quiz image

Mobile Deployment Authentication Types Quiz

FaithfulAlder avatar
FaithfulAlder
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

Which of the following must be configured to provide authentication between the switch and the TACACS+ server?

Shared secret

Which of the following is BEST suited to perform an audit of the login page of a newly developed web application to determine if default accounts have been disabled?

Password cracker

Which of the following is the color-coded table in the exhibit an example of?

Qualitative risk assessment

Which of the following should be implemented to prevent DoS attacks in the future for the bank experiencing a DoS attack against an application designed to handle 500 IP-based sessions, where the perimeter router can only handle 1Gbps of traffic?

<p>Deploy a content delivery network (CDN) to distribute the application traffic</p> Signup and view all the answers

Which of the following actions should a systems administrator take when configuring a new network switch for TACACS+ management and authentication?

<p>Configure a shared secret</p> Signup and view all the answers

Which of the following actions should a security administrator take to audit the login page of a newly developed web application to determine if default accounts have been disabled?

<p>Use a password cracker</p> Signup and view all the answers

Which of the following is the color-coded table in the exhibit used to represent?

<p>Qualitative risk assessment</p> Signup and view all the answers

What should be implemented to prevent future DoS attacks on the bank's application that can handle 500 IP-based sessions, when the perimeter router can only handle 1Gbps of traffic?

<p>Deploy a content delivery network (CDN) to distribute the application traffic</p> Signup and view all the answers

Which of the following steps should the forensic analyst perform NEXT in the forensics process, given the scenario of following incident response best practices and compiling artifacts for the legal team?

<p>Containment procedures</p> Signup and view all the answers

Which of the following would BEST resolve the vulnerability identified in the audit report that could allow unauthorized personnel access to the facility and network?

<p>Mantrap</p> Signup and view all the answers

Based on the observed network traffic behavior described, where the computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts, what is the MOST likely cause?

<p>Malware infection</p> Signup and view all the answers

Which of the following steps should the forensic analyst perform NEXT in the forensics process, given the scenario of following incident response best practices and compiling artifacts for the legal team?

<p>Eradication procedures</p> Signup and view all the answers

Which of the following would BEST resolve the vulnerability identified in the audit report that could allow unauthorized personnel access to the facility and network?

<p>Mantrap</p> Signup and view all the answers

Based on the observed network traffic behavior described, where the computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts, what is the MOST likely cause?

<p>Malware infection</p> Signup and view all the answers

Which of the following is the BEST way to check if the digital certificate is valid?

<p>CRL</p> Signup and view all the answers

Which of the following is used to validate the integrity of data?

<p>RSA</p> Signup and view all the answers

Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?

<p>Backdoor</p> Signup and view all the answers

Which of the following access management concepts is associated with file permissions?

<p>Authorization</p> Signup and view all the answers

Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?

<p>DLP</p> Signup and view all the answers

Which access management concept is associated with file permissions?

<p>Authorization</p> Signup and view all the answers

Which technique was used by the third-party penetration testing company to gain root access on the server?

<p>ARP cache poison</p> Signup and view all the answers

What did the tester do after gaining root access on the initial server?

<p>Moved to another server that was not in the original network</p> Signup and view all the answers

Based on the given information, which authentication type is being utilized?

<p>Context-aware authentication</p> Signup and view all the answers

Which account type should the policy specify for service technicians from corporate partners?

<p>Privileged user account</p> Signup and view all the answers

Which of the following are needed to ensure credentials are encrypted in transit when implementing a RADIUS server for Single Sign-On (SSO)?

<p>Public key, Shared key</p> Signup and view all the answers

In which environment is the employee currently working, based on the given information?

<p>Development</p> Signup and view all the answers

What is the term used to describe the situation when a vulnerability scan fails to identify an existing vulnerability?

<p>False negative</p> Signup and view all the answers

Which of the following is the primary goal of the account management policy mentioned in the text?

<p>All of the above</p> Signup and view all the answers

Which of the following security attributes is NOT mentioned as a parameter defined by the account management policy?

<p>Multi-factor authentication</p> Signup and view all the answers

What is the purpose of the secure shell around software being developed by the employee?

<p>To secure executable files</p> Signup and view all the answers

What is the immediate next step the technician should take after discovering a crypto-virus infection on a workstation with access to sensitive remote resources?

<p>Disable the network connections on the workstation</p> Signup and view all the answers

Which backup method would be the best for Joe, the backup administrator, to implement in order to reduce the restoration time of physical servers?

<p>Snapshots</p> Signup and view all the answers

To comply with the new requirements mandating the use of AES encryption for the company's wireless configuration, which setting should the network technician configure?

<p>Configure CCMP</p> Signup and view all the answers

Which statement accurately differentiates ARP poisoning from a MAC spoofing attack?

<p>ARP poisoning uses unsolicited ARP replies</p> Signup and view all the answers

When downloading software for the organization's core switch, the network administrator is presented with checksum values. What is the primary purpose of checksums in this context?

<p>To verify the integrity of the downloaded files</p> Signup and view all the answers

Which of the following best describes the difference between SaaS (Software as a Service) and IaaS (Infrastructure as a Service)?

<p>SaaS provides software applications, while IaaS provides virtualized computing resources</p> Signup and view all the answers

In the context of cloud computing models, what is the primary characteristic that differentiates a private cloud from a hybrid cloud?

<p>A private cloud is owned and operated by a single organization, while a hybrid cloud combines private and public cloud resources</p> Signup and view all the answers

Which of the following is an accurate statement about MaaS (Mobility as a Service)?

