1.
Which of the following allows for notification when a hacking attempt is discovered?
Correct Answer
B. NIDS
Explanation
NIDS (Network-Intrusion Detection System) Passive Response Options:
Notification communicates intrusion event-related information to the appropriate personnel when an event has occurred. This includes relaying any relevant data about the event to help evaluate the situation. If the IDS is manned full-time, messages can be displayed on the manager's console to indicate that the situation is occurring. (Domain 2.4)
2.
When dealing with a 10BASE5 network, which of the following is the MOST likely security risk?
Correct Answer
D. A vampire tap
Explanation
10BASE5 network uses coaxial wire (similar to cable co. wire)as the infrastructure. Although this configuration is mostly phased out in networks, the primary security risk was the use of Vampire Taps. These taps are named based on their physical design, which resembles how a vampire would bite into a wire - using two teeth of different sizes. One taps the braided outer shielding while another longer prong taps the center conductor. Once in place, all data on the net can be stolen with no indication the device is in place. (Domain 2.6)
3.
Which of the following allows a technician to scan for missing patches on a device without actually attempting to exploit the security problem?
Correct Answer
A. A vulnerability scanner
Explanation
A TCP/IP network makes many of the ports available to outside users through the router. These ports respond in a predictable way. A port scanner can identify which ports are open and the data collected can be fed to a vulnerability scanner, whose job is to identify the known exploits attackers may use on that open port and re-mediate them with patches. (Domain 2.1)
4.
Which of the following allows for proof that a certain person sent a particular email?
Correct Answer
D. Non-repudiation
Explanation
Non-repudiation prevents one party from denying actions they carried out. In cryptography, you need non-repudiation to verify that someone is who they report to be.
Third party organizations called CAs (Certificate Authorities) manage public keys and issue certificates verifying the validity of the sender's message. The verifying aspect serves as non-repudiation' a respected third party vouches for the individual. The goal of any effective cryptography system must include non-repudiation. (Domain 5.1)
5.
Which of the following uses a key ring?
Correct Answer
C. PGP
Explanation
PGP (Pretty Good Privacy)is the freeware e-mail security encryption system that uses both symmetrical and asymmetrical systems in a key-ring configuration.(Domain 5.3)
SIDE STUDY
AES (Advanced Encryption Standard)
6.
Which of the following allows for the highest level of security at time of login?
Correct Answer
B. Two-factor authentication
Explanation
Two-factor authentication involves an additional step beyond the normal password (one-factor) entry. Your CAC +PIN is a good example of two-factor method. (Domain 3.7)
SIDE STUDY
Single sign-on - passes authentication information to trusted systems after the initial logon by the user.
One factor-authentication - normally a username and password are all that is required for access.
NTLMv2 - NTLM (NT LAN Manager) is a suite of Microsoft security protocols that offers authentication, integrity, and confidentiality to users. NTLM is the successor to Microsoft LAN Manager (LANMAN).
7.
Sending a patch through a testing and approval process is an example of which of the following?
Correct Answer
B. Change management
Explanation
Change Management - the structured approach that is followed to secure the company's assets. Details here should include the controls that are in place to prevent unauthorized access to, and changes of, all IT assets. (Domain 6.4)
8.
Sending continuous TCP requests to a device and ignoring the return information until the device ceases to accept new connections is an example of which of the following?
Correct Answer
D. DoS
Explanation
DoS (Denial of Service) - a type of attack that prevents any users - even legitimate ones - from using a system. (Domain 2.1)
9.
Which of the following would use a group of bots to stop a web server from accepting new requests?
Correct Answer
B. DDoS
Explanation
DDoS (Distributed Denial of Service) - a derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public. (Domain 2.1)
SIDE STUDY:
DoS (Denial of Service) - a type of attack that prevents any users - even legitimate ones - from using a system.
MAC (Media Access Control) - A sublayer of the Data Link layer of the OSI (Open Systems Interconnection) model that controls the way multiple devices use the same media channel. This is a communication protocol, not an attack.
ARP (Address Resolution Protocol) used to map known IP addresses to unknown physical addresses. This is a communication protocol commonly used by routers.
10.
