ITC 563 Midterm
Which type of access control scheme uses predefined rules that makes it the most flexible scheme? a. ABAC b. DAC c. MAC d. NAC
ABAC
Which of the following is NOT part of the AAA framework? a. Authentication b. Access c. Authorization d. Accounting
Access
Which of the following best describes bash? a. Bash is a command language interpreter. b. Bash is a network assessment tool. c. Bash is computer hardware. d. Bash is a physical security measure.
Bash is a command language interpreter.
Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to agree to an acceptable use policy (AUP) before continuing. What type of AP has he encountered? a. Authenticated portal. b. Captive portal. c. Control portal. d. Rogue portal.
Captive portal
Which of the following ensures that only authorized parties can view protected information? a. Authorization b. Confidentiality c. Availability d. Integrity
Confidentiality
In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply? a. Containers use hardware hypervisors for virtualization. b. Containers use OS components for virtualization. c. Containers use dedicated physical storage for virtualization. d. Containers use Type I hypervisors for virtualization.
Containers use OS components for virtualization.
What is a disadvantage of biometric readers? a. Speed b. Cost c. Weight d. Standards
Cost
Stronger boot security is not an improvement of UEFI over BIOS. True False
False
Which type of malware relies on LOLBins? a. PUP b. File-based virus c. Fileless virus d. Bot
Fileless virus
Which of the following of the CIA Triad ensures that the information is correct, and no unauthorized person has altered it? a. Confidentiality b. Integrity c. Availability d. Assurance
Integrity
IT Management has just learned that some employees have tried to install their own wireless router in the employee lounge. Why is installing this rogue AP a security vulnerability? a. It uses the weaker IEEE 80211i protocol. b. It allows an attacker to bypass network security configurations. c. It conflicts with other network firewalls and can cause them to become disabled. d. It requires the use of vulnerable wireless probes on all mobile devices.
It allows an attacker to bypass network security configurations.
An IOC occurs when what metric exceeds its normal bounds? a. IRR b. LRG c. EXR d. KRI
KRI
Which access control scheme is the most restrictive? a. Role-Based Access Control. b. DAC. c. Rule-Based Access Control. d. MAC.
MAC
Which of these creates a format of the candidate password to significantly reduce the time needed to crack a password? a. Rainbow b. Mask c. Overlay d. Pass the hash
Mask
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable? a. Push-button method. b. Piconet method. c. PIN method. d. Click-to-connect method.
PIN method
What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. Plaintext b. Byte-text c. Cleartext d. Ciphertext
Plaintext
Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on? a. Blue Team b. Purple Team c. White Team d. Red Team
Red Team
What term refers to changing the design of existing code? a. Library manipulation b. Shimming c. Refactoring d. Design driver manipulation
Refactoring
What is a jump box used for? a. Switching from a public IP to a private IP. b. Restricting access to a demilitarized zone. c. Bypassing a firewall by generating a log entry. d. Deceiving threat actors by intentionally creating vulnerable devices.
Restricting access to a demilitarized zone.
Which of the following is NOT a symmetric cryptographic algorithm? a. DES b. SHA c. Blowfish d. 3DES
SHA
Tilde is working on a contract with the external penetration testing consultants. She does not want any executives to receive spear-phishing emails. Which rule of engagement would cover this limitation? a. Scope b. Targets c. Exploitation d. Limitations and exclusion
Scope
Which of the following is true regarding the relationship between security and convenience? a. Security and convenience are inversely proportional b. Security and convenience have no relationship c. Security is less important than convenience d. Security and convenience are equal in importance
Security and convenience are inversely proportional
Which of the following is an authentication credential used to access multiple accounts or applications? a. Single sign-on b. Credentialization c. Identification authentication d. Federal login
Single sign-on
In an interview, Max was asked to tell one difference between a software firewall and a virtual firewall. How should Max answer? a. Software firewalls are locally installed on a device, whereas virtual firewalls run in the cloud. b. Virtual firewalls are cost-free, whereas software firewalls are paid services. c. Software firewalls can protect all the endpoints in a network, whereas virtual firewalls can protect only one device. d. Virtual firewalls are used on almost all devices, whereas software firewalls are mostly used by enterprises.
Software firewalls are locally installed on a device, whereas virtual firewalls run in the cloud.
Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information? a. CISA b. FOIA c. TLP d. PCII
TLP
How do NACs ensure that a device is safe to connect to a secure network? a. The NAC encrypts all of the data on an unknown device before connecting it to the secured network. b. The NAC issues a health certificate, only allowing healthy devices to connect to the secured network. c. The NAC ensures the safety of the device by deleting all suspicious files. d. The NAC moves suspicious data on an unknown device onto an external storage device.
The NAC issues a health certificate, only allowing healthy devices to connect to the secured network.
Rule-Based Access Control dynamically assigns roles to subjects based on rules. True False
True
TAXII is an application protocol for exchanging cyberthreat intelligence over HTTPS. True False
True
To spy on citizens is one objective of state-sponsored attack. True False
True
White hat hackers will probe a system for weaknesses and then privately provide that information back to the organization. True False
True
Which type of hypervisor runs directly on the computer's hardware? a. Type I b. Type II c. Type III d. Type IV
Type I
Which of the following is known as a network virus? a. TAR b. Worm c. Remote Exploitation Virus (REV) d. C&C
Worm
A source computer's ability to reach a specified destination computer can be tested using which of the following? a. ifconfig. b. ping. c. curl. d. ipconfig.
ping
Which of the following best describes a network address translation? a. A Network Address Translation (NAT) enables a private IP network to connect to the internet. b. A Network Address Translation (NAT) blocks specific websites or attacks that attempt to exploit known vulnerabilities in specific client software. c. A Network Address Translation (NAT) can detect applications using deep packet inspection by examining the packet payloads and determining if they are carrying any malware. d. A Network Address Translation (NAT) is a device that combines several security functions like packet filtering, anti-spam, anti-phishing, anti-spyware, encryption, intrusion protection, and web filtering.
A Network Address Translation (NAT) enables a private IP network to connect to the internet.
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice's private key b. Alice's public key c. Bob's public key d. Bob's private key
Alice's public key
Which type of monitoring methodology looks for statistical deviations from a baseline? a. Behavioral monitoring. b. Signature-based monitoring. c. Anomaly monitoring. d. Heuristic monitoring.
Anomaly monitoring.
What enforces the location in which an app can function by tracking the location of the mobile device? a. Location Resource Management b. Geofencing c. GPS tagging d. Graphical Management Tracking (GMT)
Geofencing
Which of the following best describes east-west traffic? a. Movement of data from one server to another within a data center. b. Movement of data from an unsecured endpoint to a server outside a data center. c. Movement of data from a router to an enterprise switch. d. Movement of data from one unsecured endpoint to another.
Movement of data from one server to another within a data center.
Maria's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called? a. Rooting b. Sideloading c. Jailbreaking d. Ducking
Rooting
Luke is researching hash algorithms. Which algorithm would produce the longest and most secure digest? a. SHA-256 b. MD5 c. SHA3-512 d. SHA6-6
SHA3-512