Topic 1 Flashcards
A network administrator wants to implement a method of securing internal routing. Which of the following
should the administrator implement?
DMZ
NAT
VPN
PAT
VPN
Malicious traffic from an internal network has been detected on an unauthorized port on an application server.
Which of the following network-based security controls should the engineer consider implementing?
ACLs
HIPS
NAT
MAC filtering
ACLs
Which of the following is an important step to take BEFORE moving any installation packages from a test
environment to production?
Roll back changes in the test environment
Verify the hashes of files
Archive and compress the files
Update the secure baseline
Verify the hashes of files
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?
Owner
System
Administrator
User
Administrator
A company wants to host a publicity available server that performs the following functions:
Evaluates MX record lookup
Can perform authenticated requests for A and AAA records
Uses RRSIG
Which of the following should the company use to fulfill the above requirements?
LDAPS DNSSEC SFTP nslookup dig
DNSSEC
A penetration tester is crawling a target website that is available to the public. Which of the following
represents the actions the penetration tester is performing?
URL hijacking
Reconnaissance
White box testing
Escalation of privilege
Reconnaissance
In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?
Using salt
Using hash algorithms
Implementing elliptical curve
Implementing PKI
Using Salt
A company is terminating an employee for misbehavior. Which of the following steps is MOST important in
the process of disengagement from this employee?
Obtain a list of passwords used by the employee.
Generate a report on outstanding projects the employee handled.
Have the employee surrender company identification.
Have the employee sign an NDA before departing
Have an employee surrender company identification
An employer requires that employees use a key-generating app on their smartphones to log into corporate
applications. In terms of authentication of an individual, this type of access policy is BEST defined as:
Something you have.
Something you know.
Something you do.
Something you are.
Something you have
A user suspects someone has been accessing a home network without permission by spoofing the MAC
address of an authorized system. While attempting to determine if an authorized user is logged into the home
network, the user reviews the wireless router, which shows the following table for systems that are currently
on the home network.
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
A. Apply MAC filtering and see if the router drops any of the systems.
B. Physically check each of the authorized systems to determine if they are logged onto the network.
C. Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this
host.
D. Conduct a ping sweep of each of the authorized systems and see if an echo response is received.
Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this
host.
A company is developing a new secure technology and requires computers being used for development to be
isolated. Which of the following should be implemented to provide the MOST secure environment?
A perimeter firewall and IDS
An air gapped computer network
A honeypot residing in a DMZ
An ad hoc network with NAT
A bastion host
An air gapped computer network
A security administrator has found a hash in the environment known to belong to malware. The administrator
then finds this file to be in in the preupdate area of the OS, which indicates it was pushed from the central
patch system.
File: winx86_adobe_flash_upgrade.exe
Hash: 99ac28bede43ab869b853ba62c4ea243
The administrator pulls a report from the patch management system with the following output:
Given the above outputs, which of the following MOST likely happened?
The file was corrupted after it left the patch system.
The file was infected when the patch manager downloaded it.
The file was not approved in the application whitelist system.
The file was embedded with a logic bomb to evade detection
The file was embedded with a logic bomb to evade detection.
Which of the following encryption methods does PKI typically use to securely project keys?
Elliptic curve
Digital signatures
Asymmetric
Obfuscation
Asymmetric
An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission
of the OCSP will impact network performance. Which of the following should the security analyst recommend
is lieu of an OCSP?
CSR
CRL
CA
OID
CRL
A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the
domain controller, the systems administrator needs to provide the domain administrator credentials. Which of
the following account types is the systems administrator using?
Shared account
Guest account
Service account
User account
Service account
When identifying a company’s most valuable assets as part of a BIA, which of the following should be the
FIRST priority?
Life
Intellectual property
Sensitive data
Public reputation
Life
A security analyst is reviewing the following output from an IPS:
Given this output, which of the following can be concluded? (Select two.)
The source IP of the attack is coming from 250.19.18.22.
The source IP of the attack is coming from 250.19.18.71.
The attacker sent a malformed IGAP packet, triggering the alert.
The attacker sent a malformed TCP packet, triggering the alert.
The TTL value is outside of the expected range, triggering the alert.
The source IP of the attack is coming from 250.19.18.71
and
The attacker sent a malformed IGAP packet, triggering the alert.
Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a
free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were
unable to find the application in the app stores. Which of the following allowed Joe to install the application?
(Select two.)
Near-field communication Rooting/jailbreaking Ad-hoc connections Tethering Sideloading
Rooting/jailbreaking and Sideloading
Two users need to send each other emails over unsecured channels. The system should support the principle of
non-repudiation. Which of the following should be used to sign the user’s certificates?
