the latest version of Microsoft Office
C. Periodically test network security controls
- Which of the following is considered passive security testing?
A. Capturing network traffic
B. Brute-force password attack
C. Dictionary-based disk decryption
D. OS fingerprinting
A. Capturing network traffic