Term
|
Definition
Confidentiality, Integrity, Availability |
|
|
Term
What is symetric encryption? |
|
Definition
"They use the same secret" |
|
|
Term
|
Definition
That certain information should only be known to certain people |
|
|
Term
What is asymetric encryption? |
|
Definition
"They use different secrets" |
|
|
Term
|
Definition
That you can prove that someone did something |
|
|
Term
|
Definition
A weakness that could be triggered accidentally or exploited intentionally to cause a security breach? |
|
|
Term
|
Definition
Means that data is stored and transferred as intended and that any modification is authorized |
|
|
Term
|
Definition
this means that information is accessible to those authorized to view or modify it |
|
|
Term
What are the steps to establishing a security policy? |
|
Definition
Starts at the top with the CEO, then goes to the CIO, down to the managers, technical staff, non-technical staff and down to all the staff |
|
|
Term
What is a security control or countermeasure? |
|
Definition
Something designed to make a particular asset or information system secure |
|
|
Term
|
Definition
the likelihood and impact (or consequence) of a threat actor exercising a vulnerability. |
|
|
Term
|
Definition
A system or procedure put in place to mitigate risk. |
|
|
Term
|
Definition
A newbie or n00b. Does not understand what they are doing. |
|
|
Term
|
Definition
Document that identifies security conrols as belonging in one of 18 families, such as Access Control (AC), Audit and Accountability (AA), Incident Response (IR), or Risk Assessment (RA), which describe the basic functions of the controls |
|
|
Term
What is a black hat hacker |
|
Definition
|
|
Term
What is a white hat hacker? |
|
Definition
|
|
Term
|
Definition
Creating an account or ID that identifies the user or process on the computer system |
|
|
Term
|
Definition
Proving that a subject is who or what it claims to be when it attempts to access the resource |
|
|
Term
|
Definition
Proving that a subject is who or what it claims to be when it attempts to access the resource |
|
|
Term
|
Definition
Determining what rights subjects should have on each resource and enforcing those rights |
|
|
Term
|
Definition
Tracking authorized and unauthorized usage of a resource |
|
|
Term
What server is more important? |
|
Definition
|
|
Term
What must an identifier be? |
|
Definition
|
|
Term
|
Definition
(pretending to be someone else) is one of the badic social engineering techniques. |
|
|
Term
What is shoulder surfing? |
|
Definition
refers to stealin a password or PIN by watching the user type it. |
|
|
Term
What are the formal access control models? |
|
Definition
Discretionary Access Control (DAC)
Role-based Access Control (RBAC)
Mandatory Access Control (MAC) |
|
|
Term
What are some characteristics of discretionary access control (DAC) |
|
Definition
ACLs
Ownership
Flexible
Decentralized |
|
|
Term
What are the characteristics of role-based access control (RBAC) |
|
Definition
ACLs
Non-discretionary
Centralized (adminstrative control)
Can only have one role
Groups are assigned to roles
Permissions are assigned to groups |
|
|
Term
|
Definition
Leaving your CAC/staying loged in in the computer during lunch. |
|
|
Term
What are characteristics of Mandatory Access Control (MAC)? |
|
Definition
Labels and clearance
Inflexible
"Need to know" |
|
|
Term
What are characteristics of rule-based access control? |
|
Definition
System-enforced rules rather than system users |
|
|
Term
What is Tailgating or piggybacking? |
|
Definition
is a means of entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint. |
|
|
Term
|
Definition
The most restrictive priviledge
|
|
|
Term
|
Definition
is a combination of social engineering and spoofing (disguising one computer resource as another). |
|
|
Term
|
Definition
If something goes wrong - continue to work |
|
|
Term
|
Definition
If something goes wrong - nothing will work |
|
|
Term
What should you turn off prior to remove malware? |
|
Definition
|
|
Term
What is single sign-on (SSO)? |
|
Definition
A user only has to authenticate to a system once to gain access to all the resources to which the user has been granted rights |
|
|
Term
|
Definition
Recording when any whome a resource was accessed |
|
|
Term
What is the difference between a broadcast domain and a collision detection domain? |
|
Definition
Broadcast domains are used with switches and collision detection domain is used with hubs |
|
|
Term
|
Definition
refers to a phishing scam where the attacker has some information that makes the target more likely to be fooled by the attack. |
|
|
Term
What are the different man in the middle (MTM or MiTM) attacks? |
|
Definition
Sniff, replay, alter, inject, spoof, and hijack |
|
|
Term
What are the layers of the OSI Model? |
|
Definition
