Technologies and Tools Flashcards

1
Q

You are implanting a new network for a small office environment. The network includes a domain controller, four resource servers, a network printer, a wireless access point, and three dozen client systems. In addition to standard network management devices, such as switches and routers, why would you want to deploy a firewall?

To watch for intrusions

To control traffic entering and leaving a network

To require strong passwords

A

To control traffic entering and leaving a network

Firewalls provide protection by controlling traffic entering and leaving a network; thus, this is an essential foundational security device that should be deployed in any network, large or small

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As the security administrator for a moderate-sized network, you need to deploy security solutions to reduce the risk of a security breach. You elect to install a network-based IDS. However, after deployment you discover that the NIDS is not suitable for detecting which of the following?

Email spoofing

Denial-of-service attacks

Attacks against the network

A

Email spoofing

Network-based IDSs aren’t suitable for detecting email spoofing. Detecting email spoofing is not a feature of an NIDS because email is the payload of network communications and an NIDS mostly focuses on the headers of protocols. Furthermore, even those NIDS that do analyze payloads will often be unable to detect spoofed email elements if those elements are technically valid (such as proper values) and represent real entities (although not the actual author and sender of the message)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Illegal or unauthorized zone transfers are a significant and direct threat to what type of network server?

Web

DHCP

DNS

A

DNS

Illegal or unauthorized zone transfers are a significant and direct threat to DNS servers. If a zone transfer is performed against an internal DNS server by an outsider, the result is the leakage of information about every system with an IP address. This is due to the fact that most internal networks use LDAP-based directory services, LDAP is DNS-based, and DHCP auto-registers devices with LDAP and DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What mechanism of loop protection is based on an element in a protocol header?

Spanning Tree Protocol

Ports

Time to live

A

Time to live

Time to live (TTL) is a value in the IP header used to prevent loops at Layer 3. The TTL value sets the maximum number of routers that an IP packet will traverse before it is discarded if it has not reached its intended destination. Each router will decrement the TTL by 1, then check to see if the result is a non-zero value (to then forward the packet) or a zero value (to discard the packet). If the packet is discarded due to TTL exhaustion, the router will create an ICMP Type 11 Timeout Exceeded message, which is sent to the originator of the discarded communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of wireless antenna can be used to send or receive signals in any direction?

Cantenna

Yagi

Rubber duck

A

Rubber duck

A rubber duck antenna is an omnidirectional antenna. Cantenna, Yagi, and panel antennas are all examples of directional antennae

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What mechanism of wireless security is based on AES?

TKIP

CCMP

LEAP

A

CCMP

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is based on the AES encryption scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What technology provides an organization with the best control over BYOD equipment?

Encrypted removable storage

Mobile device management

Geotagging

A

Mobile device management

Mobile device management (MDM) is a software solution to the challenging task of managing the myriad mobile devices that employees use to access company resources. The goals of MDM are to improve security, provide monitoring, enable remote management, and support troubleshooting. Not all mobile devices support removable storage, and even fewer support encrypted removable storage. Geotagging is used to mark photos and social network posts, not for BYOD management. Application whitelisting may be an element of BYOD management, but it is only part of a full MDM solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the most effective means to reduce the risk of losing the data on a mobile device, such as a notebook computer?

Encrypt the hard drive.

Minimize sensitive data stored on the mobile device.

Use a cable lock.

A

Minimize sensitive data stored on the mobile device.

The risk of a lost or stolen notebook is the data loss, not the loss of the system itself. Thus, keeping minimal sensitive data on the system is the only way to reduce the risk. Hard drive encryption, cable locks, and strong passwords, although good ideas, are preventive tools, not means of reducing risk. They don’t keep intentional and malicious data compromise from occurring; instead, they encourage honest people to stay honest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which security stance will be most successful at preventing malicious software execution?

Deny by exception

Whitelisting

Allow by default

A

Whitelisting

Whitelisting is a security option that prohibits unauthorized software from being able to execute. Whitelisting is also known as deny by default or implicit deny. Blacklisting, also known as deny by exception or allow by default, is the least successful means of preventing malware execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LDAP operates over what TCP ports?

636 and 389

110 and 25

443 and 80

A

636 and 389

LDAP operates over TCP ports 636 and 389. POP3 and SMTP operate over TCP ports 110 and 25, respectively. TLS operates over TCP ports 443 and 80 (SSL operates only over TCP port 443; HTTP operates over TCP port 80). FTP operates over TCP ports 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of NAC agent is written in a web or mobile language and is temporarily executed on a system only when the specific management page is accessed?

