Security Techniques Flashcards
● 4.1 - Given a scenario, you must be able to apply common security techniques to computing resources ● 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance security
Scenario:
You are an IT administrator at a mid-sized company. Employees have reported weak Wi-Fi signals in some office areas, and there have been concerns about unauthorized access to the wireless network. You are asked to analyze the current setup and recommend changes.
Which of the following is the BEST solution to improve both coverage and security?
A) Increase the power of all wireless access points (WAPs) to extend the range.
B) Move WAPs closer to the windows and external walls for better outside access.
C) Conduct a site survey, reposition WAPs centrally, and use unidirectional antennas where needed.
D) Disable all but one WAP to prevent interference and control access.
Correct Answer: C) Conduct a site survey, reposition WAPs centrally, and use unidirectional antennas where needed.
Explanation:
(A) Incorrect: Increasing power may worsen security by extending signal coverage outside the building, making unauthorized access easier.
(B) Incorrect: Placing WAPs near windows and external walls increases the risk of signal leakage, exposing the network to external threats.
(C) Correct: A site survey helps analyze signal coverage and interference. Centrally placing WAPs improves indoor coverage while unidirectional antennas prevent signal leakage outside.
(D) Incorrect: Disabling WAPs reduces network coverage and creates dead zones, leading to connectivity issues.
Scenario:
You have been hired as a cybersecurity consultant to evaluate a company’s wireless network setup. Before making any recommendations, you need to determine the optimal locations for WAPs.
What is the FIRST step you should take?
A) Immediately install additional WAPs in all weak signal areas.
B) Perform a site survey to assess radio frequency interference and current coverage.
C) Increase the signal strength of existing WAPs to maximize coverage.
D) Set up new WAPs using only omnidirectional antennas.
Correct Answer: B) Perform a site survey to assess radio frequency interference and current coverage.
Explanation:
(A) Incorrect: Installing WAPs without analyzing current coverage may lead to unnecessary overlap and interference.
(B) Correct: A site survey identifies weak spots, interference sources, and optimal WAP placement.
(C) Incorrect: Increasing signal strength may cause interference and signal leakage outside the building.
(D) Incorrect: Using only omnidirectional antennas may lead to unwanted signal broadcasting outside secure areas.
Scenario:
A company’s IT team has noticed a decline in Wi-Fi performance. Upon investigation, they find that several WAPs are using overlapping channels, causing interference.
What is the BEST way to resolve the interference issue?
A) Configure WAPs to operate on non-overlapping channels such as 1, 6, and 11.
B) Reduce the number of WAPs in use to prevent interference.
C) Switch all WAPs to channel 1 for uniformity.
D) Increase transmission power to overcome interference issues.
Correct Answer: A) Configure WAPs to operate on non-overlapping channels such as 1, 6, and 11.
Explanation:
(A) Correct: In the 2.4 GHz band, channels 1, 6, and 11 do not overlap, reducing interference.
(B) Incorrect: Reducing WAPs could create dead zones, leading to coverage gaps.
(C) Incorrect: Assigning all WAPs to channel 1 causes co-channel interference.
(D) Incorrect: Increasing power may worsen interference rather than resolving it.
Scenario:
Your company recently expanded its office space, and employees are experiencing Wi-Fi disconnections while moving between rooms. The network team wants to ensure seamless connectivity as users move throughout the building.
Which solution would provide the BEST wireless coverage in this situation?
A) Deploy multiple WAPs using an Extended Service Set (ESS) configuration.
B) Install a single high-power WAP in the middle of the building.
C) Assign different SSIDs to each WAP so users manually switch networks.
D) Use only one channel across all WAPs to simplify network management.
Correct Answer: A) Deploy multiple WAPs using an Extended Service Set (ESS) configuration.
Explanation:
(A) Correct: An ESS allows multiple WAPs to work together, enabling seamless roaming without requiring manual network switching.
(B) Incorrect: A single WAP cannot cover a large office space efficiently.
(C) Incorrect: Different SSIDs would force users to reconnect manually, causing disruptions.
(D) Incorrect: Using only one channel across all WAPs increases co-channel interference.
