Ias - Sa1
Ias - Sa1
It could be a set of rules connected by the proprietor, maker or director of a network, site, or
service
- ACCEPTABLE USER POLICY
It ought to report what sort of mindfulness program is in put and how is it communicated on a
normal premise.
- ACCEPTABLE USER POLICY
It means attack by Viruses, Worms, Trojan Horses etc. Many users believe that malware, virus,
worms, bots are all same things.
- SOFTWARE ATTACKS
A security administrator examines a network session to a compromised database server with a
packet analyzer. Within the session there is a repeated series of the hex character 90 (x90).
Which of the following attack types has occurred?
- BUFFER OVERFLOW
It is relatively straightforward using an open source tool called Reaver
- WPS ATTACK
It could be a program that collects chunks of information that are likely to be account names and
their related passwords so that an aggressor can utilize those qualifications to posture as the
individual they were stolen from.
- PASSWORD STEALER
It is the prevention of unauthorized users from accessing your wireless network and stealing the
data using your Wi-Fi network.
- WIRELESS SECURITY
Which of the following is best practice to put at the end of an ACL?
- IMPLICIT DENY
Franz is working on her college applications online, when the admissions site crashes. She is
incapable to turn in her application on time.
- AVAILABILITY
It is the third core security principle, and it is defined as a characteristic of a resource being
accessible to a user, application, or computer system when required.
- AVAILABILITY
A company that purchased an HVAC system for the datacenter is MOST concerned with
which of the following?
- Availability
Which of the following is a security benefit of providing additional HVAC capacity or increased
tonnage in a datacenter?
- Longer MTBF of hardware due to lower operating temperatures??
- Higher data integrity due to more efficient SSD cooling
- Increased availability of network services due to higher throughput
JP gets his phone bill within the mail. The charge was assumed to be for $80, but the mail
individual spilled water on the charge, spreading the ink. The charge presently inquires for $8.
- INTEGRITY
Matt, a security administrator, wants to ensure that the message he is sending does not get
intercepted or modified in transit. This concern relates to which of the following concepts?
- Integrity
Alice is buying books from an online retail site, and she finds that she can change the
price of a book from £19.99 to £1.99. Which part of the CIA triad has been broken?
- Integrity
Sara, a security administrator, manually hashes all network device configuration files
daily and compares them to the previous days' hashes. Which of the following security
concept is Sara using?
- INTEGRITY
Which of the following BEST describes using a smart card and typing in a PIN to gain access to
a system?
- Multifactor authentication
A policy requires employees to take time away from their job.
- Mandatory vacations
A company is looking to reduce the likelihood of employees in the finance department being
involved with money laundering. Which of the following controls would BEST mitigate this risk?
- Enforce mandatory vacations
Which of the following access controls enforces permissions based on data labeling at specific
levels?
- Mandatory access control
-
It involves first identifying the groups and people who will need to change as the result of the
project, and in what ways they will need to change.
- Organizational change management
It includes to begin with recognizing the bunches and individuals who will have to be compelled
to alter as the result of the project, and in what ways they will ought to change.
- Organizational change management
It gives the IT department a method to review the changes before they are implemented.
- CHANGE MANAGEMENT
Every paper or electronic record has a specific amount of time that it needs to be kept.
- RETENTION
It gives centralized administration and setup of operating systems, applications, and users'
settings in an Active Directory environment.
- GROUP POLICY
It can be current or previous representatives, temporary workers or trade accomplices that picks
up get to an organization arrange, system or information and discharge this data without
authorization by the organization.
- MALICIOUS INSIDERS
It is also known as piggybacking
- TAILGATING
At the outside break area, an employee, Ann, asked another employee to let her into the
building because her badge is missing. Which of the following does this describe?
- TAILGAITING
It is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or
significant bodily harm, in order to achieve political or ideological gains through threat or
intimidation.
- CYBERTERRORISM
A security administrator wants to deploy security controls to mitigate the threat of company
employees' personal information being captured online. Which of the following would BEST
serve this purpose?
