FBLA Cyber Security Questions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/257

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

258 Terms

1
New cards

A user receives an unsolicited message in a social network chat window, What type of attack does this indicate?

Spim

2
New cards

An outgoing message is encrypted before transmission using asymmetric cryptography. What does the recipient need to decrypt the message?

The recipient's private key

3
New cards

You are tasked with determining the best use of client-side and server-side validation for a new web-based application. What is the potential risk of client-side validation?

It is easily bypassed

4
New cards

An organization hires temporary users to assist with end-quarter and end-year resources. All of the temps need access to the same domain resources when accessing the network. You need to ensure that user accounts used by temps can only be used during the specific end-of-quarter and end-of-year periods. You need to ensure that the accounts are not available at other times. The solution should require minimal administrative effort to maintain. What should you do?

Set expiration dates for the temp user accounts

5
New cards

A company has an office on the fifth floor of a building in a city that is prone to earthquakes. Earthquakes have been identified as the most important risk to mitigate. Which risk mitigation controls would be important to ensuring employee safety?

Emergency Lighting

Drills

Escape Plans

6
New cards

A remote collection server is managed through command-line commands. Until recently, you have been using Telnet to connect to the server, but you suspect that one or more passwords have been compromised. You are going to disable Telnet connectivity on the server. You need to use a more secure method for logging in and executing commands. What should you use?

SSH (Secure Shell)

7
New cards

A denial service attack has occurred. Which questions should be answered during the incident identification phase?

What servers have been compromised?

What is the impact to the business?

8
New cards

You receive a security bulletin that a patch is available for an application running on all network client computers. The application is a mission-critical application. You download the patch to a directory on a directory on a network server. What should you do next?

Test the patch on selected isolated computers

9
New cards

You are configuring the firewall between the Internet and your perimeter network. There are two servers on the perimeter network. Both servers host a Web application that uses TLS. Which port should you configure to allow incoming and outgoing traffic?

TCP 443 (HTTPS)

10
New cards

You are designing security for network servers. The design requirements call for the servers to be kept in a locked room with limited physical access. You want to ensure that physical access is controlled as tightly as possible and prevent unauthorized access. What should you use?

Secure the room with a biometric-based lock

11
New cards

You need to encrypt to contents of a USB flash drive using the strongest possible encryption. Which type of encryption should you use?

AES (Advanced Encryption Standard)

12
New cards

You are setting up a Wi-Fi infrastructure for a hotel. The hotel wants the Wi-Fi configured to redirect guests to a web page that provides usage instructions and prompts them for authentication information before they are granted Internet access. What should you do?

Configure a captive portal

13
New cards

Remote users who work from home are allowed to log onto the network only during normal business hours. The system administrator has configures remote access portals to enforce this. This is an example of what type of access control?

Rule-based access control

14
New cards

You want to create a document that describes what types of things employees are permitted to do regarding e-mail and Web usage. What should you create?

Acceptable use policy

15
New cards

Your application development plan calls for fuzzing. What is fuzzing used to test for?

Application flaws relating to data input

16
New cards

How does NAT server help protect your network?

By masking the IP addresses of internal computers from the Internet

17
New cards

Your organization has recently seen an increase in thefts of laptops and other electronic equipment. You want to keep equipment accessible as possible while trying to prevent equipment theft. User actions needed to keep the equipment secure need to be kept to a minimum. What should you do?

Secure equipment with cable locks

18
New cards

What protocol provides access to directory server services?

LDAP (Lightweight Directory Access Protocol)

19
New cards

What is the impact of enabling sign-on in an enterprise network?

A user logs on once and can access multiple applications and services

20
New cards

A security system validates whether or not a user has permission to complete an action. This is an example of what?

Authorization

21
New cards

Your deploying a new website. You need to request a SSL certificate from a public CA. What should you do first?

Generate a public and private key pair for the server

22
New cards

You deploy a two-factor authentication system for your network computers using a smart card and pin. Despite this, unauthorized personnel are gaining access to the network. What should you do to help prevent this in the future?

Improve user education and awareness training

23
New cards

You are hiring a consultant to provide to social media presence for your organization. The consultant will use her own computer. What are two potential security implication that should be covered by a legally binding policy documents?