RA
CA
CRL
CSR
CA
A company is currently using the following configuration:
IAS server with certificate-based EAP-PEAP and MSCHAP
Unencrypted authentication via PAP
A security administrator needs to configure a new wireless setup with the following configurations:
PAP authentication method
PEAP and EAP provide two-factor authentication
Which of the following forms of authentication are being used? (Select two.)
PAP
PEAP
MSCHAP
PEAP- MSCHAP
EAP
EAP-PEAP
PAP and MSCHAP
A company determines that it is prohibitively expensive to become compliant with new credit card regulations.
Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the
following is the company doing?
Transferring the risk
Accepting the risk
Avoiding the risk
Migrating the risk
Transferring the risk
Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML
iframe with JavaScript code via a web browser?
Buffer overflow
MITM
XSS
SQLi
XSS
A system administrator wants to provide for and enforce wireless access accountability during events where
external speakers are invited to make presentations to a mixed audience of employees and non-employees.
Which of the following should the administrator implement? Shared accounts Preshared passwords Least privilege Sponsored guest
Sponsored Guest
Which of the following cryptographic attacks would salting of passwords render ineffective?
Brute force
Dictionary
Rainbow tables
Birthday
Rainbow tables
An organization’s file server has been virtualized to reduce costs. Which of the following types of backups
would be MOST appropriate for the particular file server?
Snapshot
Full
Incremental
Differential
Incremental
A wireless network uses a RADIUS server that is connected to an authenticator, which in turn connects to a
supplicant. Which of the following represents the authentication architecture in use?
Open systems authentication
Captive portal
RADIUS federation
802.1x
802.1x
A manager wants to distribute a report to several other managers within the company. Some of them reside in
remote locations that are not connected to the domain but have a local server. Because there is sensitive data
within the report and the size of the report is beyond the limit of the email attachment size, emailing the report
is not an option. Which of the following protocols should be implemented to distribute the report securely?
(Select three.)
S/MIME
SSH
SNMPv3
FTPS
SRTP
HTTPS
LDAPS
SSH, FTPS, and HTTPS
An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified? RTO RPO MTBF MTTR
RTO (Recovery Time Objective)
A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS
attack. News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to
the website that crashed. To which of the following categories does the refrigerator belong?
SoC
ICS
IoT
MFD
IoT (internet of things)
A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a
user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers
the user is on vacation and does not have network access. Which of the following types of attacks are MOST
likely occurring? (Select two.)
Replay Rainbow tables Brute force Pass the hash Dictionary
Brute Force and Dictionary
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK? DES AES MD5 WEP
AES
An organization finds that most help desk calls are regarding account lockout due to a variety of applications
running on different systems. Management is looking for a solution to reduce the number of account lockouts
while improving security. Which of the following is the BEST solution for this organization?
Create multiple application accounts for each user.
Provide secure tokens.
Implement SSO.
Utilize role-based access control.
Implement SSO (Single-sign on)
An administrator is replacing a wireless router. The configuration of the old wireless router was not
documented before it stopped functioning. The equipment connecting to the wireless network uses older
legacy equipment that was manufactured prior to the release of the 802.11i standard. Which of the following
configuration options should the administrator select for the new wireless router?
WPA+CCMP
WPA2+CCMP
WPA+TKIP
WPA2+TKIP
WPA2-TKIP
An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the
future, Company.com wants to mitigate the impact of similar incidents. Which of the following would assist
Company.com with its goal?
Certificate pinning
Certificate stapling
Certificate chaining
Certificate with extended validation
Certificate pinning
Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and
mapped shares on their devices when it is opened. The network and security teams perform the following
actions:
Shut down all network shares.
Run an email search identifying all employees who received the malicious message.
Reimage all devices belonging to users who opened the attachment.
Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of
the incident response process?
Eradication
Containment
Recovery
Lessons learned
Recovery
Which of the following network vulnerability scan indicators BEST validates a successful, active scan?
The scan job is scheduled to run during off-peak hours.
The scan output lists SQL injection attack vectors.
The scan data identifies the use of privileged-user credentials.
The scan results identify the hostname and IP address.
The scan results identify the hostname and IP address
When trying to log onto a company’s new ticketing system, some employees receive the following message:
Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with
only the recommended hardware specifications. Which of the following is the MOST likely cause for this error
message?
Network resources have been exceeded.
The software is out of licenses.
The VM does not have enough processing power.
The firewall is misconfigured.
The VM does not have enough processing power
Ann, a security administrator, has been instructed to perform fuzz-based testing on the company’s applications.
Which of the following best describes what she will do?
Enter random or invalid data into the application in an attempt to cause it to fault
Work with the developers to eliminate horizontal privilege escalation opportunities
Test the applications for the existence of built-in- back doors left by the developers
Hash the application to verify it won’t cause a false positive on the HIPS
Enter random or invalid data into the application in an attempt to cause it to fault
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and
excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
Deterrent
Preventive
Detective
Compensating
Deterrent