Physical, Presentation, Session, Transport, Network, Data Link, and Physical |
|
|
Term
|
Definition
a spear phishing attack directed specifically against upper levels of management in the organization (CEOs and other "big breasts") |
|
|
Term
What is promiscuous mode? |
|
Definition
Used to listen to all traffic |
|
|
Term
|
Definition
is another means of redirecting users from a legitimate website to a malicious one. |
|
|
Term
|
Definition
|
|
Term
What is ethernet broadcast? |
|
Definition
Everyone on that network will hear the broadcast |
|
|
Term
What is a watering hole attack? |
|
Definition
is another type of directed social engineering attack. It relies on the probability that a particular group of targets may use an insecure third-party website. |
|
|
Term
|
Definition
Protocol analyzer
Analyzes network traffic |
|
|
Term
|
Definition
|
|
Term
|
Definition
is a catch-all term to describe malicious software threats and social engineering tools designed to vandalize or compromise computer systems. |
|
|
Term
Within the OSI model where can a hub be used? |
|
Definition
|
|
Term
Within the OSI model where can a switch be used? |
|
Definition
|
|
Term
Where in the OSI model can firewalls be used? |
|
Definition
Layers 3, 4, 5, and 7
Networ, Transport, Session, and Application layer |
|
|
Term
Where in the OSI model are MAC addresses used? |
|
Definition
|
|
Term
Where in the OSI model are IPs used? |
|
Definition
|
|
Term
|
Definition
programs designed to replicate and spread amongst computers, usually by "infecting" executable applications or program code. |
|
|
Term
Where in the OSI model are ports used? |
|
Definition
|
|
Term
|
Definition
Address Resolution Protocol |
|
|
Term
|
Definition
Broadcasting unsolicited ARP reply packets |
|
|
Term
How can ARP Poisoning be mitigated? |
|
Definition
|
|
Term
What are the different types of virus? |
|
Definition
-Boot Sector Virus
- Program viruses
- Script viruses
- Macro Viruses
- Multipartite viruses |
|
|
Term
|
Definition
|
|
Term
|
Definition
Worms are memory-resient viruses that replicate over network resources. |
|
|
Term
|
Definition
Captures and resends packets after acquiring them |
|
|
Term
What is a root kit (#1 and #2)? |
|
Definition
#1 Do common stuff to gain admin status.
#2 Malware that is able to hide in the operating system. |
|
|
Term
|
Definition
Listening to network traffic |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Pretending to be someone or something you're not |
|
|
Term
|
Definition
Pretending to be someone or something you're not |
|
|
Term
|
Definition
is a type of malware that tries to extort money from the victum. |
|
|
Term
Describe the virus mechanism: Stealth |
|
Definition
the virus intercepts commands from anti-virus software and passes the software a clean version of the file; alternatively the virus may "jump" from file-to-file ahead of the virus scanner. |
|
|
Term
Describe the virus mechanism: modification (two) |
|
Definition
anti-virus software mostly works by identifying known virus patterns (signatures). A polymorphic virus attempts to defeat this approach by changing itself (for example, by encrypting the virus code). A metamorphic virus completely re-compiles itself to infect new files. |
|
|
Term
|
Definition
Occurs after a session has occurred |
|
|
Term
Which protocol provides error detection and correction? |
|
Definition
TCP provides error detection & correction
UDP is fire and forget |
|
|
Term
Describe the virus mechanism: armor |
|
Definition
the virus code is protected, making it difficult for anti-virus software to analyze it. One technique is to obfuscate the virus code by putting unnecessary or misleading routines in it to make it hard to analyze and identify the virus' true structure and purpose. |
|
|
Term
Describe the virus mechanism: retrovirus |
|
Definition
the virus seeks to disable the anti-virus software |
|
|
Term
Describe the virus mechanism: slow and sparse |
|
Definition
infectors - these attempt to stay "under the radar" by replicating slowly. |
|
|
Term
What is a black box attack? |
|
Definition
the hacker knows nothing. External threat. |
|
|
Term
|
Definition
The attacker changes the source and/or destination address recorded in the IP packet |
|
|
Term
What is a white box test? |
|
Definition
the hacker is given as much info as an employee |
|
|
Term
|
Definition
Gathering information about the network |
|
|
Term
|
Definition
The hacker is given inbetween some infomation. |
|
|
Term
What is "no holds barred" testing? |
|
Definition
the consultant will try to use any means to penetrate as far into the network and information systems as possible. |
|
|
Term
|
Definition
What ports a client is using |
|
|
Term
What are well-known ports? |
|
Definition
You'll know what server to talk to
Ports 0 to 1024
1 |
|
|
Term
|
Definition
A way to keep track of vulnerabilities. |
|
|
Term
