SEC 110

9 May 2023
4.7 (179 reviews)
150 test answers

Unlock all answers in this set

Unlock answers (146)
question
In information security, which of the following is an example of a threat actor? Select one: a. a force of nature such as a tornado that could destroy computer equipment b. a virus that attacks a computer network c. a person attempting to break into a secure computer network Incorrect d. all of the above
answer
all of the above
question
Select the term that best describes automated attack software?
answer
open-source intelligence
question
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
answer
$1,500,000
question
Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
answer
HIPAA
question
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?
answer
Advanced Persistent Threat
question
What process describes using technology as a basis for controlling the access and usage of sensitive data?
answer
technical controls
question
What term describes a layered security approach that provides the comprehensive protection?
answer
defense-in-depth
question
What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?
answer
identity theft
question
Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?
answer
Gramm-Leach-Bliley
question
Which position below is considered an entry-level position for a person who has the necessary technical skills?
answer
security technician
question
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
answer
Swiss cheese?
question
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
answer
adware
question
What social engineering principal convinces a victim an immediate action is needed?
answer
urgency
question
What social engineering principal frightens and coerces a victim by using threats?
answer
intimidation
question
What specific type of phishing attack uses the telephone to target a victim?
answer
vishing
question
What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?
answer
social engineering
question
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
answer
watering hole
question
What type of malicious software technology is used to download and install software without the user's interaction?
answer
automatic download software
question
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trait that the malware possesses?
answer
Source
question
Which type of phishing attack targets specific users?
answer
spear phishing
question
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
answer
integrity
question
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
answer
ECC
question
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
answer
PGP
question
Which of the following is not one of the functions of a digital signature?
answer
protect the public key
question
Which standard was approved by NIST in late 2000 as a replacement for DES?
answer
AES
question
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
answer
sponge
question
Explain how a hash algorithm works and how it is primarily used.
answer
Creates a unique digital fingerprint of the data. Used mostly for comparison.
question
What characteristics are needed to consider a hashing algorithm secure?
answer
Unique, original, fixed size, and secure
question
What is a pseudorandom number generator?
answer
Algorithm for generating a sequence of numbers whose properties approximate those of random numbers
question
What is the Advanced Encryption Standard (AES)?
answer
The most secure symmetric cipher that replaced DES
question
Select the secure alternative to the telnet protocol:
answer
SSH
question
The process by which keys are managed by a third party, such as a trusted CA, is known as?
answer
key escrow
question
What allows an application to implement an encryption algorithm for execution?
answer
crypto service providers
question
What block cipher mode of operation encrypts plaintext and computes a message authentication code to ensure that the message was created by the sender and that it was not tampered with during transmission?
answer
Galois/Counter
question
What cryptographic transport algorithm is considered to be significantly more secure than SSL?
answer
TLS
question
What is used to create session keys?
answer
master secret
question
What process links several certificates together to establish trust between all the certificates involved?
answer
certificate chaining
question
What process will remove all private and public keys along with the user's identification information in the CA?
answer
destruction
question
What type of trust model has a single CA that acts as a facilitator to interconnect all other CAs?
answer
bridge trust
question
Why is IPsec considered to be a transparent security protocol?
answer
IPsec is designed to not require modifications of programs, or additional training, or additional client setup.
question
An attack that takes advantage of the procedures for initiating a session is known as what type of attack?
answer
SYN flood attack
question
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
answer
DNS poisoning
question
The exchange of information among DNS servers regarding configured zones is known as:
answer
zone transfer
question
What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?
answer
ARP poisoning
question
What type of privileges to access hardware and software resources are granted to users or devices?
answer
access rights
question
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:
answer
DNS
question
Where are MAC addresses stored for future reference?
answer
ARP cache
question
Which SQL injection statement example below could be used to discover the name of the table?
answer
whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
question
Which type of attack below is similar to a passive man-in-the-middle attack?
answer
replay
question
Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?
answer
smurf attack
question
Discuss the two advantages that NAT provides.
answer
masking the IP addresses of internal devices - the actual IP address of the sender cannot be identified by an attack who has captured an outgoing packet stronger security - because all packets are sent out through the NAT router, it knows what was sent out and what to receive
question
How does a Unified Threat Management (UTM) security product help reduce administrative overhead?
