Security Flashcards

1
Q

Which user group should you assign to a new account on a Windows system if you want the user to have the ability to create and edit private files. stop and start the system, install applications, and add new device drivers?

A

Administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While browsing the internet, you observe that your browser shows pop-up ads related to your recent keyword searches. What is this an example of?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a valid distinguished name for the SocialBook common domain name?

A

SocialBook.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have been contracted to assess a client’s building security. During your evaluation, you observe the following: all equipment secured with cable locks, server racks are locked and equipped with alarms, WAP for the guest Wi-Fi positioned on the receptionist’s desk, biometric locks are installed on high-security rooms. Based on these observations, which recommendation would you MOST likely make to enhance the client’s security?

A

Install the WAP on the ceiling or inside of a special locked box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user finds they cannot access their computer files and receives a pop-up message stating that the files have been encrypted, along with instructions for purchasing a decryption. What type of malware is this?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are responsible for managing numerous workstations in a Windows domain and need to prevent unauthorized access through repeated password attempts. Which default Group Policy Object (GPO) includes a policy that you can enable to protect all domain computers from this type of security threat?

A

Default Domain Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

While reviewing video footage from your organization’s security cameras, you observe a suspicious individual using piggybacking to enter your building without a security badge. What security measure would you MOST likely implement to prevent this from happening in the future?

A

Access control vesitbule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As a junior network technician at the local hospital, you’ve learned that the security administrator has implemented a new policy requiring users to log in to workstations using a fingerprint scanner. Which category of authentication does this represent?

A

Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term is used to describe a system that lacks any anti-malware or firewall protection?

A

Unprotected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of a hard token?

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of multi-factor authentication?

A

PIN and authentication app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malicious individual contacts an employee via cell phone, claiming to be the vice president of the accounting department within the employee’s company. She states that she has forgotten her password and insists that the employee provide his password so she can access necessary reports for an upcoming presentation. She threatens to fire him if he refuses to comply. Which type of attack BEST characterize?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of password cracking attack uses a list of words and phrases to guess the password?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lisa, an employee in HR, has created several important PDF documents that all office managers in her building need to access easily. She wants to ensure the files are easy to find and requires minimal maintenance while ensuring no other users can view them. As the IT technician, which solution would BEST meet Lisa’s requirements?

A

Network share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To add a new computer to the SkyNet domain, which System Properties setting should be used?

A

System Properties > Computer Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An unauthorized individual gains entry to a secure area by following an authorized person through a door equipped with a badge reader. Which type of security threat does this situation illustrate?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have been brought in to evaluate a client’s security protocols. While conducting your assessment, you find that users an access files belonging to other departments. Which of the following measures would you recommend the company implement?

A

Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

After implementing several lockout policies, which type of password attack will these measures MOST effectively defend against?

A

Online attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which wireless security method relies on a shared key configured on both the wireless access point and all connected wireless devices?

A

WEP, WPA Personal, and WPA2 Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What should you implement to monitor and manage the risks of a BYOD policy?

A

Mobile device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are attempting to access a server within the company network from an external location using RDP, but your connection is unsuccessful. Which network device is your network administrator MOST likely required to adjust to enable this connection?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

After entering a user ID and password, an online banking user is required to input a PIN that was sent via text message to their mobile phone. Which digital security method does this process exemplify?

A

Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are the Active Directory administrator for a company with branch offices in multiple countries, including Mexico, Argentina, Canada, and the UK. Currently, the company has 250 employees organized by department, and it’s projected to grow rapidly over the next two years. You need to design a flexible organizational unit (OU) structure that can handle future growth without requiring frequent reorganization. Additionally, you want to easily assign rights to network resources based on departmental roles. What is a solution that BEST meets these needs?

A

Organize the OUs at the top level by office (country); then use group accounts to help control resource rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which security measure can be integrated with a motion sensor to enhance protection?

A

Lights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which type of DoS attack exhausts the target’s resources by overloading a specific program or service?

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is an example of a soft token?

A

Authentication app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You own a small startup with five employees, each with their own computer. Given the nature of your business, you don’t expect much growth in the next year or two. To keep costs low and simplify file sharing, internet access, printer access, and local network resources, which solution would be the BEST fit for your business?

A

A workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which authentication category does a username and password fall under?

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You have been tasked with investigating a recent cybersecurity breach. During your investigation, you found that the attacker exploited the login field to send commands to the server and stole user credentials from the database. Which type of attack did your client MOST likely experience?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A technician helps Tom, an employee in the sales department, gain access to the client database by granting him Administrator privileges. Later, Tom finds out that he can access the salaries in the payroll database. Which security principle was compromised in this situation?

