Q611. A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic. 

Which of the following would accomplish this task? 

A. Deny TCP port 68 

B. Deny TCP port 69 

C. Deny UDP port 68 

D. Deny UDP port 69 

Answer:

Explanation: 

Trivial File Transfer Protocol (TFTP) is a simple file-exchange protocol that doesn’t require authentication. It operates on UDP port 69. 


Q612. Highly sensitive data is stored in a database and is accessed by an application on a DMZ server. The disk drives on all servers are fully encrypted. Communication between the application server and end-users is also encrypted. Network ACLs prevent any connections to the database server except from the application server. Which of the following can still result in exposure of the sensitive data in the database server? 

A. SQL Injection 

B. Theft of the physical database server 

C. Cookies 

D. Cross-site scripting 

Answer:

Explanation: 

The question discusses a very secure environment with disk and transport level encryption and access control lists restricting access. SQL data in a database is accessed by SQL queries from an application on the application server. The data can still be compromised by a SQL injection attack. SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application's software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database. 


Q613. Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model? 

A. Packet Filter Firewall 

B. Stateful Firewall 

C. Proxy Firewall 

D. Application Firewall 

Answer:

Explanation: 

Stateful inspections occur at all levels of the network. 


Q614. A software development company wants to implement a digital rights management solution to protect its intellectual property. Which of the following should the company implement to enforce software digital rights? 

A. Transport encryption 

B. IPsec 

C. Non-repudiation 

D. Public key infrastructure 

Answer:

Explanation: 

The Public-Key Infrastructure (PKI) is intended to offer a means of providing security to messages and transactions on a grand scale. The need for universal systems to support e-commerce, secure transactions, and information privacy is one aspect of the issues being addressed with PKI. A PKI can be used to protect software. 


Q615. Which of the following security concepts can prevent a user from logging on from home during the weekends? 

A. Time of day restrictions 

B. Multifactor authentication 

C. Implicit deny 

D. Common access card 

Answer:

Explanation: 

Time of day restrictions limit when users can access specific systems based on the time of day or week. It can limit access to sensitive environments to normal business hours when oversight and monitoring can be performed to prevent fraud, abuse, or intrusion. 


Q616. When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength? 

A. SHA 

B. AES 

C. DES 

D. RSA 

Answer:

Explanation: 

RSA (an asymmetric algorithm) uses keys of a minimum length of 2048 bits. 


Q617. Sara, an application developer, implemented error and exception handling alongside input validation. Which of the following does this help prevent? 

A. Buffer overflow 

B. Pop-up blockers 

C. Cross-site scripting 

D. Fuzzing 

Answer:

Explanation: 

Buffer overflow is an exploit at programming error, bugs and flaws. It occurs when an application is fed more input data than it is programmed to handle. This may cause the application to terminate or to write data beyond the end of the allocated space in memory. The termination of the application may cause the system to send the data with temporary access to privileged levels in the system, while overwriting can cause important data to be lost. Proper error and exception handling and input validation will help prevent Buffer overflow exploits. 


Q618. A security analyst implemented group-based privileges within the company active directory. Which of the following account management techniques should be undertaken regularly to ensure least privilege principles? 

A. Leverage role-based access controls. 

B. Perform user group clean-up. 

C. Verify smart card access controls. 

D. Verify SHA-256 for password hashes. 

Answer:

Explanation: Active Directory (AD) has no built-in clean-up feature. This can result in obsolete user, group and computer objects accumulating over time and placing security and compliance objectives in jeopardy. You would therefore need to regularly clean-up these settings. 


Q619. Which of the following is a BEST practice when dealing with user accounts that will only need to be active for a limited time period? 

A. When creating the account, set the account to not remember password history. 

B. When creating the account, set an expiration date on the account. 

C. When creating the account, set a password expiration date on the account. 

D. When creating the account, set the account to have time of day restrictions. 

Answer:

Explanation: 

Disablement is a secure feature to employ on user accounts for temporary workers, interns, or consultants. It automatically disables a user account or causes the account to expire at a specific time and on a specific day. 


Q620. The IT department has setup a share point site to be used on the intranet. Security has established the groups and permissions on the site. No one may modify the permissions and all requests for access are centrally managed by the security team. This is an example of which of the following control types? 

A. Rule based access control 

B. Mandatory access control 

C. User assigned privilege 

D. Discretionary access control 

Answer:

Explanation: 

Discretionary access control (DAC) allows access to be granted or restricted by an object’s owner based on user identity and on the discretion of the object owner.