Permanent

Dissolvable

Passive

A

Dissolvable

NAC agents can be dissolvable or permanent. A dissolvable NAC agent is usually written in a web/mobile language, such as Java or ActiveX, and is downloaded and executed to each local machine when the specific management web page is accessed. The dissolvable NAC agent can be set to run once and then terminate or remain resident in memory until the system reboots. A permanent NAC agent is installed on the monitored system as a persistent software background service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose or use of a media gateway?

It is a fictitious environment designed to fool attackers and intruders and lure them away from the private secured network.

It is used to spread or distribute network traffic load across several network links or network devices.

It is any device or service that converts data from one communication format to another.

A

It is any device or service that converts data from one communication format to another.

A media gateway is any device or service that converts data from one communication format to another. A media gateway is often located at the intersection of two different types of networks. Media gateways are commonly used with VoIP systems, where a conversion from IP-based communications to analog or digital is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is true regarding an exploitation framework? (Select all that apply.)

Is a passive scanner

Fully exploits vulnerabilities

Only operates in an automated fashion

Allows for customization of test elements

Represents additional risk to the environment

Can only assess systems over IPv4

A

Fully exploits vulnerabilities

Allows for customization of test elements

Represents additional risk to the environment

An exploitation framework is a vulnerability scanner that is able to fully exploit the weaknesses it discovers. It can be an automated or manual exploit assessment tool. Often an exploitation framework allows for customization of the test elements as well as the crafting of new tests to deploy against your environment’s targets. An exploitation framework does have additional risk compared to that of a vulnerability scanner, since it attempts to fully exploit any discovered weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a banner grabbing activity?

Detecting the presence of a wireless network

Capturing the initial response or welcome message from a network service that may directly or indirectly reveal its identity

Preventing access to a network until the client has accepted use terms or fully authenticated

A

Capturing the initial response or welcome message from a network service that may directly or indirectly reveal its identity

Banner grabbing is the process of capturing the initial response or welcome message from a network service. A banner grab occurs when a request for data or identity is sent to a service on an open port and that service responds with information that may directly or indirectly reveal its identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are effective permissions determined or calculated?

Accumulate allows, remove any denials

Count the number of users listed in the ACL

View the last access time stamp of the asset

A

Accumulate allows, remove any denials

Determining effective permissions is accomplished by accumulating the grants or allows of permissions, either through group memberships or to the user account directly, and then removing any denials of permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a content filter mechanism that can reduce the possibility of malicious executable code being accepted as input?

Checking length

Blocking hex characters

Escaping metacharacters

A

Escaping metacharacters

A common oversight in content filtering is to fail to escape metacharacters. Be sure that in addition to blocking content that is too long or that matches a known unwanted dataset, your filter escapes metacharacters so that their programmatic power is removed

17
Q

What is an example of a PUP?

Unwanted marketing pop-ups

A Trojan horse

A password cracker

A

A password cracker

PUPs (potentially unwanted programs) can include any type of questionable software, such as sniffers, password crackers, network mappers, port scanners, and vulnerability scanners. PUPs are distinct from malware, spyware, and adware

18
Q

What is the purpose of DEP being present in an operating system?

To block buffer overflows

To prevent social-engineering attacks

To stop ransomware infections

A

To block buffer overflows

DEP (data execution prevention) is a memory security feature of many operating systems aimed at blocking a range of memory abuse attacks, including buffer overflows. DEP blocks the execution of code stored in areas of memory designated as data-only areas

19
Q

What is the term used to describe the designation of a specific geographical area that is then used to implement features on mobile devices, which can be defined by GPS coordinates, a wireless indoor positioning system (IPS), or the presence or lack of a specific wireless signal?

Bluesmacking

Geofencing

CYOD

A

Geofencing

Geofencing is the designation of a specific geographical area that is then used to implement features on mobile devices. A geofence can be defined by GPS coordinates, IPS (wireless indoor positioning system), or the presence or lack of a specific wireless signal. A device can be configured to enable or disable features based on a geofenced area

20
Q

What is the definition of DNSSEC?

It is an Internet standard for encrypting and digitally signing email.

It can be used as a secure Telnet replacement, it can be used to encrypt protocols similar to TLS, and it can be used as a VPN protocol.

It is a security improvement to the existing name resolution infrastructure. The primary function of this tool is to provide reliable authentication between devices when performing resolution operations.

A

It is a security improvement to the existing name resolution infrastructure. The primary function of this tool is to provide reliable authentication between devices when performing resolution operations.

DNSSEC (Domain Name System Security Extensions) is a security improvement to the existing DNS infrastructure. The primary function of DNSSEC is to provide reliable authentication between devices when performing DNS operations. DNSSEC has been implemented across a significant portion of the DNS system. Each DNS server is issued a digital certificate, which is then used to perform mutual certificate authentication. The goal of DNSSEC is to prevent a range of DNS abuses where false data can be injected into the resolution process