answer
It combines several security functions
question
Select the technology that can be used to examine content through application-level filtering.
answer
Web security gateway
question
What data unit is associated with the Open Systems Interconnection layer four?
answer
segment
question
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?
answer
system call
question
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
answer
signature-based
question
When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?
answer
PAT
question
Which of the following is a software-based application that runs on a local host computer that can detect an attack as it occurs?
answer
host-based intrusion detection system
question
Which of the following is defined as a security analysis of the transaction within its approved context?
answer
content inspection
question
NAT is not a specific device, technology, or protocol. It is a technique for substituting IP addresses.
answer
True
question
DNS poisoning can be prevented using the latest edition of what software below?
answer
BIND
question
On and SDN network, what specific unit gives traffic the permission to flow through the network?
answer
SDN controller
question
Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
answer
DNS
question
What hardware device can be inserted into a network to allow an administrator to monitor traffic?
answer
network trap
question
What secure protocol is recommended for Network address translation?
answer
IPsec
question
What secure protocol is recommended for voice and video?
answer
SRTP
question
What type of computing environment allows servers, storage, and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?
answer
hosted services
question
What type of switch is used to combine multiple network connections into a single link?
answer
aggregation switch
question
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?
answer
hypervisor
question
Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?
answer
virtualization
question
Piconets in which connections exist between different piconets are known as which of the following terms?
answer
scatternet
question
Select the device that is designed to exclusively monitor the RF frequency for network transmissions?
answer
dedicated probe
question
The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length?
answer
64 bits
question
What is the maximum range of most Bluetooth 5 devices?
answer
800 ft
question
What is the maximum transmission power for IEEE WLANs?
answer
200 milliwatts (mW)
question
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
answer
evil twin
question
What type of radio frequency transmissions are used by Bluetooth devices?
answer
short-range radio
question
What type of survey can help a network administrator make decisions about bands, channels, and widths when installing new access points?
answer
site
question
Which encryption protocol below is used in the WPA2 standard?
answer
AES-CCMP
question
Which option below is responsible for the issuing of EAP request packets?
answer
authenticator?
question
Anti-virus products typically utilize what type of virus scanning analysis?
answer
String scanning analysis?
question
In Microsoft Windows, what type of templates are a collection of security configuration settings?
answer
security
question
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a:
answer
cable lock
question
What is the name for a cumulative package of all patches and hot-fixes as well as additional features up to a given point?
answer
service pack
question
What security standard was introduced in conjunction with UEFI?
answer
Secure Boot
question
What software methodology includes security automation?
answer
Secure DevOps
question
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile?
answer
Bayesian filtering
question
What type of update does not allow a user to refuse or delay security updates?
answer
forced
question
What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance?
answer
CCTV
question
Which of the following is an AV heuristic monitoring technique?
answer
code emulation
question
A QR code can't contain which of the following items directly?
answer
A video
question
How could an administrator initially manage applications on mobile devices using a technique called "app wrapping?"
answer
Mobile Application Management
question
Mobile devices with global positioning system (GPS) abilities typically make use of:
answer
location services
question
Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.
answer
web-based
question
Select the item that is not considered to be a basic characteristic of mobile devices.
answer
A removable media storage.
question
What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access?
answer
OTG
question
What systems control locally or at remote locations by collecting, monitoring, and processing real-time data so that machines can directly control devices such as valves, pumps, and motors without the need for human intervention?
answer
ICS
question
What type of management system below can help distribute and manage public and corporate apps?
answer
Mobile Device Management
question
Which management system is used to support the creation and subsequent editing and modification of digital content by multiple employees?
answer
content management
question
Which option allows a mobile device to be configured so that the device automatically unlocks and stays unlocked until a specific action occurs?
answer
context-aware authentication
question
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
answer
charmap.exe
question
The use of a single authentication credential that is shared across multiple networks is called:
answer
identity management
question
What federation system technology uses federation standards to provide SSO and exchanging attributes?
answer
Shibboleth
question
What option below represents an example of behavioral biometrics?
answer
keystroke dynamics
question
What specific type of authentication can be based on where the user is located?
answer
geolocation
question
What technology is an open source federation framework and supports the development of authorization protocols?
answer
OAuth
question
What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?