What are registered ports? |
|
Definition
|
|
Term
What are ephemeral ports? |
|
Definition
Ports 49,151 to 65,535
Ports that clients use
64 |
|
|
Term
|
Definition
File transfer protocol - data
TCP |
|
|
Term
What port # is File Transfer Protocol - Control? |
|
Definition
|
|
Term
|
Definition
Can act as a decoy. Low interaction and High interaction. |
|
|
Term
What port # is secure shell? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What protocol # does simple mail transfer protocol use? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What port # does HTTP use? |
|
Definition
|
|
Term
What port # does Kerberos authentical protocol use? |
|
Definition
|
|
Term
|
Definition
Post Office Protocol version 3
POP 3
TCP |
|
|
Term
What port # does Internet Mail Access Protocol? |
|
Definition
|
|
Term
|
Definition
Simple Network Management Protocol
TCP/UDP |
|
|
Term
What port # does SNMP trap use? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Probing a server to try to elicit any sort of response that will identify the server application and version number, or any other interesting detail about the way the server is configured. |
|
|
Term
What is a Denial of Service attack? |
|
Definition
Causes a service at a given host to fail or to become available to legitimate users |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
The attacker spoofs the victim's IP address and uses it to broadcast UDM packets aimed at obsolete diagnostics ports (echo, chargen, or discard) |
|
|
Term
|
Definition
The client spoof's the victim's IP address and pings the broadcast address of a third-party network (one of many hosts; referred to as the "amplifying network"). Each host directs its echo responses to the victim server. |
|
|
Term
What is plaintext or cleartext? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
This is the process (or algorithm) used to encrypt and decrypt a message |
|
|
Term
|
Definition
This is the art of breaking or "cracking" cryptographic systems |
|
|
Term
What is a substitution cipher? |
|
Definition
A substitution cipher involves replacing units (a letter or block of letters) in the plaintext with a different ciphertext |
|
|
Term
What is a transposition cipher? |
|
Definition
The units in a transposition cipher stay the same in plaintext and ciphertext but their order is changed, according to some mechanism |
|
|
Term
What are characteristic of keys? |
|
Definition
Cannot keep the cipher itself secret
Ensures ciphertext remains protected even when the operation of the cipher is known
Key size determines how difficult it is for the computer to guess (brute force) of the key |
|
|
Term
What is frequency analysis? |
|
Definition
Depends on the fact that some letters and groups of letters appear more frequently in natural language than others |
|
|
Term
|
Definition
The range of key values available to use with an algorithm |
|
|
Term
What is initialization vector (IV)? |
|
Definition
Random block used with keys to make the ciphertext more complex and stronger agreed upon by two parties to prevent another from discovering
|
|
|
Term
|
Definition
An encryption key that consists of exactly the same number of characters as the plaintext and must be generated by a truly random algorithm |
|
|
Term
What are characteristics of the on time pad? |
|
Definition
Message and key are the same size
Impossible to crack (if the key is sufficiently random) |
|
|
Term
|
Definition
One-way (ciphertext cannot be decrypted)
Same size
Changes randomly
Susceptible to collisions |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What term explains "the key and message are combined in a way designed to be resistant to "extension" attacks against other means of generating MACs |
|
Definition
|
|
Term
What is symmetric encryption? |
|
Definition
A single secret key is used both to encrypt and decrypt data |
|
|
Term
What are some symmetric encryption standards? |
|
Definition
Data Encryption Standard (DES / 3DES)
Advanced Encryption Standard (AES)
RSA Security (Rivest Ciphers) RC4 (stream cipher) (aka Arcfour)
International Data Encryption Algorithm (IDEA)
Blowfish / Twofish (Bruce Schneier) |
|
|
Term
What are some characteristics of DES? |
|
Definition
Uses a block size of 64
Key size of 56 bits
It goes through 16 rounds |
|
|
Term
|
Definition
The plaintext is divided into equal-size blocks (usually 64- 128-bit) |
|
|
Term
What is asymmetric encryption? |
|
Definition
A secret key is used to decrypt data. A mathematically related public key is used to encrypt data |
|
|
Term
What are some asymmetric encryption characteristics? |
|
Definition
One key encrypts or decrypts but not both
One key cannot be derived from the other
Private key must be kept secret
Public key is easy to distribute (anyone can have it)
Message size limits so not suitable for large amounts of data |
|
