by 0x4b4d


keywords:
Bookmark and Share



Front Back
1. In which type of testing do you begin with the premise that the attacker has no knowledge of the network?
Black box
White box
Gray box
Green box
1. A. With black box testing, you begin with the premise that the attacker has no knowledge of the network.
2. Which IEEE standard is often referred to as EAP over LAN?
802.1E
802.1Z
802.1Y
802.1X
2. D. The IEEE standard 802.1X is often referred to as EAP over LAN. It defines port-based security for wireless network access control.
3. Which log visible in Event Viewer shows successful and unsuccessful login attempts in Windows 7?
System
Security
Audit
Application
3. B. The Security log in Windows 7 (as well as in all versions of Windows) shows successful and unsuccessful login attempts and can be viewed with Event Viewer.
4. During what process do you look at all custom written applications for holes that may exist (in the form of the finished application, configuration files, libraries, and so on)?
Network bridging
Design review
Code review
Remediation
4. C. During a code review, you look at all custom written applications for holes that may exist (in the form of the finished application, configuration files, libraries, and the like).
5. What are the two states that an application can fail in?
Dependable
Failsafe
Failopen
Assured
5. B, C. There are two states that an application can fail in. In a failsafe mode, the crash leaves the system secure. In a failopen state, the crash leaves the system exposed (not secure).
6. You want to implement MAC filtering on a small network but do not know the MAC address of a Linux-based workstation. Which command-line tool can you run on the workstation to find the MAC address?
ifconfig
ifconfig /show
ipconfig
ipconfig /all
6. A. The command ifconfig will show the MAC address on the Linux or Unix-based workstation.
7. Which of the following is a protection feature built into many firewalls that allow the administrator to tweak the tolerance for unanswered login attacks?
MAC filter
Flood guard
MAC limiter
Security posture
7. B. A flood guard is a protection feature built into many firewalls that allow the administrator to tweak the tolerance for unanswered login attacks. By reducing this tolerance, it is possible to reduce the likelihood of a successful DoS attack.
8. The goal of _____ is to minimize the possibility of exploitation by reducing the amount of code and limiting potential damage.
EAPOL
EAP
ASR
802.1X
8. C. The goal of attack surface reduction (ASR) is to minimize the possibility of exploitation by reducing the amount of code and limiting potential damage.
9. Which Windows workstation feature is accused of—sometimes inadvertently—making network bridging possible and introducing security concerns?
Internet Connection Sharing
Windows Firewall
Network Address Translation
Dynamic Naming Service
9. A. ICS—Internet Connection Sharing—is accused of (sometimes inadvertently) making network bridging possible and introducing security concerns.
10. Which of the following is a software application that checks your network for any known security holes?
Logic bomb
Log analyzer
Vulnerability scanner
Design reviewer
10. C. A vulnerability scanner is a software application that checks your network for any known security holes.
11. In which type of testing do you begin with the premise that the attacker has inside knowledge of the network?
Black box
White box
Gray box
Green box
11. B. With white box testing, you begin with the premise that the attacker has inside knowledge of the network.
12. Rule-based management defines conditions for access to objects and is also known as:
Distributed management
Management by objective
Role-based management
Label-based management
12. D. Rule-based management, also known as label-based management, defines conditions for access to objects.
13. Nessus is a tool that performs which security function?
Vulnerability scanning
Penetration testing
Ethical hacking
Loop protection
13. A. Nessus is one of the better-known vulnerability scanners.
14. The approach a business takes to security is known as its:
Rule-based management
Network bridging
Security posture
Assessment technique
14. C. The security posture is the approach a business takes to security.
15. Which of the following is the area of an application that is available to users—those who are authenticated and more importantly those who are not?
Exposed liability
Attack surface
Security weakness
Susceptible claim
15. B. The attack surface of an application is the area of an application that is available to users—those who are authenticated and more importantly those who are not.
16. You want to implement MAC filtering on a small network but do not know the MAC address of a Windows-based workstation. Which command-line tool can you run on the workstation to find the MAC address?
ifconfig
ifconfig /show
ipconfig
ipconfig /all
16. D. The command ipconfig /all will show the MAC address as the physical address.
17. Your manager has purchased a program intended to be used to find problems during code review. The program will read the code and look for any possible bugs or holes. What type of assessment is this known as?
Mechanized
Automated
Programmed
Manual
17. B. Simply reading the code is known as manual assessment, while using tools to scan the code is known as automated assessment.
18. What checks to make sure that things are operating status quo and that change detection is used to alert when modifications are made?
Baseline reporting
Code review
Attack surfacing
Risk analysis
18. A. Baseline reporting checks to make sure that things are operating status quo and that change detection is used to alert when modifications are made.
19. In which type of testing do you begin with the premise that an outsider attacker is being fed some knowledge from someone inside the network?
Black box
White box
Gray box
Green box
19. C. With gray box testing, you begin with the premise that an outsider attacker is being fed some knowledge from someone inside the network.
20. Which of the following involves trying to get access to your system from an attacker's perspective?
Loop recon
Flood gating
Vulnerability scanning
Penetration testing
20. D. Penetration testing involves trying to get access to your system from an attacker's perspective.
Penetration Testing
Using multiple tools to attack the system as an attacker would in order to assess security and vulnerability
Black box testing
Tester has no prior knowledge of the system under attack
White box testing
Tester has full knowledge of the system under attack
Gray box testing
Tester has some knowledge of the system under attack
Code review
Examining custom source code for vulnerabilities.
Also examining changes this code will make to other code
Attack surface
All of the pathways for attack
Includes ports, protocols, services, applications, etc
Smaller attack surface means less chance of compromise
Failsafe vs Failopen
Failsafe - application crashes leave the system secure
Failopen - application crashes leave elevated privileges
x of y cards