<p>MaaS is a cloud computing model that provides transportation services on-demand</p> Signup and view all the answers

Which of the following is the MOST likely reason the company website is unavailable after the network administrator disables HTTP and implements SSL?

<p>The company firewall is blocking port 443 traffic</p> Signup and view all the answers

Which of the following access management concepts is associated with file permissions?

<p>Authorization</p> Signup and view all the answers

According to the follow-up action item from the lessons learned meeting, which of the following conditions would NOT allow authentication?

<p>The user is accessing from within the United States anytime</p> Signup and view all the answers

Which of the following is used to validate the integrity of data?

<p>The MD5 and SHA-1 checksums match, so the files have not been compromised</p> Signup and view all the answers

Which of the following statements is TRUE regarding the company website's login page?

<p>Users are able to reach the login page from home using HTTP</p> Signup and view all the answers

Which of the following is the MOST likely cause of the observed network traffic behavior where computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts?

<p>The computers have been infected with malware</p> Signup and view all the answers

Which of the following was MOST likely utilized to exfiltrate the proprietary data?

<p>Insider threat</p> Signup and view all the answers

Which of the following access management concepts is associated with file permissions?

<p>Authorization</p> Signup and view all the answers

Which of the following is the BEST way to check if the digital certificate is valid?

<p>CRL</p> Signup and view all the answers

Which of the following is used to validate the integrity of data?

<p>MD5</p> Signup and view all the answers

Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?

<p>Crypto-malware</p> Signup and view all the answers

Which of the following access management concepts is associated with file permissions?

<p>Authorization</p> Signup and view all the answers

Which technique was used by the third-party penetration testing company to gain root access on the server?

<p>ARP cache poisoning</p> Signup and view all the answers

Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?

<p>Backdoor</p> Signup and view all the answers

What did the tester do after gaining root access on the initial server?

<p>Moved to another server in the network</p> Signup and view all the answers

Which of the following access management concepts is associated with file permissions?

<p>Authorization</p> Signup and view all the answers

Which of the following is being described when a security professional develops and publishes a password policy specifically tailored to a company, and enforces the policy through technical means?

<p>Creating security benchmarks</p> Signup and view all the answers

University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?

<p>RADIUS federation</p> Signup and view all the answers

The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?

<p>Digitally sign the message to ensure authenticity and encrypt the message to ensure confidentiality</p> Signup and view all the answers

University A offers an AAA-based SSO service that allows students to access all wireless and VPN services with the standard university credentials. University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?

<p>RADIUS federation</p> Signup and view all the answers

A security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?

<p>Digitally sign the message to ensure authenticity and encrypt the message to ensure confidentiality</p> Signup and view all the answers

Which of the following is being described when a security professional develops and publishes a password policy specifically tailored to a company, and enforces the policy through technical means?

<p>Creating security benchmarks</p> Signup and view all the answers

University A offers an AAA-based SSO service that allows students to access all wireless and VPN services with the standard university credentials. University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?

<p>RADIUS federation</p> Signup and view all the answers

The security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?

<p>Digitally sign the message to ensure authenticity and encrypt the message to ensure confidentiality</p> Signup and view all the answers

What is the primary purpose of ARP poisoning?

<p>To redirect network traffic by spoofing ARP replies</p> Signup and view all the answers

Which of the following is a characteristic of a hybrid cloud model?

<p>It combines both private and public cloud resources</p> Signup and view all the answers

What is the primary purpose of using checksums when downloading software for network devices?

<p>To verify the integrity of the downloaded data</p> Signup and view all the answers

Which of the following is the MOST effective countermeasure against a distributed denial-of-service (DDoS) attack?

<p>Implementing an anti-DDoS service or mitigation solution</p> Signup and view all the answers

What is the primary purpose of implementing RADIUS for Single Sign-On (SSO)?

<p>To provide centralized authentication and authorization</p> Signup and view all the answers

Which of the following is the MOST effective way to determine if a web application has default accounts enabled?

<p>Attempt to authenticate with common default account credentials</p> Signup and view all the answers

What is the primary purpose of the secure shell (SSH) in the context of software development?

<p>To provide secure remote access to the development environment</p> Signup and view all the answers

Which of the following is the MOST effective way to mitigate the risk of a false negative during a vulnerability scan?

<p>Perform manual code reviews in addition to automated scanning</p> Signup and view all the answers

Which two protocols should the security technician configure to meet the requirements of sending status reports and logging details to a central management console?

<p>SNMPv3 and Syslog</p> Signup and view all the answers

Based on the observation that each malware binary has a different hash, which type of malware is most likely present in the enterprise network environment?

<p>Polymorphic worm</p> Signup and view all the answers

Which combination of factors represents multifactor authentication?

<p>Voice recognition and retina scan</p> Signup and view all the answers

Based on the HTTP POST request containing the string userid=bob' and 1='1&amp;request=Submit, which type of attack was attempted?

<p>SQL injection</p> Signup and view all the answers

Which type of control allows a security guard to perform a post-incident review?

<p>Detective</p> Signup and view all the answers

Which security concern arises from the testing team's decision to use production data in the test system for stress testing?

<p>Potential data leakage</p> Signup and view all the answers

Which of the following is a common technique used by polymorphic malware to evade detection?

<p>Mutating its code with each infection</p> Signup and view all the answers

In the context of network security, what is the primary purpose of using the Syslog protocol?

<p>Centralized log management</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser