Pen used to do a practice exam.

Domain 3 Quiz (Part 2)

Domain 3 Quiz

  1. Examine this network map.
    Firewall diagram.
    Add the required firewall rule to allow the server administrator to securely work on the web server's configuration.
    Source Destination Protocol Port Action
    192.168.1.0/24 10.1.2.33 TCP 80 Pass
     
    Any Any Any Any Block
    On the real test, these might be objects you can drag and drop in place in the grey slots above. Or maybe each empty line will be a drop-down menu with the below choices.
    192.168.1.0/24 10.1.2.0/24 TCP 22 Pass
    192.168.1.44/32 10.1.2.33/32 TCP 22 Pass
    192.168.1.0/24 10.1.2.0/24 TCP 443 Pass
    192.168.1.44/32 10.1.2.33/32 TCP 443 Pass
  2. Examine this network map.
    Firewall diagram.
    Add the two required firewall rules to allow the user workstations to query the primary DNS server, and also allow the secondary DNS server to synchronize with the primary.
    Source Destination Protocol Port Action
    192.168.1.0/24 10.1.2.33/32 TCP 80 Pass
     
     
    Any Any Any Any Block
    On the real test, these might be objects you can drag and drop in place in the grey slots above. Or maybe each empty line will be a drop-down menu with the below choices.
    192.168.1.0/24 10.1.2.66/32 TCP 80 Pass
    192.168.1.0/24 10.1.2.66/32 TCP 53 Pass
    192.168.1.0/24 10.1.2.66/32 UDP 53 Pass
    192.168.1.200/32 10.1.2.66/32 UDP 53 Pass
    192.168.1.200/32 10.1.2.66/32 TCP 80 Pass
    192.168.1.200/32 10.1.2.66/32 TCP 53 Pass
  3. Suheb, the IT department manager, needs to be able to assess organizational security at any time, and identify issues before they become big problems. Which should he use?
    1. Monthly audits
    2. Continuous monitoring
    3. Continuous improvement
    4. Baseline analysis
  4. Chuck, a network engineer, needs to compartmentalize traffic flow on the Intranet, and authenticate each connected endpoint device. What should he use? Select two.
    1. NAC
    2. DLP
    3. 802.3
    4. VLAN
  5. Akio, a systems engineer, needs to implement a technical defense that verifies the validity of the operating system itself before booting the system. He hopes this will solve the problem of root kits and other kernel modification. What should he use?
    1. Anti-malware scanning
    2. BIOS checks
    3. UEFI
    4. Trusted supply chain
  6. Philip, a system administrator, has been asked for recommendations for protecting compute servers in the data center. Which should he suggest? Select three.
    1. FM-200
    2. Biometrics
    3. DLP
    4. Remote wipe
    5. Mantrap
    6. GPS tracking
  7. Your company is being targeted by numerous spearphishing attempts. Which defense do you recommend?
    1. Security awareness training
    2. Pop-up blocker
    3. Spam filter
    4. Mail application-layer firewall
    5. Network intrusion prevention system
  8. You observe this command output.
    Server:         192.168.1.3
    Address:        192.168.1.3#53
    
    ** server can't find www.faasdfjh.com: NXDOMAIN 
    What is wrong?
    1. DNS cache poisoning has happened
    2. Your workstation cannot contact the nameserver
    3. The domain faasdfjh.com does not exist
    4. There is no host named www.faasdfjh.com
  9. You observe this data.
    [**] [122:1:0] (Web) Directory Traversal [**] [Priority: 2] 07/05-12:15:41.483293 192.168.3.7 -> 192.168.1.1:80 PROTO:255 TTL:0 TOS:0x0 ID:3253 IpLen:20 DgmLen:1501
    
