Tổng hợp câu hỏi trắc nghiệm ôn tập Môn An toàn thông tin Test 7 - có đáp án | Trường đại học sư phạm kỹ thuật TP. Hồ Chí Minh

Câu hỏi: Pete, a security analyst, has been tasked with explaining the different types of malware to his colleagues. The two malware types that the group seems to be most interested in are botnets and viruses. Which of the following explains the difference between these two types
of malware? Đáp án đúng: Botnets are a subset of malware which are used as part of DDoS attacks. Tài liệu giúp bạn tham khảo, ôn tập và đạt kết quả cao. Mời bạn đọc đón xem!

Câu hỏi: Pete, a security analyst, has been tasked with explaining the different types of
malware to his colleagues. The two malware types that the group seems to be most interested in
are botnets and viruses. Which of the following explains the difference between these two types
of malware?
Đáp án đúng: Botnets are a subset of malware which are used as part of DDoS attacks.
Câu hỏi: Sara, a user, downloads a keygen to install pirated software. After running the
keygen, system performance is extremely slow and numerous antivirus alerts are displayed.
Which of the following BEST describes this type of malware?
Đáp án đúng: Trojan.
Câu hỏi: Ann, a security technician, is reviewing the IDS log files. She notices a large
number of alerts for multicast packets from the switches on the network. After investigation, she
discovers that this is normal activity for her network. Which of the following BEST describes
these results?
Đáp án đúng: False positives.
Câu hỏi: Which of the following attacks is generally initiated from a botnet?
Đáp án đúng: Distributed denial of service.
Câu hỏi: Although a vulnerability scan report shows no vulnerabilities have been discovered,
a subsequent penetration test reveals vulnerabilities on the network. Which of the following has
been reported by the vulnerability scan?
Đáp án đúng: False negative.
Câu hỏi: What is the most commonly used technique to protect against virus attacks?
Đáp án đúng: Signature detection.
Câu hỏi: Which of the following malware types may require user interaction, does not hide
itself, and is commonly identified by marketing pop-ups based on browsing habits?
Đáp án đúng: Adware.
Câu hỏi: Which of the following firewall rules only denies DNS zone transfers?
Đáp án đúng: deny tcp any any port 53.
Câu hỏi: A company replaces a number of devices with a mobile appliance, combining
several functions. Which of the following descriptions fits this new implementation? (Select
TWO).
Đáp án đúng: All-in-one device, Single point of failure.
Câu hỏi: Which of the following types of malware attempts to circumvent malware detection
by trying to hide its true location on the infected system?
Đáp án đúng: Trojan.
Câu hỏi: A program has been discovered that infects a critical Windows system executable
and stays dormant in memory. When a Windows mobile phone is connected to the host, the
program infects the phone’s boot loader and continues to target additional Windows PCs or
phones. Which of the following malware categories BEST describes this program?
Đáp án đúng: Virus.
Câu hỏi: The security administrator is observing unusual network behavior from a
workstation. The workstation is communicating with a known malicious destination over an
encrypted tunnel. A full antivirus scan, with an updated antivirus definition file, does not show
any signs of infection. Which of the following has happened on the workstation?
Đáp án đúng: Zero-day attack.
Câu hỏi: A security administrator wants to block unauthorized access to a web server using a
locally installed software program. Which of the following should the administrator deploy?
Đáp án đúng: HIPS (Host-based Intrusion Prevention System).
Câu hỏi: After surfing the Internet, Joe, a user, woke up to find all his files were corrupted.
His wallpaper was replaced by a message stating the files were encrypted and he needed to
transfer money to a foreign country to recover them. Joe is a victim of:
Đáp án đúng: Ransomware.
Câu hỏi: Which type of device can prevent an intrusion on your network?
Đáp án đúng: IPS (Intrusion Prevention System).
Câu hỏi: Which of the following BEST describes a demilitarized zone (DMZ)?
Đáp án đúng: A buffer zone between protected and unprotected networks.
Câu hỏi: Which of the following should the security administrator implement to limit web
traffic based on country of origin? (Select THREE).
Đáp án đúng: Proxies, Firewall, URL filtering.
