Chapter 2 Practice Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Selah wants to analyze real-world attack patterns against systems similar to what she already has deployed in her organization. She would like to see local commands on a compromised system and have access to any tools or other materials the attacker would normally deploy. What type of technology could she use to do this? A honeypot An IPS An IDS A WAF

A Honeypot

Angela wants to ensure that IoT devices in her organization have a secure configuration when they are deployed and that they are ready for further configuration for their specific purposes. What term is used to describe these standard configurations used as part of her configuration management program? - A baseline configuration - An essential settings list - A preinstall checklist - A setup guide

A baseline configuration

Charles sets up a network with intentional vulnerabilities and then instruments it so that he can watch attackers and capture details of their attacks and techniques. What has Charles set up? A black hole A honeyhole A spynet A honeynet

A honeynet

Joanne is responsible for security at a power plant. The facility is very sensitive and security is extremely important. She wants to incorporate two-factor authentication with physical security. What would be the best way to accomplish this? - Smartcards - A mantrap with a smartcard at one door and a PIN keypad at the other door - A mantrap with video surveillance - A fence with a smartcard gate access

A mantrap with a smartcard at one door and a PIN keypad at the other door

Fred wants to make it harder for an attacker to use rainbow tables to attack the hashed password values he stores. What should he add to every password before it is hashed to make it impossible for the attacker to simply use a list of common hashed passwords to reveal the passwords Fred has stored if they gain access to them? A salt A cipher A spice A trapdoor

A salt

Scott wants to back up the contents of a network-attached storage (NAS) device used in a critical department in his company. He is concerned about how long it would take to restore the device if a significant failure happened, and he is less concerned about the ability to recover in the event of a natural disaster. Given these requirements, what type of backup should he use for the NAS? - A tape-based backup with daily full backups - A second NAS device with a full copy of the primary NAS - A tape-based backup with nightly incremental backups - A cloud-based backup service that uses high durability near-line storage

A second NAS device with a full copy of the primary NAS

Suzan is responsible for application development in her company. She wants to have all web applications tested prior to being deployed live. She wants to use a test system that is identical to the live server. What is this called? A production server A development server A test server a predeployment server

A test server

Which of the following items is not included in a blockchain's public ledger? - A record of all genuine transactions between network participants - A record of cryptocurrency balances (or other data) stored in the blockchain - The identity of the blockchain participants - A token that identifies the authority under which the transaction was made

A token that identifies the authority under which the transaction was made

Geoff wants to establish a contract with a company to have datacenter space that is equipped and ready to go so that he can bring his data to the location in the event of a disaster. What type of disaster recovery site is he looking for? A hot site A cold site A warm site An RTO site

A warm site

Chris wants to limit who can use an API that his company provides and be able to log usage of the API uniquely to each organization that they provide access to. What solution is most often used to do this? - Firewalls with rules for each company's public IP address - User credentials for each company - API keys - API passwords

API Keys

Enrique is concerned about backup data being infected by malware. The company backs up key servers to digital storage on a backup server. Which of the following would be most effective in preventing the backup data being infected by malware? Place the backup server on a separate VLAN Air-gap the backup server Place the backup server on a different network segment Use a honeynet

Air-gap the backup server

Amanda wants to use a digital signature on an email she is sending to Maria. Which key should she use to sign the email? Maria's public key Amanda's public key Maria's private key Amanda's private key

Amanda's Private Key

Trevor wants to use an inexpensive device to build a custom embedded system that can monitor a process. Which of the following options is best suited for this if he wants to minimize expense and maximize simplicity while avoiding the potential for system or device compromise? A Raspberry Pi A custom FPGA A repurposed desktop PC An Arduino

An Arduino

Ian is concerned about VoIP phones used in his organization due to the use of SMS as part of their multifactor authentication rollout. What type of attack should he be concerned about? - A vishing attack - A voicemail hijack - An SMS token redirect - A weak multifactor code injection

An SMS token redirect

AES & DES are an example of what type of cipher? - Stream ciphers that encrypt groups of plain-text symbols all together - Block ciphers that encrypt groups of plain-text symbols all together - Stream ciphers that encrypt one plain-text symbol at a time - Block ciphers that encrypt one plain-text symbol at a time

Block ciphers that encrypt groups of plain-text symbols all together

John is responsible for physical security at his company. He is particularly concerned about an attacker driving a vehicle into the building. Which of the following would provide the pest protection against this threat? A gate Bollards A security guard on duty Security Cameras

Bollards

Mark is responsible for cybersecurity at a small college. There are many computer labs that are open for students to use. These labs are monitored only by a student worker, who may or may not be very attentive. Mark is concerned about the theft of computers. Which of the following would be the best way for him to mitigate this threat? Cable locks FDE on the lab computers Strong passwords on the lab computers Having a lab sign-in sheet

