Test ?'s 1 Flashcards

1
Q

What are Opal’s security features?

A

Disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What secure development practices should developers not neglect when creating a new application?

A

Error handling, Input Validation, and proper authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which attack could overwhelm a network by targeting vulnerabilities in the headers of specific application protocols?

A

DNS amplification attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A group of junior systems administrators participates in an ethical hacking seminar that allows for advancement and rewards for completing challenges. Which training methods do the administrators experience?

A

Gamification and Capture the Flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is TRUE about false negatives in relation to vulnerability scanning tools?

A

It is a high risk and it is not identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What disadvantages could password lockouts create for an organization?

A

Increases workload for security management and becomes vulnerable to DoS Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attacker evaded antivirus detection in a Linux kernel, as multiple threads attempted to write an object at the same memory location. What type of vulnerability did the attacker use?

A

A Race Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Developers working on a project discover that dead code in the application had been executed as a result of which practice?

A

Code Reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which principles should be included in a web server hardening class?

A

Use the configuration templates provided, Use SSH when uploading files, and secure a guest account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between a playbook and a runbook?

A

A playbook is a checklist of actions while a runbook automates steps of a playbook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A piece of data that may or may not be relevant to the investigation or incident response such as registry keys, files, time stamps, and event logs are known as what?

A

Artifacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are common constraints of embedded systems?

A

Cryptography capability, Network range, and Compute power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What control type do the administrators implement when relying on ACLs (Access Control Lists)?

A

Preventative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What command line tools can identify misconfigured DNS servers?

A

Nslookup and dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What secure options can a web administrator implement on a web servers response header?

A

Cache control, Content Security Policy (CSP), and HTTP Strict Transport Security (HSTS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flow analyzers, such as IPFix and Netflow, generate what?

A

Flow records, such as history of traffic flow, including timestamps and IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which technology can be used when skimming credit cards through smart phones?

A

Near Field Communications (NFC)

18
Q

Which configuration management strategies would BEST help a team lead explain a complex IT infrastructure?

A

Diagrams

19
Q

Which of the following practices would help mitigate the oversight of applying coding techniques that will secure the code of an internal application for a company?

A

Static code analysis

20
Q

In which environment can multiple developers check out software code and include change management processes?

A

Development

21
Q

In what way does Challenge Handshake Authentication Protocol (CHAP) protect against replay attacks?

A

The handshake is repeated with different challenge messages periodically throughout the session connection.

22
Q

What type of strategy is a blackhole?

A

Isolation and Containment

23
Q

How can a security team best circumvent the hacking technique when hackers use resources to trigger a diversion just distract threat hunters while another attack is initiated?

A

Use a defensive maneuver so that threat actors do not know they have been discovered.

24
Q

What is UAV (unmanned aerial vehicle)?

A

An unmanned aerial vehicle (UAV), or drone, provides a vector a popular social engineering technique that drops infected USB media around college campuses. UAVs are also used for war flying.

25
Q

How would an attacker maliciously reconfigure a recorded task on an Excel workbook?

A

Using macro commands

26
Q

Which approach would an admin implement when needing to separate network resources on a departmental level across hardware and software devices?

A

Create VLANS

27
Q

Which protocol provides encryption for call data?

A

Secure Real-time Transport Protocol (SRTP)

28
Q

What is the “Evil Twin” in regards to rogue access points?

A

A rogue WAP masquerading as a legitimate one is called an evil twin. An evil twin might just have a similar name (SSID) to the legitimate one.

29
Q

A threat actor is using which of the following techniques to circumvent the usual authentication method to a remote host?

A

A backdoor

30
Q

Which of the following redundancy solutions best meets failover requirements?

A

Geographical dispersal is a failover consideration that replicates data in hot and warm sites physically distanced from one another in the event of a catastrophe.

31
Q

What controls is a delivery manager addressing when adding a configuration management plan, a failover plan, and a risk assessment to a program’s documentation inventory

A

Response and recovery

32
Q

What is a memorandum of understanding (MOU)?

A

A memorandum of understanding (MOU) is a preliminary or exploratory agreement to express an intent to work together. MOUs are usually intended to be relatively informal and not to act as binding contracts.

33
Q

What does a basic installation of a web server require to allow unauthenticated access?

A

Guest account

34
Q

Which type of network attack involves asserting the use of an arbitrary hardware address onto a network interface card (NIC)?

A

MAC Cloning

35
Q

Describe a black box strategy

A

In a black box environment, the pen tester is given no privileged information about the network. This type of test is useful for simulating the behavior of an external.

36
Q

An IT department implements a software tool between the company’s network and the cloud provider to monitor network traffic and enforce security policies. What software tool was implemented?

A

A Cloud access security broker (CASB)

37
Q

How is it possible that a website can read the location of an uploaded picture?

A

Geolocation and GPS tagging

38
Q

Which of the following attacks would allow an attacker to sniff all traffic on a switched network?

A

Address Resolution Protocol (ARP) poisoning

39
Q

A risk management implementation begins with which of the following characteristics?

A

Classification, Prioritization, and and Identification

40
Q

Which control types does a systems engineer implement when an initial locking mechanism does not perform as expected?

A

Compensating and Preventative