Data ownership for content created

Unauthorized data sharing

24
New cards

A company has implemented a BYOD policy that applies only to members of the Sale department. The company has also performed information classification. Only members of management can access information that is classified as High. Members of the Human Resources department have access to the PII for the company employees. Other employees have access to only information that is classified as Medium or Low. For each type of security training, indicate whether it should be organization-wide or rule-based. (Personal Device Policy, Data Handling Policy, Tailgating Policy, Proper Data Disposal)

Personal Device Policy- Role-based

Data Handling Policy- Role-based

Tailgating Policy- Organization-Wide

Proper Data Disposal- Role-based

25
New cards

What situation describes an organization that is looking for an Internet-based solution. Any employee with Internet access should have access to the resources described. When would it be most appropriate to use a hybrid cloud?

An organization hosts its own applications and data, but occasionally needs additional overflow storage

26
New cards

A server application is currently under development. It has been discovered that some errors, such as divide by zero error, can leave the application running in an unstable condition. The application needs to respond more appropriately to errors and generate an error message when they occur. What should you implement?

Exception Handling

27
New cards

Which component of PKI is necessary for a CA to know whether to accept or reject certificates from another CA?

RA (Registration Authority)

CRL (Certificate Revocation List)

28
New cards

All computers in your organization come with TPM installed. What type of data encryption most often uses keys generated from the TPM?

Full Disk Encryption

29
New cards

Which protocol provides compatible applications with a directory services look up service?

LDAP (Lightweight Directory Access Protocol)

30
New cards

Network users whose computers are running Windows 7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. The user is able to close the windows and they do not prevent the user from browsing the Internet. You need to prevent these windows from appearing. What should you do?

Configure the browsers popup locker

31
New cards

What best describes a digital signature?

A message hash encrypted with the senders private key

32
New cards

You are installing wireless access points on a company network that is separated from the Internet by a firewall. Which two steps can you take to mitigate the risk of eavesdropping by outsiders?

Reduce the transmission power

Adjust the antenna placement

33
New cards

What is risk mitigation?

The process of minimizing the impact of identical risks

34
New cards

An applications executable is digitally signed using a software developer's private key. What does this ensure?

Integrity

35
New cards

War chalking is used for what purpose?

To publicize an unprotected or poorly protected access point

36
New cards

You need to identify the source of malformed network packets flooding your network. What should you use?

Protocol Analyzer

37
New cards

Packet Filtering or Packet Purity

Analyzed against a set of filters. That make it through the filters are sent to the requesting system and other are discarded

38
New cards

Proxy

Firewalls in this case assume the role of a recipient and in turn sends it to the node that requested the information

39
New cards

Stateful Inspection

Compares certain key parts of the packet to a database of trusted information

40
New cards

IP Addresses

Blocks certain IP addresses or a range of IP addresses

41
New cards

Protocols

Decided which of the systems can allow or have access

42
New cards

Ports

Blocking or disabling ports of servers that are connected. Maintain the kind of data flow you want to see and close down possible entry points for hackers

43
New cards

Keywords

will block any website that has to deal with certain predetermined words

44
New cards

IP

Internet Protocol. The main delivery system for information over the Internet

45
New cards

TCP

a protocol developed for the internet to get data from one network device to another

46
New cards

HTTP

Hyper-Text Transfer Protocol. Used for websites.

47
New cards

FTP

File Transfer Protocol. Used to upload or download files

48
New cards

UDP

User Datagram Protocol. Used for information that requires no response. For example streaming video or audio

49
New cards

ICMP

Internet Control Message Protocol. Used by a router to exchange information with other routers

50
New cards

SMTP

Simple Mail Transport Protocol. Used to send text based information like email

51
New cards

SNMP

Simple Network Management Protocol. Used to collect system information from a remote computer

52
New cards

Telnet

Used to preform commands on a remote computer

53
New cards

Remote Log-in

When someone connects to a computer via the Internet

54
New cards

Application backdoor

Hidden access that provides some level of control to a program

55
New cards

SMTP Session Hijacking

By gaining access to a list of e-mail addresses a person can send spam to thousands of users

56
New cards

Operating System Bugs

Operating system backdoors

57
New cards

E-mail bombs

Large quantity of bulk e-mail that overwhelms an e-mail server preventing user access

58
New cards

Macros

tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected

59
New cards

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

60
New cards

Redirect bombs

Hackers can use ICMP to change the path information take by sending it to a different router

61
New cards

Source Routing

Technique in which the originator of a packet can attempt to partially or completely control the path through the network to the destination

62
New cards

Proxy Server

A server that all computers on the local network have to go through before accessing information on the Internet

63
New cards

Trojan Horses

A program advertised as performing one activity but actually doing something else

64
New cards

Worms

Infectious malware spreading without user interaction

65
New cards

Malware

Software that is harmful or destructive, such as a viruses and worms

66
New cards

Grayware

encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that are designed to harms the performance of computers on your network

67
New cards

Fast Flux

DNS technique used by botnets to hide phising and malware delivery sites behind an ever-changing network of comprised hosts acting as proxies

68
New cards

Null Route (Blackhole Route)

Is a network route (routing table entry) that goes nowhere (computer networking)

69
New cards

FDE

Full Disk Encryption. Automatically converts data on a hard drive into a form that cannot be understood by anyone who does not have the decryption key (hardware level)

70
New cards

What is the BEST way to configure a router against a denial of service attack?

