Quiz 6 Attempt 2
dig
Andrea was investigating the IP addresses associated with a domain name and obtained the results shown. What tool was used to obtain the results? nslookup dnsquery resolve dig
22 because SFTP uses SSH
Brendan is helping a colleague troubleshoot a connectivity issue for two systems using the SFTP/ He would like to check whether the traffic is being blocked by his network firewall. What TCP port is used for these connections? 23 21 22 20
The load balancers may not have capacity to survive the failure of one device
Colleen is running two load balancers in active/active mode. What is the most significant risk that she is likely facing? Network traffic may be misrouted Servers must be manually assigned to load balancers The two load balancers may become out of sync The load balancers may not have capacity to survive the failure of one device
Hashing
Frank is revising an application that currently stores SSNs in a database. This is the only unique identifier available to him but he wants to store it in a way that nobody can determine the original SSN but it remains useful as a unique identifier. What technology can he apply to meet this requirement? Encryption Stenography Hashing Decryption
Authentication server
In a Kerberos authentication scheme, who provides the client with the TGS session key? Key generation server Service server Ticket granting server Authentication server
Data custodian
Melanie is the system administrator for a database containing sensitive information. She is responsible for implementing security controls to protect the contents of the database. Which term best describes her role? Data custodian Data user Data steward Data owner
HTTPS
Mike would like to allow users on his network to securely access their personal Gmail accounts using the service's standard interface. What protocol must he allow through his network firewall to Google's servers to allow this access? SMTP HTTPS IMAP POP3
SMTP only
Orlando is configuring his network firewall to allow access to the organization's email server. He would like to allow Internet users to send email on the server. What protocols should Orlando allow to access the email server from the Internet? IMAP and POP3 POP3 only IMAP only SMTP only
OTA (over-the-air) upgrades
Samantha is the admin of her organization's mobile devices and wants to ensure that users have current versions of OS firmware. Which one of the following approaches will best meet this need? Administrator installation Sideloading OTA upgrades User installation
RAID 1
Taylor is building a server where data will be infrequently written but frequently read. He would like to use a redundant storage solution that maximizes read performance. Which of the following approaches would best meet his needs? RAID 5 RAID 0 RAID 3 RAID 1
GCM (Galois/Counter Mode)
The distinguishing feature of block numbers being generated by a counter and those numbers being combined with an initialization vector using a block cipher indicates what encryption mode of operation? CTM GTM OFB ECB
The attacker and the victim must be connected to the same switch
Tim is investigating an ARP spoofing attack that took place on his organization's network. What is the maximum scope of a single ARP spoofing attack? The attacker and the victim must be using the same router The attacker and the victim must be behind the same firewall The attacker and the victim must be connected to the same switch The attacker and the victim must be sharing a switch port
Screen locking
Tom is concerned about the fact that executives routinely leave their mobile devices unattended on their desks in the office. What control can he enforce through his MDM tool to prevent misuse of those devices? Screen locking Application control Remote wipe Geofencing
CA's private key
When a certificate authority creates a digital certificate for a web server, what key does it use to apply the CA's digital signature to the certificate? Server's private key Server's public key CA's public key CA's private key
Require an exponentially increasing timeout period between login attempts
Which of the following is a reasonable approach to handling failed authentication attempts against a password-based authentication system? Require 5 seconds between login attempts Disablement of a user account after three incorrect attempts Require an exponentially increasing timeout period between login attempts Lockout of a user account after five incorrect login attempts
NTLM and NTLMv2 are both insecure and should not be used
Which of the following statements is true about NTLM authentication? NTLM uses SHA-512 hashing to protect passwords NTLM is only available for Windows systems NTLM and NTLMv2 are both insecure and should not be used NTLMv2 is protected against pass-the-hash attacks that exist in the original version of NTLM
704
Which one of the following Linux permission settings allows the owner of a file to have full access to that file while allowing all other users to only read the file? 407 707 704 701
Jailbreaking
Which one of the following is an example of a privilege escalation attack against a mobile device? Jailbreaking Sideloading Tethering Man-in-the-middle
Fuzzing
Which one of the following techniques is an example of dynamic code testing? Taint analysis Lexical analysis Data flow analysis Fuzzing
Stateless
Which one of the following terms best describes the level of firewall protection that is typically found in router access control lists? Next generation Proxying Stateful Stateless
Aircrack
Which one of the following tools is useful in testing the security of a wireless network's encryption key? Netstumbler QualysGuard Aircrack nmap
Disable WPS
Xavier is concerned about the security of a wireless network in his organization's confrerence facility that uses WPS to connect new clients. What is the best action that Xavier can take to protect this network? Change the PSK Remove WPS stickers from wireless access points Disable WPS Use a strong WPS PIN