Security Flashcards
(127 cards)
A single server hosts a sensitive SQL-based database and a web service containing static content. A few of the database fields need to be encrypted due to
regulatory requirements. Which of the following would provide the BEST encryption solution for this particular server?
A.
Individual file
B.
Database
C.
Full-disk
D.
Record based
D
A building engineer just installed a new environmental control system (ECS) for a room that is critical to the company’s operation and needs the ability to manage
and monitor the system from any part of the network. Which of the following should the security administrator utilize to minimize the attack surface and still allow the
needed access?
A.
Configure the ECS host-based firewall to block non-ECS application traffic
B.
Create an encrypted connection between the ECS and the engineer’s computer
C.
Install a firewall that only allows traffic to the ECS from a single management and monitoring network
D.
Implement an ACL that permits the necessary management and monitoring traffic
A
Following a site survey for an upcoming 5GHz wireless network implementation, the project manager determines that several areas of the facility receive
inadequate coverage due to the use of vertical antennas on all access points. Which of the following activities would be MOST likely to remediate the issue without
changing the current access point layout in the facility?
A.
Convert all access points to models operating at 2.4GHz.
B.
Install antennas with lower front-to-back ratios to narrow the focus of coverage as needed.
C.
Reorient the existing antennas in horizontal configuration.
D.
Install unidirectional antennas to focus coverage where needed.
D
A company’s security analyst is investigating the suspected compromise of the company’s intranet web server. The compromise occurred at a time when no users
were logged into the domain. Which of the following is MOST likely to have prevented the attack from a new machine introduced to the corporate network?
A.
Domain log review
B.
802.1x
C.
NIDS
D.
Rogue detection
B
Upper management wishes to implement a policy forbidding the use of personal devices on the corporate network. Which of the following is the primary reason why
such a policy would be put in place?
A.
Devices connected to the corporate network become legally bound to company SLAs.
B.
Personally owned devices might not be subjected to the same security controls as corporate devices.
C.
Personal devices might contain personally owned media that could leave company open to licensing issues.
D.
Employees might not be properly trained to utilize the device on the corporate network.
B
The security administrator for a growing company is concerned about the increasing prevalence of personal devices connected to the corporate WLAN. Which of
the following actions should the administrator take FIRST to address this concern?
A.
Implement RADIUS to centrally manage access to the corporate network over WiFi.
B.
Request that senior management support the development of a policy that addresses personal devices.
C.
Establish a guest-access wireless network and request that employees use the guest network.
D.
Distribute a memo addressing the security risks associated with the use of personally-owned devices on the corporate WLAN.
B
A security engineer is monitoring suspicious traffic from an internal endpoint to a malicious landing page of an external entity. The internal endpoint is configured
using a limited account, is fully patched to current standards, and has current antivirus signatures. No alerts have been received involving this endpoint. The
security engineer finds malicious code on the endpoint during a forensic analysis. Which of the following MOST likely explains this occurrence?
A.
The external entity breached the IDS
B.
The antivirus engine was evaded
C.
The DLP did not detect the malicious code
D.
The endpoint was running on a hypervisor
B
A company uses PKI certificates stored on a smart chip enabled badge. The badge is used for a small number of devices that connect to a wireless network. A user
reported that their badge was stolen. Which of the following could the security administrator implement to prevent the stolen badge from being used to compromise
the wireless network?
A.
Asset tracking
B.
Honeynet
C.
Strong PSK
D.
MAC filtering
A
A company is implementing a system to transfer direct deposit to a financial institution. One of the requirements is that the institution must be certain that the
deposit amounts within the file have not been charged. Which of the following should be used to meet requirement?
A.
Key escrow
B.
Perfect forward secrecy
C.
Transport encryption
D.
Digital signatures
E.
File encryption
D
An application developer has coded a new application and needs to test all input fields. Which of the following should be used to fulfill this requirement?
A.
Application hardening
B.
Server-side validation
C.
Input validation
D.
Fuzzing
D
A security analyst has been asked to perform penetration testing against a web application being deployed for the first time. When performing the test the
application stops responding and returns an error referring to failed database connections. Upon further investigation, the analyst finds the database server was
inundated with commits which exhausted available space on the volume. Which of the following has been performed against the database server?
A.
DoS
B.
SQL injection
C.
SYN flood
D.
DDoS
E.
Cross-site scripting
A
Which of the following allows an application to securely authenticate a user by receiving credentials from a remote web domain?
A.
TACACS+
B.
RADIUS
C.
Kerberos
D.
SAML
D
Ann is preparing a presentation for management to highlight some of the issues the security department is facing trying to integrate the organizations BYOD policy.
Highest of her list is the transparency of network resources. The DAC environment includes several departments including payroll, HR, IT, and Management.
However, the small company’s structure has never been updated to incorporate these departments. The organization continued to add users based on the same
original general user profile. Which of the following security methods should Ann suggest to management to BEST fix this issue?