- ANTI-SPYWARE
It may be a program that can duplicate itself and infect a computer without the user’s consent or
information. Early viruses were usually a few forms of executable code that was hidden within
the boot sector of a disk or as an executable file.
- VIRUS
Highly sensitive data is stored in a database and is accessed by an application on a DMZ
server. The disk drives on all servers are fully encrypted. Communication between the
application server and end-users is also encrypted. Network ACLs prevent any connections to
the database server except from the application server. Which of the following can still result in
exposure of the sensitive data in the database server?
- Theft of the physical database server
It is a self-replicating program that copies itself to other computers over the network without the
need for any user intervention.
- WORM
It does not corrupt or modify files on a target computer.
- WORMS
These are considered one of the most serious types of malware since they may be used to gain
unauthorized access to remote systems and perform malicious operations.
- ROOTKITS
It is a type of malware that constantly changes its identifiable features in order to evade
detection.
- Polymorphic Malware
It will continue to spread and infect devices even if its signature changes to avoid detection
- Polymorphic Malware
Ann, a software developer, has installed some code to reactivate her account one week after
her account has been disabled. Which of the following is this an example of?
- BACKDOOR
These are carried out by either hacking a node in the network or introducing a fabricated node
in the network.
- SINKHOLE ATTACK
A user commuting to work via public transport received an offensive image on their smart phone
from another commuter. Which of the following attacks MOST likely took place?
- BLUEJACKING
Which of the following describes how an attacker can send unwanted advertisements to a
mobile device?
- BLUEJACKING
It is an attack on the protocol used to determine a device’s hardware address (MAC address) on
the network when the IP address is known.
- ARP POISING
It is an assault that traps a client into clicking a webpage component which is undetectable or
masked as another component.
- Clickjacking
It could be a pernicious strategy of deceiving a client into clicking on something distinctive from
what the client sees
- CLICKJACKING
It is an attack that tricks a user into clicking a webpage element which is invisible or disguised
as another element.
- Clickjacking
A security administrator is concerned about the strength of user's passwords. The company
does not want to implement a password complexity policy. Which of the following can the
security Administrator implement to mitigate the risk of an online password attack against users
with weak passwords?
- Decrease the account lockout time
-
It is the state of being protected against the unauthorized use of information, especially
electronic data, or the measures taken to achieve this.
- Information Security
-
Which of the following can hide confidential or malicious data in the whitespace of other
files (e.g. JPEGs)?
- Steganography
It can limit access to sensitive environments to normal business hours when. oversight
and monitoring can be performed to prevent fraud, abuse, or intrusion.
- Time of day restrictions
It limits when users can access specific systems based on the time of day or week.
- Time of day restrictions
Which of the following security concepts can prevent a user from logging on from home
during the weekends?
- Time of day restrictions
Which of the following security concepts can avoid a client from logging on from home amid the
ends of the week?
- Time of day restrictions
A technician is reviewing the logical access control method an organization uses. One of the
senior managers requests that the technician prevent staff members from logging on during
nonworking days. Which of the following should the technician implement to meet
managements request?
- Time of day restrictions
It can limit access to sensitive environments to normal business hours when. oversight and
monitoring can be performed to prevent fraud, abuse, or intrusion.
- Time of day restrictions
-
It is an encryption and decryption key that is randomly generated to ensure the security
of a communications session between a user and another computer or between two
computers.
- Session Keys
A company with a US-based sales force has requested that the VPN system be
configured to authenticate the sales team based on their username, password and a
client-side certificate. Additionally, the security administrator has restricted the VPN to
only allow authentication from the US territory. How many authentication factors are in
use by the VPN system?
- 3
It is a principle that prevents any single person or entity from being able to have full
access or complete all the functions of a critical or sensitive process.
- Separation of duties
It has been determined to require, in the interests of national security, protection against
unauthorized disclosure and which has been so designated.
