SECURITY+501 2018 Flashcards
Multiple organizations operating in the same vertical want to provide seamless wireless access for their
employees as they visit the other organizations. Which of the following should be implemented if all the
organizations use the native 802.1x client on their mobile devices?
A. Shibboleth B. RADIUS federation C. SAML D. OAuth E. OpenlD connect
B
Upon entering an incorrect password, the logon screen displays a message informing the user that the
password does not match the username provided and is not the required length of 12 characters. Which of the
following secure coding techniques should a security analyst address with the application developers to follow security best practices?
A. Input validation
B. Error handling
C. Obfuscation
D. Data exposure
B
A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements:
*All access must be correlated to a user account.
*All user accounts must be assigned to a single individual.
*User access to the PHI data must be recorded.
*Anomalies in PHI data access must be reported.
*Logs and records cannot be deleted or modified.
Which of the following should the administrator implement to meet the above requirements? (Select THREE).
A. Eliminate shared accounts.
B. Create a standard naming convention for accounts.
C. Implement usage auditing and review.
D. Enable account lockout thresholds.
E. Copy logs in real time to a secured WORM drive.
F. Implement time-of-day restrictions.
G. Perform regular permission audits and reviews.
ACE
An administrator is replacing a wireless router. The configuration of the old wireless router was not documented before it stopped functioning. The equipment connecting to the wireless network uses older legacy equipment that was manufactured prior to the release of the 802.11i standard. Which of the following configuration options should the administrator select for the new wireless router?
A. WPA+CCMP
B. WPA2+CCMP
C. WPA+TKIP
D. WPA2+TKIP
D
A security administrator has written a script that will automatically upload binary and text-based configuration files onto a remote server using a scheduled task. The configuration files contain sensitive information. Which of the following should the administrator use?
(Select TWO)
A. TOTP B. SCP C. FTP over a non-standard port D. SRTP E. Certificate-based authentication F. SNMPv3
BE
Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a
market edge and reduce time to market?
A. Competitor
B. Hacktivist
C. Insider
D. Organized crime
A
Which of the following BEST describes an important security advantage yielded by implementing vendor
diversity?
A. Sustainability
B. Homogeneity
C. Resiliency
D. Configurability
C
Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A. Pivoting
B. Process affinity
C. Buffer overflow
D. XSS
A
Which of the following differentiates a collision attack from a rainbow table attack?
A. A rainbow table attack performs a hash lookup.
B. A rainbow table attack uses the hash as a password.
C. In a collision attack, the hash and the input data are equivalent.
D. In a collision attack, the same input results in different hashes.
A
A security analyst observes the following events in the logs of an employee workstation:
1/23 1:07:16 865 Access to C:\Users\user\temp\oasdfkh.hta has been restricted by your administrator by the default restriction policy level.
1/23 1:07:09 1034 The scan is completed. No detections were found.
The security analyst reviews the file system and observes the following:
C:>dir
C:\Users\user\temp
1/23 1:07:02 oasdfkh.hta
1/23 1:07:02 update.bat
1/23 1:07:02 msg.txt
Given the information provided, which of the following MOST likely occurred on the workstation?
A. Application whitelisting controls blocked an exploit payload from executing.
B. Antivirus software found and quarantined three malware files.
C. Automatic updates were initiated but failed because they had not been approved.
D. The SIEM log aged was not tuned properly and reported a false positive
A
A security technician has been receiving alerts from several servers that indicate load balancers have had a
significant increase in traffic. The technician initiates a system scan. The scan results illustrate that the disk
space on several servers has reached capacity. The scan also indicates that incoming internet traffic to the
servers has increased. Which of the following is the MOST likely cause of the decreased disk space?
A. Misconfigured devices
B. Logs and events anomalies
C. Authentication issues
D. Unauthorized software
D
A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The main
culprit of CPU utilization is the antivirus program. Which of the following issue could occur if left unresolved?
(Select TWO)
A. MITM attack B. DoS attack C. DLL injection D. Buffer overflow E. Resource exhaustion
BE
Which of the following is used to validate the integrity of data?
A. CBC
B. Blowfish
C. MD5
D. RSA
C
A user typically works remotely over the holidays using a web-based VPN to access corporate resources. The
user reports getting untrusted host errors and being unable to connect. Which of the following is MOST likely
the case?
A. The certificate has expired
B. The browser does not support SSL
C. The user’s account is locked out
D. The VPN software has reached the seat license maximum
A
When it comes to cloud computing, if one of the requirements for a project is to have the most control over the systems in the cloud, which of the following is a service model that would be BEST suited for this goal?
A. Infrastructure
B. Platform
C. Software
D. Virtualization
A
A company was recently audited by a third party. The audit revealed the company’s network devices were
transferring files in the clear. Which of the following protocols should the company use to transfer files?
