Test ?'s 6 Flashcards

1
Q

An engineer configures server systems to failover in a way that connections are maintained; however, performance is degraded. Evaluate the options and determine which type the engineer configures.

A

Active/active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator is installing a device that uses redundant array of inexpensive disks (RAID) technologies for redundancy and provides employees remote access so that files can be accessed anywhere. The device does not require licensing and stores data at the file level. Which device is the employee likely installing in the infrastructure?

A

NAS – Network-attached storage (NAS) is a file-level data storage server attached to a network that provides data access to a common group of clients. NAS is a single storage device that serves files over Ethernet. NAS can be accessed remotely and uses RAID technologies for hard drive failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sometimes data is archived after it is past its usefulness for purposes of security or regulatory compliance. What is this called?

A

Retention – When policy dictates preserving data in an archive after the date it is still being used, whether for regulatory or security purposes, this is known as a retention policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol alters public IP addresses to private IP addresses and vice versa, in an attempt to protect internal computers from the Internet?

A

NAT - Network addressing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following describes a device that only runs administrative protocols such as secure shell (SSH) or remote desktop protocol (RDP) to securely manage application servers in a demilitarized zone (DMZ)?

A

Jump Server – A jump server only runs the necessary administrative ports and protocols (typically SSH or RDP). Administrators connect to the jump server then use the jump server to connect to the admin interface of application servers in a demilitarized zone (DMZ).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Users are only allowed to work in the office. Account policies must provide login security measures. So, users are only working during normal business hours. Identify the policy that establishes the maximum amount of time an account may be logged in for at the workplace?

A

Time-based login policy – A time-based login policy establishes the maximum amount of time an account may be logged in for. For example, a user with no activity will be logged off after 6 hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company provides smartphones to their employees. IT administrators have the ability to deploy, secure, and remove specific applications and data from the employees’ smartphones. Analyze the selections and determine how IT can perform this type of control.

A

Storage Segmentation – Storage segmentation is personal data segmented from organizational data on a mobile device. It gives IT administrators control over corporate assets on employees’ mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For security purposes, mobile devices at an organization must include location metadata on all applicable data. Which method does the policy mandate?

A

Geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IT company purchases a commercial off the shelf (COTS) product that allows for four developers to access and run the product against developed code for vulnerability and threat assessments. An IT audit indicates that five developers have accessed the product. Which of the following best describes what the company is in violation of?

A

Compliance/Licensing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A vendor ensures that each Internet of Things (IoT) device produced uses random, unique cryptographic keys in accordance with the established certificate and key management practices found in The National Institute of Standards and Technology (NIST) publications. Which of the following constraints is the vendor preventing?

A

Reuse – The practice of reusing a cryptographic key can make a system vulnerable to cyber attacks. The longer a key is in use, the easier it is for an attacker to compromise it. Randomly generated, unique keys provide better security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network engineer is plugging in new patch cables and wants to prevent inadvertent disruptions to the network while doing so. What will the engineer prevent if a Spanning Tree Protocol (STP) is configured on the switches?

A

Broadcast Storms – A Spanning Tree Protocol (STP) is a means for bridges to organize themselves into a hierarchy and prevent loops from forming. These loops have the potential for broadcasting multiple times creating a storm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company uses a DevSecOps approach for developing and maintaining software. In one environment, developers complete penetration and vulnerability scanning to ensure the system is free of bugs and coding errors early on. Which of the following best describes this environment?

A

Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After software testing activities have been completed, a system administrator moves the .war file to an environment that allows end users to access the application. Which environment is the completed software being deployed to?

A

Production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Teams of security experts are preparing for a penetration exercise using a white box environment. The activities will be monitored in an isolated environment in the company’s local datacenter. What would be the appropriate rules of engagement for this exercise?

A

Performance reconnaissance activities first and Involve a cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A test team performs an in-depth review of completed code and analyzes its compatibility with the environment it will be deployed to. Which of the following environments is the test occurring in?

A

Staging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A large business works with a consulting group to develop a business continuity plan. The goal of the plan is to provide a potentially uninterrupted workflow in the event of an incident. Examine the descriptions and determine which one matches this goal.

A

Ensuring process redundancy supports the workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multiple private data sources ingest pictures to a machine learning tool on Google Cloud Platform to find specific species of butterflies. The pictures are tagged by creator names in the company before being loaded onto the various data source locations. What type of security solution can the IT team implement to prevent tainted training data from getting to the machine learning tool?

A

Keep ML algorithm a secret and Use SOAR to check picture properties

18
Q

A connection cannot be established during a network connection test of a newly deployed WAP (Wireless Access Point) in WPA2 Enterprise (Wi-Fi Protected Access) mode. After checking the wireless controller, the 802.1x option was selected, but another configuration setting did not save. Apply knowledge of the network connection process to determine which of the following did not save.

A

RADIUS server settings

19
Q

Determine a solution that can combine with a cloud access security broker (CASB) to provide a wholly cloud-hosted platform for client access?

