You download a file management application from the Internet. When you launch the application, your screen goes blank and your hard disk's active light starts flashing. You restart the computer and discover that your hard disk partitions have been deleted. This is an example of what kind of threat
A. Spyware
B. Trojan horse
C. Logic bomb
D. RAT
Trojan horse
Which of the following types of keys is found in a key escrow?
A. Public
B. Private
C. Shared
D. Session
Private
A control implemented through administrative policies or procedures.
Administrative control
An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Manager is looking for a solution to reduce the number of account lockouts while improving
security. Which of the following is the BEST solution for this organization?
A. Create multiple application accounts for each user
B. Provide secure tokens.
C. Implement SSO.
D. Utilize role-based access control
Implement SSO
A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
A. Deterrent
B. Preventive
C. Detective
D. Compensating
Deterrent
A set of programs provide a hacker with administrator access to a computer that cannot be detected through normal means.
What is the BEST description of this threat?
A. Rootkit
B. Backdoor
C. Xmas attack
D. Armored virus
Rootkit
A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable. Which of the following MUST be implemented to support this requirement?
A. CSR
B. OCSP
C. CRL
D. SSH
CRL
A physical security deterrent used to protect a computer
Cable lock
Which of the following threat actors is MOST likely to steal a company's proprietary information to gain a market edge and reduce time to market?
A. Competitor
B. Hacktivist
C. Insider
D. Organized crime
Competitor
A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?
A. LDAP services
B. Kerberos service
C. NTLM services
D. CHAP services
Kerberos services
Only Kerberos that can do Mutual Auth and Delegation
An attacker is attempting to hack into a secure server. An insider provides the attacker with a file containing the server's hashed passwords. Company guidelines recommend using multiple word passwords.
Which type of attack would be used to most quickly find passwords in the hashed password file?
A. Dictionary attack
B. Birthday attack
C. Brute force attack
D. Rainbow table attac
Rainbow table attack
A chief Financial Officer (CFO) has asked the Chief Information Officer (CISO) to provide responses to a recent audit report detailing deficiencies in the organization security controls. The CFO would like to know ways in which the organization can improve its authorization controls. Given the request by the CFO, which of the following controls should the CISO focus on in the report? (Select Three)
A. Password complexity policies
B. Hardware tokens
C. Biometric systems
D. Role-based permissions
E. One time passwords
F. Separation of duties
G. Multifactor authentication
H. Single sign-on
I. Lease privilege
Role-based permission
Separation of duties
Lease privilege
Server room aisles that blow cold air from the floor.
Cold aisles
A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. Commonly sent via email.
Phishing
An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment DNSSEC at the organization?
TLS
Which security goal is compromised by a DDoS attack?
A. Availability
B. Confidentiality
C. Nonrepudiation
D. Integrit
Availability
Which of the following is the LEAST secure hashing algorithm?
A. SHA1
B. RIPEMD
C. MD5
D. DES
MD5
Pretending to be another person to gain information.
Impersonation
An attack that uses others by deceiving them. It does not directly target hardware or software, but instead it targets and manipulates people
Social engineering
Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:
Slow performance Word documents, PDFs, and images no longer opening A pop-up
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her wordprocessor. With which of the following is the device MOST likely infected?
A. Spyware
B. Crypto-malware
C. Rootkit
D. Backdoor
Backdoor
Which two types of attacks rely mainly on the attacker seeming to be familiar to the victim for their effectiveness? (Choose two)
A. Pharming
B. Spear phishing
C. Whaling
D. Tailgating
Spear phishing
Tailgating
A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet. Which of the following should be used in the code? (Select TWO.)
A. Escrowed keys
B. SSL symmetric encryption key
C. Software code private key
D. Remote server public key
E. OCSP
Software code private key
OCSP
Processes or actions used to respond to situations or events
Control
Typically, an email message warning of something that isn’t true, such as an outbreak of a new virus. A hoax can send users into a panic and cause more harm than the virus.
hoax
A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST
secure environment?
A. A perimeter firewall and IDS
B. An air gapped compiler network
C. A honeypot residing in a DMZ
D. An ad hoc network with NAT
E. A bastion host
An air gapped compiler network
You are working on a confidential report in a crowded airport terminal. You are not connected to the airport's Wi-Fi hotspot.
What type of attack is most likely to occur?
A. NFC
B. Shoulder surfing
C. Quid pro quo
D. Man-in-the-middle
Shoulder surfing
You receive a direct message from a friend on a social network. The message tells you about an offer to receive a $100 gift card if you are one of the first 25 to respond to a survey. You click the link and become infected with malware.
Which two attack principles contribute to the effectiveness of this attack? (Choose two)
A. Consensus
B. Authority
C. Intimidation
D. Scarcity
E. Trust
Scarcity
Trust
Looking through trash for clues—often in the form of paper scraps—to find users’ passwords and other pertinent information.
dumpster diving
Combining phishing with Voice over IP (VoIP
Vishing
An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?
A. False negative
B. True negative
C. False positive
D. True positive
False positive
Which two attacks are DoS attacks against a Wi-Fi network? (Choose two)
A. WPS attack
B. War driving
C. Jamming
D. Replay
E. IV attack
Jamming
Replay
Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Winch of the following should be used to sign the users' certificates?
A. RA
B. CA
C. CRL
D. CSR
CA
Controls and countermeasures of a tangible nature intended to minimize intrusions.
physical controls
Phishing only large accounts.
Whaling
Cybersecurity summed up in one word.
Trust