Câu hỏi: An organization recently switched from a cloud-based email solution to an in-house
email server. The firewall needs to be modified to allow for sending and receiving email. Which
of the following ports should be open on the firewall to allow for email traffic? (Select THREE).
Đáp án đúng: TCP 25, TCP 110, TCP 143.
Câu hỏi: A trojan was recently discovered on a server. There are now concerns that there has
been a security breach that allows unauthorized people to access data. The administrator should
be looking for the presence of a/an:
Đáp án đúng: Backdoor.
Câu hỏi: Which of the following would a security administrator implement in order to
discover comprehensive security threats on a network?
Đáp án đúng: Vulnerability scan.
Câu hỏi 21
A user, Ann, is reporting to the company IT support group that her workstation screen is blank
other than a window with a message requesting payment or else her hard drive will be formatted.
Which of the following types of malware is on Ann’s workstation?
Đáp án đúng: d. Ransomware
Câu hỏi 22
Which of the following should be deployed to prevent the transmission of malicious traffic
between virtual machines hosted on a singular physical device on a network?
Đáp án đúng: b. HIPS on each virtual machine
Câu hỏi 23
By default, which of the following uses TCP port 22? (Select THREE).
Đáp án đúng: f. SCP, g. SSH, h. SFTP
Câu hỏi 24
Which of the following can Joe, a security administrator, implement on his network to capture
attack details that are occurring while also protecting his production network?
Đáp án đúng: c. Honeypot
Câu hỏi 25
A user has several random browser windows opening on their computer. Which of the following
programs can be installed on his machine to help prevent this from happening?
Đáp án đúng: a. Pop-up blocker
Câu hỏi 26
A network administrator has purchased two devices that will act as failovers for each other.
Which of the following concepts does this BEST illustrate?
Đáp án đúng: c. Availability
Câu hỏi 27
A rogue wireless access point is created with the same SSID as the corporate SSID. The attacker
has employees connect to the SSID and watches the information as it’s relayed to the original
SSID. What type of attack is described here?
Đáp án đúng: d. Man in the middle attack
Câu hỏi 28
Several employees clicked on a link in a malicious message that bypassed the spam filter and
their PCs were infected with malware as a result. Which of the following BEST prevents this
situation from occurring in the future?
Đáp án đúng: b. Security awareness training
Câu hỏi 29
Pete, a security administrator, has observed repeated attempts to break into the network. Which
of the following is designed to stop an intrusion on the network?
Đáp án đúng: a. NIPS
Câu hỏi 30
Users have reported receiving unsolicited emails in their inboxes, often times with malicious
links embedded. Which of the following should be implemented in order to redirect these
messages?
Đáp án đúng: b. Spam filter
Câu hỏi 31
Which of the following types of application attacks would be used to identify malware causing
security breaches that have NOT yet been identified by any trusted sources?
Đáp án đúng: c. Zero-day
Câu hỏi 32
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provide?
Đáp án đúng: c. Protection against malware introduced by banner ads
Câu hỏi 33
The network security engineer just deployed an IDS on the network, but the Chief Technical
Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the
following types of IDS has been deployed?
Đáp án đúng: c. Signature Based IDS
Câu hỏi 34
Which attack can be used on a native VLAN?
Đáp án đúng: d. Double tagging
Câu hỏi 35
A security administrator needs to implement a system that detects possible intrusions based upon
a vendor provided list. Which of the following BEST describes this type of IDS?
Đáp án đúng: c. Signature based
Câu hỏi 36
Timestamps and sequence numbers act as countermeasures against which of the following types
of attacks?
Đáp án đúng: c. Replay
Câu hỏi 37
When dealing with firewalls, the term trusted network is used to describe what?
Đáp án đúng: d. Internal network
Câu hỏi 38
Which statement is TRUE about the operation of a packet sniffer?
Đáp án đúng: d. The Ethernet card must be placed in promiscuous mode
Câu hỏi 39
A Windows-based computer is infected with malware and is running too slowly to boot and run a
malware scanner. Which of the following is the BEST way to run the malware scanner?
Đáp án đúng: a. Boot from CD/USB
Câu hỏi 40
Which of the following security architecture elements also has sniffer functionality? (Select
TWO).
