- A centralized directory of digital certificates is called a(n) Certificate Repository (CR)
- A digital certificate associates the user’s identity with his public key
- A mail gateway can have many functions. Which choice is NOT one of those functions? Require full tunnel
- A replay attack _____. makes a copy of the transmission for use at a later time
- A replay attack is a variation of this attack type MITM
- A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The server has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client? IPCONFIG
- Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email? It can prevent a DNS transfer attack
- An attacker who manipulates the maximum size of an integer type would be performing what kind of attack? integer overflow
- An entity that issues digital certificates is a _______________. Certificate Authority (CA)
- are symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity Session keys
- Attackers who register domain names that are similar to legitimate domain names are performing _____. URL hijacking
- Both DNS poisoning and ARP poisoning involves: Spoofing
- Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs? Port mirroring
- Considering the implications of virtual servers on a host, what poses the greatest threat to them? Hypervisor compromise
- Digital certificates can be used for each of these EXCEPT to verify the authenticity of the Registration Authorizer
- DNS poisoning _____. substitutes DNS addresses so that the computer is automatically redirected to another device
- DNSSEC adds additional _____ and message header information, which can be used to verify that the requested data has not been altered in transmission. resource records
- Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say? Once the MAC address table is full the switch functions like a network hub.
- How does network address translation (NAT) improve security? It discards unsolicited packets.
- In which of the following configurations are all the load balancers always active? Active-active
- is a protocol for securely accessing a remote computer Secure Shell (SSH)
- Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend? Router
- John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing? XSS
- Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle? On-premises
- Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about? Privilege escalation
- Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect? Host table and external DNS server
- One way to secure data is through Data Loss Prevention (DLP). Which of the choices is not a data type protected by DLP? Data-to-disclose
- Packet sniffing can be helpful in detecting rogues True
- Public key infrastructure (PKI) is the management of digital certificates
- Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose? Split tunnel
- refers to a situation in which keys are managed by a third party, such as a trusted CA Key escrow
- Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian? Cause the device to enter a fail-open mode.
- SNMP uses which port by default? 161
- The strongest technology that would assure Alice that Bob is the sender of a message is a(n) digital certificate
- To achieve server scalability, more servers may be added to a configuration and make use of: Load balancers
- To increase fault-tolerance, the security administrator for Corp.com has installed an active/passive firewall cluster where the second firewall is held in reserve in case of primary firewall failure. Stateful firewall inspection is being used in the firewall implementation. There have been numerous reports of dropped connections with external clients. Inbound packets are traversing the active firewall and return traffic is being sent through the passive firewall
- What attack involves impersonating another device? Spoofing
- What can be deployed to intercept and log network traffic passing through the network? protocol analyzers
- What functions of a switch does a software defined network separate? Control plane and physical plane
- What hardware based solutions are measures for fault tolerance? (Choose all that apply.) RAID, Clustering, and Load balancing
- What is a session token? a random string assigned by a web server
- What is the basis of an SQL injection attack? to insert SQL statements through unfiltered user input
- What is the difference between a DoS and a DDoS attack? DoS attacks use fewer computers than DDoS attacks
- What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)? A NIPS can take actions more quickly to combat an attack.
- What is the recommended secure protocol for voice and video applications? Secure Real-time Transport Protocol (SRTP)
- What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another? privilege escalation
- What type of attack intercepts legitimate communication and forges a fictitious response to the sender? MITM
- What type of attack involves manipulating third-party ad networks? Malvertising
- When defining data policies, what areas or issues must be covered? (Select FOUR) Disposing, Retention, Wiping, Storage
- When preparing a cloud computer security solution for your organization, you implement a “gatekeeper” to guarantee your security policies. Which choice correctly identifies this method of policy enforcement? CASB (Cloud access security broker)
- Which action cannot be performed through a successful SQL injection attack? reformat the web application server’s hard drive
- Which application stores the user’s desktop inside a virtual machine that resides on a server and is accessible from multiple locations? VDI
- Which attack intercepts communications between a web browser and the underlying computer? man-in-the-browser (MITB)
- Which attack uses the user’s web browser settings to impersonate that user? XSRF
- Which command is used in testing and troubleshooting DNS servers? Nslookup
- Which device intercepts internal user requests and then processes those requests on behalf of the users? Forward proxy server
- Which device is connected to a port on a switch in order to receive network traffic? Passive IDS
- Which device is easiest for an attacker to take advantage of to capture and analyze packets? Hub
- Which device watches for attacks and sounds an alert only when one occurs? network intrusion detection system (NIDS)
- Which digital certificate displays the name of the entity behind the website? Extended Validation (EV) Certificate
- Which function does an Internet content filter NOT perform? intrusion detection
- Which is the most secure type of firewall? stateful packet filtering
- Which of the choices identifies an attack that intercepts communications between a browser and the host security system? MITB
- Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser? Plug-ins
- Which of the following are available protocols for security purposes? (Choose all that apply.) TLS, SSL, IPSec, SSH
- Which of the following block ciphers XORs each block of plaintext with the previous block of ciphertext before being encrypted? Cipher Block Chaining (CBS)
- Which of the following can protect “data at rest”? (Select FOUR) Bitlocker, Encrypted file system (EFS), Bitlocker to go, Transparent database encryption(TDE)
- Which of the following CANNOT be used to hide information about the internal network? a protocol analyzer
- Which of the following devices can identify the application that sends packets and then makes decisions about filtering based on it? application-based firewall
- Which of the following is a multipurpose security device? Unified Threat Management
- Which of the following is NOT a means used by an attacker to do reconnaissance on a network? Smurf attack
- Which of the following is NOT a method for strengthening a key? Variability
- Which of the following is NOT a service model in cloud computing? Hardware as a Service (HaaS)
- Which of the following services only requires a single port be opened on the firewall? HTTP
- Which of the following technologies are necessary for implementing USB drive encryption or hard drive encryption? (Choose two that apply) TPM & HSM
- Which of these is considered the strongest cryptographic transport protocol? TLS v1.2
- Which of these is NOT a DoS attack? push flood
- Which of these is NOT part of the certificate life cycle? Authorization
- Which of these is NOT used in scheduling a load balancer? The IP address of the destination packet
- Which of these is the most secure protocol for transferring files? SFTP
- Which of these would NOT be a filtering mechanism found in a firewall ACL rule? Date
- Which statement about network address translation (NAT) is true? It removes private addresses when the packet leaves the network.
- Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks? Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.
- Which statement is NOT true regarding hierarchical trust models? It is designed for use on a large scale.
- Which statement regarding a demilitarized zone (DMZ) is NOT true? It contains servers that are used only by internal network users.
- Which trust model has multiple CAs, one of which acts as a facilitator? Bridge
- Why are extensions, plug-ins, and add-ons considered to be security risks? They have introduced vulnerabilities in browsers.
- Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization’s secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia? A bridge could permit access to the secure wired network from the unsecured wireless network
- You are asked to design a VLAN using a Type 1 Hypervisor. Which technology will you use as a base? Host
- You are examining the security implications of virtual machines. A condition exists where the virtual machine can potentially harm the host. Which choice describes this? All
- You are examining the types of overflow attacks. Which type of attack attempts to store data in RAM that is beyond the fixed-length storage boundaries? Buffer overflow attacks
- You are planning to deploy several patches and updates to a virtual server. Take system snapshot
Other Links:
See other websites for quiz:
Check on QUIZLET