Scenario:
Your company has recently detected unauthorized devices attempting to connect to the wireless network from the parking lot. The IT team is tasked with improving security while maintaining good internal coverage.
Which action would BEST mitigate this issue?
A) Increase the WAP transmission power to create a stronger internal signal.
B) Move WAPs to the building’s center and use unidirectional antennas where necessary.
C) Disable encryption to allow only known devices to connect.
D) Reduce the number of WAPs to limit network availability.
Correct Answer: B) Move WAPs to the building’s center and use unidirectional antennas where necessary.
Explanation:
(A) Incorrect: Increasing power could extend the network even further outside the building, increasing risk.
(B) Correct: Centrally placing WAPs and using unidirectional antennas helps focus the signal inward, reducing external signal leakage.
(C) Incorrect: Disabling encryption exposes the network to unauthorized access.
(D) Incorrect: Reducing WAPs can lead to dead zones and poor coverage.
Scenario:
A heat map of your company’s Wi-Fi network shows strong signals near the building’s edges and even extending outside.
What should you do to resolve this issue?
A) Increase the signal strength to improve coverage.
B) Reduce signal strength and/or reposition WAPs to minimize leakage.
C) Add more WAPs to balance the coverage across the building.
D) Ignore the issue unless employees report problems.
Correct Answer: B) Reduce signal strength and/or reposition WAPs to minimize leakage.
Explanation:
(A) Incorrect: Increasing signal strength will worsen the problem by further extending the signal outside.
(B) Correct: Reducing power and repositioning WAPs can confine the signal within the building.
(C) Incorrect: Adding more WAPs without a proper site survey may create interference.
(D) Incorrect: Ignoring security vulnerabilities puts the network at risk.
Scenario:
You are an IT administrator at a law firm that stores confidential client data. Your manager asks you to ensure that the firm’s Wi-Fi security is strong enough to prevent unauthorized access.
Which encryption method should you use to provide the most secure wireless network?
A) WEP – Wired Equivalent Privacy
B) WPA – Wi-Fi Protected Access
C) WPA2-CCMP – Wi-Fi Protected Access 2 with AES encryption
D) WPA3-SAE – Wi-Fi Protected Access 3 with Simultaneous Authentication of Equals
Correct Answer: D) WPA3-SAE – Wi-Fi Protected Access 3 with Simultaneous Authentication of Equals
Explanation:
(A) Incorrect: WEP is outdated and insecure due to its weak 24-bit Initialization Vector (IV), which is easily cracked.
(B) Incorrect: WPA was an improvement over WEP but still used TKIP, which is vulnerable to attacks.
(C) Correct but not the best: WPA2-CCMP provides strong encryption using AES but is vulnerable to KRACK attacks.
(D) Correct: WPA3-SAE replaces the traditional 4-way handshake with a Diffie-Hellman key agreement, preventing offline dictionary attacks.
Scenario:
A café offers free Wi-Fi to customers but is concerned about the risk of cybercriminals intercepting unencrypted data. They want a security solution that encrypts communications without requiring passwords.
Which feature of WPA3 would be the best solution?
A) AES-GCMP – A stronger encryption algorithm
B) Enhanced Open (Opportunistic Wireless Encryption)
C) WPA3-Enterprise
D) Message Integrity Check (MIC)
Correct Answer: B) Enhanced Open (Opportunistic Wireless Encryption)
Explanation:
(A) Incorrect: AES-GCMP improves encryption strength but does not address public network security directly.
(B) Correct: Enhanced Open encrypts data even in open networks without requiring authentication, preventing passive eavesdropping.
(C) Incorrect: WPA3-Enterprise is for organizations with strict security policies, requiring 802.1X authentication.
(D) Incorrect: MIC prevents tampering but does not secure public networks against passive attacks.
Scenario:
A financial institution wants to prevent unauthorized employees from accessing sensitive data. They need a secure authentication method that verifies both the server and the client before granting access.
Which authentication protocol should they use?
A) EAP-FAST
B) EAP-TTLS
C) PEAP
D) Open Authentication
Correct Answer: C) PEAP (Protected Extensible Authentication Protocol)
Explanation:
(A) Incorrect: EAP-FAST is useful for networks without certificates but does not provide mutual authentication.
