Security (6) Flashcards
A user discovers a strange text file at the root of her User directory. It contains everything she has typed over the past few days, including her credentials. What is the likely cause of the text file?
System auditing enabled
Keylogger installed
Email application in debug mode
Keylogger installed
A keylogger seems to be running on the system, monitoring and copying all that is typed on the keyboard. Obviously, this malware needs to be removed and incident response steps taken
A user asks what can be done to keep his web browsing private. Which of the following would accomplish that?
Software firewall
SecureDNS
Anti-malware
SecureDNS
SecureDNS, specifically DNS over HTTPS, would enable a person to browse while keeping the DNS queries private
What security solution would protect a user from unwanted network traffic probing her workstation?
Software firewall
SecureDNS
Anti-malware
Software firewall
A software-based firewall on the workstation would be able to stop unwanted network traffic, including port scans and probes
A user is taking a flight tomorrow and intends on using his laptop while seated on the plane. The user asks what steps he can take protect his privacy from wandering eyes sitting next to them. What could you offer to install on their laptop?
Multifactor authentication
Antivirus
Privacy screen
Privacy screen
Privacy screens fitted on a display can shield the display content from anyone not sitting at the correct angle to the display
What security concept helps to ensure non-repudiation (assurance that someone cannot deny something) when sending emails?
Comprehensive email signature
Digital signature using certificates
Phoning immediately after email is sent
Digital signature using certificates
Digital signatures can be used for non-repudiation. Digital signatures are done with digital certificates. A phone call or text might offer some assurance, but not to the degree as the email being digitally signed. Email signatures are simply your contact information and offer no true assurance
The user wants to use multifactor authentication at her PC but does not want to carry a key fob and is strongly against biometrics. What method can you suggest?
Second password
Hardware token
Software token
Software token
The software token is stored on a general-purpose device, such as the PC. The hardware token option would involve carrying an added key fob or device. A fingerprint reader would be unacceptable as it involves biometrics. A second password defeats the benefit of using multifactor authentication
What wireless protocol compensates for the weak encryption of WEP?
VLAN
TKIP
VPN
TKIP
Temporal Key Integrity Protocol (TKIP) is an encryption protocol for wireless connections that’s intended to replace WEP’s weak encryption
Which of the following Active Directory concepts can help enforce security settings? (Choose two)
DLP
Group Policy/updates
Port security
Login script
Group Policy/updates
Login script
Group Policy/updates and login scripts are common ways to push and enforce security settings on Active Directory objects
What 128-bit block size encryption algorithm, originally named Rijndael, was designed to replace DES?
VPN
DES3
AES
AES
Advanced Encryption Standard (AES) was originally named Rijndael, designed by Joan Daemen and Vincent Rijmen to replace the obsolete DES
What protocol was designed to authenticate remote users to a dial-in access server?
TKIP
TACACS
RADIUS
RADIUS
Remote Authentication Dial-In User Service (RADIUS) was originally designed to authenticate remote users to a dial-in access server but is now used in several authentication situations
Which of the following encryption protocols is older than RADIUS but was used for similar purposes?
TACACS+
TACACS
Extended TACACS
TACACS
Terminal Access Controller Access Control System (TACACS) is the older encryption protocol here. The other two variants of the name, TACACS+ and Extended TACACS, are actually different protocols altogether. SNMP is not an encryption protocol
Your datacenter recently experienced a theft of a server from the rack. Which security mechanism would protect servers from future theft?
Security token
Server lock
Key fob
Server lock
It’s a bold move to try to steal a server. But a server lock or locks on the rack door would stall future theft attempts
A user is complaining that he can no longer sign into his account because of too many bad attempts. What basic Active Directory function would help here?
Account deletion
Password reset/unlock account
Disable account
Password reset/unlock account
Resetting the password or unlocking the account would give the user back the opportunity to sign in. Creating a new account or deleting his account would not help in this situation. Disabling the account might be the next step if you find out the account has been compromised
What concept in Active Directory creates a directory subdivision within which may be placed users, groups and other objects?
Domain
Home folder
Organizational unit
Organizational unit
The organizational unit is a subdivision within which may be placed users, groups, more organizational units, and other objects
Normally, a company places a users’ profiles and folders on the local machine. Now, the organization would like a few users to be able to log in from other computers. What concept in Active Directory allows a user’s profile folders to be placed in storage somewhere else on the network?
Home folder
Folder redirection
Organizational unit
Folder redirection
Folder redirection allows users’ profile folders to be stored off of a local machine and instead placed in a more centralized location on the network