- Ethical Hacking Statement
- The Modern Security Operations Center
- The Windows Operating System
- Linux Basics
- Network Protocols
- Ethernet and IP Protocol
- Connectivity Verification
- Address Resolution Protocol
- The Transport Layer
- Network Services
- Network Communication Devices
- Network Security Infrastructure
- Attackers and Their Tools
- Common Threats and Attacks
- Network Monitoring and Tools
- Attacking the Foundation
- Attacking What We Do
- Understanding Defense
- Access Control
- Threat Intelligence
- Public Key Cryptography
- EndPoint Protection
- Endpoint Vulnerability
- Technologies and Protocols
- Network Security Data
- Evaluating Alerts
- Working with Network Security Data
- Digital Forensics and Incidents Analysis and response
1. Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?
- A. Behavior-based
- B. Routing-based
- C. Heuristics-based
- D. Signature-based
Antimalware programs may detect viruses using three different approaches: o signature-based – by recognizing various characteristics of known malware files o heuristics-based – by recognizing general features shared by various types of malware o behavior-based – through analysis of suspicious activities
2. In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location?
- A. Telemetry
- B. Safe browsing
- C. Anti-phishing
- D. Intrusion detection and prevention
The telemetry functionality in most host-based security suites provides robust logging functionality and submits logs to a central location for analysis.
3. Which technology might increase the security challenge to the implementation of IoT in an enterprise environment?
- A. Cloud computing
- B. Network bandwidth
- C. CPU processing speed
- D. Data storage
With cloud computing, boundaries of enterprise networks are expanded to include locations on the Internet for which the enterprises are not responsible. Malicious software might access the internal network endpoints to attack internal networks.
4. Which statement describes the term attack surface?
- A. It is the total sum of vulnerabilities in a system that is accessible to an attacker.
- B. It is the group of hosts that experiences the same attack.
- C. It is the network interface where attacks originate.
- D. It is the total number of attacks toward an organization within a day.
An attack surface is the total sum of the vulnerabilities in a system that is accessible to an attacker. The attack surface can consist of open ports on servers or hosts, software that runs on Internet-facing servers, wireless network protocols, and even users.
5. Which HIDS is an open-source based product?
- A. Tripwire
- B. AlienVault USM
- C. Cisco AMP
- D. OSSEC
The Open Source HIDS SECurity (OSSEC) software is an open-source HIDS that uses a central manager server and agents that are installed on the hosts that are to be monitored.
6. Which device in a LAN infrastructure is susceptible to MAC address-table overflow and spoofing attacks?
- A. Workstation
- B. Firewall
- C. Switch
- D. Server
Switches are LAN infrastructure devices interconnecting endpoints. They are susceptible to LAN-related attacks including MAC address-table overflow attacks, spoofing attacks, LAN storm attacks, STP manipulation attacks, and VLAN attacks.
7. As described by the SANS Institute, which attack surface includes the use of social engineering?
- A. Internet attack surface
- B. Network attack surface
- C. Human attack surface
- D. Software attack surface
The SANS Institute describes three components of the attack surface: 1) Network Attack Surface – exploitation of vulnerabilities in networks 2) Software Attack Surface – exploitation of vulnerabilities in web, cloud, or host-based software applications 3) Human Attack Surface – exploitation of weaknesses in user behavior
8. What is a host-based intrusion detection system (HIDS)?
- A. It detects and stops potential direct attacks but does not scan for malware.
- B. It combines the functionalities of antimalware applications with firewall protection.
- C. It identifies potential attacks and sends alerts but does not stop the traffic.
- D. It is an agentless system that scans files on a host for potential malware.
A current HIDS is a comprehensive security application that combines the
functionalities of antimalware applications with firewall protection. An HIDS not only detects malware but also prevents it from executing. Because the HIDS runs directly on the host, it is considered an agent-based system.
9. Which security endpoint setting would be used by a security analyst to determine if a computer has been configured to prevent a particular application from running?
- A. Base lining
- B. Blacklisting
- C. Services
- D. Whitelisting
Blacklisting can be used on a local system or updated on security devices such as a firewall. Blacklists can be manually entered or obtained from a centralized security system. Blacklists are applications that are prevented from executing because they pose a security risk to the individual system and potentially the company.
10. In Windows Firewall, when is the Domain profile applied?
- A. When the host is connected to an isolated network from the Internet by another security device
- B. When the host checks emails from an enterprise email server
- C. When the host accesses the Internet
- D. When the host is connected to a trusted network such as an internal business network
The Domain profile in Windows Firewall configuration is for connections to a trusted network, such as a business network, that is assumed to have an adequate security infrastructure.
11. As described by the SANS Institute, which attack surface includes the exploitation of vulnerabilities in wired and wireless protocols used by IoT devices?
- A. Network attack surface
- B. Internet attack surface
- C. Human attack surface
- D. Software attack surface
The SANS Institute describes three components of the attack surface: 1. Network Attack Surface – exploitation of vulnerabilities in networks 2. Software Attack Surface – exploitation of vulnerabilities in web, cloud, or host-based software applications 3. Human Attack Surface – exploitation of weaknesses in user behavior
12. Which statement describes agentless antivirus protection?
- A. Host-based antivirus systems provide agentless antivirus protection.
- B. Antivirus scans are performed on hosts from a centralized system.
- C. The antivirus protection is provided by the ISP.
- D. The antivirus protection is provided by the router that is connected to a cloud service.
Host-based antivirus protection is also known as agent-based. Agent-based antivirus runs on every protected machine. Agentless antivirus protection performs scans on hosts from a centralized system.