Đáp án đúng: b. IDS, e. IPS
Câu hỏi41
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following will help prevent smurf attacks?
Câu hỏi 41Select one:
a.
Allowing necessary UDP packets in and out of the network
b.
Disabling unused services on the gateway firewall
c.
Flash the BIOS with the latest firmware
d.
Disabling directed broadcast on border routers
A smurf attack involves sending PING requests to a broadcast address. Therefore, we
can prevent smurf attacks by blocking broadcast packets on our external routers.
Phản hồi
Your answer is correct.
The correct answer is: Disabling directed broadcast on border routers
Câu hỏi42
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Joe, the Chief Technical Officer (CTO), is concerned about new malware being
introduced into the corporate network. He has tasked the security engineers
to implement a technology that is capable of alerting the team when unusual
traffic is on the network. Which of the following types of technologies will
BEST address this scenario?
Câu hỏi 42Select one:
a.
Anomaly Based IDS
b.
Proxy Firewall
c.
Signature IDS
d.
Application Firewall
Phản hồi
Your answer is correct.
The correct answer is: Anomaly Based IDS
Câu hỏi43
Sai
Đạt điểm 0,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A company wants to prevent end users from plugging unapproved
smartphones into PCs and transferring data. Which of the following would be
the BEST control to implement?
Câu hỏi 43Select one:
a.
DLP
b.
HIPS
c.
IDS
d.
MDM
Phản hồi
Your answer is incorrect.
The correct answer is: DLP
Câu hỏi44
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following would the security engineer set as the subnet mask for
the servers below to utilize host addresses on separate broadcast domains?
Server 1: 192.168.100.6
Server 2: 192.168.100.9
Server 3: 192.169.100.20
Câu hỏi 44Select one:
a.
/30
b.
/29
c.
/28
d.
/24
e.
/27
Phản hồi
Your answer is correct.
The correct answer is: /29
Câu hỏi45
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following software allows a network administrator to inspect the
protocol header in order to troubleshoot network issues?
Câu hỏi 45Select one:
a.
Packet sniffer
b.
URL filter
c.
Spam filter
d.
Switch
Phản hồi
Your answer is correct.
The correct answer is: Packet sniffer
Câu hỏi46
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
The finance department just procured a software application that needs to
communicate back to the vendor server via SSL. Which of the following
default ports on the firewall must the security engineer open to accomplish
this task?
Câu hỏi 46Select one:
a.
130
b.
443
c.
3389
d.
80
Phản hồi
Your answer is correct.
The correct answer is: 443
Câu hỏi47
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A system administrator has noticed network performance issues and wants to
gather performance data from the gateway router. Which of the following can
be used to perform this action?
Câu hỏi 47Select one:
a.
SNMP
b.
iSCSI
c.
IPSec
d.
SMTP
Phản hồi
Your answer is correct.
The correct answer is: SNMP
Câu hỏi48
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
The Chief Information Officer (CIO) receives an anonymous threatening
message that says “beware of the 1st of the year”. The CIO suspects the
message may be from a former disgruntled employee planning an attack.
Which of the following should the CIO be concerned with?
Câu hỏi 48Select one:
a.
Smurf Attack
b.
Virus
c.
Logic bomb
A logic bomb is a piece of code intentionally inserted into a software system that will set
off a malicious function when specified conditions are met. For example, a programmer
may hide a piece of code that starts deleting files should they ever be terminated from
the company. Software that is inherently malicious, such as viruses and worms, often
contain logic bombs that execute a certain payload at a pre-defined time or when some
other condition is met. This technique can be used by a virus or worm to gain
momentum and spread before being noticed. Some viruses attack their host systems on
specific dates, such as Friday the 13th or April Fool’s Day. Trojans that activate on
certain dates are often called “time bombs”. To be considered a logic bomb, the
payload should be unwanted and unknown to the user of the software. As an example,
trial programs with code that disables certain functionality after a set time are not
normally regarded as logic bombs.
d.
Trojan
Phản hồi
Your answer is correct.
