Security Review #2 – Flashcards

Unlock all answers in this set

Unlock answers
question
1. On your way into the back entrance of the building at work one morning a man dressed as a plumber asks you to let him in so he can "fix the restroom." what should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist.
question
2. Which of the following is not an example of a physical barrier access control mechanism?
answer
One time passwords.
question
3. Which of the following can be used to stop piggybacking that has been occurring at a front entrance where employees should swipe their smart cards to gain entry?
answer
Deploy a mantrap.
question
4. You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
answer
PTZ.
question
5. Which of the following CCTV camera types lets you adjust the distance that the camera can see (i.e. zoom in or out)?
answer
Varifocal.
question
6. Which of the following is the most important thing to do to prevent console access to the router?
answer
Keep the router in a locked room.
question
7. You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks.
question
8. Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?
answer
Class C.
question
9. You walk by the server room and notice a fire has started. What should you do first?
answer
Make sure everyone has cleared the area.
question
10. Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components?
answer
Carbon Dioxide (C02)11.)
question
11. What is the recommended humidity level for server rooms?
answer
50%.
question
12. Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do?
answer
Install shielded cables near the elevator.
question
13. A smart phone was lost at the airport. There is no way to recover the device. Which if the following will ensure data confidentiality on the device?
answer
Remote wipe.
question
14. Which of the following are not reasons to remote wipe a mobile device?
answer
When the device is inactive for a period of time.
question
15. The presence of unapproved modems on desktop systems gives rise to the LAN being vulnerable to which of the following?
answer
War dialing.
question
16. Which Internet connectivity method sends voice phone calls using the TCP/IP protocol over digital data lines?
answer
VoIP.
question
17. Which of the following is not a reason to use subnets on a network?
answer
Combine different media type on to the same subnet.
question
18. Which of the following best describes the purpose of using subnets?
answer
Subnets divide an IP network address into multiple network addresses.
question
19. Which protocol uses traps to send notifications from network devices?
answer
SNMP
question
20. You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?
answer
Implement Version 3 of SNMP.
question
21. Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
answer
ICMP
question
22. Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1?
answer
::1
question
23. You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. Which of the following TCP/IP ports should you open on the firewall (Select Two.)?
answer
25, 110
question
24. Which of the following is a valid IPv6 address?
answer
FEC0::AB:9007.
question
25. Which port number is used by SNMP?
answer
161
question
26. You want to close all ports associated with NetBIOS on your network firewalls to prevent attacks directed against NetBIOS. Which ports should you close?
answer
135,137-139.
question
27. Which of the following protocols uses port 443?
answer
HTTPS.
question
28. Which of the following ports does FTP use to establish sessions and manage traffic?
answer
20, 21
question
29. If an SMTP server is not properly and securely configured, it can be hijacked and used maliciously as a SMTP relay agent. Which of the following activity could it result in?
answer
Spam.
question
30. Which of the following is the best countermeasure against man-in-the-middle attacks?
answer
IPsec.
question
31. While using the Internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, however, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed. Which type of attacks likely occurred?
answer
DNS poisoning.
question
32. Which of the following attacks tries to associate an incorrect MAC address with a known IP address?
answer
ARP poisoning.
question
33. What are the most common network traffic packets captured and used in a replay attack?
answer
Authentication
question
34. A router on the border of your network detects a packet with a source address that is from an internal client but the packet was received on the Internet-facing interface. This is an example of what form attack?
answer
Spoofing.
question
35. What is modified in the most common form of spoofing on a typical IP packet?
answer
Source address.
question
36. What of the following is a privately controlled portion of a network that is accessible to some specific external entities?
answer
Extranet.
question
37. You are implementing security at a local high school that is concerned with students accessing inappropriate material on the Internet from the library's computers. The students will use the computers to search the Internet for research paper content. The school budget is limited. Which of the following filtering option would you choose?
answer
Restrict content based on content categories.
question
38. You are the office manager of a small financial credit business. Your company handles personal, financial information for clients seeking small loans over the internet. You are aware of your obligation to secure clients records, but budget is an issue. Which item would provide the best security for this situation?
answer
All-in-one security appliance.
question
39. Which of the following is a firewall function?
answer
Packet filtering.
question
40. Which of the following are characteristics of a circuit-level gateway (Select two.)?
answer
Stateful, Filters based on sessions.
question
41. Which of the following are characteristics of a packet filtering gateway (Select two.)?
answer
Stateless, Filters IP address and port.
question
42. You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
answer
Circuit-level.
question
43. Which of the following is a valid security measure to protect e-mail from viruses?
answer
Use blockers on e-mail gateways.
question
44. Which of the following prevents access based on website ratings and classifications?
answer
Content filter.
question
45. You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?
answer
Switch.
question
46. Which of the following is an advantage of using switches to create virtual LANs?
answer
Broadcast traffic travels to a subset of devices rather than to all devices on the network.
question
47. Which characteristic of a switch can improve bandwidth utilization and reduce the risk of sniffing attacks on the network?
answer
A switch filters port traffic based on MAC address.
question
48. What characteristics of hubs poses a security threat?
answer
Hubs transmit frames to all hosts on all ports.
question
49. Which of the following devices does not examine the MAC address in a frame before processing or forwarding the frame?
answer
Hub.
question
50. A relatively new employee in the data entry cubical farm was assigned a user account similar to that of all of the other data entry employees. However, audit logs have shown that this user account has been used to change ACLs on several confidential files and has accessed data in restricted areas. This situation indicates which of the following has occurred?
answer
Privilege escalation.
question
51. An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?
answer
Privilege escalation.
question
52. What is the main difference between a worm and a virus?
answer
A worm can replicate itself, while a virus requires a host for distribution.
question
53. What type of malware monitors your actions?
answer
Spyware.
question
54. A collection of zombie computers have been setup to collect personal information. What type of malware do the zombie computers represent?
answer
Botnet.
question
55. What is a program that appears to be a legitimate application, utility, game, or screensaver and that performs malicious activities surreptitiously?
answer
Trojan horse.
question
56. Which of the following actions should you take to reduce the attack surface of a server?
answer
Disable unused services.
question
57. Which of the following describes a configuration baseline?
answer
A list of common security settings that a group or all devices share.
question
58. FTPS uses which mechanism to provide security for authentication and data transfer?
answer
SSL.
question
59. You need to increase the security of your Linux system by finding and closing open ports. Which of the following commands should you use to locate open ports?
answer
nmap
question
60. What will the netstat -a command show?
answer
All listening and non-listening sockets.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New