    Which tool or defensive measure was involved?
    1. NIDS
    2. NIPS
    3. HIDS
    4. HIPS
  10. Which of these are appropriate defenses for a mobile device? Select three.
    1. Remote wipe
    2. Cable lock
    3. FM-200
    4. Biometrics
    5. GPS tracking
    6. Transparent proxy
  11. Tony, a network engineer, has been tasked by his manager with monitoring the more sensitive internal networks, to spot and block attacks. What should Tony use?
    1. SIEM
    2. HIDS
    3. HIPS
    4. NIDS
    5. NIPS
  12. Yoyodyne Corporation plans to use Active Directory for single sign-on throughout the enterprise. Which network protocols must be added to the ALLOW list in all internal router ACLs? Select two.
    1. LDAP
    2. LDAPS
    3. Kerberos
    4. X.500
  13. Dmitri's company wants to establish SSO. The initial analysis concluded that they need a system that handles both authentication and authorization with tokens. Dmitri has concluded that the protocol used by Facebook and LinkedIn is the most promising. He is favoring:
    1. SAML
    2. OAUTH
    3. OpenID
    4. WS-Federation
    5. Shibboleth
  14. Pedro's manager has been given a recommendation that they implement a single-sign on solution in which user sessions will have cryptographic software tokens providing their identity, their authorization to use services, and the cryptographic keys used to secure their communication. What should Pedro recommend?
    1. Kerberos
    2. RADIUS
    3. SAML
    4. VPN
  15. Mikhail, a system administrator, has been asked by Kelli, a database administrator, to create an account for the new database project. The account should require authenticated access, have auditing enable, but incapable of interaction, with credentials that rarely if ever change. What type of account should Mikhail create?
    1. Ordinary user
    2. Privileged user
    3. Administrator
    4. Guest
    5. Service
    6. Management
  16. Which password policy setting would require a user to include both digits and special characters in their password?
    1. Prohibiting dictionary words
    2. Length
    3. Complexity
    4. Maximum age
    5. Minimum age
    6. Expiration
    7. Length
  17. A military contractor is very worried about physical intrusion. They need to keep unauthorized individuals out of sensitive areas. Inappropriately allowing an unauthorized individuals into an area is classified as which of the following:
    1. False Acceptance
    2. False Rejection
    3. False Positive
    4. False Negative
    5. Fail Open
    6. Fail Closed
  18. Which of these is an open-source standards-based solution for single sign-on web authentication, based largely on SAML?
    1. OAUTH
    2. OpenID
    3. EAP-TLS
    4. Shibboleth
    5. WS-Federation
  19. Mutual authentication involves which two? Select two.
    1. Client authenticating the server
    2. Client authorizing the server
    3. Server authenticating the client
    4. Server authorizing the client
  20. You observe this data.
    enp9s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
            inet 192.168.1.1  netmask 255.255.255.0  broadcast 192.168.1.255
            inet6 2601:249:4300:cb:a62:66ff:fe2c:ab1c  prefixlen 64  scopeid 0x0<global>
            inet6 fe80::a62:66ff:fe2c:ab1c  prefixlen 64  scopeid 0x20<link>
            ether 08:62:66:2c:ab:1c  txqueuelen 1000  (Ethernet)
            RX packets 16332198  bytes 4799272313 (4.7 GB)
            RX errors 0  dropped 3  overruns 0  frame 0
            TX packets 27220877  bytes 32805346549 (32.8 GB)
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0 
    Which tool or defensive measure was involved?
    1. Wireshark
    2. ping
    3. nmap
    4. tcpdump
    5. netstat
    6. arp
    7. ifconfig
  21. You observe this data.
    192.168.1.4 at dc:a6:32:36:a9:4e [ether] on enp9s0
    192.168.1.218 at b8:27:eb:1f:f6:87 [ether] on enp9s0
    192.168.1.20 at b8:27:eb:03:6b:37 [ether] on enp9s0
    192.168.1.205 at b8:27:eb:f9:ea:4d [ether] on enp9s0
    192.168.1.7 at b8:27:eb:95:25:5b [ether] on enp9s0
    192.168.1.40 at 00:12:79:df:81:b1 [ether] on enp9s0
    192.168.1.254 at 38:94:ed:fa:48:88 [ether] on enp9s0
    192.168.1.42 at 00:1c:50:ac:72:1e [ether] on enp9s0
    192.168.1.3 at dc:a6:32:36:a9:4e [ether] on enp9s0 
    Which tool or defensive measure was involved?
    1. Wireshark
    2. ping
    3. nmap
    4. tcpdump
    5. netstat
    6. arp
    7. ifconfig
  22. You observe this data.
    Proto Recv-Q Send-Q Local Address          Foreign Address        (state)
    tcp        0      0 www.http               ec2-54-251-14-39.http  SYN_RCVD
    tcp        0      0 www.http               97-127-152-158.c.http  SYN_RCVD
    tcp        0     72 www.ssh                c-67-162-124-176.57046 ESTABLISHED
    tcp        0      0 www.ssh                c-67-162-124-176.56956 TIME_WAIT
    tcp        0      0 www.57694              metadata.google..http  ESTABLISHED
    tcp        0      0 localhost.9000         localhost.45172        TIME_WAIT
    tcp        0      0 www.https              cpe-184-153-88-7.45718 ESTABLISHED
    tcp        0      0 www.https              ec2-54-90-33-176.40684 ESTABLISHED
    tcp        0      0 www.https              petalbot-114-119.32762 TIME_WAIT
