security plus test 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A hacker has used a design flaw in an application to obtain unauthorized access to the application. Which type of attack has occurred?

escalation of privileges

Management is concerned that mobile device location information can be revealed to attackers. Which mobile device should you investigate?

geotagging

Management has decided to purchase a new appliance firewall that will be installed between the public and private networks owned by your company. Which type of firewall is also referred to as an appliance firewall?

hardware

Which type of vulnerability is demonstrated by an SQL injection?

improper input handling

Which threat actor type would most likely have the most resources available

nation states

What is the goal when you passively test security controls?

probing for weaknesses

The new anti-virus application that your company purchased claims that it protects against multi-part viruses. Which statement correctly defines this type of virus?

A multipart virus can infect executable files and boot sectors of hard disk drives

Management has asked you to ensure that the certificates that have been validated in the corporates PKI are protected. What must be secured in the PKI?

A private key of the root CA

Which of the following is the best description of a zero-day exploit?

An attack that exploits a security vulnerability on the day the vulnerability becomes generally known

You suspect that several users are using expired digital certificates and that other digital certificates are very close to expiration. You need to examine the list of serial numbers of digital certificates that have not expired, but should be considered invalid. Which PKI component should you examine?

CRL

Your company issues mobile devices to certain personnel. You enable a screen lock on each of the devices that require users to enter a code. You need to ensure that the device cannot be used if the wrong code is entered five times in a row. What should you do?

Enable lockout

Your organization needs to implement a system that logs changes to files. What category of solution should you research?

File integrity checks

You need to ensure that your company's antivirus application protects against viruses that include protective code that prevents outside examination of critical elements. Which type of virus is this?

armored virus

As part of your company's comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your company's subnetworks. Which statement is true of this scan?

It impacts the hosts and networks less than other scan types

You find general purpose guides and platform/vendor-specific guides for deploying the items below. Which of the following should you deploy using vendor-specific guides as a best practice?

Network infrastructure devices Operating systems Application servers Web Server (Choose all of them because all of them are correct)

Which of these is part of a scan to identify a common misconfiguration?

Router with a default password

You have several independent security monitoring solutions, each with different logging mechanisms. You are concerned that they are not working together, and that the separate logs may not present all the necessary information. In addition, the costs of maintaining the separate products are rising. You need to provide a centralized solution that will include centralized logging. What could you replace them with>

UTM

An IT technician has been assigned to install a new embedded firewall. What statement best describes this type of firewall?

a firewall that is integrated into a router

"Recently, an IT administrator contacted you regarding a file server. Currently, all users are granted access to all of the files on this server. You have been asked to change the configuration and designate which users can access the files. What should you use to do this?

an ACL

you have been authorized by management to use a vulnerability scanner once every three months. What is this tool?

an application that identifies security issues on a network and gives suggestions on how to prevent the issue

you suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts were unsuccessful. What tool did you implement that logged those attempts and identified the users?

application whitelisting

You are researching the different types of firewalls that you can install to protect your company's network and assets. Which type of firewall is most detrimental to network performance.

application-level proxy firewall

You discover that a malicious program has been installed on several host computers on the network. This program's execution was remotely triggered. Of which malware is this an example of?

botnet

Your company recently discovered that an attacked carried out an exhaustive password attack. Which type of password attack is often referred to as this?

brute force attack

Your manager suspects that your network is under attack. You have been asked to provide information regarding traffic flow and statistical information for your network. Which tool should you use?

protocol analyzer

Which memory vulnerability is associated with multithreaded applications?

race condition

which tool is used to perform a vulnerability test?

scanning tool

Which threat actor type can be characterized by having an unsophisticated skill level, using widely available tools, and being often motivated by the need that they can prove they can do it

script kiddies

A hacker has called a company employee and has learned the employee's username and password by posing as a member of corporate technical support. Which type of attack has this company suffered?

social engineering

You company has recently decided to implement a BYOD policy for the network. Management has asked you to write the initial BYOD security policy. Which of the following should be included as part of this policy?

support ownership data ownership application whitelisting and blacklisting patch management (Choose all of them because all of them are right)

A Windows 7 computer is located on a TCP/IP network that uses DHCP. You want the computer to release its lease on the TCP/IP configuration that it received from the DHCP server. Which command should you issue to release the configurations?

the ipconfig command

As the security administrator for your company, you are primarily concerned with protecting corporate assets. Currently you are working to ensure confidentiality for corporate data. Which activity is NOT covered under this objective

treason

What is often the weakest link in the security chain, and represents the largest vulnerability?

untrained users


संबंधित स्टडी सेट्स

IBUS311 Chapter 1: Globalization

View Set

15.33.4 The Contemporary United States

View Set

POLS Exam # 3 Study Guide Key Terms

View Set

Osteoporosis book just the drugs (minus charts, theyre in other quizlet)

View Set

Module 24. Forgetting, Memory Construction, And Improving Memory

View Set