|
Term
What is Diffie-Hellman (D-H)? |
|
Definition
A key agreement protocol, published in 1975 by Whitfield Diffie and Martin Hellman |
|
|
Term
What is Perfect Forward Secrecy? |
|
Definition
Where an ephemeral key is generated for each session |
|
|
Term
What is an ephemeral key? |
|
Definition
A key generated for different sessions |
|
|
Term
What are characteristics of digital signatures? |
|
Definition
Proves it came from a certain user
Integrity
Authentication
Non-repudiation |
|
|
Term
What are characteristics of RSA Security? |
|
Definition
Very widely used (SSL/TLS)
Basis of many digital certificates and signature schemes
Maximum message size: Keysize = 11KB
Used for authentication, integrity, non-repudiation, and confidentiality |
|
|
Term
What is a digital envelope? |
|
Definition
Used to seal large amounts of data
encrypted using the receivers public key |
|
|
Term
What are characteristics of Elliptic Curve Cryptography (ECC)? |
|
Definition
Another means of generating "trapdoor" functions (easy to calculate, difficult to reverse)
Can use smaller keys to obtain same security |
|
|
Term
What is transport encryption? |
|
Definition
Encrypting data as it is sent of a network |
|
|
Term
What are some characteristics of mathematicaly attacks? |
|
Definition
Weaknesses in the cipher
Weaknesses in the keyspace
Weaknesses in the implementation (software) |
|
|
Term
What are characteristics of man-in-the-middle and replay attacks? |
|
Definition
Inadequate authentication
Inadequate session control/timestamping |
|
|
Term
What are methods for digitally signing an e-mail? |
|
Definition
Hash
Encrypt the hash with the sender's private key
Receiver receives the message
Hash
Decrypt's the hash sent by the sender with the sender's public key |
|
|
Term
What is Public Key Infrastructure (PKI)? |
|
Definition
Aims to prove that the owners of public keys are who they say they are.
Certificate authority
Trusted third party |
|
|
Term
What protocol(s) can kerberos use? |
|
Definition
|
|
Term
What is a birthday attack? |
|
Definition
Attach a fake signature to a message
find two plaintexts that produce the same ciphertext
Birthday paradox is group such that two in group share same (any birthday) (the paradox is the that the group doesn't have to be very big)
Happens by chance due to a hash collision |
|
|
Term
What is a weak key attack? |
|
Definition
If the password is weak, an attacker may be able to gues or crack the password to derive the key. Also, the plain fact is that even a strong password is not a particularly good seed for a large key |
|
|
Term
|
Definition
To make the key generated from a user password stronger by - basically - mucking about with it lots of times |
|
|
Term
|
Definition
It uses a small key The initialization vector is negotiated in the open |
|
|
Term
What is perfect forward secrecy? |
|
Definition
Perfect forward secrecy allows me to keep confidentiality even if my RSA key is compromised |
|
|
Term
What are ways to mitigate Man in the Middle Attacks? |
|
Definition
Time stamps
Sequence numbers
Encryption |
|
|
Term
What are the different models of PKI? |
|
Definition
Stand alone
Hierarchy
Mesh |
|
|
Term
What type of certificate model is PGP? |
|
Definition
|
|
Term
What is a certificate practice statement? |
|
Definition
How the certificate authority works |
|
|
Term
What is the certificate policy statement? |
|
Definition
Associated with one certificate and the role that should be used
What the owner of the certificate is allowed to do |
|
|
Term
What are the two ways you can check the revocation of certificate? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
If you only want UDP authentication services what authentication and authorization protocols should be used? |
|
Definition
|
|
Term
|
Definition
You can authenticate by using a third party account i.e., Facebook (idP) to play a game (SP) |
|
|
Term
|
Definition
Is a protocol used to query and update an X.500 directory or any type of directory that can present itself as an X.500 |
|
|
Term
What port # does LDAP operate on? |
|
Definition
|
|
Term
What is smaller than a domain? |
|
Definition
|
|
Term
What is larger than a domain? |
|
Definition
|
|
Term
There are two rules to understand with group policies? |
|
Definition
1.) the domain rules preempt/over rule the local rules
2.) If there is conflict, the more specific rule wins |
|
|
Term
|
Definition
control what a user can/can't do |
|
|
Term
The GPO is broken up into two parts. What are the two parts? |
|
Definition
|
|
Term
|
Definition
Connects two networks at layer two |
|
|
Term
|
Definition
Virtual Storage Area Network
Breaks up a SAN, similar to VLAN to LAN
|
|
|
Term
|
Definition
|
|
Term
What are characteristics of a basic firewall? |
|
Definition
Restricts traffic allowed on the network
Used to implement security zones
