ITSY 1342 Final Review

Ace your homework & exams now with Quizwiz!

In an interview, you are provided the following statements regarding virtualization security. Which statement should you identify as correct?

A software-defined network virtualizes parts of the physical network to be more quickly and easily reconfigured.

What is a thin client?

A thin client is a computer that runs from resources stored on a central cloud server.

Which policy restricts the introduction of malicious programs into an enterprise network or server?

Acceptable use

Accounting is an important security concept in an enterprise environment. Which of the following best describes accounting in this context?

Accounting refers to keeping track of all financial activities of the enterprise.

Which of the following is the safest authentication method?

Authentication using security keys

Which of the following data types have the highest level of data sensitivity?

Confidential

For which of the following is the encapsulating security payload (ESP) protocol applied?

Confidentiality

An enterprise's annual financial statement reported an overall profit when there was actually a loss. Which of the following risks has occurred?

Control risk

What is data masking?

Creating the copy of data by obfuscating sensitive elements

John is appointed as a vulnerability assessment engineer in a financial organization. An audit report published by a third-party auditing firm revealed that most of the web servers have cross-site scripting and XML entity injection vulnerabilities. John has been told to perform a vulnerability assessment on these servers to verify if the audit report is valid. He is also told that he should not attempt to engage or exploit any vulnerabilities. By applying his knowledge of vulnerability assessment concepts, which type of vulnerability scanning should John use?

Credentialed

Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised credentials to access the network?

Credentialed scan

Which of the following is an attack that affects data availability?

DDoS attack

Which of the following can be used to enhance privacy data protection?

Data anonymization

Which layer of the OSI model is targeted by the threat actors for layer 2 attack?

Data link layer

Which of the following are country-specific requirements that apply to data?

Data sovereignty

What is NOT a firewall feature?

Deceiving attackers

Which wireless probe is designed exclusively to monitor the airwaves for RF transmissions?

Dedicated probes

For which of the following systems is resilience through redundancy the least important?

Desktops

Which technique added to cryptographic algorithms can change a single character of plaintext into multiple characters of ciphertext?

Diffusion

Bob is sending a message to John. Which algorithm should John use to ensure that Bob is the actual sender of the message and not anyone else?

Digital signature algorithm

Which attack creates false deauthentication management frames that appear to come from another client device, which causes the client to disconnect from AP?

Disassociation

Joseph, a black hat hacker, is approached by Sigma Technology to check the enterprise's security. He is told that the system is being checked to verify whether the higher-security mode of operations is moved automatically to another version during a cyberattack on the network, making it easier to attack. Which mode should Joseph use to test this vulnerability, and why?

Downgrade attack because, in a downgrade attack, an attacker forces the system to abandon the current mode of operation and instead move it to implement a less secure mode.

Rob made a physical security review report of his organization in which he proposed replacing physical locks with electronic ones. Which of the following is the best justification for Rob to include in his report?

Electronic locks keep track of the accessing time and user identity.

Which of the following provides multiple forensic tools in a single interface?

FTK imager

The company that developed the office productivity software used on both static and mobile devices by your organization has audited some code and noticed a potential security issue. To address the issue, they have released and automatically scheduled an update to ensure that all users receive it. Which of the following might still be vulnerable after the patch?

Firmware

Which application intercepts user requests from the secure internal network and then processes them on behalf of the user?

Forward proxy

Which part of the NIST Cybersecurity frameworks defines the activities needed to attain the different cybersecurity results?

Framework core

Which of the following is a valid biometric authentication method?

Gait recognition

Which of the following types of hackers are strongly motivated by ideology?

Hacktivists

Which of the following trust models has only one CA signing digital certificates?

Hierarchical trust model

Which of the following recovery sites is more expensive to maintain?

Hot site

You have been instructed to set up a system in a conference room where only trusted employees can access both the secure internal corporate network and the internet, and public users are restricted from accessing the internet from the same network. Which protocol or standard should you use?

IEEE 802.1x

Which of the following is a physical security measure?

Industrial camouflage

An attack where the threat actor changes the value of the variable outside of the programmer's intended range is known as _____________.

Integer overflow

Shaun is an external penetration testing consultant. The Chief Information Security Officer (CISO) of the organization he is working with indicated that none of the internal higher management executives should receive any kind of spear-phishing emails during Shaun's testing. Which part of the rules of engagement would cover this limitation?

Internal targets

Why is the UEFI framework considered to be better than the BIOS framework?

It has a better user interface and supports remote troubleshooting.

What is virtual desktop infrastructure?

