Chapter 2 Practice Questions
Selah wants to analyze real-world attack patterns against systems similar to what she already has deployed in her organization. She would like to see local commands on a compromised system and have access to any tools or other materials the attacker would normally deploy. What type of technology could she use to do this? A honeypot An IPS An IDS A WAF
A Honeypot
Angela wants to ensure that IoT devices in her organization have a secure configuration when they are deployed and that they are ready for further configuration for their specific purposes. What term is used to describe these standard configurations used as part of her configuration management program? - A baseline configuration - An essential settings list - A preinstall checklist - A setup guide
A baseline configuration
Charles sets up a network with intentional vulnerabilities and then instruments it so that he can watch attackers and capture details of their attacks and techniques. What has Charles set up? A black hole A honeyhole A spynet A honeynet
A honeynet
Joanne is responsible for security at a power plant. The facility is very sensitive and security is extremely important. She wants to incorporate two-factor authentication with physical security. What would be the best way to accomplish this? - Smartcards - A mantrap with a smartcard at one door and a PIN keypad at the other door - A mantrap with video surveillance - A fence with a smartcard gate access
A mantrap with a smartcard at one door and a PIN keypad at the other door
Fred wants to make it harder for an attacker to use rainbow tables to attack the hashed password values he stores. What should he add to every password before it is hashed to make it impossible for the attacker to simply use a list of common hashed passwords to reveal the passwords Fred has stored if they gain access to them? A salt A cipher A spice A trapdoor
A salt
Scott wants to back up the contents of a network-attached storage (NAS) device used in a critical department in his company. He is concerned about how long it would take to restore the device if a significant failure happened, and he is less concerned about the ability to recover in the event of a natural disaster. Given these requirements, what type of backup should he use for the NAS? - A tape-based backup with daily full backups - A second NAS device with a full copy of the primary NAS - A tape-based backup with nightly incremental backups - A cloud-based backup service that uses high durability near-line storage
A second NAS device with a full copy of the primary NAS
Suzan is responsible for application development in her company. She wants to have all web applications tested prior to being deployed live. She wants to use a test system that is identical to the live server. What is this called? A production server A development server A test server a predeployment server
A test server
Which of the following items is not included in a blockchain's public ledger? - A record of all genuine transactions between network participants - A record of cryptocurrency balances (or other data) stored in the blockchain - The identity of the blockchain participants - A token that identifies the authority under which the transaction was made
A token that identifies the authority under which the transaction was made
Geoff wants to establish a contract with a company to have datacenter space that is equipped and ready to go so that he can bring his data to the location in the event of a disaster. What type of disaster recovery site is he looking for? A hot site A cold site A warm site An RTO site
A warm site
Chris wants to limit who can use an API that his company provides and be able to log usage of the API uniquely to each organization that they provide access to. What solution is most often used to do this? - Firewalls with rules for each company's public IP address - User credentials for each company - API keys - API passwords
API Keys
Enrique is concerned about backup data being infected by malware. The company backs up key servers to digital storage on a backup server. Which of the following would be most effective in preventing the backup data being infected by malware? Place the backup server on a separate VLAN Air-gap the backup server Place the backup server on a different network segment Use a honeynet
Air-gap the backup server
Amanda wants to use a digital signature on an email she is sending to Maria. Which key should she use to sign the email? Maria's public key Amanda's public key Maria's private key Amanda's private key
Amanda's Private Key
Trevor wants to use an inexpensive device to build a custom embedded system that can monitor a process. Which of the following options is best suited for this if he wants to minimize expense and maximize simplicity while avoiding the potential for system or device compromise? A Raspberry Pi A custom FPGA A repurposed desktop PC An Arduino
An Arduino
Ian is concerned about VoIP phones used in his organization due to the use of SMS as part of their multifactor authentication rollout. What type of attack should he be concerned about? - A vishing attack - A voicemail hijack - An SMS token redirect - A weak multifactor code injection
An SMS token redirect
AES & DES are an example of what type of cipher? - Stream ciphers that encrypt groups of plain-text symbols all together - Block ciphers that encrypt groups of plain-text symbols all together - Stream ciphers that encrypt one plain-text symbol at a time - Block ciphers that encrypt one plain-text symbol at a time
Block ciphers that encrypt groups of plain-text symbols all together
John is responsible for physical security at his company. He is particularly concerned about an attacker driving a vehicle into the building. Which of the following would provide the pest protection against this threat? A gate Bollards A security guard on duty Security Cameras