A

Principle of lease privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the BEST describes authorization?

A

The resources that a user can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In your new role as a junior network technician at the local hospital’s IT department, which user group should your account be assigned to in order to effectively troubleshoot network communication issues?

A

Network Configuration Operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

There are two primary types of firewalls you should know about. Which pertains to a network-based firewall?

A

Inspects traffic as it flows between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You have five salespeople in your office who often leave their laptops unattended on their desks in cubicles. You’re worried the potential for theft. What is the MOST effective method to secure these laptops and prevent them from being stolen?

A

Use cable locks to chain laptops to the desks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Is it true or false that hard tokens provide protection even if they are lost of stolen?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which encryption algorithm incorporates a base key, the MAC address of the wireless access point, and a unique packet serial number for every transmitted packet?

A

TKIP (Temporal Key Integrity Pool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You have been tasked with assessing a client’s building security. During your evaluation, you observe the following features: a high fence surrounding the property, security cameras are positioned on all buildings, light poles illuminate the parking lot throughout, and vehicles can drive directly up to the building entrance. Based on these observations, what would MOST likely enhance security?

A

Install bollards

37
Q

Which of the following is true of an Organizational Unit (OU)?

A

An organizational unit is like a folder that subdivides and organizes network resources within a domain

38
Q

Where is the access control list stored on a Windows system?

A

Master File Table

39
Q

Which security practices most effectively demonstrates the principle of least privilege?

A

All users on a Windows workstation are Limited users except for one, who is responsible for maintaining the system

40
Q

You have been contracted to evaluate the security of your client’s organization. In the course of your assessment, you discover a rogue wireless access point that closely resembles the legitimate wireless network. What attack is MOST likely occurring?

A

Evil twin attack

41
Q

An employee in the legal department has created sensitive documents that need to be accessible to the executive staff in the same building. He wants to restrict access and ensure no one else in the company can find the files unless they have the specific UNC path. Which BEST meets Josh’s file management needs?

A

Administrative share

42
Q

What term describes the malicious activity involving the widespread distribution of unwanted and unsolicited email messages to multiple recipients?

A

Spamming

43
Q

Which security measures should be implemented at the building entrance to prevent weapons or unauthorized equipment from being brought inside?

A

Magnetometer

44
Q

Which user group should you assign to a Windows account the requires the ability to create files, run application, and install printers, while ensuring the user has only the minimum necessary permissions?

A

Users

45
Q

What is the service in the Windows Server OS that handles a centralized database for managing user accounts and security information?

A

Active Directory

46
Q

Which type of attack aims to overwhelm a target by sending more data than it can process?

A

Denial-of-service

47
Q

What does Windows use to manage and enforce what a user is authorized to access?

A

Access Control List

48
Q

Ava downloaded a free PDF editing application from the internet, and now her laptop is plagued by persistent desktop pop-ups, and several applications are failing to launch. Which type of malware has likely infected Ava’s laptop?

A

Trojan

49
Q

Which type of firewall examines network traffic based on TCP or UDP protocols?

A

Circuit-layer gateway

50
Q

As a security consultant, you’ve been brought in by an organization to assess their security protocols. Employees frequently receive phone calls from hackers attempting to extract sensitive information through aggressive tactics. What would be your PRIMARY recommendation to reduce the risk of these social engineering attacks?

A

Teach users how to recognize and respond to these attacks

51
Q

What part of BYOD risks poses both a security concern for the organization and a privacy concern for the user?

A

Mixing of personal and corporate data

52
Q

Which authentication method enables a printer to connect securely to a wireless network with minimal effort?

A

WPS (Wi-Fi Protected Setup)

53
Q

Which type of attack takes advantage of a software vulnerability that has yet to be identified by the developer?

A

Zero-day attack

54
Q

A user receives an email from a well-known video streaming service urging him to renew his membership, even though he has never signed up for one. Upon closer inspection, he notices that a hyperlink in the email directs him to a suspicious URL. What security threats does this situation represent?

A

Phishing

55
Q

At the company headquarters, multiple employees are experiencing sudden drops in their Wi-Fi access, followed by automatic reconnections to the same wireless network. Up investigation, you discover that a rogue access point has been established near the company headquarters, allowing someone to capture sensitive data from the company network. Which type of social engineering attack does this situation illustrate?

A

Evil twin

56
Q

Which feature should the public library implement to physically secure their new laptops and protect them from theft?

A

Cable locks

57
Q

What does Active Directory use to locate and name network objects?

A

DNS

58
Q

What is the common name for a program that serves no useful purpose, spreads to other systems, and frequently causes damage to resources on the infected systems?