(B) Incorrect: EAP-TTLS requires only server certificates, not client authentication.
(C) Correct: PEAP encapsulates authentication within a TLS tunnel and requires both client and server certificates, ensuring strong mutual authentication.
(D) Incorrect: Open Authentication does not provide encryption or authentication, making it highly insecure.
Scenario:
Your company is upgrading from WPA2 to WPA3 to prevent cybercriminals from capturing encrypted Wi-Fi handshakes and attempting offline brute-force attacks.
Which feature of WPA3 prevents this type of attack?
A) AES-CCMP
B) AES-GCMP
C) Simultaneous Authentication of Equals (SAE)
D) RADIUS authentication
Correct Answer: C) Simultaneous Authentication of Equals (SAE)
Explanation:
(A) Incorrect: AES-CCMP is WPA2’s encryption standard but does not address offline attacks.
(B) Incorrect: AES-GCMP enhances encryption but does not prevent brute-force attempts.
(C) Correct: SAE in WPA3 replaces the WPA2-PSK method, preventing hackers from capturing handshakes and guessing passwords offline.
(D) Incorrect: RADIUS provides authentication services but does not prevent offline attacks.
Scenario:
A retail company wants to improve Wi-Fi security without the complexity of managing certificates for thousands of employees. They also want seamless Wi-Fi roaming between store locations.
Which authentication protocol is the best fit?
A) EAP-FAST
B) PEAP
C) EAP-TTLS
D) EAP-TLS
Correct Answer: A) EAP-FAST
Explanation:
(A) Correct: EAP-FAST uses Protected Access Credentials (PACs) instead of certificates, making it ideal for large deployments where employees move between access points.
(B) Incorrect: PEAP requires client-side and server-side certificates, increasing administrative complexity.
(C) Incorrect: EAP-TTLS requires server certificates, but still introduces complexity.
(D) Incorrect: EAP-TLS is one of the most secure methods but requires client certificates, making it difficult to manage for thousands of employees.
Scenario:
A company is experiencing Wi-Fi deauthentication attacks, where employees are randomly disconnected from the network.
Which WPA3 feature prevents this?
A) Enhanced Open
B) Management Frame Protection (MFP)
C) AES-GCMP encryption
D) Opportunistic Wireless Encryption (OWE)
Correct Answer: B) Management Frame Protection (MFP)
Explanation:
(A) Incorrect: Enhanced Open encrypts data in open networks but does not prevent deauthentication attacks.
(B) Correct: MFP protects management frames from being forged or tampered with, preventing deauthentication attacks.
(C) Incorrect: AES-GCMP provides stronger encryption but does not protect management frames.
(D) Incorrect: OWE secures public Wi-Fi but does not prevent targeted Wi-Fi disconnection attacks.
Scenario:
Your IT department is configuring network authentication for remote workers. They need a protocol that centralizes user authentication and logs user activity for security monitoring.
Which protocol should they use?
A) RADIUS
B) TACACS+
C) EAP-TLS
D) PEAP
Correct Answer: A) RADIUS
Explanation:
(A) Correct: RADIUS centralizes authentication, authorization, and accounting (AAA), making it ideal for managing remote worker access.
(B) Incorrect: TACACS+ is better suited for device administration rather than remote authentication.
(C) Incorrect: EAP-TLS is an authentication protocol, not an AAA protocol.
(D) Incorrect: PEAP is an authentication method, not a centralized AAA protocol.
Scenario:
A company is developing a new web application that allows users to log in with their username and password. A security analyst warns the development team about potential SQL injection attacks if they do not properly validate user inputs.
Which technique should they use to prevent this vulnerability?
A) Using Templated Queries (Parameterized Queries)
B) Allowing direct input concatenation in SQL queries
C) Only performing front-end validation for username and password fields
D) Encouraging users to choose complex passwords
Correct Answer: A) Using Templated Queries (Parameterized Queries)
Explanation:
(A) Correct: Parameterized queries prevent SQL injection by separating user input from the SQL query structure, treating it as data instead of executable code.
(B) Incorrect: Concatenating input directly into SQL queries allows attackers to inject malicious SQL code.