Bollards
Mark is responsible for cybersecurity at a small college. There are many computer labs that are open for students to use. These labs are monitored only by a student worker, who may or may not be very attentive. Mark is concerned about the theft of computers. Which of the following would be the best way for him to mitigate this threat? Cable locks FDE on the lab computers Strong passwords on the lab computers Having a lab sign-in sheet
Cable Locks
Alaina is reviewing practices for her reception desk and wants to ensure that the reception desk's visitor log is accurate. What process should she add to the guard's check-in procedure? - Check the visitor's ID against their log book entry - Perform a biometric scan to validate visitor identities - Requires two-person integrity control - Replace the guard with a security robot
Check the visitor's ID against their log book entry
Naomi wants to hire a third-party secure data destruction company. What process is most frequently used to ensure that third parties properly perform data destruction? - Manual on-sire inspection by federal inspectors - Contractual requirements and a csertification process - Requiring pictures of every destroyed document or device - All of the above
Contractual requirements and a csertification process
Laura knows that predictability is a problem in pseudo-random number generators (PRNGs) used for encryption operations. What term describes the measure of uncertainty used for a PRNG? Ellipses Quantum Flux Entropy Primeness
Entropy
Jaros is concerned about EMI affecting a key escrow server. Which method would be most effective in mitigating this risk? VLAN SDN Trusted Platform Module Faraday Cage
Faraday Cage
Gerard is responsible for secure communications with his company's e-commerce server. All communications with the server use TLS. What is the most secure option for Gerard to store the private key on the e-commerce server? HSM FDE SED SDN
HSM
Why is heating, ventilation, and air-conditioning (HVAC) part of organizational security planning? - Attackers often use HVAC systems as part of social engineering exercises - HVAC systems are important for availability - HVAC systems are a primary line of network defense - None of the above
HVAC systems are important for availability
Chris set up SAN replication for his organization. What has he done? - He has enabled RAID 1 to ensure that the SAN cannot lose data if a drive fails because the drives are replicated - He has set up backups to a tape library for the SAN to ensure data resilience - He has replicated the data on one SAN to another at the block or hardware level
He has replicated the data on one SAN to another to the block or hardware level
Ian wants to send an encrypted message to Michelle using public key cryptography. What key does he need to encrypt the message? His public key His private key Her public key Her private key
Her public key
In an attempt to observe hacker techniques, a security administrator configures a nonproduction network to be used as a target so he can covertly monitor network attacks. What is this type of network called? Active detection False subnet IDS Honeynet
Honeynet
Web developers in your company currently have direct access to the production server and can deploy code directly to it. This can lead to unsecure code, or simply code flaws being deployed to the live system. What would be the best change you could make to mitigate this risk? - Implement sandboxing - Implement virtualized servers - Implement a staging server - Implement deployment policies
Implement a staging server
Maria is a security engineer with a manufacturing company. During a recent investigation, she discovered that an engineer's compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. What should Maria do to mitigate this threat? - Install host-based antivirus software on the engineer's system. - Implement account usage auditing on the SCADA system. - Implement an NIPS on the SCADA system. - Use FDE on the engineer's system
Implement account usage auditing on the SCADA system
Chris sets a resource policy in his cloud environment. What type of control does this allow him to exert? - It allows him to determine how much disk space can be used - It allows him to determine how much bandwidth can be used - It allows him to specify who has access to resources and what actions they can perform on it - It allows him to specify what actions a resource can take on specific users
It allows him to specify who has access to resources and what actions they can perform on it
What key advantage does an elliptical cryptosystem have over an RSA-based cryptosystem? - It can use a smaller key length for the same resistance to being broken - It requires only a single key to encrypt and decrypt - It can run on older processors - It can be used for digital signatures as well as encryption
It can use a smaller key length for the same resistance to being broken
What purpose does a transit gateway serve in cloud services? - It connects systems inside of a cloud datacenter - It connects virtual private clouds and on-premises networks - It provides an API Gateway between trust zones - It allows multicloud infrastructure designs
It connects virtual private clouds and on-premises networks
What advantage does symmetric encryption have over asymmetric encryption? - It is more secure - It is faster - It can use longer keys - It simplifies key distributions
It is faster
Which of the following is not a critical characteristic of a hash function? - It converts variable-length input into a fixed-length output - Multiple inputs should not hash to the same output - It must be reversible - It should be fast to compute
It must be reversible
