ITN 261 final exam OOOONOOO

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

idk from where to study

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

to help protect a company from a ransomware attack which plan should be created ?

an incident response plan

2
New cards

what type of attack could be prevented by having a policy of not allowing users to install software on company phones ?

malware

3
New cards

how would you Best prevent malicious files from reaching a Linux Apache web server?

web application firewall

4
New cards

the following is an administrative control the would be MOST effective to reduce the success of phasing attack ?

security awareness training

5
New cards

what is the best security architecture concept for preventing a worm attack form spreading beyond initial area?

network segmentation

6
New cards

which would be used to restrict accesss for a final PC to an office’s Ethernet port?

MAc filtering

7
New cards

which is most associated with vulnerability scan ?

passive Reconnaissance to get IP dress and operating system info

8
New cards

who attacks companies because they believe a company does business in an unethical manner ?

Hacktivist

9
New cards

what is one danger that a company may face when it moves to completely cloud-based solutions?

possible lack of control over cybersecurity settings

10
New cards

servers logs shows a hacked website used the HTTP method for authenticating uses what is the most likely happened ?

the HTTP Post method is not protected by HTTPs encryption

11
New cards

which of the following BEST describes the type of attacks that are prevented by air gapping critical system?

attacker from another local network segment

12
New cards

a company needs to set up email and web servers for both internal employees and external customers what they should do?

implement a DMZ segment

13
New cards

during a penetration test why would a tester perform a premiminary scan for any responsive hosts ?

to identify server IP address and OS versions for subsequent hacking

14
New cards

which would a company use to ensure users are only logging into system from their laptops when they are on site ?

geofencing

15
New cards

which of the following security concepts is used to make sure employees only have access to the file the need ?

least privilege

16
New cards

a security consultant receives the following output from the company’s web server what is worst danger?

unencrypted credentials over HTTP

17
New cards

which refers to any one system or service thta will cause damage to a company’s revenue when it doesn’t work ?

sinal point of failure

18
New cards

which of the following is typically responsible for a SQL database injections vulnerabilities?

lack of input validations

19
New cards

a crypto-virus infection is found on a workstation that has access to sensitive remote resources what is done FIRST?

disable the network connection on the workstation

20
New cards

which port number does HTTPS use as a default ?

433

21
New cards

which malware works by encrypting files across a network ?

crypto-ransomware

22
New cards

which of the following cryptographic algorithms is irreversible

SHA-256 (hashing )

23
New cards

A CEO personal info was stolen in a social engeering attack .where would it most likely show up for sale ?

dark web

24
New cards

which defines a nation -sate performing advanced and related attacks often employing large numbers of hacker

advanced persistent threat (APT)

25
New cards

a penetration tester is crawling a public website what action is the penetration tester performing ?

reconnaissance

26
New cards

a malicious system sends many continuous TCP SYN packets to a server which BEST describes the resulting effect ?

a denail of service attack where the server will exhaust its memory

27
New cards

what should an analyst do to BEST assess a small company internal servers against recommended security practices ?

run a framework like metaspolit to confirm vulnerabilities

28
New cards

what is the best encryption standard to use on a company wireless access point ?

implement WPA3

29
New cards

which of the following account types should employees on the shop foor with computers thta will log their time receive ?

user accounts based on employee names