TCNO Week 3
Which Windows tool in an Active Directory domain can apply a single AutoPlay configuration to all domain-joined computers?
Group Policy
What data privacy enhancement removes directly identifying elements in raw data and replaces it with randomly generated pseudonyms?
Tokenization
Which is most commonly used to secure a password manager vault?
PKI certificate
You are configuring MDM policies regarding failed login attempts on smartphones. Which setting value disables device wipe upon incorrect password attempts?
0
Which UDP ports are used by RADIUS?
1813 1812
Which is the default TCP port number for HTTPS?
443
Do not implement any safeguards
Acceptance
It is a basic identity layer on top of the OAuth 2.0 protocol
OIDC
Which mobile device provisioning strategy consists of devices being provided by the organization?
COPE
Which web browser provides the most privacy online?
Tor Browser
Which term describes running multiple passes of random data writing to wipe storage media?
Hard wipe
It is an open authorization framework that lets third-party applications get limited access to HTTP services
OAuth
How does disabling SSID broadcast enhance Wi-Fi security?
The WLAN name is not visible to user devices
Which TCP port is used by TACACS+?
49
What are some signs you may have a Rootkit installed on your system?
Blue screens Performance issues
What is the difference between a wireless router and a wireless access point?
Wireless routers can send WLAN traffic to other remote networks
Which of these represents an attribute of a structured attack?
Planned Organized Persistent Multi-phased
What are some of the commands you can use in the recovery console?
chkdsk fixmbr fixboot
Which Windows command line tool manages EFS?
cipher
How can you prevent boot sector viruses?
Maintain an updated operating system Maintain hardware-based updates Use an updated antivirus
What does AWS use to assign permissions to groups and/or users in IAM?
Managed policies
Which characteristics would make a building more susceptible to tailgating attacks?
Multiple entrances Busy office space Large number of active employees
What are some signs that you may be under a distributed denial of service attack?
Odd web facing network traffic patterns Sudden surge in requests Slow performance
What are some signs that you have a Cryptomining malware installed on a computer?
Overheating GPU Increased CPU usage Decreased performance
You need to ensure that data on decommissioned hard disk drives cannot be recovered before the drives are sent to a shredding facility. Which option is the best choice?
Use degaussing to eliminate magnetic fields
How can you protect yourself from a brute force attack?
Use two-factor authentication Don't reuse passwords Use long complex passwords
Which Wi-Fi standards use AES?
WPA2 WPA3
What advanced authorization method can be used to put restrictions on where a mobile device can be actively used based on GPS?
Geofencing
Which of the following activities are related to proactive hacking?
Period security control review Applying patches
How can enterprise settings and data be destroyed over a network by IT admins for a stolen smart phone?
Remote wiping
Which of these is considered a primary or secondary loss from a data breach?
Replacement Reputation Productivity Response
What are the different types of keyloggers?
Software-base keyloggers Physical keyloggers
With asymmetric encryption, which key is used to decrypt a message?
Private
What are some common types of a Trojan Horse?
Downloader Fake AV Backdoor
According to GDPR, what is a public document provided by an organization that explains how they will process personal data and how the organization applies data protection principles?
Privacy notice
How do NTFS permissions differ from share permissions?
They are enforced locally
What data designation refers to information that, though unclassified, often requires strict controls over its distribution?
Sensitive but unclassified
How might an attacker fake a secure connection?
SSL hijacking HTTPS spoofing SSL striping
What are some features of modern anti-malware software?
Web filtering Sandboxing
Which term defines sending a malicious email message to a user in an attempt to trick them into divulging sensitive information or clicking a link?
Phishing
In the IEEE 802.1X architecture, which component is the most likely to send the initial EAPOL frames?
Supplicant
Which authentication methods are considered biometric?
Fingerprint Facial recognitions
Which types of phishing attack might be undertaken by an attacker?
Spearphishing Whaling
Which type key is normally used to encrypt storage on a smartphone?
Symmetric
Which firmware component is automatically used with BitLocker for the operating system drive?
TPM
You are managing the properties of an Active Directory user account using the Active Directory Users and computers tool. You need to set login time restrictions. Which tab should you click?
Account
You have a temporary folder that periodically triggers a false positive for virus detections when you install apps. What should you do to prevent these false positives in the future?
Add an exclusion
Which of the following represents the maximum tolerable amount of system downtime?
RTO
hich cloud computing characteristic best relates to autoscaling?
Rapid provisioning
What is the first phase of ethical hacking?
Reconnaissance
Choose not to undertake actions that introduce risk
Avoidance
What should be done prior to executing a pen test?
Back up configurations and data
How can you protect your organization from insider threats?
Create a culture of security Monitor critical assets with video
Which of these has the role of the keeper of information from a technical standpoint such as maintaining confidentiality, integrity, and availability?
Custodian
Which malicious actors might undertake a zero-day attack?
Cybercriminals Nation states conducting cyber warfare Hacktivists
Which data might you find while dumpster diving?
Medical records Phone numbers Credit card statements
Implement safeguards that will reduce risk
Mitigation
Which Linux command switches to the root account?
su
What is the purpose of a web browser extension?
It provides additional functionality to a web browser
Which tool provides hundreds of pen testing tools?
Kali Linux
What is a strict non-discretionary model defining relationships between subjects and objects?
MAC
How is port triggering different from port forwarding?
Port forwarding leaves a TCP or UDP port open all the time
Which device can you install on a monitor to help protect against shoulder surfing?
Privacy Screen
What are some of the impacts that an XSS attack could have on an organization?
Hijacking accounts Spreading of malware
What entity has the responsibility to protect the federated identity's stored credentials and then provide them when requested?
Identity provider
Which port do ICMP echo requests use?
Echo requests do not use a port number
Which steps would an attacker take in an evil twin attack?
Attacker creates a fake Captive Portal Attacker lures victims into connecting to evil twin
ALE = _______ x ARO
SLE
It is popular with colleges and universities
Shibboleth
Which Wi-Fi standard uses TKIP?
WPA
Pass the risk to a third-party
Transference
What can members of the ADMINISTRATORS group do that members of the POWER USERS group cannot?
Change display settings
Which are some advantages to using a software firewall?
Configurable Affordable
What is the difference between a vulnerability and an exploit?
Exploits actively take advantage of weaknesses
What are some areas you may want end-user training to focus on?
Identifying malware Email usage Removable storage usage
Which security strategy can minimize the harm caused by a compromised IoT device?
Isolate IoT devices on their own VLAN
Which steps can be taken to help prevent whaling attacks?
Enhanced email security Data protection software Senior management training
Which aspect of computing does MFA enhance security for?
Authentication
What is a benefit of ethical hacking?
Discover weaknesses before malicious users do
What is another term for a key fob?
Hardware token
Which combinations constitute multifactor authentication?
PKI certificate, password for private key Username, PKI certificate
t is an XML-based open-source SSO standard used by many organizations
SAML
What does Kerberos authentication use to grant user access to resources?
Ticket
What is a tamper-resistant security chip installed on the device or built into PCs, tablets, and phones?
TPM
What is the amount of time available to recover a resource, service, or function?
RTO
How can you prevent a SQLi attack?
Use strict allowlists Scan regularly for vulnerabilities
Which mobile device options should administrators enable to protect sensitive data on lost or stolen smartphones?
Encryption of data-at-rest Remote wipe
Which type of hacker has malicious intent?
Black hat
Which type of pen testing is normally prohibited by public cloud service providers?
DoS
Which name is given to private browsing mode in the Google Chrome web browser?
Incognito
Which Windows feature can prevent apps from making changes without your consent?
UAC
You need to protect a web application from common web app attacks. What should you implement?
WAF
Which cryptographic solution in WPA2 replaces TKIP?
AES
Which security measure involves an inner door that opens only when outer door closes completely?
Access control vestibule
How can you protect a computer from Virus activity?
Download from trusted sites only Perform systems updates Updated anti-virus protection
Which of these disasters would be considered environmental?
Landslide
When conducting an impersonation attack, who might an attack impersonate to have the best results?
Influential persons Well-known brands Third-party vendors
It uses a Ticket Granting Server (TGS)
Kerberos
Which network authentication protocol is used by Microsoft Active Directory?
Kerberos
You manage a fleet of Android and iOS smartphones. Updates must be applied for the mobile OS and apps. Which tool allows the central management of smartphones?
MDM
Which is a legal document related to the potential of exposing sensitive data during a pen test?
NDA
Which cryptographic solution in WPA3 personal replaces a pre-shared key (PSK)?
SAE
Which types of spyware may you encounter on a system?
Trojan spyware Cookies Adware
You have configured Active Directory Group Policy password settings. Which command refreshes Group Policy immediately on a host?
gpupdate
Which type of information can be gathered by running a network scan?
Active IP addresses Open ports
What can you do to limit the impact/chances of a ransomware event?
Back and secure data regularly Maintain updated security software Educate users on safe computer usage
Which type of spoofing attack might an attacker attempt?
Email spoofing Website spoofing IP address spoofing
You are configuring a Cisco router for centralized AAA with a RADIUS server cluster. What type of account would you create to get administrative access if the RADIUS servers are temporarily unavailable due to a network issue?
Emergency account
Which are some of the typical types of social engineering attacks?
Phishing Tailgating Pretexting