- A Bluetooth piconet is an example of what type of network topology ad hoc topology
- A client PC on your company’s network is attempting to browse to a vendor’s web page on the Internet, but the computer goes to a malicious web page instead. What two utilities can you use to verify that the DNS records are correct for the web page? (Choose two.) dignslookup
- A Digital signature is a piece of data digest encrypted with: The private key of the sender
- A framework for all of the entities involved in digital certificates for digital certificate management is known as: Public key infrastructure
- A Web application firewall protects Web servers from malicious traffic and blocks attempts to compromise the system. It prevents targeted attacks that include Denial of Service (DOS), Cross-Site Scripting (XSS), SQL injection, Cross-Site Request Forgery (CSRF), forceful browsing, cookie poisoning and invalid input. In which of the following attacks does the attacker gains access to a restricted page within a Web application by supplying a URL directly? Forceful browsing
- Anetwork administrator is evaluating different firewalls. Which of the following firewalls provides protection from the following attacks: Denial of Service (DOS), Cross-Site Scripting (XSS), SQL injection, Cross-Site Request Forgery (CSRF), forceful browsing, cookie poisoning and invalid input? Web application firewall (WAF)
- By creating a starting point for comparison purposes in order to apply targets and goals to measure success, what are you doing Establishing a baseline.
- Choose the SQL injection statement example below that could be used to find specific users: whatever’ OR full_name LIKE ‘%Mia%’
- Cryptography is often used to make a message unreadable. _________ is used to physically hide a message. Steganography
- Digital files all contain hidden information used to describe the content and structure. This information is called _________? Metadata
- Hashing aims to produce: A fixed-size string
- How does a buffer overflow attack occur? A buffer overflow attack occurs when an attacker sets up a process to overflow data in the target machines RAM that will fill the memory past its buffered capacity. This extra information flows into other memory locations (i.e. virtual memory). Thus, the attacker is able to interrupt the current program’s instructions, overflow/redirect the return address, and point that process towards his/her own malware.
- How does a cross-site scripting (XSS) attack work? In a cross-site scripting (XSS) attack, the threat actor uses the web applications that accept user input without validating it before presenting it back to the user. Thus, the attacker can use this vulnerability by tricking a valid (non-validating) website to feed a malicious script to the user’s browser which will execute the script.
- How does a distributed denial of service attack differ from a regular denial of service attack DDoS attacks utilize many computers for making bogus requests, instead of just one.
- In Active Directory, what does authorization? LDAP
- In what type of security policy might you define the required minimal security configuration for servers on the network server security policy
- MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits? 128
- Of the two encryption modes supported by IPsec, what mode is more secure, and why Tunnel mode, because the header and data portion of the packet are encrypted
- Once the malware reaches a system through circulation, then it must embed itself into that system. TRUE
- Packet sniffing can be helpful in detecting rogues. True
- Per your company’s data destruction policy, you have been tasked with the destruction of data on a magnetic hard drive. The policy employed by your company specifies that you must destroy the drive by reducing or eliminating the magnetic fields present in the drive. What method should you use You should perform a degaussing procedure on the drive
- Providing the minimum amount of privileges necessary to perform a job or function is known as what security principle least privilege
- Proxies are “devices” that are strictly software-only. FALSE
- RIPEMD (RIPE Message Digest) is a suite of cryptographic hash functions developed basing upon: MD4 – Message-Digest Algorithm
- SSL v3.0 served as the basis for TLS v1.0. True
- Steganography takes the data it is protecting and hides it within a file. The process can utilize many areas of the file. Which of the choices shown is NOT used? File name
- The Authentication Header (AH) protocol is a part of what encryption protocol suite below? IPSec
- The exchange of information among DNS servers regarding configured zones is known as: zone transfer
- The security administrator for Conglomerate.com has been directed by the CIO to reduce the cost of certificates. Which of the following is the FIRST step that should be taken? Install a CA
- The Steganography message is called the ___________? Plaintext
- To achieve server scalability, more servers may be added to a configuration and make use of: load balancers
- To increase fault-tolerance, the security administrator for Corp.com has installed an active/passive firewall cluster where the second firewall is held in reserve in case of primary firewall failure. Stateful firewall inspection is being used in the firewall implementation. There have been numerous reports of dropped connections with external clients. Which of the following is MOST likely the cause of this problem? Inbound packets are traversing the active firewall and return traffic is being sent through the passive firewall.
- What are the three areas of protection provided by IPSEC? Three areas of protection provided by IPSEC are:
Authentication – IPSEC authenticates the packets received were the original packets that were sent from the source.
Confidentiality – IPSEC encrypts the packets so no third parties could view the information.
Key management – IPSEC manages the keys to ensure they are not intercepted. - What are the two different types of one-time password that can be created? (Choose two.) HMAC based one-time password (HOTP)time-based one time password (TOTP)
- What are two items that are specifically part of the Secure DevOps methodology? (Choose two.) continuous integrationsecurity automation
- What attack involves impersonating another device? Spoofing
- What block cipher mode of operation involves each ciphertext block being fed back into the encryption process to encrypt the next plaintext block? Cipher Block Chaining (CBC)
- What can be deployed to intercept and log network traffic passing through the network? protocol analyzers
- What common method is used to ensure the security and integrity of a root CA? Keep it in an offline state from the network
- What DNS vulnerability can be specifically addressed by utilizing Domain Name System Security Extensions (DNSSEC) DNS poisoning
- What does a component’s mean time between failures (MTBF) value determine? It refers to the average amount of time until a component fails and cannot be repaired.