Configured with access control rules |
|
|
Term
|
Definition
Hardware or software
Stateful or stateless
It works at layers 3/4 (network firewall), 7 (application firewall or content filter firewall), |
|
|
Term
|
Definition
A list of rules, each of which defines a specific type of data packet and the appropriate action to take when a packeet matches the rule |
|
|
Term
What is a non-transparent server? |
|
Definition
A non-transparent server means that the client must be configured with the server address to use it |
|
|
Term
What is a transparent proxy server? |
|
Definition
Intercepts client traffic without the client having to be reconfigured |
|
|
Term
What is pre-fetching or caching? |
|
Definition
Some proxy servers also pre-fetch pages that are referenced in pages that have been requested. When the client computer then requests that page, the proxy server already has a local copy. |
|
|
Term
What are web security gateways? |
|
Definition
Primary functions are to prevent viruses or Trojans infecting computers from the internet, block spam, and restrict web use to authorized sites |
|
|
Term
What is a reverse proxy server? |
|
Definition
Provides for protocol-specific inbound traffic |
|
|
Term
|
Definition
|
|
Term
What are characteristics of host-based firewalls? |
|
Definition
Protects single host (personal firewall)
Windows firewall
Can perform packet filtering and control which processes can use the network interface
Vulnerable to tampering
|
|
|
Term
What are characteristics of web application firewalls? |
|
Definition
Able to inspect code in HTTP packets
Matches suspicious code to vulnerability database
Can be implemented as software on host or as appliance
|
|
|
Term
What are characteristics of web security gateways? |
|
Definition
Many applications use HTTP
Keyword / URI based filtering
Time-of-day / total usage restrictions
Combined firewall / malware scanner /intrusion detection in all-in-one appliance or proxy
Unified Threat Management
|
|
|
Term
What are the mail access protocols? |
|
Definition
|
|
Term
What protocol is used to send mail? |
|
Definition
|
|
Term
What are the types of logs? |
|
Definition
Event
Audit
Security
Access |
|
|
Term
|
Definition
|
|
Term
Encapsulation Security Payload (ESP) does what? |
|
Definition
Encryption
Integrity
Authentication (Non repudiation)
Compression |
|
|
Term
|
Definition
|
|
Term
What two ports do I use to remotely log in? |
|
Definition
|
|
Term
What is DNS Poisoning or DNS Cache Pollution? |
|
Definition
A redirection attack, but instead of trying to subvert the name service used by the client, it aims to corrupt the records held by the DNS server itself |
|
|
Term
|
Definition
|
|
Term
What are some DNS vulnerabilities? |
|
Definition
Footprinting
DoS
Poisoning |
|
|
Term
|
Definition
Backing out of installing a patch |
|
|
Term
What are the different network zones? |
|
Definition
Extranet
Intranet
Internet
DMZ |
|
|
Term
How can two switches talk to each other? |
|
Definition
|
|
Term
|
Definition
MAC Filtering
A white list of acceptable MACs |
|
|
Term
|
Definition
Connecting two networks over layer 2 |
|
|
Term
What is the purpose of NAT? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
An application firewall or content filter reads |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What does WPA Enterprise require? |
|
Definition
|
|
Term
What is the difference between WPA and WPA2 |
|
Definition
Different encryption
WPA2 uses CCMP and AES
WPA uses RC-4, TKIP, and AAA server (enterprise only) |
|
|
Term
|
Definition
|
|
Term
What are you looking for in a site survey for wireless? |
|
Definition
coverage and unauthorized access points |
|
|
Term
What are some protocols to use to setup VPN? |
|
Definition
PPP
SSL
TLS
IPSec
SSH
L2TP |
|
|
Term
What are the two way to securely access a remote computer? |
|
Definition
SSH - port 22
RDP - port 3389 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What are the two main versions of IPSec? |
|
Definition
ESP - Protocol 50
AH - Protocol 51 |
|
|
Term
What are the four things ESP does? |
|
Definition
Encrypts
Authenticates
Integrity
Compression |
|
|
Term
What two things does AH do? |
|
Definition
|
|
Term
What is Internet Key Exchange? |
|
Definition
It creates a security association |
|
|
Term
Internet Security Association and Key Management Protocol (ISAKMP) is a type of what? |
|
Definition
Type of IKE or Internet Key Exchange |
|
|
Term
Two types of DNS attacks? |
|
Definition
DNS Cache Poisoning
Attacking the zone transfers |
|
|
Term
SANs can make a network more secure by? |
|
Definition
|
|
Term
You use zoning to accomplish? |
|
Definition
|
|
Term
SANs can help with security by |
|
Definition
|
|
Term
|
Definition
|
|
Term
An achievement in providing worldwide Internet security was the signing of certificates associated
with which of the following protocols?