Cable Locks

Alaina is reviewing practices for her reception desk and wants to ensure that the reception desk's visitor log is accurate. What process should she add to the guard's check-in procedure? - Check the visitor's ID against their log book entry - Perform a biometric scan to validate visitor identities - Requires two-person integrity control - Replace the guard with a security robot

Check the visitor's ID against their log book entry

Naomi wants to hire a third-party secure data destruction company. What process is most frequently used to ensure that third parties properly perform data destruction? - Manual on-sire inspection by federal inspectors - Contractual requirements and a csertification process - Requiring pictures of every destroyed document or device - All of the above

Contractual requirements and a csertification process

Laura knows that predictability is a problem in pseudo-random number generators (PRNGs) used for encryption operations. What term describes the measure of uncertainty used for a PRNG? Ellipses Quantum Flux Entropy Primeness

Entropy

Jaros is concerned about EMI affecting a key escrow server. Which method would be most effective in mitigating this risk? VLAN SDN Trusted Platform Module Faraday Cage

Faraday Cage

Gerard is responsible for secure communications with his company's e-commerce server. All communications with the server use TLS. What is the most secure option for Gerard to store the private key on the e-commerce server? HSM FDE SED SDN

HSM

Why is heating, ventilation, and air-conditioning (HVAC) part of organizational security planning? - Attackers often use HVAC systems as part of social engineering exercises - HVAC systems are important for availability - HVAC systems are a primary line of network defense - None of the above

HVAC systems are important for availability

Chris set up SAN replication for his organization. What has he done? - He has enabled RAID 1 to ensure that the SAN cannot lose data if a drive fails because the drives are replicated - He has set up backups to a tape library for the SAN to ensure data resilience - He has replicated the data on one SAN to another at the block or hardware level

He has replicated the data on one SAN to another to the block or hardware level

Ian wants to send an encrypted message to Michelle using public key cryptography. What key does he need to encrypt the message? His public key His private key Her public key Her private key

Her public key

In an attempt to observe hacker techniques, a security administrator configures a nonproduction network to be used as a target so he can covertly monitor network attacks. What is this type of network called? Active detection False subnet IDS Honeynet

Honeynet

Web developers in your company currently have direct access to the production server and can deploy code directly to it. This can lead to unsecure code, or simply code flaws being deployed to the live system. What would be the best change you could make to mitigate this risk? - Implement sandboxing - Implement virtualized servers - Implement a staging server - Implement deployment policies

Implement a staging server

Maria is a security engineer with a manufacturing company. During a recent investigation, she discovered that an engineer's compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. What should Maria do to mitigate this threat? - Install host-based antivirus software on the engineer's system. - Implement account usage auditing on the SCADA system. - Implement an NIPS on the SCADA system. - Use FDE on the engineer's system

Implement account usage auditing on the SCADA system

Chris sets a resource policy in his cloud environment. What type of control does this allow him to exert? - It allows him to determine how much disk space can be used - It allows him to determine how much bandwidth can be used - It allows him to specify who has access to resources and what actions they can perform on it - It allows him to specify what actions a resource can take on specific users

It allows him to specify who has access to resources and what actions they can perform on it

What key advantage does an elliptical cryptosystem have over an RSA-based cryptosystem? - It can use a smaller key length for the same resistance to being broken - It requires only a single key to encrypt and decrypt - It can run on older processors - It can be used for digital signatures as well as encryption

It can use a smaller key length for the same resistance to being broken

What purpose does a transit gateway serve in cloud services? - It connects systems inside of a cloud datacenter - It connects virtual private clouds and on-premises networks - It provides an API Gateway between trust zones - It allows multicloud infrastructure designs

It connects virtual private clouds and on-premises networks

What advantage does symmetric encryption have over asymmetric encryption? - It is more secure - It is faster - It can use longer keys - It simplifies key distributions

It is faster

Which of the following is not a critical characteristic of a hash function? - It converts variable-length input into a fixed-length output - Multiple inputs should not hash to the same output - It must be reversible - It should be fast to compute

It must be reversible

What function does counter mode perform in a cryptographic system? - It reverses the encryption process - It turns a block cipher into a stream cipher - It turns a stream cipher into a block cipher - It allows public keys to unlock private keys

It turns a block cipher into a stream cipher

Gurvinder knows that the OpenSSL passwd file protects passwords by using 1,000 rounds of MD5 hashing to help protect password information. What is this technique called? Spinning the hash Key rotation Key stretching Hash iteration

