Security+ 501 Test 1 Flashcards
- What do you use to encrypt a message to send to someone? 2. What do they use to decrypt it?
- Public Key
2. Private Key
What following secure e-mail protocols is carried over an SSL or TLS connection and uses TCP port 993?
IMAPS
What is a server-side e-mail protocol and is not used over SSL or TLS?
SMTP (Simple Mail Transfer Protocol)
What is is a non-secure client-side e-mail protocol that uses TCP port 110?
POP3 (Post Office Protocol 3)
What is is a non-secure client-side e-mail protocol that uses TCP port 143?
IMAP4 (Internet Mail Access Protocol version 4)
What form of Load Balancing assigns to each server in order, then returns to the first server assigns to each server in order, then returns to the first server?
Round Robin
What form of Load Balancing keeps a client’s sessions connected to the server that’s keeping the session?
Affinity Scheduling
What is a point-in-time backup of certain key configuration settings of a virtual machine, allowing the VM to be restored back to that point in time if it suffers a crash or other issue?
Snapshot
What is a Microsoft Windows type of backup that backs up critical files used by the operating system to restore it in the event of a system crash or other issue?
System State Backup
What protocols would you use to encrypt VPN traffic?
IPsec
What port does DNS use?
TCP and UDP port 53
What port does SSH use?
22
What port does SMTP use?
25
What port is HTTP used?
80
What technique separates applications from one another and does not allow them to share execution, user, or data space?
Sandboxing
What technique enables an administrator to determine which applications and other software the user is allowed to install and execute?
Whitelisting
What technique is used to separate different sensitivities of data, such as corporate and personal data on a mobile device?
Containerization
What is a method that enables administrators to restrict users from installing and executing certain applications?
Blacklisting
Which of the following is a key agreement protocol used in public-key cryptography?
Elliptic Curve Diffie-Hellman (ECDH)
What is the most common public-private key generation algorithm used in public-key cryptography? It is used to generate a public and private key pair.
RSA (Rivest-Shamir-Adleman)
What is used to generate message digests for plaintext? It is not used in public-key cryptography to exchange keys or establish secure sessions.
SHA-2
Which of the following concepts should be the most important consideration when determining how to budget properly for security controls?
Risk and Impact
What form of authentication passes credentials in clear text and is not recommended for use?
PAP
What form of authentication uses password hashes and challenge methods to authenticate to the system. Passwords are not passed in clear text with this protocol.
CHAP (Challenge Handshake Authentication Protocol)
What form of authentication is a modern authentication framework that can use various authentication methods for both wired and wireless networks? It also does not pass username and password information in clear text.
EAP (Extensible Authentication Protocol)
(Blank) typically involves checking traffic on a network device based upon specific characteristics.
Filtering
What is an older form of attack where a malicious/compromised Web site places invisible controls on a page, giving users the impression they are clicking some safe item that actually is an active control for something malicious?
Clickjacking
(Blank) adds malicious information to HTTP headers?
Header Manipulation
What type of attack means to add malicious information or code, often by using a Trojan horse?
Man-in-the-Browser
(Blank) attempt to access privilege escalation by forcing a buffer to cause an error.
Buffer Overflows
What is typically created for a single Web browsing session and is generally not carried across different sessions?
Session Cookies
(Blank) cookies are saved and used between various Web sessions?
Persistent
Which of the following enables a user to provide one set of credentials to the system and use those credentials throughout other interconnected systems?
Single Sign-On
What method of authentication uses several different factors to authenticate to a system, such as something you know, something you are, and something you have.
Multi-Factor
What method of authentication uses only one factor, such as something you know, to authenticate to a system. It can also be used in a single sign-on environment but is not required.
Single Factor
What method of authentication can appear to be similar to single sign-on, but it requires all individual systems simply to accept credentials passed from another system without a unified approach.
Pass-through
Which of the following authentication protocols uses a series of tickets to authenticate users to resources, as well as timestamps to prevent replay attacks?
Kerberos
What is the error caused by rejecting an authorized user; it is also called a Type I error
False Rejection Rate
What is the error caused when an unauthorized user is validated as authorized, also referred to as a Type II error.
False Acceptance Rate
Which two secure protocols protects traffic during transmission and uses TCP port 443?
SSL and TLS
Both SCP and SSH use which TCP port
22
UDP uses UDP port (blank) and is totally unsecure.
