Security (6) Flashcards

1
Q

A user discovers a strange text file at the root of her User directory. It contains everything she has typed over the past few days, including her credentials. What is the likely cause of the text file?

System auditing enabled

Keylogger installed

Email application in debug mode

A

Keylogger installed

A keylogger seems to be running on the system, monitoring and copying all that is typed on the keyboard. Obviously, this malware needs to be removed and incident response steps taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user asks what can be done to keep his web browsing private. Which of the following would accomplish that?

Software firewall

SecureDNS

Anti-malware

A

SecureDNS

SecureDNS, specifically DNS over HTTPS, would enable a person to browse while keeping the DNS queries private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What security solution would protect a user from unwanted network traffic probing her workstation?

Software firewall

SecureDNS

Anti-malware

A

Software firewall

A software-based firewall on the workstation would be able to stop unwanted network traffic, including port scans and probes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user is taking a flight tomorrow and intends on using his laptop while seated on the plane. The user asks what steps he can take protect his privacy from wandering eyes sitting next to them. What could you offer to install on their laptop?

Multifactor authentication

Antivirus

Privacy screen

A

Privacy screen

Privacy screens fitted on a display can shield the display content from anyone not sitting at the correct angle to the display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What security concept helps to ensure non-repudiation (assurance that someone cannot deny something) when sending emails?

Comprehensive email signature

Digital signature using certificates

Phoning immediately after email is sent

A

Digital signature using certificates

Digital signatures can be used for non-repudiation. Digital signatures are done with digital certificates. A phone call or text might offer some assurance, but not to the degree as the email being digitally signed. Email signatures are simply your contact information and offer no true assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The user wants to use multifactor authentication at her PC but does not want to carry a key fob and is strongly against biometrics. What method can you suggest?

Second password

Hardware token

Software token

A

Software token

The software token is stored on a general-purpose device, such as the PC. The hardware token option would involve carrying an added key fob or device. A fingerprint reader would be unacceptable as it involves biometrics. A second password defeats the benefit of using multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What wireless protocol compensates for the weak encryption of WEP?

VLAN

TKIP

VPN

A

TKIP

Temporal Key Integrity Protocol (TKIP) is an encryption protocol for wireless connections that’s intended to replace WEP’s weak encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following Active Directory concepts can help enforce security settings? (Choose two)

DLP

Group Policy/updates

Port security

Login script

A

Group Policy/updates

Login script

Group Policy/updates and login scripts are common ways to push and enforce security settings on Active Directory objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What 128-bit block size encryption algorithm, originally named Rijndael, was designed to replace DES?

VPN

DES3

AES

A

AES

Advanced Encryption Standard (AES) was originally named Rijndael, designed by Joan Daemen and Vincent Rijmen to replace the obsolete DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol was designed to authenticate remote users to a dial-in access server?

TKIP

TACACS

RADIUS

A

RADIUS

Remote Authentication Dial-In User Service (RADIUS) was originally designed to authenticate remote users to a dial-in access server but is now used in several authentication situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following encryption protocols is older than RADIUS but was used for similar purposes?

TACACS+

TACACS

Extended TACACS

A

TACACS

Terminal Access Controller Access Control System (TACACS) is the older encryption protocol here. The other two variants of the name, TACACS+ and Extended TACACS, are actually different protocols altogether. SNMP is not an encryption protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your datacenter recently experienced a theft of a server from the rack. Which security mechanism would protect servers from future theft?

Security token

Server lock

Key fob

A

Server lock

It’s a bold move to try to steal a server. But a server lock or locks on the rack door would stall future theft attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user is complaining that he can no longer sign into his account because of too many bad attempts. What basic Active Directory function would help here?

Account deletion

Password reset/unlock account

Disable account

A

Password reset/unlock account

Resetting the password or unlocking the account would give the user back the opportunity to sign in. Creating a new account or deleting his account would not help in this situation. Disabling the account might be the next step if you find out the account has been compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What concept in Active Directory creates a directory subdivision within which may be placed users, groups and other objects?

Domain

Home folder

Organizational unit

A

Organizational unit

The organizational unit is a subdivision within which may be placed users, groups, more organizational units, and other objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Normally, a company places a users’ profiles and folders on the local machine. Now, the organization would like a few users to be able to log in from other computers. What concept in Active Directory allows a user’s profile folders to be placed in storage somewhere else on the network?

Home folder

Folder redirection

Organizational unit

A

Folder redirection

Folder redirection allows users’ profile folders to be stored off of a local machine and instead placed in a more centralized location on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which command-line tool permits someone to make changes to the operating system without having to boot up Windows?

Emergency repair disk

System recovery options

WinRE / Recovery Console

A

WinRE / Recovery Console

The Windows Recovery Environment (Windows 8, 10) is a replacement for the Recovery Console, both of which are a command-line tool that allow the administrator the ability to copy or remove directories, enable or disable services, write a new Master Boot Record (MBR), format volumes, and much more

17
Q

Rainbow tables are used for what purpose?

To offer more color options for the desktop background

To compare cryptographic hashes for cracking passwords

To reverse polarity of the DVI video connector

A

To compare cryptographic hashes for cracking passwords

Rainbow tables are tables of cryptographic hash values, against which an attacker can compare a captured password hash. A match tells the attacker what was the original password string to compute that matching hash

18
Q

A Windows server volume for the Finance department is formatted with NTFS. The folder C:\receipts is shared with Travel group. Both Travel and Finance groups have Modify access to the directory C:\receipts. You move the C:\receipts folder to be under the C:\bigmoney folder. The Finance group alone has only Read access to the directory C:\bigmoney. Also, the C:\bigmoney folder is set to not propagate its permissions to any descendant folders. After the move, who has what permissions with the C:\bigmoney\receipts folder?

Finance group alone has only Read access

Both Finance and Travel have Read access

Both Finance and Travel have Modify access

A

Both Finance and Travel have Modify access

When files and folders are moved (not copied) on a NTFS volume, the original permissions are retained at the new location, as is done in this case. However, when files or folders are copied, the new file or folder will inherit its permissions from its new parent folder. The old permissions would be discarded. In this case, there was no permission propagation

19
Q

A Microsoft Windows mobile device has the ability to back up applications, settings, camera pictures and text messages. Backups can be saved locally or remotely. Which of the following remote backup applications is easiest and capable to save the listed data in the cloud?

No extra app needed for device to save all data remotely

Microsoft OneDrive

Microsoft Azure

A

No extra app needed for device to save all data remotely

Microsoft’s mobile OS is capable to save applications, settings, camera pictures and text messages to the cloud without having to install any backup application

20
Q

Windows user profiles contain a user’s settings and personal files. Profiles can be configured as either local, remote, mandatory or temporary, depending on user needs and company policy. Which of the following is the optimal user profile choice for a traveling sales engineer who may or may not have network access?

local

remote

mandatory

A

local

In this situation where the sale engineer may not have network access when travelling, the local profile is best. A local profile keeps settings and files on the laptop. Generally, since remote user profiles keep settings and files centralized on a company server, it is preferred. That requires travelers to have network access. Mandatory enforces settings from the administrator, but changes to the local laptop are lost at logoff. Temporary profiles are also means any file changes are lost when the user disconnects