A. TCP/IP
B. SSL
C. SCP
D. SSH
|
|
Definition
|
|
Term
A Chief Information Security Officer (CISO) wants to implement two-factor authentication within
the company. Which of the following would fulfill the CISO’s requirements?
A. Username and password
B. Retina scan and fingerprint scan
C. USB token and PIN
D. Proximity badge and token
|
|
Definition
|
|
Term
Which of the following can a security administrator implement on mobile devices that will help
prevent unwanted people from viewing the data if the device is left unattended?
A. Screen lock
B. Voice encryption
C. GPS tracking
D. Device encryption
|
|
Definition
|
|
Term
Which of the following would a security administrator implement in order to identify a problem
between two systems that are not communicating properly?
A. Protocol analyzer
B. Baseline report
C. Risk assessment
D. Vulnerability scan
|
|
Definition
|
|
Term
Which of the following can result in significant administrative overhead from incorrect reporting?
A. Job rotation
B. Acceptable usage policies
C. False positives
D. Mandatory vacations
|
|
Definition
|
|
Term
A security administrator wants to perform routine tests on the network during working hours when
certain applications are being accessed by the most people. Which of the following would allow
the security administrator to test the lack of security controls for those applications with the least
impact to the system?
A. Penetration test
B. Vulnerability scan
C. Load testing
D. Port scanner
|
|
Definition
|
|
Term
Which of the following risk concepts requires an organization to determine the number of failures
per year?
A. SLE
B. ALE
C. MTBF
D. Quantitative analysis
|
|
Definition
|
|
Term
Three of the primary security control types that can be implemented are.
A. supervisory, subordinate, and peer.
B. personal, procedural, and legal.
C. operational, technical, and management.
D. mandatory, discretionary, and permanent.
|
|
Definition
C. operational, technical, and management.
|
|
|
Term
The helpdesk reports increased calls from clients reporting spikes in malware infections on their
systems. Which of the following phases of incident response is MOST appropriate as a FIRST
response?
A. Recovery
B. Follow-up
C. Validation
D. Identification
E. Eradication
F. Containment
|
|
Definition
|
|
Term
Which of the following protocols operates at the HIGHEST level of the OSI model?
A. ICMP
B. IPSec
C. SCP
D. TCP
|
|
Definition
|
|
Term
Joe, the system administrator, has been asked to calculate the Annual Loss Expectancy (ALE) for
a $5,000 server, which often crashes. In the past year, the server has crashed 10 times, requiring
a system reboot to recover with only 10% loss of data or function. Which of the following is the
ALE of this server?
A. $500
B. $5,000
C. $25,000
D. $50,000
|
|
Definition
|
|
Term
Which of the following should an administrator implement to research current attack
methodologies?
A. Design reviews
B. Honeypot
C. Vulnerability scanner
D. Code reviews
|
|
Definition
|
|
Term
Which of the following can be implemented in hardware or software to protect a web server from
cross-site scripting attacks?
A. Intrusion Detection System
B. Flood Guard Protection
C. Web Application Firewall
D. URL Content Filter
|
|
Definition
C. Web Application Firewall
|
|
|
Term
Which of the following means of wireless authentication is easily vulnerable to spoofing?
A. MAC Filtering
B. WPA - LEAP
C. WPA - PEAP
D. Enabled SSID
|
|
Definition
|
|
Term
The BEST methods for a web developer to prevent the website application code from being
vulnerable to cross-site request forgery (XSRF) are to: (Select TWO).