A. HTTPS
B. LDAPS
C. SCP
D. SNMPv3
C
A security analyst is acquiring data from a potential network incident. Which of the following evidence is the
analyst MOST likely to obtain to determine the incident?
A. Volatile memory capture
B. Traffic and logs
C. Screenshots
D. System image capture
B
A cybersecurity analyst is looking into the payload of a random packet capture file that was selected for analysis. The analyst notices that an internal host had a socket established with anther internal host over a nonstandard port. Upon investigation, the origin host that initiated the socket shows this output: usera@host>history mkdir /local/usr/bin/somedirectory nc -1 192.168.5.1 -p 9856 ping -c 30 8.8.8.8 -a 600 rm /etc/dir2/somefile rm -rm /etc/dir2/ traceroute 8.8.8.8 pakill pid 9487 usera@host> Given the above output, which of the following commands would have established the questionable socket? A. traceroute 8.8.8.8 B. ping -1 30 8.8.8.8 -a 600 C. nc -1 192.168.5.1 -p 9856 D. pskill pid 9487
C
A security administrator has written a script that will automatically upload binary and text-based configuration files onto a remote server using a scheduled task. The configuration files contain sensitive information. Which
of the following should the administrator use? (Select TWO)
A. TOPTP B. SCP C. FTP over a non-standard pot D. SRTP E. Certificate-based authentication F. SNMPv3
BE
A security analyst conducts a manual scan on a known hardened host that identifies many non-compliant items.
Which of the following BEST describe why this has occurred? (Select TWO)
A. Privileged-user certificated were used to scan the host
B. Non-applicable plug ins were selected in the scan policy
C. The incorrect audit file was used
D. The output of the report contains false positives
E. The target host has been compromised
BD
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in
a third-party software application?
A. Sandboxing
B. Encryption
C. Code signing
D. Fuzzing
A
A network administrator needs to allocate a new network for the R&D group. The network must not be
accessible from the Internet regardless of the network firewall or other external misconfigurations. Which of the
following settings should the network administrator implement to accomplish this?
A. Configure the OS default TTL to 1
B. Use NAT on the R&D network
C. Implement a router ACL
D. Enable protected ports on the switch
A
To help prevent one job role from having sufficient access to create, modify, and approve payroll data, which of the following practices should be employed?
A. Least privilege
B. Job rotation
C. Backround checks
D. Separation of duties
D
When attackers use a compromised host as a platform for launching attacks deeper into a company’s network,
it is said that they are:
A. escalating privilege
B. becoming persistent
C. fingerprinting
D. pivoting
D
The help desk received a call after hours from an employee who was attempting to log into the payroll server remotely. When the help desk returned the call the next morning, the employee was able to log into the server remotely without incident. However, the incident occurred again the next evening. Which of the following BEST describes the cause of the issue?
A. The password expired on the account and needed to be reset
B. The employee does not have the rights needed to access the database remotely
C. Time-of-day restrictions prevented the account from logging in
D. The employee’s account was locked out and needed to be unlocked
C
An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned
network can be seen sending packets to the wrong gateway. Which of the following network devices is
misconfigured and which of the following should be done to remediate the issue?
A. Firewall; implement an ACL on the interface
B. Router; place the correct subnet on the interface
C. Switch; modify the access port to trunk port
D. Proxy; add the correct transparent interface
A
A home invasion occurred recently in which an intruder compromised a home network and accessed a WiFIenabled baby monitor while the baby’s parents were sleeping. Which of the following BEST describes how the intruder accessed the monitor?
A. Outdated antivirus
B. WiFi signal strength
C. Social engineering
D. Default configuration
D
A security engineer must install the same x.509 certificate on three different servers. The client application that connects to the server performs a check to ensure the certificate matches the host name. Which of the following should the security engineer use?
A. Wildcard certificate
B. Extended validation certificate
C. Certificate chaining
D. Certificate utilizing the SAN file
A
Which of the following refers to the term used to restore a system to its operational state?
A. MTBF
B. MTTR
C. RTO
D. RPO
B
A Chief Information Officer (CIO) recently saw on the news that a significant security flaws exists with a specific version of a technology the company uses to support many critical application. The CIO wants to know if this reported vulnerability exists in the organization and, if so, to what extent the company could be harmed. Which of the following would BEST provide the needed information?
A. Penetration test
B. Vulnerability scan
C. Active reconnaissance
D. Patching assessment report
A
An organization is expanding its network team. Currently, it has local accounts on all network devices, but with growth, it wants to move to centrally managed authentication. Which of the following are the BEST solutions for the organization? (Sect TWO)
A. TACACS+ B. CHAP C. LDAP D. RADIUS E. MSCHAPv2
AD