It is the process of running a user desktop inside a VM residing on a server.

Which of the following refers to the method by which an iOS user can access root privileges on the device?

Jailbreaking

Which of the following is a snooping malware?

Keylogger

Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?

Lateral movement

Which cryptography method provides cryptographic solutions uniquely customized to low-power devices that need to manage resources instead of security constraints?

Lightweight cryptography

Which of the following systems combines the functions of a printer, copier, scanner, fax machine, and special-purpose computer with a CPU?

MFP

Your firewall is configured to deny all packets from the address range 192.110.20.30-192.110.20.100, but you want to allow packets from 192.168.20.73. How should you resolve this issue?

Make a force allow rule for source address 192.168.20.73.

Which devices are used as a contactless alternative to cash or a credit card payment system?

NFC

Which agreement specifies how confidential material will be shared between certain parties but restricted to others?

Nondisclosure agreement

Which of the following performs a real-time lookup of a certificate status?

Online certificate status protocol (OCSP)

You want to use different passwords for different accounts by remembering just one password. Which of the following tools fits your need?

Password vault

Which of the following is the Windows network analysis tool that checks the connection to each hop between source and destination?

Pathping

Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the network looking for additional systems accessible through advanced privileges. What should Meta do to gain repeated and long-term access to the system in the future?

Perform backdoor installation

Which of the following accounts is the least vulnerable to cyberattacks?

Personal account

Which of the following social engineering attacks continues to be a primary weapon used by threat actors?

Phishing

Identifying the attack, containing its spread, recovering, and improving the defenses can be done by which of the following?

Preparing incident response plans

Which keys are supposed to be kept confidential and not shared with anyone?

Private key

A zero-day vulnerability has been found in an e-commerce website used to purchase electronics. Neither the website owner nor the general public knows about the vulnerability; it was discovered by a computer security specialist making a purchase. What should the specialist do?

Privately share their findings regarding the zero-day vulnerability with the e-commerce company.

Which of the following best describes attacks due to application vulnerabilities that trick the vulnerable application(s) into producing more executable files in the system?

Process spawning control

Which of the following classifications of data is least important?

Proprietary

When assessing risks, you found that a customer database in your enterprise has a higher risk calculation than a product database and allocated more resources to protect the customer database. Which risk assessment was used here?

Quantitative risk assessment

In a device driver manipulation attack, which of the following changes a device driver's existing code design?

Refactoring

In WPA3, what is designed to increase security at the handshake, when keys are being exchanged, even if the password is small or weak?

SAE

Which protocol can send cryptographic confirmation that an endpoint is who it claims to be so that ARP poisoning is hindered?

SEND

Which of the following protocols can protect network equipment from unauthorized access?

SNMP

Which of the following is a VPN protocol?

SSTP

Which of the below cryptographic protocol is an encrypted alternative to the Telnet protocol used to access remote computers?

Secure shell (SSH)

You want to install a non-biometric authentication method to reduce overall costs. Which of the following is the best fit?

Security keys

Your enterprise network's security was breached when a non-employee connected a device to the network. In a security review meeting, you were asked to employ appropriate measures to prevent this from happening in the future while, at the same time, continuing to allow outsiders to connect to the network. Which of the following actions should you take?

Set up a network access control

Typically, certain employees of an organization get texts that update them on various IT activities. If there is a support ticket or downtime, they will receive texts to let them know about the activity. They have started to receive some messages via text instructing them to call the IT help desk at the provided number. When they call the help desk number, a recording asks them for their employee ID. Assuming that the IT department did not send those texts, which of the following social engineering attacks is this?

Smishing

Ricky entered a restricted lab by scanning his finger on the fingerprint scanner outside the door. Which type of authentication credential allowed Ricky to enter the lab?

Something you are.

Which of the following encrypts one character at a time?

Stream

David, a software engineer, recently bought a brand new laptop because his enterprise follows the BYOD (bring your own device) model. David was part of a software development project where the software code was leaked before its release. Further investigation proved that a vulnerability in David's laptop caused the exposure. David insists he never used the laptop to access any network or integrate any devices, and the laptop was kept in a vault while not in use. Which of the following attack vectors was used by the threat actor?

Supply chain

Which application protocol is used to exchange cyber threat intelligence over HTTP?

TAXII

Which of the following is NOT a characteristic of a trusted platform module (TPM)?

TPM includes a pseudorandom number generator.

