Podcast Beta
Questions and Answers
Which of the following is being described when a security professional develops and publishes a password policy specifically tailored to a company, and enforces the policy through technical means?
University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?
A security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?
Which of the following is being described when a malicious host is performing a MITM attack?
Signup and view all the answers
Which of the following is being described when a worm is attacking the network?
Signup and view all the answers
Which of the following is being described when an amplified DDoS attack is in progress?
Signup and view all the answers
Which of the following is being described when a race condition is being leveraged?
Signup and view all the answers
Which of the following is being described when users are running port scans on the network?
Signup and view all the answers
What is the immediate NEXT step the technician should take after discovering a crypto-virus infection on a workstation with access to sensitive remote resources?
Signup and view all the answers
What is the BEST method for Joe, the backup administrator, to use to reduce the restoration time of physical servers?
Signup and view all the answers
Which of the following settings would BEST ensure the new wireless encryption requirements, which mandate the use of AES, are met?
Signup and view all the answers
What differentiates ARP poisoning from a MAC spoofing attack?
Signup and view all the answers
What is the purpose of the checksum values provided on the download page for the organization's core switch software?
Signup and view all the answers
What is the primary difference between SaaS, IaaS, and MaaS?
Signup and view all the answers
What is the main difference between a private cloud and a hybrid cloud?
Signup and view all the answers
What is the primary purpose of using a differential backup strategy?
Signup and view all the answers
Which type of penetration testing is best identified when the client does not share any information related to the environment to be tested?
Signup and view all the answers
What is the GREATEST ongoing risk after a vulnerability is discovered in an IoT system?
Signup and view all the answers
Which of the following is a type of authentication factor?
Signup and view all the answers
Which of the following is a type of penetration testing approach?
Signup and view all the answers
Which of the following is a type of security incident response team?
Signup and view all the answers
Which of the following is a type of authentication method?
Signup and view all the answers
Which of the following is a type of security testing approach?
Signup and view all the answers
What type of attack has most likely occurred when a Chief Executive Officer receives an email instructing to update account credentials?
Signup and view all the answers
In the scenario described, what type of malware could be responsible for locking files and demanding payment in Bitcoin?
Signup and view all the answers
Which authentication protocol would be the BEST choice for mutual authentication, SSO, smart card logons, and high security in file-sharing?
Signup and view all the answers
What method would internal security teams use to assess the security of internally developed applications?
Signup and view all the answers
What is the likely reason for other users in the organization losing the ability to open files on the server after one user clicked on a malicious file?
Signup and view all the answers
Which type of attack involves sending deceptive emails to trick individuals into revealing sensitive information like passwords or account details?
Signup and view all the answers
What type of malware is designed to disrupt normal network traffic or services by overwhelming a system with an excessive amount of traffic requests?
Signup and view all the answers
Which authentication method is typically used for secure wireless networks and is not suitable for mutual authentication?
Signup and view all the answers
Which architecture concept would BEST accomplish isolating resources for each department while allowing communication to central servers?
Signup and view all the answers
If a user was complying with the Acceptable Use Policy (AUP), what is the MOST likely cause for the proxy server log event indicating the user was repeatedly violating content standards?
Signup and view all the answers
Which of the following controls BEST describes the policy of requiring all employees to have their badges rekeyed at least annually?
Signup and view all the answers
What information is the remote intruder looking for by exploiting the network to inventory software versions?
Signup and view all the answers
Which of the following architecture concepts would BEST accomplish isolating resources for each department while allowing communication to central servers?
Signup and view all the answers
If a user was complying with the Acceptable Use Policy (AUP), what is the MOST likely cause for the proxy server log event indicating the user was repeatedly violating content standards?
Signup and view all the answers
Study Notes
Network Security
- A malicious host performing a MITM attack, an amplified DDoS attack, or a worm attacking the network can be identified through port scans.
- A security professional develops and publishes a password policy tailored to a company and enforces it through technical means, implementing security control diversity.
Single Sign-On (SSO) Services
- University A offers an AAA-based SSO service allowing students to access wireless and VPN services with standard university credentials.
- To partner with University B, RADIUS federation should be implemented to allow students to sign into both universities' wireless network and VPN services with their home university credentials.
Secure Communication
- To assure the authenticity and confidentiality of an official response to a security assessment report, digital signatures and encryption should be used.
- A security analyst should use digital signatures to authenticate the sender and ensure the contents remain confidential.
Incident Response
- Upon discovering a crypto-virus infection on a workstation with access to sensitive remote resources, the immediate next step is to disable the network connections on the workstation.
- In a security breach, lessons learned documentation should include details of communication challenges, man-hours, and costs associated with the breach, as well as suggestions for improved monitoring and auditing of system access.
Penetration Testing
- A black box penetration test involves no prior knowledge of the environment to be tested.
- In a black box penetration test, the tester has no information about the environment, similar to a real-world attack scenario.
IoT Systems
- After a vulnerability is discovered in an IoT system, the greatest ongoing risk is credentialed vulnerability scanning.
Email Attacks
- An email directing the CEO to click on a link to update account credentials is likely a spear phishing attack.
Ransomware and Malware
- A user unable to open a file with a grayed-out icon and a lock, with a pop-up message demanding payment in Bitcoin to unlock the file, has likely been affected by ransomware or crypto-malware.
Authentication Protocols
- Kerberos is a protocol that provides mutual authentication, SSO, and smart card logons, making it suitable for securely authenticating clients in a file-sharing protocol.
Network Architecture
- Network segmentation is an architecture concept that allows departments to isolate their resources while still communicating with central servers.
Security Assessments
- Internal security teams use penetration testing to assess the security of internally developed applications.
- Password cracking methods can be slowed down using PBKDF2, Bcrypt, and other algorithms.
Risk Assessment
- To determine the Annualized Loss Expectancy (ALE) of a particular risk, the Single Loss Expectancy (SLE) and Annualized Rate of Occurrence (ARO) must be calculated.
Access Control
- A policy requiring employees to rekey their badges at least annually is an administrative control.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cybersecurity attacks and vulnerability testing with this quiz. Identify the types of attacks based on given scenarios, and understand different methods of vulnerability testing. From phishing attacks to penetration testing, this quiz covers a range of topics in cybersecurity.