Test ?'s 1 Flashcards
What are Opal’s security features?
Disk encryption
What secure development practices should developers not neglect when creating a new application?
Error handling, Input Validation, and proper authentication and authorization
Which attack could overwhelm a network by targeting vulnerabilities in the headers of specific application protocols?
DNS amplification attack
A group of junior systems administrators participates in an ethical hacking seminar that allows for advancement and rewards for completing challenges. Which training methods do the administrators experience?
Gamification and Capture the Flag
Which is TRUE about false negatives in relation to vulnerability scanning tools?
It is a high risk and it is not identified
What disadvantages could password lockouts create for an organization?
Increases workload for security management and becomes vulnerable to DoS Attacks
An attacker evaded antivirus detection in a Linux kernel, as multiple threads attempted to write an object at the same memory location. What type of vulnerability did the attacker use?
A Race Condition
Developers working on a project discover that dead code in the application had been executed as a result of which practice?
Code Reuse
Which principles should be included in a web server hardening class?
Use the configuration templates provided, Use SSH when uploading files, and secure a guest account.
What’s the difference between a playbook and a runbook?
A playbook is a checklist of actions while a runbook automates steps of a playbook.
A piece of data that may or may not be relevant to the investigation or incident response such as registry keys, files, time stamps, and event logs are known as what?
Artifacts
Which of the following are common constraints of embedded systems?
Cryptography capability, Network range, and Compute power
What control type do the administrators implement when relying on ACLs (Access Control Lists)?
Preventative control
What command line tools can identify misconfigured DNS servers?
Nslookup and dig
What secure options can a web administrator implement on a web servers response header?
Cache control, Content Security Policy (CSP), and HTTP Strict Transport Security (HSTS)
Flow analyzers, such as IPFix and Netflow, generate what?
Flow records, such as history of traffic flow, including timestamps and IP addresses.
Which technology can be used when skimming credit cards through smart phones?
Near Field Communications (NFC)
Which configuration management strategies would BEST help a team lead explain a complex IT infrastructure?
Diagrams
Which of the following practices would help mitigate the oversight of applying coding techniques that will secure the code of an internal application for a company?
Static code analysis
In which environment can multiple developers check out software code and include change management processes?
Development
In what way does Challenge Handshake Authentication Protocol (CHAP) protect against replay attacks?
The handshake is repeated with different challenge messages periodically throughout the session connection.
What type of strategy is a blackhole?
Isolation and Containment
How can a security team best circumvent the hacking technique when hackers use resources to trigger a diversion just distract threat hunters while another attack is initiated?
Use a defensive maneuver so that threat actors do not know they have been discovered.
What is UAV (unmanned aerial vehicle)?
An unmanned aerial vehicle (UAV), or drone, provides a vector a popular social engineering technique that drops infected USB media around college campuses. UAVs are also used for war flying.