The correct answer is: Logic bomb
Câu hỏi49
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
An employee reports work was being completed on a company-owned laptop
using a public wireless hot-spot. A pop-up screen appeared, and the user
closed the pop-up. Seconds later, the desktop background was changed to the
image of a padlock with a message demanding immediate payment to recover
the data. Which of the following types of malware MOST likely caused this
issue?
Câu hỏi 49Select one:
a.
Ransomware
b.
Rootkit
c.
Scareware
d.
Spyware
Phản hồi
Your answer is correct.
The correct answer is: Ransomware
Câu hỏi50
Sai
Đạt điểm 0,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which method would prevent tampering of data in transit?
Câu hỏi 50Select one:
a.
Spoofing mitigation
b.
Secure Sockets Layer
c.
Encryption of the data
d.
Access control lists
Phản hồi
Your answer is incorrect.
The correct answer is: Secure Sockets Layer
Câu hỏi51
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which the following flags are used to establish a TCP connection? (Select
TWO).
Câu hỏi 51Select one or more:
a.
>PSH
b.
FIN
c.
SYN
d.
ACK
e.
URG
Phản hồi
Your answer is correct.
The correct answers are: ACK, SYN
Câu hỏi52
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following devices would MOST likely have a DMZ interface?
Câu hỏi 52Select one:
a.
>Firewall
b.
Proxy
c.
Switch
d.
Load balancer
Phản hồi
Your answer is correct.
The correct answer is:>Firewall
Câu hỏi53
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A firewall technician has been instructed to disable all non-secure ports on a
corporate firewall. The technician has blocked traffic on port 21, 69, 80, and
137-139. The technician has allowed traffic on ports 22 and 443. Which of the
following correctly lists the protocols blocked and allowed?
Câu hỏi 53Select one:
a.
Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP
b.
Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS
c.
Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS
The question states that traffic on port 21, 69, 80, and 137-139 is blocked, while ports
22 and 443 are allowed.
Port 21 is used for FTP by default.
Port 69 is used for TFTP.
Port 80 is used for HTTP.
Ports 137-139 are used for NetBIOS.
VMM uses SFTP over default port 22.
Port 22 is used for SSH by default.
SCP runs over TCP port 22 by default.
Port 443 is used for HTTPS.
d.
Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS
Phản hồi
Your answer is correct.
The correct answer is: Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP,
HTTPS
Câu hỏi54
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A distributed denial of service attack can BEST be described as:
Câu hỏi 54Select one:
a.
Multiple attackers attempting to gain elevated privileges on a target system.
b.
Multiple computers attacking a single target in an organized attempt to deplete its
resources.
c.
Invalid characters being entered into a field in a database application.
d.
Users attempting to input random or invalid data into fields within a web browser
application.
Phản hồi
Your answer is correct.
The correct answer is: Multiple computers attacking a single target in an organized
attempt to deplete its resources.
Câu hỏi55
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
During a server audit, a security administrator does not notice abnormal
activity. However, a network security analyst notices connections to
unauthorized ports from outside the corporate network. Using specialized
tools, the network security analyst also notices hidden processes running.
Which of the following has MOST likely been installed on the server?
Câu hỏi 55Select one:
a.
SPIM
b.
Logic bomb
c.
Rootkit
A rootkit is a collection of tools (programs) that enable administrator-level access to a
computer or computer network. Typically, a cracker installs a rootkit on a computer
after first obtaining user-level access, either by exploiting a known vulnerability or
cracking a password. Once the rootkit is installed, it allows the attacker to mask
intrusion and gain root or privileged access to the computer and, possibly, other
machines on the network. A rootkit may consist of spyware and other programs that:
monitor traffic and keystrokes; create a “backdoor” into the system for the hacker’s
use; alter log files; attack other machines on the network; and alter existing system
tools to escape detection. The presence of a rootkit on a network was first documented
in the early 1990s. At that time, Sun and Linux operating systems were the primary
targets for a hacker looking to install a rootkit. Today, rootkits are available for a
number of operating systems, including Windows, and are increasingly difficult to detect
on any network.
d.
Backdoor
Phản hồi
Your answer is correct.