answer
rule attack
question
What type of authentication is based on what the user has?
answer
security token
question
What type of card contains an integrated circuit chip that can hold information, which then can be used as part of the authentication process?
answer
smart card
question
Which of the following is NOT a valid biometric disadvantage?
answer
False error rate
question
A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n):
answer
ACL
question
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as which of the following?
answer
separation of duties
question
Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?
answer
RADIUS
question
During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?
answer
authentication request
question
To assist with controlling orphaned and dormant accounts, what can be used to indicate when an account is no longer active?
answer
account expiration
question
What is an entry in an ACL known as?
answer
ACE
question
What standard provides a greater degree of security by implementing port-based authentication and blocks all traffic on a port-by-port basis until the client is authenticated using credentials stored on an authentication server?
answer
IEEE 802.1x
question
Which access control model is considered to be the least restrictive?
answer
Discretionary Access Control
question
Which access control model that uses access based on a user's job function within an organization?
answer
Role Based Access Control
question
Which of the following controls can be implemented so an organization can configure multiple computers by setting a single policy for enforcement?
answer
group-based access control
question
If a penetration tester has gained access to a network and then tries to move around inside the network to other resources, what procedure is the tester performing?
answer
pivot
question
If a user uses the operating system's "delete" command to erase data, what type of data removal procedure was used?
answer
purging
question
Select the vulnerability scan type that will use only the available information to hypothesize the status of the vulnerability.
answer
non-intrusive
question
What is the end result of a penetration test?
answer
penetration test report
question
What is the name of the process that basically takes a snapshot of the current security of an organization?
answer
vulnerability appraisal
question
What process addresses how long data must be kept and how it is to be secured?
answer
data retention
question
What process does a penetration tester rely on to access an ever higher level of resources?
answer
persistence
question
What security goal do the following common controls address: Redundancy, fault tolerance, and patching.?
answer
availability
question
What type of penetration testing technique is used if the tester has no prior knowledge of the network infrastructure that is being tested?
answer
black box
question
Which data erasing method will permanently destroy a magnetic-based hard disk by reducing or eliminating the magnetic field?
answer
degaussing
question
A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees of service, is known as:
answer
service level agreement
question
A snapshot of the current state of a computer that contains all current settings and data is known as what option below:
answer
system image
question
How can an administrator keep devices powered when power is interrupted?
answer
uninterruptible power supply
question
What RAID type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?
answer
RAID 5
question
What RAID type is based on striping, uses multiple drives, and is not fault tolerant if one of the drives fails?
answer
RAID 0
question
What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?
answer
chain of custody
question
What type of assessment can determine if a system contains PII, whether a privacy impact assessment is required, and if any other privacy requirements apply to the IT system?
answer
privacy threshold
question
What type of element addresses the recovery of critical information technology (IT) assets, including systems, applications, databases, storage and network assets?
answer
disaster recovery
question
When does a company need to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of its operational and financial position, what should be performed?
answer
business impact analysis
question
Which of the following is a location that provides office space, but the customer must provide and install all the equipment needed to continue operations?
answer
cold site
question
Generally considered to be the most important information security policies, what item below defines the actions a user may perform while accessing systems and networking equipment?
answer
acceptable use policies
question
Select the option that best describes a policy:
answer
A document that outlines specific requirements or rules that must be met
question
What describes an agreement between two or more parties and demonstrates a "convergence of will" between the parties so that they can work together?
answer
MOU
question
What is the name for a framework and corresponding functions required to enable incident response and incident handling within an organization?
answer
incident management
question
What kind of policy defines the actions users may perform while accessing systems and networking equipment?
answer
acceptable use policy
question
What specific type of mechanism should be utilized by all types of training to provide input from participants on the training's effectiveness so that any needed modifications can be made for future training?
answer
feedback mechanism
question
What term best describes the ability to continue to function as the size or volume of the enterprise data center expands to meet the growing demands?
answer
scalability
question
What term can be described as a function of threats, consequences of those threats, and the resulting vulnerabilities?
answer
risk
question
What type of control is designed to provide an alternative to normal controls that for some reason cannot be used.?
answer
compensating control
question
Which of the following is an agreement that is intended to minimize security risks for data transmitted across a network?
answer
ISA