Key stretching

What statement is expected to be true for a post-quantum cryptography world? - Encryption speed will be measured in qubits - Nonquantum cryptosystems will no longer be secure - Quantum encryption will no longer be relevant - Ket lengths longer than 4,096 bits using RSA will be required

Nonquantum cryptosystems will no longer be secure

You are responsible for network security at an e-commerce company. You want to ensure that you are using best practices for the e-commerce website your company hosts. What standard would be the best practice for you to review? OWASP NERC Trusted Foundry ISA/IEC

OWASP

What cryptographic capability ensures that even if the server's private key is compromised, the session keys will not be compromised? Perfect forward secrecy Symmetric encryption Quantum key rotation Diffie-Hellman key modulation

Perfect forward secrecy

What major technical component of modern cryptographic systems is likely to be susceptible to quantum attacks? Key generation Elliptical plot algorithms Cubic root curve cryptography Prime factorization algorithms

Prime factorization algorithms

Lisa is concerned about fault tolerance for her database server. She wants to ensure that if any single drive fails, it can be recovered. What RAID level would support this goal while using distributed parity bits? RAID 0 RAID 1 RAID 3 RAID 5

RAID 5

Olivia needs to ensure an IoT device does not have its operating system modified by third parties after it is sold. What solutions should she implement to ensure that this does not occur? Set a default password Require signed & encrypted firmware Check the MD5sum for new firmware versions Patch regularly

Require signed & encrypted firmware

What type of system is used to control and monitor power plant power generation systems? IPG SEED SCADA ICD

SCADA (Supervisory Control & Data Acquisition Systems)

Derek has been assigned to assess the security of smart sensors. Which of the following is not a common concern for an embedded system like a smart sensor? Eavesdropping Denial of service Remote disconnection SQL Injection

SQL Injection

Which cloud service model gives the consumer the ability to use applications provided by the cloud provider over the internet? SaaS PaaS IaaS Hybrid

SaaS (Software as a Service)

Olivia wants to ensure that the code executed as part of her application is secure from tampering and that the application itself cannot be tampered with. Which of the following solutions should she use and why? - Server-side execution and validation, because it prevents data and application tampering - Client-side validation and server-side execution to ensure client data access - Server-side validation and client-side execution to prevent data tampering - Client-side execution and validation, because it prevents data and application tampering

Server-side execution and validation, because it prevents data and application tampering

Mike is a security analyst and has just removed malware from a virtual server. What feature of virtualization would he use to return the virtual server to a last known good state? Sandboxing Hypervisor Snapshot Elasticity

Snapshot

What type of attribute is a Windows picture password? Somewhere you are Something you exhibit Something you can do Someone you know

Something you can do

Alexandra is preparing to run automated security tests against the code that developers in her organization have completed. Which environment is she most likely to run them in if the next step is to deploy the code to production? Development Test Staging Production

Staging

Yasmine is responding to a full datacenter outage, and after referencing the documentation for the systems in the datacenter she brings the network back up, then focuses on the storage area network (SAN), followed by the database servers. Why shoes her organization list systems for her to bring back online in a particular series? - The power supply for the building cannot handle all the devices starting at once - The organization wants to ensure that a second outage does not occur due to failed systems - The organization wants to ensure that systems are secure and have the resources they need by following a restoration order - The fire suppression system may activate due to the sudden change in heat, causing significant damage to the systems

The organization wants to ensure that systems are secure and have the resources they need by following a restoration order

Cheryl is responsible for cybersecurity at a mid-sized insurance company. She has decided to utilize a different vendor for network antimalware than she uses for host antimalware. Is this a recommended action, and why or why not? - This is not recommended; you should use a single vendor for a particular security control - This is recommended; this is described as vendor diversity - This is not recommended; this is described as vendor forking - It is neutral. This does not improve or detract from security

This is recommended; This is described as vendor diversity

Nick wants to make an encryption key harder to crack, and he increases the key length by one bit from a 128-bit encryption key to a 129-bit encryption key as an example to explain the concept. How much more work would an attacker have to do to crack the key using brute-force if no other attacks or techniques could be applied? One more 129 more Twice as much Four times as much

Twice as much


संबंधित स्टडी सेट्स

Wandering Jew or Tradescantia pallida.

View Set

Microeconomics final (chapter 12)

View Set

𝘂𝗻𝗶𝘁 𝗼𝗻𝗲 𝗰𝗼𝗹𝗹𝗲𝗴𝗲 𝗯𝗼𝗮𝗿𝗱 𝗽𝗿𝗮𝗰𝘁𝗶𝗰𝗲 𝘁𝗲𝘀𝘁

View Set

Ch 1 , Ch 2 , CH 12 OB Process of birth, ch 13 pain OB, Ch 14 OB Intrapartum Fetal Surv, ch 15 Nursing Care During Labor

View Set