Which of the following is the MOST likely to generate static electricity?
Correct Answer
A. Low humidity and high temperature
Explanation
Static electricity thrives in hot, dry air. Humidity
11.
Using an asymmetric key cryptography system, where can a technician generate the key pairs?
Correct Answer
A. A certificate authority
Explanation
CAs are responsible for maintaining certificates in the PKI (Public Key Infrastructure) environment. (Domain 3.7)
SIDE STUDY:
IETF (Internet Engineering Task Force) establishes standards and protocols for the Internet.
12.
Which of the following media is the LEAST likely to be successfully tapped into?
Correct Answer
C. Fiber optic cable
Explanation
Fiber, as a media, is relatively secure because it can't be tapped easily. Most known methods of tapping fiber are easily detectable by an IDS. (Domain 2.6)
13.
Which of the following allows a person to find public wireless access points?
Correct Answer
C. SSID broadcast
Explanation
SSID broadcast allows a person to find public wireless access points. When a wireless access point broadcasts its SSID (Service Set Identifier), it becomes visible to nearby devices. This allows users to easily identify and connect to the network. While disabling SSID broadcast can enhance security by making the network less visible, it can also make it more difficult for users to find and connect to the network. Therefore, enabling SSID broadcast is commonly used for public wireless access points to ensure easy accessibility for users.
14.
Which of the following allows a file to have different security permissions for users that have the same roles or user groups?
Correct Answer
C. Discretionary Access Control (DAC)
Explanation
Discretionary Access Control (DAC) allows a file to have different security permissions for users that have the same roles or user groups. In DAC, the owner of a file has the discretion to determine who can access the file and what level of access they have. This means that even if multiple users have the same roles or belong to the same user group, the file owner can assign different permissions to each individual user based on their specific needs or trust levels.
15.
A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?
Correct Answer
D. Honeypot
Explanation
A honeypot is a security mechanism that sets up a fake network or system to attract hackers and gather information about their techniques and intentions. In this scenario, the DMZ (Demilitarized Zone) is acting as a honeypot by creating a decoy network that the hacker is attacking. By luring the hacker to the honeypot, security professionals can study the hacker's methods, identify vulnerabilities, and enhance their overall security posture.
16.
A company decides that the purchasing agent and the accounts receivable agent should exchange positions in order to allow for more oversight of past transactions. Which of the following is this an example of?
Correct Answer
D. Job rotation
Explanation
Job rotation is the correct answer because it involves employees switching roles or positions within a company. In this scenario, the purchasing agent and accounts receivable agent are exchanging positions, which allows for a fresh perspective and increased oversight of past transactions. Job rotation can help prevent fraud, increase employee skills and knowledge, and promote a more well-rounded workforce.
17.
A user complains that the color laser printer continuously gives an access denied message while attempting to print a text document. The administrator logs onto the PC and prints successfully. Which of the following should the administrator check FIRST?
Correct Answer
C. That the user has sufficient rights to print to the printer
Explanation
The administrator should first check if the user has sufficient rights to print to the printer. This is because the access denied message suggests that the user may not have the necessary permissions to use the printer. By verifying the user's rights, the administrator can ensure that the issue is not related to permissions before investigating other possible causes such as paper size, toner, or printer tray.
18.
Which of the following uses a sandbox to manage a programs ability to access system resources?
Correct Answer
A. Java
Explanation
Java uses a sandbox to manage a program's ability to access system resources. The sandbox is a security mechanism that restricts the actions of a program, preventing it from accessing certain system resources or performing potentially harmful operations. This helps to ensure the safety and security of the system by limiting the program's capabilities and preventing it from causing any damage or unauthorized access.
19.
Which of the following allows a technician to view the security permissions of a file?
Correct Answer
A. The access control list
Explanation
The access control list allows a technician to view the security permissions of a file. The access control list is a list of permissions attached to an object, such as a file or folder, that specifies which users or groups are granted or denied access to that object. By viewing the access control list, a technician can see the specific permissions assigned to the file and determine who has access to it.
20.
A user is denied access to a file. The user had access to the file yesterday. Which of the following is the FIRST action for the technician to take?