69
If a person knows a control exists, and this control keeps him or her from performing a malicious act, what type of control would this be classified as?
deterrent
What control assists and mitigates the risk when an existing control is unable to do so.
Compensating
What protocol uses a management information base (MIB) to provide detailed device-specific information to a central management console?
SNMP (Simple Network Management Protocol)
What protocol is responsible for sending e-mail?
SMTP (Simple Mail Transport Protocol)
(Blank) is a log server found in UNIX and Linux systems?
Syslog
What is the process of marking a photo or other type of media with geographical location information using the GPS of a mobile device?
Geotagging
(Blank) is the use of a device’s GPS features to determine device location, locate points of interest, and gather other useful information?
Geotagging
(Blank) is the use of geolocation features to ensure that a mobile device does not leave specific areas of corporate property.
Geofencing
Which type of network intrusion detection system (NIDS) develops a baseline of normal traffic so it can detect deviations in this traffic that might indicate an attack?
Anomaly-Based System
Which type of network intrusion detection system (NIDS) use predefined rule sets?
Rule-Bases System
Which type of network intrusion detection system (NIDS) uses routers and firewalls, base detection on access control lists that specify traffic that is permitted and denied?
Filter-based systems
Which type of network intrusion detection system (NIDS) use predefined traffic signatures that are typically downloaded from a vendor?
Signature-based systems
Which of the following is the simplest form of disaster recovery exercise?
The documentation review
What form of disaster recovery exercise goes through the motions of fulfilling the responsibilities and conducting the activities required during an incident or disaster?
Walkthrough test
In what form of disaster recovery exercise all personnel are usually involved and may actually conduct activities as they would during a real incident. This type of test is more complex and normally requires extensive resources, such as people and equipment, so it is typically conducted infrequently.
Full Scale
Which of the following details the specific access levels that individuals or entities may have when interacting with objects?
ACL (Access Control List)
For which of the following should employees receive training to establish how they are to treat information of different sensitivity levels?
Information Classification
What policy instructs employees to not leave sensitive data unattended, as well as data disposal policies, can be included in the information and data handling policies, but these are very specific instances and don’t cover all information or all scenarios where an employee would be in a position to treat data with care
Clean Desk Policy
During which type of assessment would penetration testers not have any knowledge about the network and network defenders have no knowledge of the test itself?
Double-Blind Test
During which type of assessment only the testers have no knowledge of details about this network configuration. This type of test is also referred to as a blind test.
Black Box
During which type of assessment the penetration tester may have some limited knowledge of the network or systems, gained from the organization that wants the test.
Gray Box
Which of the following DES/AES encryption modes is considered the weakest?
ECB (Electronic Code Book)
What type of filter can scan content as it leaves the network, checking for certain types of content that has been pre-specified within the software.
Content Filter
What filters are used to catch and quarantine spam messages?
Antispam filters
(Blank) are used to cache, or store, messages for speedy retrieval in the future?
Catching Proxy Servers
(Blank) help control and block (when necessary) network traffic at the ingress and egress points?
Firewalls
Which access control models enable a person who creates or owns objects to define permissions to access those objects?
Discretionary access control
Which access control model use labels and security clearances to grant access to objects?
Mandatory Access Control
What type of organizations are the main users of an interconnection service agreement (ISA)?
Telecommunication Companies
You have received reports that a number of hosts in your company’s internal network are sluggish and unresponsive. After troubleshooting other items, you decide to use a sniffer to examine the network traffic coming into the host. You see that massive amounts of ICMP broadcasts are being sent on the network. The switch is having trouble processing all of this traffic, due to repeated ICMP replies, causing it to slow down. What type of attack most likely caused this
Flood attack
What type of attack attempts to break into an existing communications session, and is not a denial-of service attack?
Man-in-the-middle
What type of attack is a form of social engineering attack using e-mail?
phising
Which of the following two ways typically separate network hosts for security purposes?
physically and logically
During which stage of a secure development model would you normally find steps such as requirements gathering, analysis, and diagram development?
Security Requirements
During which stage of a secure development model would you normally find steps such as secure code review, fuzzing, and vulnerability assessments?
Security Testing
During which stage of a secure development model are different security functionality is designed into the application?
Security design
During which stage of a secure development model are security requirements are validated as implemented in the application?