The correct answer is: Rootkit
Câu hỏi56
Đúng một phần
Đạt điểm 0,67 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A chief Financial Officer (CFO) has asked the Chief Information Officer (CISO)
to provide responses to a recent audit report detailing deficiencies in the
organization security controls. The CFO would like to know ways in which the
organization can improve its authorization controls. Given the request by the
CFO, which of the following controls should the CISO focus on in the report?
(Select Three)
Câu hỏi 56Select one or more:
a.
Password complexity policies
b.
Single sign-on
c.
Biometric systems
d.
Multifactor authentication
e.
Hardware tokens
f.
Role-based permissions
g.
One time passwords
h.
Separation of duties
i.
Lease privilege
Phản hồi
Your answer is partially correct.
Bạn đã chọn đúng 2.
The correct answers are: Role-based permissions, Separation of duties, Lease privilege
Câu hỏi57
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A user casually browsing the Internet is redirected to a warez site where a
number of pop-ups appear. After clicking on a pop-up to complete a survey, a
drive-by download occurs. Which of the following is MOST likely to be
contained in the download?
Câu hỏi 57Select one:
a.
Logic bomb
b.
Spyware
Spyware is software that is used to gather information about a person or organization
without their knowledge and sends that information to another entity. Whenever
spyware is used for malicious purposes, its presence is typically hidden from the user
and can be difficult to detect. Some spyware, such as keyloggers, may be installed by
the owner of a shared, corporate, or public computer intentionally in order to monitor
users.
c.
Smurf
d.
Backdoor
e.
DDoS
Phản hồi
Your answer is correct.
The correct answer is: Spyware
Câu hỏi58
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
A news and weather toolbar was accidently installed into a web browser. The
toolbar tracks users online activities and sends them to a central logging
server. Which of the following attacks took place?
Câu hỏi 58Select one:
a.
Session hijacking
b.
Flash cookies
c.
Man-in-the-browser
d.
Remote code execution
e.
Malicious add-on
Phản hồi
Your answer is correct.
The correct answer is: Malicious add-on
Câu hỏi59
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which is a common attack method used to overwhelm services from traffic from
multiple Internet sources?
Câu hỏi 59Select one:
a.
IP address spoofing
b.
Session hijacking
c.
Denial of service
d.
Distributed denial of service
Distributed denial of service, or DDoS, is a common attack technique used to deny
others of service. It is performed by overwhelming the service with bogus traffic. When
it is performed from multiple hosts on the Internet, it is very difficult to prevent and
stop.
Phản hồi
Your answer is correct.
The correct answer is: Distributed denial of service
Câu hỏi60
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Joe has hired several new security administrators and have been explaining
the design of the company’s network. He has described the position and
descriptions of the company’s firewalls, IDS sensors, antivirus server, DMZs,
and HIPS. Which of the following best describes the incorporation of these
elements?
Câu hỏi 60Select one:
a.
Defense in depth
b.
UTM security appliance
c.
Network segmentation
d.
Load balancers
Phản hồi
Your answer is correct.
The correct answer is: Defense in depth
Câu hỏi61
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
It is MOST important to make sure that the firewall is configured to do which
of the following?
Câu hỏi 61Select one:
a.
Deny all traffic based on known signatures.
b.
Alert the administrator of a possible intrusion.
c.
Deny all traffic and only permit by exception.
Firewalls manage traffic using filters, which is just a rule or set of rules. A recommended
guideline for firewall rules is, “deny by default; allow by exception”.
d.
Alert management of a possible intrusion.
Phản hồi
Your answer is correct.
The correct answer is: Deny all traffic and only permit by exception.
Câu hỏi62
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following design components is used to isolate network devices
such as web servers?
| 1/21

Preview text:

Câu hỏi: Pete, a security analyst, has been tasked with explaining the different types of
malware to his colleagues. The two malware types that the group seems to be most interested in
are botnets and viruses. Which of the following explains the difference between these two types of malware?
Đáp án đúng: Botnets are a subset of malware which are used as part of DDoS attacks.
Câu hỏi: Sara, a user, downloads a keygen to install pirated software. After running the
keygen, system performance is extremely slow and numerous antivirus alerts are displayed.
Which of the following BEST describes this type of malware?
Đáp án đúng: Trojan.