    tcp        0      0 www.https              static.kpn.net.49168   ESTABLISHED
    tcp        0      0 www.https              static.kpn.net.49169   ESTABLISHED
    tcp        0      0 www.https              185-97-201-166.n.1480  ESTABLISHED
    tcp        0      0 www.https              185-97-201-166.n.1478  ESTABLISHED
    tcp        0      0 www.https              185-97-201-166.n.1476  ESTABLISHED
    tcp        0      0 www.https              crawl-66-249-79-.52368 TIME_WAIT
    tcp        0      0 www.https              crawl-66-249-79-.35610 TIME_WAIT
    tcp        0      0 www.http               crawl-66-249-68-.58406 TIME_WAIT
    tcp        0      0 www.https              84.93.94.244.56895     ESTABLISHED
    tcp        0      0 www.https              ip-99-203-20-246.19011 ESTABLISHED
    tcp        0      0 www.https              pool-96-252-105-.51616 TIME_WAIT
    tcp        0     63 www.https              CPE589630c056fc-.59897 FIN_WAIT_1
    tcp        0      0 www.http               200.46.45.114.50849    CLOSED
    tcp        0      0 www.http               201.130.137.117..44167 CLOSED
    tcp        0      0 *.https                *.*                    LISTEN
    tcp        0      0 *.http                 *.*                    LISTEN
    tcp        0      0 localhost.9000         *.*                    LISTEN
    tcp        0      0 *.ssh                  *.*                    LISTEN
    tcp6       0      0 *.ssh                  *.*                    LISTEN
    tcp        0      0 localhost.smtp         *.*                    LISTEN 
    Which tool or defensive measure was involved?
    1. Wireshark
    2. ping
    3. nmap
    4. tcpdump
    5. netstat
    6. arp
    7. ifconfig
  23. You observe this command output.
    ;; connection timed out; no servers could be reached 
    What is wrong?
    1. DNS cache poisoning has happened
    2. Your workstation cannot contact the nameserver
    3. The domain does not exist
    4. There is no host with the requested name
  24. Which of these can you put in a boot script to prevent MitM?
    1. nmap -sS -sV -T5 192.168.12.72
    2. arp -s 00:13:3B:12:6f:aa 192.168.12.72
    3. tcpdump -i eth0 host 192.168.12.72 or ether host 00:13:3b:12:6f:aa
    4. netstat -an
    5. ping 192.168.12.72
  25. Which of these are advantages of WPA/2 Enterprise over WPA/2 PSK? Select two.
    1. PKI
    2. Stronger cipher suite
    3. Higher performance
    4. Integrated Active Directory
    5. RADIUS
  26. Tasha, a network engineer, is designing a wireless solution for her large corporation. She needs to specify the current best encryption, supporting 802.1x with either LEAP or EAP-TLS. What should she use? Select three.
    1. CCMP
    2. AES-GCM-256
    3. WPA/2 PSK
    4. WPA/2 Enterprise
    5. RADIUS
    6. Active Directory
  27. Isaac is a cybersecurity architect for a financial services company. He has been tasked with securing key escrow. The escrow storage is extremely sensitive. What should he use to implement trustworthy key escrow?
    1. Asymmetric encryption
    2. M-of-N control
    3. Certificate chaining
    4. Off-site storage
  28. Ellen is a webmaster for a major high technology company. She will use virtual hosting to provide six web sites with unique domain names on a single server:
        weyland-yutani.com
    www.weyland-yutani.com
        weyland-yutani.net
    www.weyland-yutani.net
        weyland-yutani.org
    www.weyland-yutani.org
    That is, the same corporation name in three top-level domains, both with and without leading "www.". What would be the most economic way to obtain certificates?
    1. Self-signed certificates
    2. Wildcard certificates
    3. Server Alternative Names
    4. Six individual certificates
  29. Which of the following is not needed to enable any user to encrypt a message which only the intended recipient can read?
    1. PKI
    2. Public keys
    3. Private keys
    4. Hashing
  30. Lee is a security analyst at a software development company. Their data is worth far more than the hardware on which it is stored, and confidentiality is protected with strong encryption. However, management is also concerned about availability. Lee has been tasked with providing availability of cleartext versions of encrypted software, even if an employee loses or destroys their decryption key. What should be set up?
    1. Escrow
    2. Secret sharing
    3. Certificate chaining
    4. Key pinning
    5. Key stapling
  31. Charlize, a data archivist for a government agency, needs to protect the confidentiality of a large data set. A government regulation requires the use of the Advanced Encryption Standard for this category of data. But in which mode should she employ that cipher?
    1. CBC
    2. CCMP
    3. ECB
    4. GCM
  32. Gary works for a bank, and is designing a wireless solution for customers to use during their visits to bank branches. Which two technologies should he deploy? Select two.
    1. WPA/2 Enterprise
    2. Captive portal
    3. Open system authentication
    4. Enable an Internet-facing SSID

To the answers

30 questions

Passing = 82% of 30 = 24.6

Goal = 91% of 30 = 27.3

To the Cybersecurity Page