A. permit redirection to Internet-facing web URLs.
B. ensure all HTML tags are enclosed in angle brackets, e.g., ”<” and “>”.
C. validate and filter input on the server side and client side.
D. use a web proxy to pass website requests between the user and the application.
E. restrict and sanitize use of special characters in input and URLs.
|
|
Definition
C. validate and filter input on the server side and client side.
E. restrict and sanitize use of special characters in input and URLs.
|
|
|
Term
Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?
A. WPA2-PSK
B. WEP-PSK
C. CCMP
D. LEAP
|
|
Definition
|
|
Term
A network administrator is configuring access control for the sales department which has high
employee turnover. Which of the following is BEST suited when assigning user rights to individuals
in the sales department?
A. Time of day restrictions
B. Group based privileges
C. User assigned privileges
D. Domain admin restrictions
|
|
Definition
B. Group based privileges
|
|
|
Term
Which of the following is being tested when a company’s payroll server is powered off for eight
hours?
A. Succession plan
B. Business impact document
C. Continuity of operations plan
D. Risk assessment plan
|
|
Definition
C. Continuity of operations plan
|
|
|
Term
A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been
created for a frequently used application. She notifies the software vendor and asks them for
remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability.
Which of the following BEST describes this exploit?
A. Malicious insider threat
B. Zero-day
C. Client-side attack
D. Malicious add-on
|
|
Definition
|
|
Term
A security administrator has concerns about new types of media which allow for the mass
distribution of personal comments to a select group of people. To mitigate the risks involved with
this media, employees should receive training on which of the following?
A. Peer to Peer
B. Mobile devices
C. Social networking
D. Personally owned devices
|
|
Definition
|
|
Term
A network administrator is responsible for securing applications against external attacks. Every
month, the underlying operating system is updated. There is no process in place for other software
updates.
Which of the following processes could MOST effectively mitigate these risks?
A. Application hardening
B. Application change management
C. Application patch management
D. Application firewall review
|
|
Definition
C. Application patch management
|
|
|
Term
A software developer is responsible for writing the code on an accounting application. Another
software developer is responsible for developing code on a system in human resources. Once a
year they have to switch roles for several weeks.
Which of the following practices is being implemented?
A. Mandatory vacations
B. Job rotation
C. Least privilege
D. Separation of duties
|
|
Definition
|
|
Term
A network engineer is designing a secure tunneled VPN. Which of the following protocols would
be the MOST secure?
A. IPsec
B. SFTP
C. BGP
D. PPTP
|
|
Definition
|
|
Term
Which of the following implementation steps would be appropriate for a public wireless hot-spot?
A. Reduce power level
B. Disable SSID broadcast
C. Open system authentication
D. MAC filter
|
|
Definition
C. Open system authentication
|
|
|
Term
Which of the following is a step in deploying a WPA2-Enterprise wireless network?
A. Install a token on the authentication server
B. Install a DHCP server on the authentication server
C. Install an encryption key on the authentication server
D. Install a digital certificate on the authentication server
|
|
Definition
D. Install a digital certificate on the authentication server
|
|
|
Term
Which of the following controls would allow a company to reduce the exposure of sensitive
systems from unmanaged devices on internal networks?
A. 802.1x
B. Data encryption
C. Password strength
D. BGP
|
|
Definition
|
|
Term
Which of the following preventative controls would be appropriate for responding to a directive to
reduce the attack surface of a specific host?
A. Installing anti-malware
B. Implementing an IDS
C. Taking a baseline configuration
D. Disabling unnecessary services
|
|
Definition
D. Disabling unnecessary services
|
|
|
Term
A security manager must remain aware of the security posture of each system. Which of the
following supports this requirement?
A. Training staff on security policies
B. Establishing baseline reporting
C. Installing anti-malware software
D. Disabling unnecessary accounts/services
|
|
Definition
B. Establishing baseline reporting
|
|
|
Term
Deploying a wildcard certificate is one strategy to:
A. secure the certificate’s private key.
B. increase the certificate’s encryption key length.
C. extend the renewal date of the certificate.
D. reduce the certificate management burden.
|
|
Definition
D. reduce the certificate management burden.
|
|
|
Term
The security administrator needs to manage traffic on a layer 3 device to support FTP from a new
remote site. Which of the following would need to be implemented?
A. Implicit deny
B. VLAN management
C. Port security
D. Access control lists
|
|
Definition
|
|
Term
Which of the following ports is used for SSH, by default?
