Test ?'s 1 Flashcards
What are Opal’s security features?
Disk encryption
What secure development practices should developers not neglect when creating a new application?
Error handling, Input Validation, and proper authentication and authorization
Which attack could overwhelm a network by targeting vulnerabilities in the headers of specific application protocols?
DNS amplification attack
A group of junior systems administrators participates in an ethical hacking seminar that allows for advancement and rewards for completing challenges. Which training methods do the administrators experience?
Gamification and Capture the Flag
Which is TRUE about false negatives in relation to vulnerability scanning tools?
It is a high risk and it is not identified
What disadvantages could password lockouts create for an organization?
Increases workload for security management and becomes vulnerable to DoS Attacks
An attacker evaded antivirus detection in a Linux kernel, as multiple threads attempted to write an object at the same memory location. What type of vulnerability did the attacker use?
A Race Condition
Developers working on a project discover that dead code in the application had been executed as a result of which practice?
Code Reuse
Which principles should be included in a web server hardening class?
Use the configuration templates provided, Use SSH when uploading files, and secure a guest account.
What’s the difference between a playbook and a runbook?
A playbook is a checklist of actions while a runbook automates steps of a playbook.
A piece of data that may or may not be relevant to the investigation or incident response such as registry keys, files, time stamps, and event logs are known as what?
Artifacts
Which of the following are common constraints of embedded systems?
Cryptography capability, Network range, and Compute power
What control type do the administrators implement when relying on ACLs (Access Control Lists)?
Preventative control
What command line tools can identify misconfigured DNS servers?
Nslookup and dig
What secure options can a web administrator implement on a web servers response header?
Cache control, Content Security Policy (CSP), and HTTP Strict Transport Security (HSTS)
Flow analyzers, such as IPFix and Netflow, generate what?
Flow records, such as history of traffic flow, including timestamps and IP addresses.