Term Test 3 Flashcards
Which of the following best describes an implicit deny principle?
A. All actions that are not expressly denied are allowed.
B. All actions that are not expressly allowed are denied.
C. All actions must be expressly denied.
D. None of the above
B. All actions that are not expressly allowed are denied
What is the intent of least privilege?
A. Enforce the most restrictive rights required by users to run system processes.
B. Enforce the least restrictive rights required by users to run system processes.
C. Enforce the most restrictive rights required by users to complete assigned tasks.
D. Enforce the least restrictive rights required by users to complete assigned tasks.
C. Enforce the most restrictive rights required by users to complete assigned tasks
Which of the following models is also known as an identity-based access control model? A. Discretionary access control B. Role-based access control C. Rule-based access control D. Mandatory access control
A. discretionary access control
A central authority determines which files a user can access. Which of the following best describes this? A. An access control list (ACL) B. An access control matrix C. Discretionary access control model D. Nondiscretionary access control model
D. Nondiscretionary access control model
A central authority determines which files a user can access based on the organization’s hierarchy. Which of the following best describes this? A. Discretionary access control model B. An access control list (ACL) C. Rule-based access control model D. Role-based access control model
D. Role-based access control model
Which of the following best describes a rule-based access control model?
A. It uses local rules applied to users individually.
B. It uses global rules applied to users individually.
C. It uses local rules applied to all users equally.
D. It uses global rules applied to all users equally.
D. It uses global rules applied to all users equally
What type of access control model is used on a firewall? A. Mandatory access control model B. Discretionary access control model C. Rule-based access control model D. Role-based access control model
C. Rule-based access control model
Which of the following best describes a characteristic of the mandatory access control model? A. Employs explicit-deny philosophy B. Permissive C. Rule-based D. Prohibitive
D. Prohibitive
Which of the following can help mitigate the success of an online brute-force attack? A. Rainbow table B. Account lockout C. Salting passwords D. Encryption of password
B. Account lockout
What type of attack uses email and attempts to trick high-level executives? A. Phishing B. Spear phishing C. Whaling D. Vishing
C. Whaling
Which one of the following tools is used primarily to perform network discovery scans? A. Nmap B. Nessus C. Metasploit D. lsof
A. Nmap
Which one of the following is not normally included in a security assessment? A. Vulnerability scan B. Risk assessment C. Mitigation of vulnerabilities D. Threat assessment
C. Mitigation of vulnerabilities
Who is the intended audience for a security assessment report? A. Management B. Security auditor C. Security professional D. Customers
A. Management
Which one of the following tests provides the most accurate and detailed information about the security state of a server? A. Unauthenticated scan B. Port scan C. Half-open scan D. Authenticated scan
D. Authenticated scan
Badin Industries runs a web application that processes e-commerce orders and handles credit card transactions. As such, it is subject to the Payment Card Industry Data Security Standard (PCI DSS). The company recently performed a web vulnerability scan of the application and it had no
unsatisfactory findings. How often must Badin rescan the application?
A. Only if the application changes
B. At least monthly
C. At least annually
D. There is no rescanning requirement.
C. At least annually
Grace is performing a penetration test against a client’s network and would like to use a tool to assist in automatically executing common exploits. Which one of the following security tools will best meet her needs? A. nmap B. Metasploit C. Nessus D. Snort
B. Metasploit
Paul would like to test his application against slightly modified versions of previously used input. What type of test does Paul intend to perform? A. Code review B. Application vulnerability review C. Mutation fuzzing D. Generational fuzzing
C. Mutation fuzzing
Users of a banking application may try to withdraw funds that don’t exist from their account. Developers are aware of this threat and implemented code to protect against it. What type of software testing would most likely catch this type of vulnerability if the developers have not already remediated it? A. Misuse case testing B. SQL injection testing C. Fuzzing D. Code review
A. Misuse case testing
What type of interface testing would identify flaws in a program’s command-line interface?
A. Application programming interface testing
B. User interface testing
C. Physical interface testing
D. Security interface testing
B. User interface testing
During what type of penetration test does the tester always have access to system configuration information? A. Black box penetration test B. White box penetration test C. Gray box penetration test D. Red box penetration test
B. White box penetration test
An organization ensures that users are granted access to only the data they need to perform specific work tasks. What principle are they following? A. Principle of least permission B. Separation of duties C. Need to know D. Role-based access control
C. Need to know
An administrator is granting permissions to a database. What is the default level of access the administrator should grant to new users? A. Read B. Modify C. Full access D. No access
D. No access
What is a primary benefit of job rotation and separation of duties policies? A. Preventing collusion B. Preventing fraud C. Encouraging collusion D. Correcting incidents
B. Preventing fraud
Which of the following is one of the primary reasons an organization enforces a mandatory vacation policy? A. To rotate job responsibilities B. To detect fraud C. To increase employee productivity D. To reduce employee stress levels
B. To detect fraud
Which of the following identifies vendor responsibilities and can include monetary penalties if the vendor doesn’t meet the stated responsibilities?
A. Service level agreement (SLA)
B. Memorandum of understanding (MOU)
C. Interconnection security agreement (ISA)
D. Software as a Service (SaaS)
A. Service level agreement (SLA)
An organization is planning the layout of a new building that will house a datacenter. Where is the most appropriate place to locate the datacenter?
A. In the center of the building
B. Closest to the outside wall where power enters the building
C. Closest to the outside wall where heating, ventilation, and air conditioning systems are located
D. At the back of the building
A. In the center of the building
Backup tapes have reached the end of their life cycle and need to be disposed of. Which of the following is the most appropriate disposal method?
A. Throw them away. Because they are at the end of their life cycle, it is not possible to read data from them.
B. Purge the tapes of all data before disposing of them.
C. Erase data off the tapes before disposing of them.
D. Store the tapes in a storage facility.
B. Purge the tapes of all data before disposing of them
Which of the following can be an effective method of configuration management using a baseline? A. Implementing change management B. Using images C. Implementing vulnerability management D. Implementing patch management
B. Using images
While troubleshooting a network problem, a technician realized it could be resolved by opening a port on a firewall. The technician opened the port and verified the system was now working. However, an attacker accessed this port and launched a successful attack. What could have prevented this problem? A. Patch management processes B. Vulnerability management processes C. Configuration management processes D. Change management processes
D. Change management processes
What would an administrator use to check systems for known issues that attackers may use to exploit the systems? A. Versioning tracker B. Vulnerability scanner C. Security audit D. Security review
B. Vulnerability scanner