Correct Answer
C. Verify that the users permissions are correct.
Explanation
The first action for the technician to take is to verify that the user's permissions are correct. This is because the user had access to the file yesterday, indicating that there might be an issue with their permissions. By checking and ensuring that the user has the necessary permissions to access the file, the technician can troubleshoot and resolve any permission-related issues that may have caused the denial of access.
21.
A user is convinced that someone is attempting to use their user account at night. Which of the following should an administrator check FIRST in order to prove or disprove this claim?
Correct Answer
C. The local security logs
Explanation
To prove or disprove the claim that someone is attempting to use the user account at night, the administrator should check the local security logs first. The local security logs contain information about login attempts, failed login attempts, and other security-related events on the user's system. By examining these logs, the administrator can identify any suspicious activity during the night and determine if someone is indeed trying to access the user account. The IDS logs, security application logs, and firewall logs may also provide valuable information, but the local security logs are the most direct and relevant source of evidence in this scenario.
22.
A user reports that a web based application is not working after a browser upgrade. Before theupgrade, a login box would appear on the screen and disappear after login. The login box doesnot appear after the upgrade. Which of the following BEST describes what to check FIRST?
Correct Answer
B. That the pop-up blocker application trusts this site
Explanation
The most likely reason for the login box not appearing after a browser upgrade is that the pop-up blocker application is blocking it. Pop-up blockers are designed to prevent unwanted pop-up windows from appearing, but sometimes they can mistakenly block legitimate ones. Therefore, the first thing to check would be if the pop-up blocker application is configured to allow pop-ups from the specific website.
23.
An intrusion has been detected on a company's network from the Internet. Which of the following should be checked FIRST?
Correct Answer
A. The firewall logs
Explanation
The firewall logs should be checked first because they provide information about all incoming and outgoing network traffic. By analyzing the firewall logs, the company can identify any suspicious or unauthorized activity that may have occurred during the intrusion. This can help in understanding the nature of the attack and taking appropriate measures to mitigate it. DNS logs, access logs, and performance logs may also be useful in investigating the intrusion, but checking the firewall logs is the most crucial initial step.
24.
A user needs to verify that a patch file downloaded from a third party has not been modified since the time that the original manufacturer released the patch. Which of the following is the BEST way to verify that the file has not been modified?
Correct Answer
A. Compare the final MD5 hash with the original
Explanation
Comparing the final MD5 hash with the original is the best way to verify that the patch file has not been modified. MD5 is a widely used cryptographic hash function that generates a unique hash value for a given file. By comparing the final MD5 hash of the downloaded patch file with the original MD5 hash provided by the manufacturer, any changes or modifications to the file can be detected. If the hashes match, it ensures the integrity and authenticity of the file, indicating that it has not been tampered with since the manufacturer released it.
25.
A technician suspects that one of the network cards on the internal LAN is causing a broadcast storm. Which of the following would BEST diagnose which NIC is causing this problem?
Correct Answer
B. A protocol analyzer
Explanation
A protocol analyzer would be the best tool to diagnose which NIC is causing a broadcast storm. A protocol analyzer captures and analyzes network traffic, allowing the technician to identify the source of excessive broadcast traffic. By examining the packets and analyzing their source and destination addresses, the technician can pinpoint the network card that is generating the excessive broadcasts. The NIDS log file, local security log file, and local firewall log file may provide some information about network activity, but they would not provide the detailed packet-level analysis needed to identify the specific NIC causing the broadcast storm.
26.
A user does not understand why the domain password policy is so stringent. Which of thefollowing BEST demonstrates the security basis for the password policy?
Correct Answer
A. Explain how easy it is for a hacker to crack weak passwords
Explanation
Explaining how easy it is for a hacker to crack weak passwords would demonstrate the security basis for the password policy. By highlighting the vulnerabilities and risks associated with weak passwords, the user can better understand the need for a stringent password policy to protect against unauthorized access and potential data breaches. This explanation helps the user comprehend the importance of strong passwords and the potential consequences of using weak ones.
27.
A company needs to have multiple servers running low CPU utilization applications. Which of the following is the MOST cost efficient method for accomplishing this?