A.
Two-factor authentication
B.
Mandatory access control
C.
Application firewall
D.
Network segmentation
D
A university police department is housed on the first floor of a student dormitory. Which of the following would prevent students from using ARP spoofing attacks
against computers at the police department?
A.
Enable proxy ARP on router
B.
Private network addresses
C.
Separate Layer 2 VLANs
D.
Disable SSID broadcast
C
The CEO for company A has asked the security engineer to design a PKI for company A. The CEO has asked that it allow company A users to send signed and
encrypted emails to company B. The users from company B must have an inherent trust in certificates from company A, because the security policy of company B
disallows adding of new CAs to their trusted root container. Which of the following is the BEST solution?
A.
Request email certificates for the users of company A from the PKI of company B.
B.
Build a new CA within the boundary of company A and issue email certificates to the users
C.
Establish a sub CA of company B’s root CA to issue email certificates to the users.
D.
Procure the services of a common Internet root CA to issue email certificates to the users.
D
A security administrator is called to troubleshoot a computer infection. The computer’s software correctly identified the malware and flagged it to the central
management console; however the malicious payload was still executed. Which of the following can cause this scenario?
A.
The payload hash did not match known malware
B.
The antivirus is running an older virus definition
C.
The computer is running an IDS
D.
The payload is a zero-day attack
C
Am organization decides to implement a BYOD policy but wants to ensure they address requirements associated with any legal investigations and controls needed
to comply with the analysis and recreation of an incident. This concern is also known as which of the following?
A.
Data ownership
B.
Forensics
C.
Chain of custody
D.
Acceptable use
B
A security administrator is having continued issues with malware variants infecting systems infecting systems and encrypting several types of files. The malware
uses a document macro to create a randomly named executable that downloads the encrypted payload of the malware. Once downloaded, the malware searches
all drives, creates and HTML file with the decryption instructions in the directory, and then proceeds to encrypt the target files. Which of the following actions would
BEST interrupt the malware before it encrypts other files while minimizing the adverse impacts to the users?
A.
Block execution of documents with macros
B.
Block addition of documents with macros
C.
Block the creation of the HTML of the HTML document on the local system
D.
Block running external files from within documents.
A
A media company would like to securely stream live video feeds over the Internet to clients. The security administrator suggests that the video feed is encrypted in
transport and configures the web server to prefer ciphers suited to the live video feeds. Which of the following cipher suites should the administrator implement on
the web server to minimize the computational and performance overhead of delivering live feeds?
A.
ECDHE-RSA-RC4-SHA
B.
DHE-DSA-DES-CBC-SHA
C.
ECDHE-RSA-AES-CBC-SHA
D.
ECDHE-RSA-AES256-CBC-SHA
A
Several users require administrative access for software compatibility reasons. Over time, these users have made several changes to important system settings.
Which of the following is the BEST course of action to ensure the system settings are properly enforced?
A.
Require users to run under a standard user account
B.
Use centralized group policy to configure the settings
C.
Conduct user access reviews to determine appropriate privileges
D.
Implement an application whitelist throughout the company
B
In the course of troubleshooting wireless issues from users, a technician discovers that users are connecting to their home SSIDs while at work. The technician
scans detects none of those SSIDs. The technician eventually discovers a rogue access point that spoofs any SSID that a client requests. Which of the following
allows wireless use while mitigating this type of attack?
A.
Configure the device to verify access point MAC addresses
B.
Disable automatic connection to known SSIDs
C.
Only connect to trusted wireless networks
D.
Enable MAC filtering on the wireless access point
A
An employee connects a wireless access point to the only jack in the conference room to provide Internet access during a movie. The access point is configured to
secure its users with WPA2-TKIP. A malicious user is able to intercept clear text HTTP communication between the meeting attendees and the Internet. Which of
the following is the reason the malicious user is able to intercept and see clear text communications?
A.
The malicious user is running a wireless sniffer
B.
The wireless access point is broadcasting the SSID
C.
The malicious user is able to capture the wired communication
D.
The meeting attendees are using unencrypted hard drives
C
A security engineer notices that unknown devices are connecting to the company’s wireless network and trying to access the database server. The wireless access
point is configured with WPA for encryption and the network administrator setup a 8 digit pin for easy setup to the wireless access point. Which of the following is
the MOST likely type of attack?
A.
IV attack
B.
WPS attack
C.
Bluesnarfing attack
D.
Replay attack
B
A user contacts the help desk after being unable to log in to the corporate website. The user can log into the site from another computer in the next office, but not
from the PC. The user’s PC was able to connect earlier in the day. The help desk has the user restart the NTP service. Afterwards, the user is able to log into the
website. The MOST likely reason for the initial failure was that the website was configured to use which of the following authentication mechanisms?
A.
Secure LDAP
B.
RADIUS
C.
NTLMv2
D.
Kerberos
D