PDC Bank is working on creating an AI application that enables customers to send SMS to the AI application to allow banking activities from their registered ID. Jane, the project engineer, has taken bank customer data from the last few years from the server and is using it to train the ML to recognize and authenticate actual users and to ensure unauthorized users are barred from entering the application. Suppose the AI application has been compromised, and the reason has been identified as compromised data being used to improve the ML accuracy. What kind of attack is the PDC Bank application subjected to?

Tainted training data for ML

Which of the following best describes artifacts?

Technology devices that may contain evidence

Frank is authorized to issue mandatory security guidelines for IoT device manufacturers in the United States. Which of the following guidelines should Frank NOT issue?

The devices should present a cost-effective solution for consumers.

The mean time to recovery (MTTR) of a system is zero. What does this imply?

The system is highly resilient.

Jennifer created an e-learning web application where a login form has to be filled by the user entering the application. Jennifer created an 8-byte buffer for the user name file while developing the application. One day, the application halted with denial of service. An attack on the web application due to the incorrect entry of input values in the login screen was then discovered. What caused the denial of service issue?

This is due to a buffer overflow attack.

ABC Automobiles is a large manufacturing company based in Munich, Germany. To ensure productivity, all departments like Finance, Purchase, Sales, R&D, Management, etc., are using computers, and for security, each department is placed in different physical and logical networks while interconnected. Johnson, the Vice President of IT, has requested your service in identifying a problem. Details provided by Johnson and your initial probe include the following: The problem started a few weeks ago in the sales department. Videos of six employees working on the computer are shared outside the organization without the users switching on the cameras or the webcam. Their personal phone numbers and email IDs are also found compromised from these devices. At specific times during the day, these computers exhibited substantial amounts of network traffic. Johnson removed these compromised machines from the network immediately to avoid vulnerabilities spreading in the network. He monitored these machines for any unusual behavior for 40 continuous hours. He could not find anything unusual, except that employees who were using these machines were receiving spam messages on their phones. He also scanned these computers using antivirus software but could not find any viruses. He connected these machines back to the network after these checks, but the computers showed the same behaviors. While the infected machines were off the network, a few other machines started showing similar issues, including sudden network traffic during certain times. During the next three days, the Finance and Purchase departments reported similar complaints on their devices. Johnson was contacted yesterday by the IT admin of Silicon Graphics, saying that their web server crashed. A large number of requests coming from various computers at ABC caused the crash. Silicon Graphics's claims were correct; ABC's computers were sending large amounts of HTTP data packets during the specified time. What is your inference based on the discussion with Johnson?

This is most probably a bot attack.

Which of the following only encrypts the IP packet data and leaves the header unencrypted?

Transport mode

Which of the following best describes password spraying?

Trying a common password on different user accounts

Hassan has been asked to choose a mobile management tool that can provide a single management interface for application, content, and device management. Which of the following is the best solution?

Unified environment management (UEM) tool

In a practical test, you are given a computer with a Windows host OS. You are asked to install a guest machine with Linux OS. What should you do?

Use Type II hypervisor program

You are working in a data center when you suddenly notice a fire in the server room. Which of the following measures should you take first to suppress the fire?

Use the stationary fire suppression system

You are the security administrator in your organization and have been asked to choose a deployment method that ensures the utmost security, where the data is stored in a centralized server and can be accessed by authorized employees using their own devices. Which of the following should you choose?

Virtual desktop infrastructure (VDI)

Which configuration of WLANs has the following flaws? The last PIN character is only a checksum. The PIN is divided into two shorter values. There is no lockout limit for entering PINs.

WPS

Which of the following can be used to enforce strong credential policies for an organization?

Windows Active Directory

You are the security administrator for an enterprise that follows the bring your own device (BYOD) deployment model. What is the first action that you should take to protect sensitive enterprise data from exposure if an employee device is stolen and can't be located?

You should perform a remote wipe.

Which category of cybersecurity vulnerability is exploited by attackers before anyone else knows about it?

Zero day

Which of the following is an improvement of UEFI over BIOS?

enhanced boot security

Which of the following can be a log data source for investigating a security breach?

metadata


Related study sets

FINISHED: American History Study Guide Chapters 23-26

View Set

Melting Pot by Anna Quindlen Q & A

View Set

Module 40: Basic Concepts of Psychological Disorders

View Set

LAST SEMESTER BIO FINAL :) HAINEY

View Set

BIO 101 Exam 1: Chapter 3 (A tour of the cell)

View Set

Modeling And Analyzing Quadratic Functions - Part One Unit Review

View Set

LearningCurve - Chapter 14: Oligopoly

View Set

Course Revision Questions Physics Ch.1

View Set