- What encryption protocol is used for the WPA2 wireless standard Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
- What feature of a mobile device management system could be used to restrict the use of an application containing confidential data to only a specific geographical area? Geofencing
- What hardware based solutions are measures for fault tolerance? (Choose all that apply.) Clustering
RAID
Load Balancing - What is NOT an advantage of using job rotation in a complex business environment It reduces job training costs by ensuring everyone knows how to do everyone else’s job
- What is PBKDF2 (Password-Based Key Derivation Function 2) for? Hashing passwords for storage
- What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site? OCSP
- What is the most secure form of IEEE 802.1x authentication certificate based
- What is the S/MIME protocol used for? MIME is a standard for organizing electronic messages. So, the S/MIME protocol is used to secure email messages. It also allows users to send encrypted messages that are digitally signed.
- What is used to create session keys? master secret
- What kind of digital certificate is typically used to ensure the authenticity of a web server to a client? web server
- What language below is used to view and manipulate data that is stored in a relational database? SQL
- What process will remove all private and public keys along with the user’s identification information in the CA? destruction
- What specific type of phishing attack uses the telephone to target a victim? Vishing
- What specific ways can a session token be transmitted? (Choose all that apply.) In the URL.
In the header of the HTTP requisition. - What statement accurately defines what a race condition is and how it might affect a computer? A race condition occurs when concurrent threads of execution access a shared resource simultaneously, producing unintended consequences.
- What statement correctly defines what a rainbow table is in relation to password attacks A rainbow table is a compressed representation of cleartext passwords that are related and organized in a sequence.
- What statement describes the Privacy Enhancement Mail (PEM) X.509 format? It is designed to provide confidentiality and integrity to emails utilizing DER encoding.
- What two statements describe methods that can be employed by armored viruses in order to avoid detection? (Choose two.) Armored viruses can use encrypted code pieces to assemble itself with the help of an infected program.Armored viruses may mutate or change their code on the fly to avoid detection.
- What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks? ARP poisoning
- What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company? watering hole
- What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it? Logic bomb
- What type of cryptography provides security comparable to asymmetric encryption with significantly reduced computational power and with smaller key sizes elliptic curve cryptography
- What type of malware specializes in avoiding detection by accessing lower layers of the operating system or by using undocumented functions to make alterations rootkit
- What type of ransomware displays a screen and prevents the user from accessing the computer’s resources? blocker ransomware
- What type of software can be installed in an individual’s web browser to prevent ads from displaying? ad blocking
- What type of spyware silently captures and stores each keystroke that a user types on the computer’s keyboard? Keylogger
- What type of trust model is used as the basis for most digital certificates used on the Internet? distributed trust
- What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks? Easter egg
- When dealing with the preservation of evidence, who should be responsible for processing the evidence? Properly trained computer evidence specialists
- When deploying sensors, collectors, and filters, where should they be placed in the network? They should be placed where the stream of data is largest.
- When evaluating risk response techniques, which of the terms would best identify the attempt to make the risk less serious? Mitigate
- When evaluating risk response techniques, which of the terms would best identify the act of purchasing insurance for an asset? Transfer
- When using application-based firewalls, what is NOT capable of being used to identify an application being used IP addresses
- When using OAuth, how are a user’s username and password received by a third party server. The username and password are replaced by a an authentication token, which is then used to gain access to the third party server.
- When using steganography to hide a message you can increase the protection of a message by using cryptography to encrypt the message. Examine the choices provided and select the one that describes encrypted information. Ciphertext
- When you are configuring password policy settings in Group Policy, what is the recommended setting for password reuse 24 new passwords must be used before a reused password
- Which attack method can be executed by someone with little or no computer or network knolege? Open-source intelligence
- Which malware type would be used to infect cloud based storage? Crypto-malware
- Which of the choices identifies the actions of a rootkit? Becomes undetectable
- Which of the choices is NOT a trait of crypt-malware? Collects private information
- Which of the choices shown are NOT true when considering virus behavior? Requires human actions to execute
- Which of the following are considered to be interception attacks? (Choose all that apply.) man-in-the-middle
replay attacks - Which of the following are measures for achieving availability? (Choose all that apply.) Redundancy, Fault tolerance, and Patching
- Which of the following are options that are viable and practical for implementing data encryption? (Choose all that apply.) Full disk encryption, database encryption, individual file encryption, removable media encryption, and mobile devices encryption.
- Which of the following is NOT a means used by an attacker to do reconnaissance on a network? Smurf attack
- Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trait that the malware possesses? Source
- Which of the following is true concerning RC4 (Rivest Cipher 4)? It was the most widely used software cipher.
- Which of the following is true regarding cloud storage? One may not have control over how exactly the data is safeguarded.
- Which of the following may be used as an alternative to CRLs (Certificate revocation list)? OCSP
- Which state legislation requires companies to report security breaches within 48 hours? Database Security Breach Notification Act
- Which statement is NOT true regarding a critical asset in the enterprise environment? It can be easily replaced
- Which type of attack below is similar to a passive man-in-the-middle attack? Replay
- With this type of key cryptography, the sender and receiver of a message share a single common key. Symmetric
- You are speaking to your CIO, and she has instructed you to ensure that the network is “five nines” in percentage of availability. What is the total yearly downtime that this allows 5.26 minutes
- You have been tasked with responding to a security incident involving the compromise of a manager’s documents. You and your team have determined that the attacker involved copied files via a Bluetooth connection with the manager’s unprotected cell phone. What kind of attack was this bluesnarfing attack
Other Links:
See other websites for quiz:
Check on QUIZLET