Sec+ Exam B

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which extension can be used for a scripting language based on the Microsoft's Visual Basic programming language.

.vbs

Your company has just impemented a host-based firewall and you are not sure it allows incoming SFTP connections. Which Port must you allow?

22/TCP

What is a characteristic feature of a Spraying attack?

A short list of commonly used passwords tried against large number of user accounts

An insurance company charges an additional $200 monthly premium for natural disaster coverage for your business site. What figure must you compare this against to determine whether to accept this additional coverage?

ALE

Which of the following enables the exchange of information between computer programs?

API

If an attacker manages to associate their MAC address with the IP address of the default gateway this would result in targeted host sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Which type of attack is taking place in this scenario?

ARP poisoning

Which of the following physical access control methods do not normally identify who has entered a secure area?

Access control vestibule,Hardware locks

Which of the following statements can be used to describe the characteristics of an on-path attack?

An on-path attack is also known as MITM attack

Which term fall into the category of unauthorized hacking activities?

Black hat

The act of taking control of a mobile device via a Bluetooth connection is known as:

Bluebourne

The practice of sending unsolicited messages over Bluetooth is known as:

Bluejacking

Which of the following refers to unauthorized data access of a Bluetooth device over a Bluetooth wireless network?

Bluesnarfing

Providing a high and low estimate in order to entice a more specific number is the definiton of:

Bracketing

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is called:

Buffer overflow

What is a method for requesting a digital certificate?

CSR

When you attempt to use your smartphone to connect to the coffee shop Wi-Fi, you are presented with the web page shown below. What has been configured to require web page authentication prior to your gaining Internet access?

Captive portal

Which data forensic term encompasses documenting all aspects of evidence to ensure its integrity?

Chain of custody

These actors engage in illegal activities to learn proprietary information and gain market advantage?

Competitors

What term refers to automating the integration of code changes from multiple contributors into a single software project?

Continuous integration

Which type of attack involves an attacker injecting malicious executable code into a web site page that will be viewed by others?

Cross-site scripting

Which of the following describes an application attack that relies on executing a library of code?

DLL injection

Which term best reflects what is happening in the exhibit? CMD WITH NSLOOKUP

DNS

A wireless disassociation attack is a type of:

Denial-of-Service (DoS) attack

A wireless jamming attack is a type of:

Denial-of-Service (DoS) attack

Which of the following control types is an IDS?

Detective

Which of the following refers to a situation in which domain registrants, due to unlawful actions of third parties, lose control over their domain names?

Domain hijacking

SSL stripping is an example of:

Downgrade attack,Denial-of-Service (DoS) attack

Which cryptographic approach uses points on a curve to define public and private key pairs?

ECC

You are asked to configure network security appliances to detect abnormal activities that could indicate a network attack or worm. What must you first do?

Establish a network baseline.

What can be done to protect data after a handheld device is lost or stolen?

Execute a remote wipe.

ARP poisoning is designed to spoof the IP address in namespace records whereas DNS poison is designed to spoof physical addresses in the computer's address cache.

False

PKI relies on a pair of symmetric keys in which all users must publish their private key to the system to enable senders to encrypt email messages.

False

WidgetCo datacenter is in a hostile environment and has concerns about protecting the facility from vehicle-based attacks. Which of the following BEST would protect the building from this threat?

Fencing,Bollards

You want to enable a third factor to an existing multifactor authentication. You currently implement smart card and password. Which of the following would meet the organization's needs for a third factor?

Fingerprints

You have just been assigned the role of DPO. Which privacy regulation do you fall under?

GDPR

Which of the following frameworks protects PHI?

HIPAA

Your company wants to control the PII that is stored locally on each salesperson's laptop and ensure security. Laptops have higher-than-average rate of the lost equipment within your company. Which of the following recommendations would BEST address this security concern?

Implement managed Full-disk encryption (FDE)

A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:

Improper input validation

Which of the following statements can be used to describe the characteristics of an on-path attack??