Security Implementation
When information is converted to an unreadable state using cryptography, in what form is the information?
Ciphertext
A (blank) or message digest is a cryptographic representation of variable length text, but it is not the text itself.
Hash
(Blank) is unencrypted text.
Plaintext
What are valid methods to secure static hosts in an organization?
Application Level Firewalls, Network Segmentation, Layered Security
The (Blank) is the maximum allowable amount of data (measured in terms of time) that the organization can afford to lose during a disaster or an incident.
RPO (Recovery Point Objective)
Which of the following is a trusted OS?
- Ubuntu Linux
- SELinux
- Windows 10
- Windows Server
- SELinux
Which of the following is the biggest risk involved in cloud computing?
- Lack of Control
- Lack of Availability
- Lack of Responsibility
- Lack of Accountability
- Lack of Control
Which of the following is normally required to convert and read coded messages?
Codebook
What can cause a successful attack on a system when a user enters malicious code or characters into a form field on a Web application?
Input Validation
What formal management effort is designed to remediate security flaws discovered in applications and operating systems?
Patch Management
What is the process of provisioning and maintaining user accounts on the system?
Account Management
What is a formalized process that involves both long-term and short-term infrastructure changes, as well as configuration changes to hosts and networks?
Change Management
What type of file, often sent with an e-mail message, can contain malicious code that can be downloaded and executed on a client’s computer?
HTML
What is a simple script that is set to execute at a certain time that is usually created by rogue administrators or disgruntled employees?
Logic Bombs
What is a piece of malicious software that must be propagated through a definite user action?
Virus
What is a piece of software that seems to be of value to the user, but in reality is malware?
A Trojan Horse
What causes usually annoying advertisements that come in the form of pop-up messages in a user’s browser?
Adware
What is an application designed to create and initiate files on a host to provide a fully functional virtual machine?
Hypervisor
What is software or a hardware appliance responsible for balancing user requests and network traffic among several different physical or virtualized hosts?
A Load Balancer
Which type of cloud service is usually operated by a third-party provider that sells or rents “pieces” of the cloud to different entities, such as small businesses or large corporations, to use as they need?
Public
Which type of cloud service is for use only by one organization and is usually hosted by that organization’s infrastructure?
Private
Which type of cloud service for use by similar organizations or communities, such as universities or hospitals, that need to share common data?
Community
An attack in which an attacker attempts to disconnect a victim’s wireless host from its access point is called?
Deauthentication
What type of attack involves impersonating a wireless client or access point, either through its IP or MAC address?
Spoofing
What type of attack involves the reuse of intercepted non-secure credentials to gain access to a system or network.
Replay Attack
What type of attack involves attempting to break WEP keys by targeting their weak IVs?
Initialization vector (IV) attacks
Which of the following algorithms won the U.S. government?sponsored competition to become the Advanced Encryption Standard (AES)?
- RC4
- Blowfish
- Twofish
- Rijindael
4.Rijindael
What is a variant of a phishing attack, where a phishing e-mail is sent to a high-value target instead of on a mass scale to all employees?
Whaling
What type of attack involves targeting a particular type of user, regardless of rank in the organization, and basing the attack on more detailed, in-depth information in order to convince the target that the phishing e-mail is actually valid.
Spearfishing
(Blank) is a form of phishing attack that takes place over Voice-over-IP (VoIP) telephone systems?
Vishing
What network management protocols uses agents that respond to queries to report its status to a central program manager?
SNMP (Simple Network Management Protocol)
What methods of strengthening weak keys involve taking a weak initial key and feeding it to an algorithm that produces an enhanced key, which is much stronger?
Key Stretching
This involves sending individual characters of the key through an algorithm and using the mathematical XOR function to change the output.
Key streaming
What involves generating and exchanging an asymmetric key used for a particular communications session, or exchanging public keys in order to use them for public-key cryptography.
Key Exchange
Your organization wants you to create and implement a policy that will detail the proper use of its information systems during work hours. Which of the following is the best choice?
Acceptable Use Policy
What is an act performed by the company itself, and is not a user policy?
Due Care
What type of agreements are made between a company and a third party, such as a contractor or a supplier.
Service Level Agreement
Which of the following is a form of intentional interference with a wireless network?
Jamming
What type of attack is a rogue wireless access point set up to be nearly identical to a legitimate access point.
