QUESTIONS AND SOLUTIONS RATED A+
✔✔Application hardening - ✔✔You have disabled all unnecessary services on a domain
controller. What is this an example of?
✔✔To offer an environment where malware might be executed but with minimal risk to
equipment - ✔✔What is the best reason for security researchers to use virtual
machines?
✔✔White box - ✔✔The security company you work for has been contracted to discern
the security level of a software application. The company building the application has
given you the login details, production documentation, a test environment, and the
source code. Which of the following testing types has been offered to you?
✔✔Zero day - ✔✔A security administrator for your organization utilized a heuristic
system to detect an anomaly in a desktop computer's baseline. The admin was able to
detect an attack even though the signature-based IDS and antivirus software did not
detect it. Upon further review, it appears that the attacker had downloaded an
executable file on the desktop computer from a USB port, and executed it triggering a
privilege escalation. What type of attack has occurred?
✔✔NOP instructions - ✔✔Which of the following would you most likely find in a buffer
overflow attack?
✔✔Integrity - ✔✔Jake is in the process of running a bulk data update. However, the
process writes incorrect data throughout the database. What has been compromised?
✔✔The computer is part of a botnet. - ✔✔You are surprised to notice that a co-worker's
computer is communicating with an unknown IRC server and is scanning other systems
on the network. None of this was scheduled by anyone in your organization, and the
user appears to be unaware of what is transpiring. What is the most likely cause?
✔✔To store keys
To generate keys - ✔✔What are the best reasons to use an HSM
✔✔Secure coding concepts - ✔✔Tara has written an application and is ready to go
through the hardening process. Which of the following could be considered a hardening
process of the SDLC?
✔✔Buffer overflow - ✔✔Which of the following describes an application that accepts
more input than it was originally expecting?
, ✔✔Input validation - ✔✔Which of the following invalidates SQL injection attacks that
were launched from a lookup field of a web server?
✔✔Provider cloud - ✔✔Which of the following solutions should be used by heavily
utilized networks?
✔✔Software as a Service - ✔✔What type of cloud service is webmail known as?
✔✔FTP server - ✔✔Which of the following would a DMZ typically contain?
✔✔Create a VLAN for the servers
Create an ACL to access the servers - ✔✔Your organization uses a SOHO wireless
router all-in-one device. The network has five wireless BYOD users and two web
servers that are wired to the network. What should you configure to protect the servers
from the BYOD users' devices? (Select the two best answers.)
✔✔VLAN - ✔✔What would you implement to separate two departments?
✔✔CASB - ✔✔Your company has a mix of on-premises infrastructure and cloud-
provider infrastructure and needs to extend the reach of its security policies beyond the
internal infrastructure. Which of the following would be the BEST solution for the
company to consider?
✔✔Pharming - ✔✔What is it known as when traffic to a website is redirected to another,
illegitimate site?
✔✔80
443 - ✔✔You have been asked to set up a web server that will service regular HTTP
requests as well as HTTP Secure requests. Which of the following ports would you use
by default?
✔✔Replay attack - ✔✔Which of the following attacks is best described as an attacker
capturing part of a communication, and then later sending some or all of that
communication to a server while pretending to be the original client?
✔✔SYN attack - ✔✔Which one of the following attacks misuses the Transmission
Control Protocol three-way handshake process in an attempt to overload network
servers so that authorized users are denied access to network resources?
✔✔SCP and SFTP - ✔✔You analyze the network and see that a lot of data is being
transferred on port 22. Which of the following set of protocols is most likely being used?
✔✔SCP - ✔✔Which of the following protocols operates at the highest layer of the OSI
model?