(C) Incorrect: Front-end validation alone is insufficient since attackers can bypass it using developer tools or intercept network requests.
(D) Incorrect: Strong passwords help protect user accounts, but they do not prevent SQL injection.
Scenario:
A retail website uses cookies to store session data for logged-in users. However, security researchers have identified that session hijacking is a risk due to improper cookie settings.
Which security measures should be implemented to protect session cookies?
A) Enable the Secure, HttpOnly, and SameSite attributes on cookies
B) Use persistent cookies for session verification
C) Store session IDs in local storage instead of cookies
D) Allow cookies to be transmitted over HTTP to ensure accessibility
Correct Answer: A) Enable the Secure, HttpOnly, and SameSite attributes on cookies
Explanation:
(A) Correct:
✅ Secure Attribute: Ensures cookies are sent only over HTTPS.
✅ HttpOnly Attribute: Prevents cookies from being accessed via JavaScript, protecting against XSS attacks.
✅ SameSite Attribute: Helps prevent CSRF attacks by restricting cross-site requests.
(B) Incorrect: Persistent cookies increase session hijacking risks.
(C) Incorrect: Storing session IDs in local storage exposes them to JavaScript-based attacks.
(D) Incorrect: Allowing cookies over HTTP makes them vulnerable to interception.
Scenario:
A software company is testing its latest financial application. During testing, an engineer notices that when input exceeds a certain length, the application crashes.
Which type of security flaw is most likely responsible for this behavior?
A) Cross-Site Scripting (XSS)
B) Buffer Overflow
C) SQL Injection
D) Code Signing Mismatch
Correct Answer: B) Buffer Overflow
Explanation:
(A) Incorrect: XSS allows attackers to inject malicious scripts, but it does not cause an application to crash due to excessive input.
(B) Correct: A buffer overflow occurs when an input exceeds a program’s allocated memory, leading to crashes or exploitation.
(C) Incorrect: SQL Injection manipulates database queries but does not typically cause crashes from excessive input.
(D) Incorrect: Code signing verifies software integrity but is unrelated to memory vulnerabilities.
Scenario:
A software development team is implementing security testing into their DevOps pipeline. They need a method to detect vulnerabilities in source code before execution.
Which security technique should they use?
A) Static Code Analysis (SAST)
B) Dynamic Code Analysis (DAST)
C) Fuzz Testing
D) Stress Testing
Correct Answer: A) Static Code Analysis (SAST)
Explanation:
(A) Correct: SAST reviews source code for security vulnerabilities before execution, making it ideal for early-stage detection.
(B) Incorrect: DAST tests applications while running, which is not useful for pre-execution analysis.
(C) Incorrect: Fuzz Testing is a subset of DAST, designed to cause crashes by sending malformed input.
(D) Incorrect: Stress Testing evaluates system performance, not security flaws.
Scenario:
A security team is testing a web application for hidden vulnerabilities by injecting random, malformed, or unexpected data into input fields to see how the application reacts.
Which security testing technique are they using?
A) Static Code Analysis (SAST)
B) Fuzz Testing (Fuzzing)
C) Code Signing
D) Secure Cookies
Correct Answer: B) Fuzz Testing (Fuzzing)
Explanation:
(A) Incorrect: SAST analyzes source code statically, but does not inject data dynamically.
(B) Correct: Fuzz Testing finds vulnerabilities by overloading input fields with unexpected data to detect security flaws.
(C) Incorrect: Code Signing verifies software authenticity but is unrelated to input testing.
(D) Incorrect: Secure cookies enhance authentication security but do not test application robustness.
Scenario:
An IT department is developing software for internal use. They want a way to verify the authenticity and integrity of their software before deployment.
Which security feature should they implement?
A) Dynamic Code Analysis
B) Code Signing
C) Sandboxing
D) Input Validation
Correct Answer: B) Code Signing
Explanation:
(A) Incorrect: Dynamic Code Analysis tests for vulnerabilities but does not verify authenticity.
(B) Correct: Code Signing ensures software has not been tampered with and confirms its legitimate source.
(C) Incorrect: Sandboxing isolates applications but does not verify their integrity.
(D) Incorrect: Input validation ensures secure user input but is unrelated to software authenticity.
