Test ?'s 1 Flashcards

1
Q

What are Opal’s security features?

A

Disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What secure development practices should developers not neglect when creating a new application?

A

Error handling, Input Validation, and proper authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which attack could overwhelm a network by targeting vulnerabilities in the headers of specific application protocols?

A

DNS amplification attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A group of junior systems administrators participates in an ethical hacking seminar that allows for advancement and rewards for completing challenges. Which training methods do the administrators experience?

A

Gamification and Capture the Flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is TRUE about false negatives in relation to vulnerability scanning tools?

A

It is a high risk and it is not identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What disadvantages could password lockouts create for an organization?

A

Increases workload for security management and becomes vulnerable to DoS Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attacker evaded antivirus detection in a Linux kernel, as multiple threads attempted to write an object at the same memory location. What type of vulnerability did the attacker use?

A

A Race Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Developers working on a project discover that dead code in the application had been executed as a result of which practice?

A

Code Reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which principles should be included in a web server hardening class?

A

Use the configuration templates provided, Use SSH when uploading files, and secure a guest account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between a playbook and a runbook?

A

A playbook is a checklist of actions while a runbook automates steps of a playbook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A piece of data that may or may not be relevant to the investigation or incident response such as registry keys, files, time stamps, and event logs are known as what?

A

Artifacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are common constraints of embedded systems?

A

Cryptography capability, Network range, and Compute power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What control type do the administrators implement when relying on ACLs (Access Control Lists)?

A

Preventative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What command line tools can identify misconfigured DNS servers?

A

Nslookup and dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What secure options can a web administrator implement on a web servers response header?

A

Cache control, Content Security Policy (CSP), and HTTP Strict Transport Security (HSTS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flow analyzers, such as IPFix and Netflow, generate what?

A

Flow records, such as history of traffic flow, including timestamps and IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which technology can be used when skimming credit cards through smart phones?

A

Near Field Communications (NFC)

18
Q

Which configuration management strategies would BEST help a team lead explain a complex IT infrastructure?

19
Q

Which of the following practices would help mitigate the oversight of applying coding techniques that will secure the code of an internal application for a company?

A

Static code analysis

20
Q

In which environment can multiple developers check out software code and include change management processes?

A

Development

21
Q

In what way does Challenge Handshake Authentication Protocol (CHAP) protect against replay attacks?

A

The handshake is repeated with different challenge messages periodically throughout the session connection.

22
Q

What type of strategy is a blackhole?

A

Isolation and Containment

23
Q

How can a security team best circumvent the hacking technique when hackers use resources to trigger a diversion just distract threat hunters while another attack is initiated?

A

Use a defensive maneuver so that threat actors do not know they have been discovered.

24
Q

What is UAV (unmanned aerial vehicle)?

A

An unmanned aerial vehicle (UAV), or drone, provides a vector a popular social engineering technique that drops infected USB media around college campuses. UAVs are also used for war flying.

25
How would an attacker maliciously reconfigure a recorded task on an Excel workbook?
Using macro commands
26
Which approach would an admin implement when needing to separate network resources on a departmental level across hardware and software devices?
Create VLANS
27
Which protocol provides encryption for call data?
Secure Real-time Transport Protocol (SRTP)
28
What is the "Evil Twin" in regards to rogue access points?
A rogue WAP masquerading as a legitimate one is called an evil twin. An evil twin might just have a similar name (SSID) to the legitimate one.
29
A threat actor is using which of the following techniques to circumvent the usual authentication method to a remote host?
A backdoor
30
Which of the following redundancy solutions best meets failover requirements?
Geographical dispersal is a failover consideration that replicates data in hot and warm sites physically distanced from one another in the event of a catastrophe.
31
What controls is a delivery manager addressing when adding a configuration management plan, a failover plan, and a risk assessment to a program's documentation inventory
Response and recovery
32
What is a memorandum of understanding (MOU)?
A memorandum of understanding (MOU) is a preliminary or exploratory agreement to express an intent to work together. MOUs are usually intended to be relatively informal and not to act as binding contracts.
33
What does a basic installation of a web server require to allow unauthenticated access?
Guest account
34
Which type of network attack involves asserting the use of an arbitrary hardware address onto a network interface card (NIC)?
MAC Cloning
35
Describe a black box strategy
In a black box environment, the pen tester is given no privileged information about the network. This type of test is useful for simulating the behavior of an external.
36
An IT department implements a software tool between the company’s network and the cloud provider to monitor network traffic and enforce security policies. What software tool was implemented?
A Cloud access security broker (CASB)
37
How is it possible that a website can read the location of an uploaded picture?
Geolocation and GPS tagging
38
Which of the following attacks would allow an attacker to sniff all traffic on a switched network?
Address Resolution Protocol (ARP) poisoning
39
A risk management implementation begins with which of the following characteristics?
Classification, Prioritization, and and Identification
40
Which control types does a systems engineer implement when an initial locking mechanism does not perform as expected?
Compensating and Preventative