Test ?'s 5 Flashcards

1
Q

A tech considers installing either a Raspberry Pi or Arduino system inside a small enclosure as a control device for sensitive tasks. The utilization of this technology is an example of which embedded system type?

A

System on chip (SoC)– is a design where processors, controllers, and devices are provided on a single processor die (or chip). Raspberry Pi and Arduino are examples of SoC boards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An increase in malware detection, due to certain web browsing activity in the workplace, caused the information systems security office (ISSO) to deploy a unified threat manager on the network. How would this network appliance help reduce malware on client workstations?

A

Block URLS, Block malware, and Scan web traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can an attacker exploit the lack of authentication between the internal services (e.g., implicit trust) of a web host to steal service account credentials?

A

Server-side request forgery (SSRF) – exploits both the lack of authentication between the internal servers and services (implicit trust) and weak input validation, allowing the attacker to submit unsanitized requests or Application Programming Interface (API) parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where might one find operating system files during acquisition?

A

Pagefile, RAM, and Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following represents a non-intrusive scanning type of framework?

A

Vulnerability Scanning – vulnerability scanners represent a non-intrusive scanning type. The scanner identifies vulnerabilities from its database by analyzing things, such as build and patch levels or system policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is NOT a critical profiling factor when assessing the risk that any one type of threat actor poses to an organization?

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cardiovascular patient is sent home with a monitoring device that records and sends data to a healthcare provider when triggered by abnormal cardiac activity. Response time to the data is critical to patient health. Which embedded platform is the medical device using?

A

A real-time operating system (RTOS) is in an embedded system intended to serve real-time applications that process data as it comes in. It provides a quicker reaction to external events than a typical operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A gray hat hacker will perform which of the following when using hacking techniques on an organization or software?

A

Cleanup evidence and Seek a bug bounty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A system administrator implements a process that provides two separate paths from each server node to every disk in a redundant array of inexpensive disks set up to remove a single point of failure. What concept has the administrator implemented?

A

Multipathing – Multipathing allows users to configure multiple input/output (I/O) paths between server nodes and storage arrays into a single device to remove a single point of failure and increase redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IT discovers a flaw in a web application where it allows queries without encryption. As a result, requests are being spoofed and directories containing private files are viewable. What is happening?

A

Extensible Markup Language (XML) injection – Extensible Markup Language (XML) can be used for data exchange. Without encryption, it is vulnerable to spoofing, request forgery, and injection of arbitrary code. For example, an XML External Entity (XXE) attack embeds a request for a local resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A website uses a code generator for access to the site. Once a user enters their username, a one-time 30-second code is generated and provided through a stand-alone app. The user must enter the unique code to gain access. This is an example of which of the following cryptography methods?

A

Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A stratum 2 time server obtains routinely updated time to ensure accuracy. Evaluate the Network Time Protocol (NTP) and conclude which device provided the updates.

A

Stratum 1 – A stratum 2 server would obtain the time from a stratum 1 server. The higher level server must always receive the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where should a systems administrator search for more information on how to fix a CPU vulnerability on a Dell rack server?

A

Vendor support page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are valid security concerns for installing software on a mobile device from a website rather than an app store?

A

The website may have an outdated version and The .apk file may be a malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What replaced RC4/TKIP to make WPA2 significantly more secure than WPA?

A

AES (Advanced Encryption Standard) and CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Recommend a strategy to establish what witnesses were doing at the scene, whether they observed any suspicious behavior or activity, and to gather information about the computer system.

A

Interview witnesses

17
Q

Choose the components a threat actor may use to set up a distributed denial of service attack (DDoS) on a local network.

A

Command and control, Remote Access Trojan, and a Botnet

18
Q

A security administrator notices port scanning from an unknown entity on the company infrastructure. The administrator sets up a router to provide erroneous information to be provided in return to protect the system from breach or attack. What is the router providing in response to the scan?

A

Fake telemetry – is false, but realistic, data used to trick an attacker into believing it is legitimate information.

19
Q

A company wants to implement a control model that dictates access based on attributes. The company would like to reconfigure the network by making changes from executable files instead of physically reconfiguring. Which of the following should the company implement?

A

SDN – A software defined network (SDN) separates data and control planes in a network. It uses an attribute-based access control (ABAC) that identifies subjects and objects within a policy.

20
Q

Recommend a strategy for organizing evidence during the e-discovery process of forensic investigation.

A

Apply Tags – Tags might be used to indicate relevancy to the case or part of the case or to show confidentiality and help organize evidence according to keywords or labels.

21
Q

Using Unified Extensible Firmware Interface (UEFI) to boot a server, the system must also provide secure boot capabilities. Part of the secure boot process requires a secure boot platform key or self-signed certificate. Determine which of the following an engineer can use to generate keys within the server using an available Peripheral Component Interconnect Express (PCIe) slot.

A

A hardware security module (HSM) is an appliance designed to perform centralized public key infrastructure (PKI) management, key generation, or key escrow for devices. HSM can also be implemented as a plug-in PCIe adapter card to operate within a device.

22
Q

A financial institution uses File Transfer Protocol Secure (FTPS) to transmit personally identifiable information (PII) to a receiving institution. Which encryption method would best be suitable for protecting the confidentiality of the information in transit?

A

Secure Socket Layer/Transport Layer Security (SSL/TLS)

23
Q

A company shares an external drive that allows members to collaborate documentation and products to work simultaneously. The CIO enforces a rule that some users can download files to their local desktop while others can only view files. This is an example of which type of data protection?

A

Rights Management

24
Q

Which coding automation concept relates to committing and testing updates often?

A

Continuous Integration

25
Q

An attacker came within close proximity of a victim and sent the mobile device user spam of an unsolicited text message. Once the user clicked the link in the message, Trojan malware infected the user’s device. What type of attack did the hacker most likely infect the mobile user with?

A

Bluejacking – A Bluetooth-discoverable device is vulnerable to bluejacking, similar to spam, where someone sends an unsolicited text (or picture/video) message or vCard (contact details). This can also be a vector for Trojan malware.

26
Q

Which of the following is the service that provisions the user account and processes authentication requests?

A

Identity provider

27
Q

A microfabrication company recently suffered a breach of their R&D servers, from which blueprints and proprietary development documents were downloaded. What is likely the most impactful organizational consequence of this breach?

A

IP-theft

28
Q

The 802.1x framework establishes several ways for devices and users to be securely authenticated before they are permitted access to LAN (Local Area Network) or WLAN (Wireless LAN). Identify the actual authentication mechanism established.

A

EAP – 802.1x, which is the Port-based Network Access Control framework, establishes several ways for devices and users to be securely authenticated before they are permitted full network access. EAP or extensible authentication protocol is the actual authentication mechanism.

29
Q

Which type of service account has the most privileges?

A

System

30
Q

An organization that is planning a move to the cloud checks to see that the chosen CSP uses a standard method for creating and following security competencies. Which method does the CSP likely implement?

A

Cloud controls matrix – Cloud controls consists of specific controls and assessment guidelines that should be implemented by CSPs. A matrix acts as a starting point for agreements as it provides a baseline level of security competency that the CSP should meet.

31
Q

A small department at a company manages a server, separate from IT, for data access and backup purposes. What role does the department fulfill?

A

Data Custodian – The data custodian role handles managing the system on which the data assets are stored. This includes responsibility for enforcing access control, encryption, and backup/recovery measures.