Correct Answer
C. Install a single high end server, running multiple virtual servers
Explanation
Installing a single high-end server and running multiple virtual servers is the most cost-efficient method for the company. This approach allows for the consolidation of resources, reducing the need for multiple physical servers. By utilizing virtualization technology, the company can maximize the utilization of the high-end server's resources, effectively running multiple applications on a single machine. This not only saves on hardware costs but also reduces power consumption, cooling requirements, and maintenance efforts.
28.
A programmer creates an application to accept data from a website. A user places moreinformation than the program expects in the input field resulting in the back end database placing the extra information into the database. Which of the following is this an example of?
Correct Answer
D. SQL injection
Explanation
This is an example of SQL injection. SQL injection occurs when a user input is not properly validated or sanitized, allowing an attacker to insert malicious SQL code into a query. In this case, the user input with extra information is being directly inserted into the database, which can lead to unauthorized access, data manipulation, or other malicious activities.
29.
Which of the following security threats is MOST commonly associated with a targeted distributed denial of service (DDoS)?
Correct Answer
C. Botnets
Explanation
A targeted distributed denial of service (DDoS) attack involves overwhelming a target's network or website with a massive amount of traffic, rendering it inaccessible. Botnets, which are networks of compromised computers controlled by a single entity, are commonly associated with DDoS attacks. The attacker can use the botnet to send a flood of traffic to the target, amplifying the impact of the attack. This makes botnets the most commonly associated security threat with targeted DDoS attacks.
30.
A developer added code to a financial system designed to transfer money to a foreign bankaccount on a specific time and date. The code would activate only if human resources processed the developers termination papers. The developer implemented which of the following security threats?
Correct Answer
A. Logic bomb
Explanation
The developer implemented a logic bomb in the financial system. A logic bomb is a malicious code that is inserted into a software system and is triggered by a specific event or condition, in this case, the processing of the developer's termination papers by human resources. Once triggered, the logic bomb would activate and initiate the unauthorized transfer of money to a foreign bank account. This represents a security threat as it could result in financial loss and unauthorized access to sensitive information.
31.
A CEO is concerned about staff browsing inappropriate material on the Internet via HTTPS. It has been suggested that the company purchase a product which could decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing.Which of the following type of attacks is similar to this product?
Correct Answer
D. Man-in-the-middle
Explanation
The correct answer is "Man-in-the-middle." This is because a man-in-the-middle attack involves an attacker intercepting communication between two parties without their knowledge and then relaying the information between them. In this scenario, the product suggested by the CEO would act as a man-in-the-middle by intercepting the SSL session, decrypting it, scanning the content for inappropriate material, and then repackaging the session without the staff knowing.
32.
After a system risk assessment was performed it was found that the cost to mitigate the risk was higher than the expected loss if the risk was actualized. In this instance, which of the following is the BEST course of action?
Correct Answer
A. Accept the risk
Explanation
In this scenario, accepting the risk is the best course of action because the cost to mitigate the risk is higher than the expected loss if the risk occurs. This means that attempting to mitigate the risk would be more expensive than the potential harm caused by the risk itself. By accepting the risk, the organization acknowledges the potential consequences but decides not to take any further action to prevent or reduce it. This decision is based on a cost-benefit analysis, where it is more cost-effective to accept the risk rather than investing resources in mitigation measures.
33.
A small call center business decided to install an email system to facilitate communications in the office.As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected . If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If determining the risk, which of the following is the annual loss expectancy (ALE)?
Correct Answer
D. $7,290
Explanation
ALE (Annual Loss Expectancy) only calculates the loss associated with the risk. It does not factor in the cost associated with remediation.
FORMULA:
$90 per hour * 3 hours labor per incident = $270
$270 * 30 staff = $8100
$8100 * 0.9 (90%) = $7,290
34.
A technician is deciding between implementing a HIDS on the database server or implementing a NIDS. Which of the following are reasons why a NIDS may be better to implement? (Select TWO)
Correct Answer(s)
B. Many HIDS are not able to detect network attacks
C. Many HIDS have a negative impact on system performance.
Explanation
HIDS (Host Intrusion Detection System)
NIDS (Network Intrusion Detection System)
35.
