You are on page 1of 8

Bluesnarfing attack: Unauthorized access of data through a bluetooth device You manage a restaurants public wi-fi network.

Complaining about people standing in line looking at their screens while they are entering their online banking info: Shoulder surfing File system supports EFS: NTFS Access control model that bases access to resources on an employees job function: RBAC Purpose of mandatory vacations: detect instances of fraud or abuse Component of the PKI infrastructure encrypts a message so that only the intended recipient can read it: public key Type of attack can be prevented by validating cookies and query strings: cross-site scripting Protect against sql injection attacks: validate input Describes a TPM: a hardware chip used to store cryptographic keys Just received an e-mail from your manager asking you to update your project work by using the link provided in the e-mail. You click on the link and enter your login information, but then nothing seems to happen: spear fishing A user reports that when he swiped his card to enter the building, another user entered directly after him He did not recognize the user as being an employee. Tailgating Management has informed you that you must increase security by implementing multifactor authentication on all servers. Example of multifactor authentication: smart card and pin Which steps involves collecting billing information: accounting

Which security measure helps prevent the theft of a notebook computer: cable lock Vulnerability assessment tool is known as a network sniffer: protocol analyzer Authentication protocols uses port 49 by default: TACACS Network protocol that allows users to transfer data between local or remote computers, while protecting the accuracy and privacy of data during the process. Port 22. SCP What encryption component ensures that a sender cannot dispute or deny sending a message: Non-repudiation Not recommended to sending credit card information in an instant messager: traffic is easily sniffed Why might an organization employ security guards as opposed to video surveillance, such as a closed-circuit television: to provide a discriminating factor To better demonstrate the companys use of physical security Authentication protocol uses tickets as part of the authentication process: Kerberos Authentication protocol is commonly used in wlan and lan: EAP Which type of risk strategy is insurance considered: transference Which communication protocol is used to secure communication over the internet: TLS What type of attack can be avoided by using proper application input validation rules: buffer overflow Which port does sftp operate on: port 22

Protect a database server from sql injection: application firewall Encryption protocol uses pre-shared keys to authenticate users WPA Run multiple operating systems at the same time on one machine: virtualization Element of the public key infrastructure is use to identify and authenticate a user requesting a certificate from the certificate authority: registration authority What does BitLocker provide: whole disk encryption Yvette, permissions for a shared folder are read share permission, change share, read and execute ntfs permission; what will she be able to do within the folder: view the contents of files or folders, or run programs located in the folders Network admin called after normal business hours, ongoing computer attack against the database server: ensure that any evidence collected is cataloged, sealed, and logged the server should remain connected to the network Hacker discovered your access points ssid and the wpa encryption keys; what can you do to ensure the hacker cannot communicate on your network: configure MAC address filtering Example of technical control: access control list Which process can be used to evaluate the projected changes to the firewall: auditing A hacker has managed to take control of multiple systems and now plans to use those systems to perform a dos attack; what are these computers known as: botnet What security design goal ensures that only authorized users can access data: confidentiality Power supply rated at 20,000 hours, what is the rating based on: mean time between failure

Clients are required to use different credentials to access resources on various windows servers, which technologies could be used to prevent this problem: implement single sign-on Trust models lacks a central authority: web of trust Communication occurs between clients and web servers, the parameter data transmitted between them can be manipulated by an attacker; which parameter manipulation attack involves modification of the Referer: http header manipulation All information stored on removable storage devices must remain confidential in case of theft: enable the appropriate group policy setting what can be done to ensure that your cell phone data remains confidential: perform a remote sanitation Used to ensure that a message was sent from a particular person and ensures that the message was not altered: digital signature Social engineering technique involves sending a non-targeted e-mail that appears to be from a trusted sender: phishing For an organization that offers time critical services, what should be in place if their infrastructure ever failed: hot site Implement a policy that prohibits the investors from taking mobile devices with them while on the tour: mobile devices could be used to access internal networks to limit the chances of photos being taken Type of attack is it when a malicious host controls a tcp session between two users: MITM Wpa2 access point, not all devices support wpa2: ensure the highest level of security while minimizing cost: configure network to use wpa Which application should be used to protect computers from malicious programs: anti-virus

Best describes a BOTNET: a group of computers taken over by a hacker without the computer owners knowing Credit company never dealt with, saying that you need to update your personal information by clicking on the link provided: phishing You have just received an automated message on your phone saying you need to update your credit card info, immediately by calling a certain number: vishing Disaster recovery plan: a working backup plan Security threat can replace the OS kernel: rootkit Prominent risks associated with cloud computing: ddos attacks DNS problems injection of malicious scripts into a website: XSS Program allows an attacker to bypass security and gives them access to a computer: backdoor Allows an attacker to hide their identity by changing the source address in the header of a network packet: spoofing Installing a new firewall; intermediary between the connected networks and to provide caching: proxy Ensure the confidentiality of data stored on all mobile devices in case of theft: device encryption Hashing function includes a 128-bit hash value and is often used to verify the integrity of data: MD5 User tries to access a file, but does not meet any rules in the access list: user is denied access by an implicit deny

default security principle of a shared resources acl: implicit deny use of biometrics to access their computers; example of something you are: voice verification large highly secure corporate environment, who should audit the network administrator: independent party which control type includes environmental security devices, such as fire alarms and smoke detectors: operational inform you of an attack that has already taken place: logs five users require concurrent access to a medical application that requires expensive licensing; esure the employees can access the application, reduce cost, and promote an ethical office: obtain a software as a service agreement with a cloud computing vendor process of hiding data within another piece of data: steganography client computer has become infected with a virus that targets the kernel; which log file can be viewed to determine errors caused by this virus: system logs which of the following options controls access to a network using policies: NAC whenever the machinery in the warehouse is operating, you are unable to communicate on the network: EMI standard encryption protocol used with wpa2 ccmp Houston hosts the web presence, due to a tornado, the Houston office is inoperable; back up web servers in Chicago come online, what type of cluster: active/passive

Attacker has configured his laptop to be a wi-fi hotspot to gain access to a users personal information: evil twin Applying a highly secure security template to one of the new servers: configuration baseline Authentication protocol separates the authentication, authorization, and auditing processes: XTACACS System admin for a company, allow users to use and access information on an ftp site; to ensure it is secure, you will be enabling FTPS: port 990 port 21 Wep attack: IV collisions attack Cipher used to encrypt a data stream One-time pad Large group of employees often travel and they need access to the company network while traveling; configuring a VPN: IPSec Which of the following options makes use of a token: smart card Create a security zone for two web servers that will be accessed by external users; shouldnt be able to access internal network resources; type of security zone should you create: DMZ Access control model that uses permissions to grant access to resources: DAC Mandatory vacation as part of their security policy: to audit the employees behavior Stronger encryption from shorter keys: ECC Secure remote access connection to a computer, SSH: port 22

Quantitative and qualitative risk analysis: risk management can be completely qualitative risk management typically uses both types of analysis portion of the firewall log: port scan social engineering exploit the company using this information: whaling how often should you back up this database: daily Important to digitally sign important messages: it verifies the integrity of the message it guarantees non-repudiation prevent unsolicited spam: anti-spam Purpose of M of N control: distribute the recovery process of keys amongst multiple recovery agents Ensures that evidence has been handled properly: chain of custody

You might also like