Configure your router to use WPA encryption

71
New cards

Botnets

Networks of virus-infected computers

72
New cards

UAC

User Account Control. Informs you when a program makes a change that requires administrator-level permission, also adjusts the permission level of your user accounts

73
New cards

Firewall Analyzer

Helps network security administrators and IT Managers for bandwidth monitoring, and Firewall Internet security events monitoring efficiently

74
New cards

Authenticating

process of determining whether someone or something is who or what they declare to be, usually done by passwords

75
New cards

SmartScreen Filtering

Helps detect phising websites and can protect you from downloading or installing malware

76
New cards

Which of the following provides secure methods for IP multihoming and mobile computing?

Host Identity Protocol (HIP)

77
New cards

Asymmetric Key

Algorithms are used to create a mathematically related key pair: a secret private key and a published public key

78
New cards

Cryptographic Keys

Used in encrypting and decrypting information, there are private keys and public keys

79
New cards

Authorization

Process of giving someone permission to do or have something, this occurs after Authentication

80
New cards

What is the maximum lifetime for a user 10 ticket?

10 hours

81
New cards

What is the usual max tolerance for computer clock synchronization?

5 minutes

82
New cards

User Certificate

A credential issued by the Authentication Service that supplies valid authentication credentials. Whenever the client requires access to a new network resource, it must prevent its TGT to the Key Distribution Center

83
New cards

Data Recovery

Process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally

84
New cards

What is a set of policies and procedures for reacting to and recovering from an IT-disabling disaster?

Business Continuity Strategy

85
New cards

Non-Continuous Data Protection

Refers to backup of computer data by automatically saving a copy of every change made to that data

86
New cards

Cryptography

The science of writing on a secret code and is an ancient art

87
New cards

Hash Function

Uses one key for encryption and another for decrypting

88
New cards

When the sender and the recipient can transmit data to each other over an unsecured or monitored link by encrypting messages without worrying that their communications are being monitored, it is called:

Confidentiality

89
New cards

Networks that allow access to some database materials and e-mail are called:

Semi-Trusted Networks

90
New cards

You need to identify the source of malformed packets flooding your network. What should you use?

Protocol Analyzer

91
New cards

Your network supports a DAC (Discretionary Access Control) system to manage file access permissions. How is this information maintained on the network?

As ACLs (Access Control List)

92
New cards

On a network that uses Kerberos, what does the client computer present as authentication to the server that contains a resource?

Session Ticket

93
New cards

An application needs to use a two-factor authentication based on a username and password plus a one-time password generated from a shared secret key and time stamp. What algorithm can provide the one-time password?

TOTP (Time-based One-time Password Algorithm)

94
New cards

You set up a VM (virtual machine) for testing different versions of an application. You want to be able to return to the baseline state as quickly as possible between each test. What should you do?

Create a snapshot of the VM

95
New cards

RDP

Remote Desktop Protocol

Port: 3389

96
New cards

You are designing security for a financial application. You need to ensure that all tasks relating to the transfer of money require actions by more then one user through a series of checks and balances. All activity must be audited and logged. Which access control method should you design your security model?

Separation of duties

97
New cards

A company has an Ethernet network with four switches, as well as two wireless APs. All devices that connect to either network must be authenticated using EAP (Extensible Authentication Protocol). What should you use?

802.1X

98
New cards

You install a Web application on three identical servers. You need to mitigate the risk that users will be unable to access the Web application if one of the servers fail. It should also mitigate the risk of malware infection. What should you use?

UTM (Unified Threat Management) appliance

99
New cards

You would need to include a RADIUS authentication server when implementing what in you network configuration?

WPA2- Enterprise

802.1X Network Access Control

100
New cards

You are configuring TLS (Transport Layer Security) using a block cipher algorithm for transport encryption. You are using a key exchange that supports forward security. What is the advantage of using forward security?

The session key is not comprised even if a private key used in generating it is compromised