Which of the following scenarios is MOST likely to benefit from using a personal software firewall on a laptop?
Correct Answer
D. Office laptop connected to a home users network
Explanation
Using a personal software firewall on an office laptop connected to a home user's network is most likely to benefit because home networks typically have less security measures in place compared to enterprise LANs. The personal software firewall can provide an additional layer of protection by monitoring and controlling incoming and outgoing network traffic, preventing unauthorized access and potential attacks from the home network.
36.
Virtualized applications, such as virtualized browsers, are capable of protecting the underlyingoperating system from which of the following?
Correct Answer
A. Malware installation from suspects Internet sites
Explanation
Virtualized applications, such as virtualized browsers, can protect the underlying operating system from malware installation from suspicious internet sites. By running the browser in a virtualized environment, any potential malware or malicious code that may be encountered while browsing is isolated from the underlying operating system. This prevents the malware from infecting or compromising the operating system, ensuring its security and integrity.
37.
A flat or simple role-based access control (RBAC) embodies which of the following principles?
Correct Answer
D. Users assigned to roles, permissions are assigned to roles and users acquire permissions by
being a member of the role
Explanation
In a flat or simple role-based access control (RBAC), users are assigned to roles. Permissions are then assigned to roles, and users acquire those permissions by being a member of the role. This means that instead of directly assigning permissions to users or groups, permissions are assigned to roles, and users gain those permissions by being assigned to the corresponding roles. This approach simplifies access control management by centralizing permissions at the role level and allowing for easier assignment and revocation of permissions based on user roles.
38.
A number of unauthorized staff has been entering the data center by piggybacking authorizedstaff. The CIO has mandated that this behavior stops. Which of the following is the BESTtechnology to install at the data center to prevent piggybacking?
Correct Answer
A. Mantrap
Explanation
A mantrap is a security device that consists of two interlocking doors or gates. It allows only one person to pass through at a time, preventing unauthorized individuals from piggybacking or following authorized staff into the data center. By installing a mantrap at the data center, the CIO can ensure that only one person is allowed entry at a time, effectively stopping the unauthorized access. This technology provides a physical barrier and enhances the overall security of the data center.
39.
Which of the following is a security threat that hides its processes and files from being easilydetected?
Correct Answer
D. Rootkit
Explanation
A rootkit is a type of security threat that hides its processes and files from being easily detected. It is designed to gain unauthorized access to a computer system and remain undetected for a long period of time. By hiding its presence, a rootkit can enable malicious activities such as stealing sensitive information, modifying system settings, or installing additional malware. This makes it a serious threat to the security and integrity of a computer system.
40.
Security templates are used for which of the following purposes? (Select TWO).
Correct Answer(s)
D. To ensure that all servers start from a common security configuration
E. To ensure that servers are in compliance with the corporate security policy
Explanation
Security templates are used to ensure that all servers start from a common security configuration and to ensure that servers are in compliance with the corporate security policy. By applying a security template, organizations can enforce consistent security settings and configurations across all servers, reducing the risk of vulnerabilities and ensuring that all servers meet the required security standards.
41.
Frequent signature updates are required by which of the following security applications? (Select TWO).
Correct Answer(s)
A. Antivirus
E. IDS
Explanation
Antivirus and IDS (Intrusion Detection System) are the security applications that require frequent signature updates. Antivirus software needs regular updates to stay up-to-date with the latest virus definitions and protect against new threats. IDS systems also rely on signature updates to detect and prevent new types of attacks by comparing network traffic against known attack patterns. PGP (Pretty Good Privacy), Firewall, and PKI (Public Key Infrastructure) do not typically require frequent signature updates for their functionality.
42.
When choosing an anti-virus product, which of the following are the MOST important securityconsiderations? (Select TWO).
Correct Answer(s)
A. The frequency of signature updates
E. The number of viruses the software can detect
Explanation
The frequency of signature updates is important because it determines how quickly the anti-virus software can recognize and protect against new and emerging threats. The more frequently the signatures are updated, the more effective the software will be in detecting and preventing infections.