What function does counter mode perform in a cryptographic system? - It reverses the encryption process - It turns a block cipher into a stream cipher - It turns a stream cipher into a block cipher - It allows public keys to unlock private keys
It turns a block cipher into a stream cipher
Gurvinder knows that the OpenSSL passwd file protects passwords by using 1,000 rounds of MD5 hashing to help protect password information. What is this technique called? Spinning the hash Key rotation Key stretching Hash iteration
Key stretching
What statement is expected to be true for a post-quantum cryptography world? - Encryption speed will be measured in qubits - Nonquantum cryptosystems will no longer be secure - Quantum encryption will no longer be relevant - Ket lengths longer than 4,096 bits using RSA will be required
Nonquantum cryptosystems will no longer be secure
You are responsible for network security at an e-commerce company. You want to ensure that you are using best practices for the e-commerce website your company hosts. What standard would be the best practice for you to review? OWASP NERC Trusted Foundry ISA/IEC
OWASP
What cryptographic capability ensures that even if the server's private key is compromised, the session keys will not be compromised? Perfect forward secrecy Symmetric encryption Quantum key rotation Diffie-Hellman key modulation
Perfect forward secrecy
What major technical component of modern cryptographic systems is likely to be susceptible to quantum attacks? Key generation Elliptical plot algorithms Cubic root curve cryptography Prime factorization algorithms
Prime factorization algorithms
Lisa is concerned about fault tolerance for her database server. She wants to ensure that if any single drive fails, it can be recovered. What RAID level would support this goal while using distributed parity bits? RAID 0 RAID 1 RAID 3 RAID 5
RAID 5
Olivia needs to ensure an IoT device does not have its operating system modified by third parties after it is sold. What solutions should she implement to ensure that this does not occur? Set a default password Require signed & encrypted firmware Check the MD5sum for new firmware versions Patch regularly
Require signed & encrypted firmware
What type of system is used to control and monitor power plant power generation systems? IPG SEED SCADA ICD
SCADA (Supervisory Control & Data Acquisition Systems)
Derek has been assigned to assess the security of smart sensors. Which of the following is not a common concern for an embedded system like a smart sensor? Eavesdropping Denial of service Remote disconnection SQL Injection
SQL Injection
Which cloud service model gives the consumer the ability to use applications provided by the cloud provider over the internet? SaaS PaaS IaaS Hybrid
SaaS (Software as a Service)
Olivia wants to ensure that the code executed as part of her application is secure from tampering and that the application itself cannot be tampered with. Which of the following solutions should she use and why? - Server-side execution and validation, because it prevents data and application tampering - Client-side validation and server-side execution to ensure client data access - Server-side validation and client-side execution to prevent data tampering - Client-side execution and validation, because it prevents data and application tampering
Server-side execution and validation, because it prevents data and application tampering
Mike is a security analyst and has just removed malware from a virtual server. What feature of virtualization would he use to return the virtual server to a last known good state? Sandboxing Hypervisor Snapshot Elasticity
Snapshot
What type of attribute is a Windows picture password? Somewhere you are Something you exhibit Something you can do Someone you know
Something you can do
Alexandra is preparing to run automated security tests against the code that developers in her organization have completed. Which environment is she most likely to run them in if the next step is to deploy the code to production? Development Test Staging Production
Staging
Yasmine is responding to a full datacenter outage, and after referencing the documentation for the systems in the datacenter she brings the network back up, then focuses on the storage area network (SAN), followed by the database servers. Why shoes her organization list systems for her to bring back online in a particular series? - The power supply for the building cannot handle all the devices starting at once - The organization wants to ensure that a second outage does not occur due to failed systems - The organization wants to ensure that systems are secure and have the resources they need by following a restoration order - The fire suppression system may activate due to the sudden change in heat, causing significant damage to the systems
The organization wants to ensure that systems are secure and have the resources they need by following a restoration order
Cheryl is responsible for cybersecurity at a mid-sized insurance company. She has decided to utilize a different vendor for network antimalware than she uses for host antimalware. Is this a recommended action, and why or why not? - This is not recommended; you should use a single vendor for a particular security control - This is recommended; this is described as vendor diversity - This is not recommended; this is described as vendor forking - It is neutral. This does not improve or detract from security
This is recommended; This is described as vendor diversity
Nick wants to make an encryption key harder to crack, and he increases the key length by one bit from a 128-bit encryption key to a 129-bit encryption key as an example to explain the concept. How much more work would an attacker have to do to crack the key using brute-force if no other attacks or techniques could be applied? One more 129 more Twice as much Four times as much
Twice as much