A. 23
B. 32
C. 12
D. 22
|
|
Definition
|
|
Term
A network administrator has been tasked with securing the WLAN. Which of the following
cryptographic products would be used to provide the MOST secure environment for the WLAN?
A. WPA2 CCMP
B. WPA
C. WPA with MAC filtering
D. WPA2 TKIP
|
|
Definition
|
|
Term
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs
show repeated connection attempts from the following IPs:
10.10.3.16
10.10.3.23
212.178.24.26
217.24.94.83
These attempts are overloading the server to the point that it cannot respond to traffic. Which of
the following attacks is occurring?
A. XSS
B. DDoS
C. DoS
D. Xmas
|
|
Definition
|
|
Term
Which of the following ciphers would be BEST used to encrypt streaming video?
A. RSA
B. RC4
C. SHA1
D. 3DES
|
|
Definition
|
|
Term
A user attempting to log on to a workstation for the first time is prompted for the following
information before being granted access: username, password, and a four-digit security pin that
was mailed to him during account registration. This is an example of which of the following?
A. Dual-factor authentication
B. Multifactor authentication
C. Single factor authentication
D. Biometric authentication
|
|
Definition
C. Single factor authentication
|
|
|
Term
After analyzing and correlating activity from multiple sensors, the security administrator has
determined that a group of very well organized individuals from an enemy country is responsible
for various attempts to breach the company network, through the use of very sophisticated and
targeted attacks. Which of the following is this an example of?
A. Privilege escalation
B. Advanced persistent threat
C. Malicious insider threat
D. Spear phishing
|
|
Definition
B. Advanced persistent threat
|
|
|
Term
Which of the following is true about input validation in a client-server architecture, when data
integrity is critical to the organization?
A. It should be enforced on the client side only.
B. It must be protected by SSL encryption.
C. It must rely on the user’s knowledge of the application.
D. It should be performed on the server side.
|
|
Definition
D. It should be performed on the server side.
|
|
|
Term
A merchant acquirer has the need to store credit card numbers in a transactional database in a
high performance environment. Which of the following BEST protects the credit card data?
A. Database field encryption
B. File-level encryption
C. Data loss prevention system
D. Full disk encryption
|
|
Definition
A. Database field encryption
|
|
|
Term
A bank has a fleet of aging payment terminals used by merchants for transactional processing.
The terminals currently support single DES but require an upgrade in order to be compliant with
security standards. Which of the following is likely to be the simplest upgrade to the aging
terminals which will improve in-transit protection of transactional data?
A. AES
B. 3DES
C. RC4
D. WPA2
|
|
Definition
|
|
Term
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI
model?
A. WAF
B. NIDS
C. Routers
D. Switches
|
|
Definition
|
|
Term
Which of the following is BEST used to capture and analyze network traffic between hosts on the
same network segment?
A. Protocol analyzer
B. Router
C. Firewall
D. HIPS
|
|
Definition
|
|
Term
After a number of highly publicized and embarrassing customer data leaks as a result of social
engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will
reduce the risk of another data leak. Which of the following would be MOST effective in reducing
data leaks in this situation?
A. Information Security Awareness
B. Social Media and BYOD
C. Data Handling and Disposal
D. Acceptable Use of IT Systems
|
|
Definition
A. Information Security Awareness
|
|
|
Term
Which of the following functions provides an output which cannot be reversed and converts data
into a string of characters?
A. Hashing
B. Stream ciphers
C. Steganography
D. Block ciphers
|
|
Definition
|
|
Term
Which of the following encrypts data a single bit at a time?
A. Stream cipher
B. Steganography
C. 3DES
D. Hashing
|
|
Definition
|
|
Term
Which of the following is used to verify data integrity?
A. SHA
B. 3DES
C. AES
D. RSA
|
|
Definition
|
|
Term
By default, which of the following uses TCP port 22? (Select THREE).
A. FTPS
B. STELNET
C. TLS
D. SCP
E. SSL
F. HTTPS
G. SSH
H. SFTP
|
|
Definition
|
|
Term
Access mechanisms to data on encrypted USB hard drives must be implemented correctly
A. user accounts may be inadvertently locked out.
B. data on the USB drive could be corrupted.
C. data on the hard drive will be vulnerable to log analysis.
D. the security controls on the USB drive can be bypassed.
|
|
Definition
D. the security controls on the USB drive can be bypassed.
|
|
|