Shared Flashcard Set

Details

Security+ Questions that Came
SEC +
112
Computer Networking
Not Applicable
03/20/2019

Additional Computer Networking Flashcards

 


 

Cards

Term

QUESTION 430

A security administrator installed a new network scanner that identifies new host systems on the network. Which of the following did the security administrator install?

A. Vulnerability scanner

B. Network based IDS

C. Rogue System detection

D. Configuration compliance scanner

Definition
C. Rogue System detection
Term

QUESTION 434

A recent internal audit is forcing a company to review each internal business unit's VMs because the clusters they are installed on is in danger of running out of computer resources. Which of the following vulnerabilities exists?

A. Buffer overflow

B. End of life systems

C. System sprawl

D. Weak configuration

Definition

C. System sprawl

Term

QUESTION 443

Which of the following differentiates a collision attack from a rainbow table attack?

A. A rainbow table attack performs a hash lookup

B. A rainbow table attack uses the hash as a password

C. In a collision attack, the hash and the input data are equivalent

D. In a collision attack, the same input results in different hashes

Definition

C. In a collision attack, the hash and the input data are equivalent

Term

QUESTION 446

When attackers use a compromised host as a platform for launching attacks deeper into a company's network, it is said they are:

A. Escalating privilege

B. Becoming persistent

C. Fingerprinting

D. Pivoting  

Definition

D. Pivoting  

Term

QUESTION 452

A security technician has been receiving alerts from several servers that indicate load balancers have had a significant increase in traffic. The technician initiates a system scan. The scan results illustrate that the disk space on several servers has reached capacity. The scan also indicates that incoming internet traffic to the servers has increased. Which of the following is the most likely cause of the decreased disk space?

A. Misconfigured devices

B. Log and events anomalies

C. Authentication issues

D. unauthorized software

Definition

D. unauthorized software

Term

QUESTION 462

Two users must encrypt and transmit large amounts of data between them. Which of the following should they use to encrypt and transmit the data?

A. Symmetric encryption

B. Hash function

C. Digital Signature

D. Obfuscation

Definition

A. Symmetric encryption

Term

QUESTION 464

A security analyst is investigating a potential breach. Upon gathering, documenting and securing the evidence, which of the following actions is the next step to minimize the business impact?

A. Launch an investigation to identify the attacking host

B. Initiate the incident response plan

C. Review lessons learned captured in the process

D. Remove malware and restore the system to normal operation

Definition

B. Initiate the incident response plan

Term

QUESTION 468

The company has a policy that all of the employees must have their badges rekeyed at least annually. Which of the following describes this policy?

A. Physical

B. Corrective

C. Technical

D. Administrative

Definition

D. Administrative

Term

QUESTION 470 

A forensic export is given a hard drive from a crime scen3e and is asked to perform an investigation. Which of the following is the first step the forensic expert needs to take to protect the chain of custody?

A. Make a forensic copy

B. Create a hash of the drive

C. Recover the hard drive data

D. Update the evidence log 

Definition

D. Update the evidence log 

Term

QUESTION 478 

To help prevent one job role from having sufficient access to create, modify and approve payroll data, which of the following practices should be employed?

A. Least privilege

B. Job rotation

C. Background checks

D. Separation of duties

Definition

D. Separation of duties

Term

QUESTION 485

Joe, a salesman, was assigned to a new project that requires him to travel to a client site. Whilst waiting for a flight, Joe decides to connect to the airport wireless network without connecting to a VPN, and then sends confidential emails to fellow colleagues. A few days later, the company experiences a data breach. Upon investigation the company learns Joe's emails were intercepted. Which of the following most likely caused the data breach?

A. Policy violation

B. Social engineering

C. Insider threat

D. Zero-day attack

Definition

A. Policy violation

Term

QUESTION 489 

A technician is investigating a potentially compromised device with the following symptoms:

Browser slowness

Frequent browser crashes

Hourglass stuck

New Search toolbar

Increased memory consumption

Which of the following types of malware has infected the system?

A. Man in the browser

B. Spoofer

C. Spyware

D. Adware

Definition

A. Man in the browser

Term

QUESTION 496 

An analyst is reviewing a simple program for potential security vulnerabilities before being deployed to a windows server. Given the following code:

Void foo (char *bar)

(

char random_user_input(12);

strcpy (random_user_input, bar) ;

)

Which of the following vulnerabilities is present?

A. Bad memory pointer

B. Buffer overflow

C. Integer overflow

D. Backdoor

Definition

B. Buffer overflow

Term

QUESTION 499 

A user typically works remotely over the holidays, using a web based VPN to access corporate resources. The user reports getting untrusted host errors and being unable to connect. Which of the following is the likely cause?

A. The certificate has expired

B. The browser does not support SSL

C. The user's account is locked out

D. The VPN software has reached the seat license maximum

Definition

A. The certificate has expired

Term

1.       A security administrator has placed the firewall and noticed a number of dropped connections. After looking at the data the security administrator see the following information that was flagged as a possible issue:

“SELECT *FROM” and ‘1’=’1’

 

Which of the following can the security administrator determine from this?

 

a.       An SQL injection attack is being attempted.

b.       Legitimate connections are being dropped.

c.       A network scan is being done on the system

d.       An XSS attack is being attempted.

Definition