Scenario:
A company is testing unknown or untrusted software before allowing it to run on their production environment. They want to ensure that any potentially malicious actions remain isolated.
Which security technique should they use?
A) Code Signing
B) Static Code Analysis
C) Sandboxing
D) SQL Injection Prevention
Correct Answer: C) Sandboxing
Explanation:
(A) Incorrect: Code Signing verifies authenticity but does not isolate untrusted applications.
(B) Incorrect: Static Code Analysis helps detect vulnerabilities but does not contain software execution.
(C) Correct: Sandboxing isolates applications, limiting access to system resources and preventing malware from affecting the host system.
(D) Incorrect: SQL Injection Prevention secures databases but does not protect against untrusted software execution.
Scenario:
A company enforces Network Access Control (NAC) to ensure that only secure devices can connect to the network. When a remote employee’s laptop attempts to connect, the system places the device into a virtual holding area for scanning.
What happens next in the NAC process?
A) The laptop is immediately granted full access to the network.
B) The device is scanned for compliance factors such as security patches and antivirus updates.
C) The NAC system requests the user to confirm their identity manually via email.
D) The laptop is permanently blocked from the network unless an administrator intervenes.
Correct Answer: B) The device is scanned for compliance factors such as security patches and antivirus updates.
Explanation:
(A) Incorrect: Devices must pass compliance checks before receiving full access.
(B) Correct: NAC places devices in a virtual holding area to scan for security factors (e.g., antivirus, OS patches, firewall status).
(C) Incorrect: NAC does not rely solely on manual user verification; it automates device compliance checks.
(D) Incorrect: Failing the scan does not result in a permanent block—non-compliant devices are placed into quarantine for remediation.
Scenario:
A corporate office requires all company-issued devices to maintain continuous compliance with security policies before accessing the network. IT decides to use NAC agents to enforce these policies.
Which type of NAC agent is best suited for this environment?
A) Non-Persistent Agent
B) Persistent Agent
C) 802.1X-Based NAC
D) Captive Portal-Based NAC
Correct Answer: B) Persistent Agent
Explanation:
(A) Incorrect: Non-persistent agents are better suited for BYOD (Bring Your Own Device) environments like universities, not corporate environments.
(B) Correct: Persistent agents remain installed on corporate devices, continuously enforcing security policies (e.g., checking for missing patches, expired antivirus).
(C) Incorrect: 802.1X is a foundational NAC method but does not specify persistent vs. non-persistent agent use.
(D) Incorrect: Captive portals are used for guest/BYOD access, not corporate network security enforcement.
Scenario:
A company implements 802.1X authentication as part of its Network Access Control (NAC) strategy.
What happens when an employee’s laptop tries to connect to the corporate network using 802.1X?
A) The device is immediately given unrestricted network access.
B) The user must authenticate with credentials before being allowed onto the network.
C) The laptop is placed in quarantine until an administrator manually approves the connection.
D) The laptop is only allowed to browse the internet, but cannot access internal network resources.
Correct Answer: B) The user must authenticate with credentials before being allowed onto the network.
Explanation:
(A) Incorrect: 802.1X requires authentication before allowing network access.
(B) Correct: 802.1X is a port-based authentication method that verifies a device’s credentials before granting access.
(C) Incorrect: Devices are not automatically quarantined unless they fail compliance checks after authentication.
(D) Incorrect: Access control policies (not 802.1X alone) determine network restrictions.
Scenario:
An organization wants to prevent unauthorized access outside of normal business hours. The IT team configures a NAC policy to block network access from 6:00 PM to 8:00 AM.
Which type of NAC control is being implemented?
A) Location-Based NAC
B) Role-Based NAC
C) Time-Based NAC
D) Health Policy-Based NAC
Correct Answer: C) Time-Based NAC
Explanation:
(A) Incorrect: Location-based NAC controls access based on physical location (e.g., geolocation restrictions).
(B) Incorrect: Role-based NAC grants access based on user/device roles (e.g., employee vs. server).
(C) Correct: Time-based NAC enforces policies based on time schedules (e.g., blocking access outside working hours).
(D) Incorrect: Health policy NAC ensures devices meet security compliance before access is granted.