In an on-path attack, attackers place themselves on the communication route between two devices

What is it called when a trusted third party is allowed to store an organizations sensitive PKI components?

Key escrow

An attacker changed the physical address of his NIC to assume the identity of a different network host is known as:

MAC cloning

An AI feature that enables it to accomplish tasks based on training data without explicit human instructions is called:

ML

Your company utilizes classified data and senior leadership wants to protect the data by utilizing classification labels. Which access control schemes would be BEST for your company to implement?

Mandatory

A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required is known as:

Memory leak

What is the most commonly used DDoS attack?

Network-based

Which of the following terms describes an attempt to read a variable value from an invalid memory address?

Null-pointer dereference

This type of DDoS attack targets infrastructure and industrial equipment:

OT

Which of the below refers to the most common format in which Certificate Authorities (CA) issue certificates?

PEM

What type of spam relies on text-based communication?

PUP

A technique that allows an attacker to authenticate to a remote server without extracting cleartext password from a digest is called:

Pass the hash

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

RFID

The practice of modifying an application's code without changing its external behavior is referred to as:

Refactoring

What is the purpose of a DDoS attack?

Resource exhaustion

You are evaluating public cloud storage solutions. Users will be authenticated to a local server on your network that will allow them access to cloud storage. Which identity federation standard could be configured to achieve this?

SAML

Which of the following indicates an SQL injection attack attempt?

SELECT * FROM users WHERE userName = 'Bobby' AND password = '' OR '1' = '1';

Which of the following should be put in place when negotiating with Amazon Web Services about the duration of a significant security outage or incident?

SLA

Which of the following are used to facilitate randomization during the encryption process?

Salting,Initialization Vector (IV)

Which type of VPN configuration can use the Internet connection of a VPN client device to access Internet resources as opposed to the VPN-connected network's Internet connection?

Split tunnel

Select all RFID vulnerabilities:

Spoofing,Eavesdropping,Data interception,Replay attacks

Which password attack bypasses account-lockout policies?

Spraying attack

Which firmware solution can store keys used for storage media encryption?

TPM

A network administrator posts a file named Networkconfigs.txt on the desktop of an administrator account on a server in the DMZ. What term best explains what this is?

The document is a honeyfile and is meant to attract the attention of a cyberintruder.

What is skimming?

The theft of sensitive data from a payment card

Which of the following terms refers to a vulnerability caused by race conditions?

Time-of-check to time-of-use

What risk management strategy may utilize cybersecurity insurance?

Transference

A type of software that performs unwanted and harmful actions in disguise of legitimate and useful program is known as a Trojan horse. This type of malware may act like legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.

True

In social engineering, the term "Elicitation" describes the use of casual conversation to extract non-public information from people without giving them the feeling they are being interrogated.

True

The term "Evil twin" refers to a Access Point (AP) set up to replace the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID), making it appears as a legitimate access point to connecting hosts to steal or intercept data.

True

Which statement best describe the attributes of an APT?

Typically funded by governments/nation states

Your company will be implementing two-factor authentication during the start of the next quarter. Which of the following would fulfill the your company's requirement?

USB token and PIN

An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine some security controls into one platform. Which of the following would BEST accomplish this goal?

UTM

How can users ensure that e-mail messages are not forged?

Verify the digital signatures with the sender's public key.

The practice of using a telephone system to manipulate user into disclosing confidential information is known as:

Vishing

Your direct superviser wants you to ensure that there are no exposures to well-known attacks throughout the enterprise. What is the BEST way to do this?

Vulnerability scanning

A government contracting company wants to to protect the confidentiality of data on laptops. They want to ensure that in the event a laptop is stolen the data would still be safeguarded. Which of the following would BEST suit their needs?

Whole disk encryption with two-factor authentication


Kaugnay na mga set ng pag-aaral

Eriko, istorijos datos+lietuvos prezidentai

View Set

Vocabulario de el Principe y el Mendigo.

View Set

Chapter 19 Industrial Revolution

View Set

Chapter 19- Vibrations and Waves

View Set