A

Virus

59
Q

What is Spyware?

A

Spyware monitors the actions you take on your machine and sends the information back to the originating source.

60
Q

Which encryption algorithm is widely regarded as one of the strongest and is used across various types of networks, not just wireless ones?

A

AES (Advanced Encryption Standard)

61
Q

Which type of door lock uses Bluetooth technology to authenticate access to a specific lock?

A

Key fob

62
Q

In which type of security attack does a hacker intercept session cookies in order to access the victim’s account?

A

Session hijacking

63
Q

An employee in the sales department has requested his coworker to update the product descriptions in a sales document. She can access the file but is unable to save her changes. What digital security method is MOST likely preventing her from saving the file?

A

Directory permissions

64
Q

Which encryption method is used in WPA3 to generate a new key for every transmission?

A

SAE (Simultaneous Authentication of Equals)

65
Q

Which Windows service is responsible for storing registered biometric scans for authentication and verifying if they match the stored scan?

A

Windows Hello

66
Q

What is the term for security measures implemented through the OS and software?

A

Logical security

67
Q

Which processes is used to prove a user’s identity?

A

Authentication

68
Q

What is the best defense against an insider network threat?

A

Immediately revoke the employee’s credentials when they leave

69
Q

How would you log in to a computer that uses a picture password for authentication?

A

Swipe and tap with a three-step gesture

70
Q

An executive receives an email that appears to be from the financial institution that provides his company card. The text of the email includes his name and the company name, stating that there is a problem with his credit card. The email provides a link to verify the credit card, but when he hovers over the link, he notices that the web address seems strange. What BEST describes this type of attack?

A

Social engineering

71
Q

Which Windows feature requests user credential or permissions to prevent unauthorized actions, like accidental software installation?

A

User Account Control (UAC)

71
Q

A user has contacted support regarding an issue while trying to install an application on his new Windows 11 system. How account belongs to the Users groups, and the installation is not proceeding. What is the MOST likely reason for the installation problem?

A

His group membership does not allow her to install new software

72
Q

What policy permits employees to utilize their personal computers and mobile devices for work-related tasks?

A

BYOD (Bring Your Own Device)

73
Q

Which type of password cracking attacks is designed to avoid lockout policies?

A

Password spraying

74
Q

While traveling, you want to access your home computer using Remote Desktop, but after enabling it, you discover you cannot connect from outside your home network. What is the BEST solution to resolve this issue?

A

Open the firewall port for the Remote Desktop protocol

75
Q

What benefit of Bring Your Own Device (BYOD) policy arises from users becoming proficient in using their personal devices?

A

Increased productivity

76
Q

You need to access a shared folder named “Pictures” on a computer called “Home1” using the Universal Naming Convention (UNC) format. What is the valid UNC path?

A

\Home1\Pictures

77
Q

A technician is setting up a wireless access point and must choose from several security mode options. What offers the highest level of security?

A

WPA2 and AES

78
Q

A user reports being unable to uninstall an unnecessary program because the “Programs” option is missing from the Control Panel. You’ve checked the Local Group Policy Editor and found that the policy to hide the “Programs” option is not configured. However, other users in the same domain can access the “Programs” options without issue. Where should you investigate next to find out if the policy is enabled for this specific user?

A

GPOs linked to the organizational units that contain this user’s objects

79
Q

A domain controller is a Windows server that holds a copy of the Active Directory database, true or false?

A

True

80
Q

What are the two most common methods of distributing viruses?

A
  1. Email
  2. Malicious websites
81
Q

AES encryption keys that can be 128, 192, or 256 bits in length. However, it encrypts data in fixed-size blocks. What is the size of these data blocks?

A

128

82
Q

What is released by software vendors to address issues or vulnerabilities?

A

Patches

83
Q

The AAA security standard encompasses authentication, authorization, and accounting. Which authentication protocols is focused solely on providing authenication?

A

Kerberos

84
Q

Your company has recently adopted a BYOD policy. To safeguard the network, users are required to install an application on their devices that enables the security administrator to enforce security policies. What does this exemplify?

A

Mobile Device Management

85
Q

What term describes a situation where numerous compromised computers are infected with malware that enables an attacker (known as a herder) to control them to sending spam emails and executing DoS attacks?

A

Zombie/botnet

86
Q

What can be used to back up a company’s certificate database?

A

Certificate Manager

87
Q

A help desk technician identifies that a corrupt file is causing issues on a user’s computer. What is the quickest method to replace the corrupted file with a functioning one?

A

Use the C$ administrative share to copy the file

88
Q

One of your users receive a call from a person pretending to be from their bank. What is this an example of?

A

Spoofing