The number of viruses the software can detect is also important as it indicates the software's ability to identify and remove a wide range of malware and viruses. A higher number of viruses detected means that the software has a larger database of known threats, increasing the chances of detecting and eliminating malicious software.
43.
Three generally accepted activities of patch management are: determining which patches areneeded, applying the patches and which of the following?
Correct Answer
C. Auditing for the successful application of the patches
Explanation
After determining which patches are needed and applying them, the next step in patch management is to audit for the successful application of the patches. This involves verifying that the patches were installed correctly and have effectively resolved the vulnerabilities they were intended to address. This auditing process ensures that the system is secure and protected against potential threats.
44.
In which of the following situations would it be appropriate to install a hotfix?
Correct Answer
B. A patch is not available and workarounds do not correct the problem.
Explanation
If a patch is not available and workarounds do not correct the problem, it would be appropriate to install a hotfix. A hotfix is a software update specifically designed to address a particular issue or bug that is causing problems. In this situation, since there is no patch available and the workarounds are not effective, installing a hotfix would be the best course of action to resolve the problem.
45.
Social engineering, password cracking and vulnerability exploitation are examples of which of the following?
Correct Answer
C. Penetration testing
Explanation
Social engineering, password cracking, and vulnerability exploitation are all techniques used in penetration testing. Penetration testing involves simulating real-world attacks on a system or network to identify vulnerabilities and weaknesses. By using these techniques, a penetration tester can assess the security posture of the target and provide recommendations for improvement.
46.
If an administrator does not have a NIDS examining network traffic, which of the following could be used to identify an active attack?
Correct Answer
A. Protocol analyzer
Explanation
A protocol analyzer can be used to identify an active attack if an administrator does not have a NIDS examining network traffic. A protocol analyzer is a tool that captures and analyzes network traffic, allowing the administrator to inspect packets and detect any suspicious or malicious activity. By analyzing the network traffic, the administrator can identify any unusual patterns or behaviors that may indicate an active attack. Therefore, a protocol analyzer can be a useful tool in detecting and investigating potential security breaches in the absence of a NIDS.
47.
Configuration baselines should be taken at which of the following stages in the deployment of anew system?
Correct Answer
D. After initial configuration
Explanation
Configuration baselines should be taken after the initial configuration of a new system. This is because the initial configuration involves setting up the system with the necessary hardware, software, and settings. Once this initial configuration is complete, taking a configuration baseline helps establish a reference point for the system's configuration. It allows for future comparisons to identify any changes or deviations from the established baseline. Taking the baseline after the initial configuration ensures that the system is in a stable and functional state before capturing its configuration.
48.
Which of the following practices should be implemented to harden workstations and servers?
Correct Answer
B. Install only needed software
Explanation
Installing only needed software is a recommended practice to harden workstations and servers. By installing only necessary software, the attack surface is reduced, minimizing the potential vulnerabilities that can be exploited by malicious actors. Unnecessary software increases the risk of security breaches as it may contain vulnerabilities or provide additional avenues for attackers to gain unauthorized access. Therefore, installing only needed software helps to enhance the security posture of workstations and servers.
49.
Which of the following is a mechanism that prevents electromagnetic emanations from beingcaptured?
Correct Answer
C. Faraday cage
Explanation
A Faraday cage is a mechanism that prevents electromagnetic emanations from being captured. It is a sealed enclosure made of conductive material, such as metal, that blocks external electromagnetic fields. The conductive material absorbs and redistributes the electromagnetic energy, preventing it from escaping or entering the cage. This helps to protect sensitive electronic devices from electromagnetic interference and prevents unauthorized access to electromagnetic signals.
50.
Which of the following describes the difference between a secure cipher and a secure hash?
Correct Answer
C. A cipHer can be reversed, a hash cannot.
Explanation
A secure cipher is a cryptographic algorithm that can be reversed or decrypted to obtain the original plaintext from the ciphertext. In contrast, a secure hash function is a one-way function that generates a fixed-size output (hash value) for any input size. The hash function cannot be reversed or decrypted to obtain the original input from the hash value. Therefore, the difference between a secure cipher and a secure hash is that a cipher can be reversed, while a hash cannot.