Evil Twin
What type of attack is a weak security measure designed to hide the broadcasting of a wireless network’s service set identifier.
SSID Cloaking
What type of attack is an attempt to impersonate another host by using its MAC address.
MAC Spoofing
Which of the following secure file copy protocols is used over an SSL or TLS connection?
FTPS
(Blank) is a secure file transfer protocol used to copy files to and from an Internet-based host, and it also uses SSH.
SFTP
(Blank) is a secure copy protocol used to copy files securely to and from a networked host, and it uses SSH.
SCP
(Blank) is a non-secure protocol used to copy files to and from Internet-based hosts?
FTP
In order, the steps of the incident response life cycle are preparation; detection and analysis; containment, eradication, and recovery; and post-incident activity
- preparation
- detection and analysis
- containment, eradication, and recovery
- post-incident activity
What technologies allow devices to communicate with each other at very close range through radio signals by using a special chip implanted in the device, and maybe vulnerable to eavesdropping and man-in-the-middle attacks?
NFC
How many rounds does DES perform when it encrypts plaintext?
16
What authentication protocol does RADIUS use?
UDP port 1812
Which of the following security controls allows connectivity to a network based on the system’s hardware address?
MAC Filtering
What policy settings prevent a user from rapidly changing passwords and cycling through his or her password history to reuse a password?
Minimum Password age
Which of the following encryption protocols uses RC4 with small initialization vector sizes?
WEP
Which of the following types of public-key cryptography uses a web of trust model?
PGP (Pretty Good Privacy)
(Blank) is a key negotiation and agreement protocol that is used to exchange keys and establish a secure communications session.
DHE (Diffie-Hellman Exchange)
What size WEP key did the original IEEE 802.11b specification use?
64-bit
What network-connected systems can manage heating, ventilation, and air-conditioning controls?
SCADA (Supervisory control and data acquisition)
What systems are antiquated computers that performed advanced tasks in the place of mainframe systems and are no longer widely in use?
Minicomputers
Which term indicates the length of time a device is expected to last in operation, and only a single, definitive failure will occur and will require that the device be replaced rather than repaired?
MTTF (Mean Time to Failure)
Which term represents the manufacturer’s best guess (based on historical data) regarding how much time will pass between major failures of that component. This assumes that more than one failure will occur, which means that the component will be repaired, rather than replaced.
MTBF (Mean Time Between Failure)
Which term is the amount of time it takes for a hardware component to recover from failure.
(MTTR) Mean time to recovery
Which of the following ports would be most likely to allow secure remote access into a system within a data center?
L2TP -> TCP Port 1701
Risk assessment means evaluating which of the following elements?
Probability and Impact
What ire suppression chemicals was banned in 1987 and can no longer be used in data centers?
Halon
Which of the following is a protocol used to obtain the status of digital certificates in public keys?
OCSP (Online Certificate Status Protocol)
(Blank) is a public key cryptography protocol used on small mobile devices, due to its low power and computing requirements?
ECC (Elliptical Curve Cryptography)
(Blank) is a key negotiation and agreement protocol used in public-key cryptography.
DHE (Diffie-Hellman Exchange)
Which two utilities are specifically used to diagnose DNS issues?
Dig and NSLookup
Wissa is updating a printer driver on a Windows system. She downloads the latest driver from the manufacturer’s Web site. When installing the driver, Windows warns that the driver is unsigned. To which of the following threats is Wissa exposing her system?
Refactoring
Which type of assessment is used to determine weaknesses within a system?
Vulnerability assessment
Which type of assessment looks at events that could exploit vulnerabilities.
Threat Assessment
Which type of assessment combination of assessments and is designed to assess factors, including likelihood and impact, that affect an asset.
Risk Assessment
Which type of assessment actually attempts to exploit any found weaknesses to gain access to systems.
Penetration Test
Which of the following types of factors could be used to describe a fingerprint-based method of logging in and authenticating to a touchscreen device?
Something you are
What size is the initialization vector (IV) for the Temporal Key Integrity Protocol (TKIP), used in the WPA standard?
48 bit
Which of the following methods of log management involves visiting each individual host to review its log files?
Decentralized
What port does LDAP (The Lightweight Directory Application Protocol) use?
TCP 389
What is the biggest difference between EAP-TLS and EAP-TTLS?
EAP-TLS needs server and client certificates; EAP-TTLS only needs server certificates.