- Official document
Records that are not confidential and do not contain personal/financial identifying
information.
- Recycle
It ought to clearly recognize how the arrangement will be implemented and how security
breaches and/or wrongdoing will be dealt with.
- enforcement
It talks about what in the event that any Network Security Intrusion Detection or
Prevention Framework is utilized and how it is executed.
- Intrusion Detection
It is the teach that guides how we plan, prepare and back people to effectively embrace
alter in arrange to drive organizational victory and results.
- change management
It incorporates how to handle connections, through sifting, individual utilize of the mail
framework, dialect confinements, and authentic necessities
- E-Mail
He uses the same tools and techniques as a hacker but does so in order to disrupt
services and bring attention to a political or social cause.
- Script kiddie
It is generally assumed that most of them are juveniles who lack the ability to write sophisticated
programs or exploits on their own and that their objective is to try to impress their friends or gain
credit in computer-enthusiast communities.
- SCRIPT KIDDIE
It is the process by which a URL is wrongly removed from the search engine index and
replaced by another URL.
- URL hijacking
It can lead to a tremendous drop in guests of websites.
- Url hijacking
It is type of phishing attacks that try to lure victims via voice calls.
- Vishing
It is the false hone of making phone calls or clearing out voice messages implying to be
from legitimate companies in arrange to initiate people to uncover individual data, such
as bank subtle elements and credit card numbers.
- Vishing
It may be a strategy utilized to pick up get to to information, frameworks, or systems,
basically through deception
- Social Engineering
This technique typically relies on the trusting nature of the person being attacked.
- Social Engineering
It is the term used for a broad range of malicious activities accomplished through human
interactions.
- Social Engineering Attacks
It is somebody without the right verification takes after a confirmed worker into a limited
zone.
- Tailgating
It happens both exterior and interior companies and decreasing the hazard of insider
information burglary at the corporate level is anything but simple
- Malicious insiders
-
A type of virus that has been designed to thwart attempts by analysts from examining its
code by using various methods to make tracing, disassembling and reverse engineering
more difficult
- Armored virus
It may also protect itself from antivirus programs, making it more difficult to trace.
- armored virus
It is a program that can copy itself and infect a computer without the user’s consent or
knowledge. Early viruses were usually some form of executable code that was hidden in
the boot sector of a disk or as an executable file
- Viruses
It is a software program designed to provide a user with administrator access to a
computer without being detected.
- ROOTKITS
It is a software or hardware device designed to gain administrator-level control over a
computer system without being detected. Rootkits can target the BIOS, hypervisor, boot
loader, kernel or, less commonly, libraries or applications.
- rootkits
It can also install additional software, which can redirect your web browser to other sites
or change your home page.
- Spyware
A user casually browsing the Internet is redirected to a warez site where a number of
pop-ups appear. After clicking on a pop-up to complete a survey, a drive-by download
occurs. Which of the following is MOST likely to be contained in the download?
- SPYWARE
It gathers your personal information and relays it to advertisers, data firms, or external
users.
- Spyware
These were usually some form of executable code that was hidden in the boot sector of
a disk or as an executable file
- Viruses
Which of the following types of application attacks would be used to identify malware
causing security breaches that have NOT yet been identified by any trusted sources?
- Zero-day
-
It takes advantage of the specific capacity limits that apply to any network resources –
such as the infrastructure that enables a company’s website.
- Denial-of-service attack
It may be a sort of assault where the aggressor breaks into the communication between the
endpoints of a arrange association.
- MAN IN THE MIDDLE
It attacks are often facilitated by social engineering attacks which lure the user to a fake site.
- MAN IN THE MIDDLE
It is an assault where the assailant subtly transfers and conceivably modifies the
communications between two parties who accept that they are specifically
communicating with each other.
- Man-in-the-Middle Attacks
It can be difficult to detect because the network transmissions will appear to be
operating normally.
- Man-in-the-Middle Attacks