A

Next-generation secure web gateway – An on-premises next-generation secure web gateway (SWG) is a proxy-based firewall, content filter, and intrusion detection/prevention system that mediates user access to Internet sites and services. Netskope is an example of an SWG product that can include a cloud access security broker (CASB).

20
Q

Consider conditional access to a system and determine which options fit the criteria.

A

Sudo restrictions and User account control (UAC)

21
Q

In regards to performing forensic investigation in public clouds, what document would contain the right to audit clause, giving the investigator the authority to audit files on the network?

A

Service-level agreements (SLA)

22
Q

The company’s current network utilizes EAP-TTLS (EAP-Tunneled TLS) for supplicant clients connecting to the network. Newer model devices and systems are deployed on the network and are not compatible with EAP-TTLS. These systems require MS-CHAPv2 for authentication. Which of the following options will support these new systems?

A

PEAP – PEAP uses MSCHAPv2 in PEAPv0 (also known as EAP-MSCHAPv2). Where required, another iteration called PEAPv2 (also known as EAP-GTC), which is a Cisco implementation, can be used.

23
Q

Companies often update their website links to redirect users to new web pages that may feature a new promotion or to transition to a new web experience. How would an attacker take advantage of these common operations to lead users to fake versions of the website?

A

Add redirects to .htaccess files and Craft phishing links in email

24
Q

In which environment can multiple developers check out software code and include change management processes?

A

Development

25
Q

Which of the following is designed to mitigate losses from cyber incidents such as data breaches, outages, and network damage?

A

Cybersecurity Insurance

26
Q

A zone separated from the local network, provides business partners access to company resources without disclosing internal information. What type of zone does this illustrate?

A

Extranet

27
Q

Which of the following is an example of a vulnerability database that a security administrator can use with Tenable Nessus to assess the security state of servers on the network?

A

CVE – Common Vulnerabilities and Exposures (CVE) is a database of information about vulnerabilities that are codified as signatures. A vulnerability scanner like Tenable Nessus uses CVE to scan the network to determine the security state of almost any device.

28
Q

A system administrator moves a file from a server to a client using Secure Shell (SSH) over port 22. Compare the protocols for file transfers to deduce the protocol utilized.

A

SFTP

29
Q

Experts at a scientific facility suspect that operatives from another government entity have planted malware and are spying on one of their top-secret systems. Based on the attacker’s location and likely goals, which attacker type is likely responsible?

A

State Actors

30
Q

A lack of which of the following measures of disorder can leave a cryptosystem vulnerable and unable to encrypt data securely?

A

Entropy – Entropy is a measure of cryptographic unpredictability. Using high entropy sources of data provides more security than using low sources. A lack of good entropy can leave a system vulnerable.

31
Q

An enterprise has recently experienced a severe malware attack. Admin has identified and removed the cause, and they are now checking the systems and bringing them back online. How would one categorize the cause with respect to incident response procedures?

A

Eradication – is an incident response lifecycle phase requiring the identification of the root cause of an incident. For instance, a user clicking on a suspicious attachment in an email is a root cause of a potentially larger problem.

32
Q

Identify types of metadata that would be associated with CDR (call detail records) of mobile devices.

A

Call Durations, SMS text timestamps, List of towers connected to

33
Q

A company purchased a few rack servers from a different vendor to try with their internal cluster. After a few months of integration failures, the company opted to remain with their previous vendor and to upgrade their other rack servers. The current commercial software will be migrated to the new rack servers. What may have caused the company to remain with their previous vendor for new rack servers?

A

Servers are incompatible and Vendor lacks expertise

34
Q

A threat actor logs in to a website as a free user and submits a request for a file. The request references the parent directory of the web server. This injection attack is successful by using a canonicalization attack to disguise the nature of the malicious input. How was the threat actor able to retrieve the file?

A

Using a directory traversal attack.

35
Q

Which principle of social engineering can a threat actor use to get many people to act as others would?

A

Consensus – The principle of consensus or social proof refers to techniques that cause many people to act just as others would without force. The attacker can use this instinct to persuade the target that to refuse a request would be odd.

36
Q

Which value is the result of a quantitative or qualitative risk analysis?

A

Inherent Risk – The result of quantitative or qualitative analysis is a measure of inherent risk. Inherent risk is the level of risk before any type of mitigation has been attempted.

37
Q

Which type of network attack involves asserting the use of an arbitrary hardware address onto a network interface card (NIC)?

A

MAC Cloning

38
Q

An Information Security Manager working for an ISP has discovered that an attacker has poisoned the DNS server cache by spamming it with recursive queries. Predict what tools the manager might use to discover whether the attacker has inserted any false records.

A

dnsenum and nslookup/dig

39
Q

Which of the following is NOT an example of improper or weak application patch management.

A

Application design flaw

40
Q

Verify the terminology that describes the action of isolating a system or file in order to contain a worm or virus.

A

Quarantine – Data loss prevention software can deny the offending user(s) access to the original file. The software accomplishes this by encrypting the file in place, or by moving the file to an area isolated from access. This is quarantining a file.

41
Q

What are different types of social engineering?

A

Phishing, Whaling, spear phishing, vishing, baiting, and scareware