Câu hỏi: Ann, a security technician, is reviewing the IDS log files. She notices a large
number of alerts for multicast packets from the switches on the network. After investigation, she
discovers that this is normal activity for her network. Which of the following BEST describes these results?
Đáp án đúng: False positives.
Câu hỏi: Which of the following attacks is generally initiated from a botnet?
Đáp án đúng: Distributed denial of service.
Câu hỏi: Although a vulnerability scan report shows no vulnerabilities have been discovered,
a subsequent penetration test reveals vulnerabilities on the network. Which of the following has
been reported by the vulnerability scan?
Đáp án đúng: False negative.
Câu hỏi: What is the most commonly used technique to protect against virus attacks?
Đáp án đúng: Signature detection.
Câu hỏi: Which of the following malware types may require user interaction, does not hide
itself, and is commonly identified by marketing pop-ups based on browsing habits?
Đáp án đúng: Adware.
Câu hỏi: Which of the following firewall rules only denies DNS zone transfers?
Đáp án đúng: deny tcp any any port 53.
Câu hỏi: A company replaces a number of devices with a mobile appliance, combining
several functions. Which of the following descriptions fits this new implementation? (Select TWO).
Đáp án đúng: All-in-one device, Single point of failure.
Câu hỏi: Which of the following types of malware attempts to circumvent malware detection
by trying to hide its true location on the infected system?
Đáp án đúng: Trojan.
Câu hỏi: A program has been discovered that infects a critical Windows system executable
and stays dormant in memory. When a Windows mobile phone is connected to the host, the
program infects the phone’s boot loader and continues to target additional Windows PCs or
phones. Which of the following malware categories BEST describes this program?
Đáp án đúng: Virus.
Câu hỏi: The security administrator is observing unusual network behavior from a
workstation. The workstation is communicating with a known malicious destination over an
encrypted tunnel. A full antivirus scan, with an updated antivirus definition file, does not show
any signs of infection. Which of the following has happened on the workstation?
Đáp án đúng: Zero-day attack.
Câu hỏi: A security administrator wants to block unauthorized access to a web server using a
locally installed software program. Which of the following should the administrator deploy?
Đáp án đúng: HIPS (Host-based Intrusion Prevention System).
Câu hỏi: After surfing the Internet, Joe, a user, woke up to find all his files were corrupted.
His wallpaper was replaced by a message stating the files were encrypted and he needed to
transfer money to a foreign country to recover them. Joe is a victim of:
Đáp án đúng: Ransomware.
Câu hỏi: Which type of device can prevent an intrusion on your network?
Đáp án đúng: IPS (Intrusion Prevention System).
Câu hỏi: Which of the following BEST describes a demilitarized zone (DMZ)?
Đáp án đúng: A buffer zone between protected and unprotected networks.
Câu hỏi: Which of the following should the security administrator implement to limit web
traffic based on country of origin? (Select THREE).
Đáp án đúng: Proxies, Firewall, URL filtering.
Câu hỏi: An organization recently switched from a cloud-based email solution to an in-house
email server. The firewall needs to be modified to allow for sending and receiving email. Which
of the following ports should be open on the firewall to allow for email traffic? (Select THREE).
Đáp án đúng: TCP 25, TCP 110, TCP 143.
Câu hỏi: A trojan was recently discovered on a server. There are now concerns that there has
been a security breach that allows unauthorized people to access data. The administrator should
be looking for the presence of a/an:
Đáp án đúng: Backdoor.
Câu hỏi: Which of the following would a security administrator implement in order to
discover comprehensive security threats on a network?
Đáp án đúng: Vulnerability scan. Câu hỏi 21
A user, Ann, is reporting to the company IT support group that her workstation screen is blank
other than a window with a message requesting payment or else her hard drive will be formatted.
Which of the following types of malware is on Ann’s workstation?
Đáp án đúng: d. Ransomware Câu hỏi 22
Which of the following should be deployed to prevent the transmission of malicious traffic
between virtual machines hosted on a singular physical device on a network?
Đáp án đúng: b. HIPS on each virtual machine Câu hỏi 23
By default, which of the following uses TCP port 22? (Select THREE).
Đáp án đúng: f. SCP, g. SSH, h. SFTP Câu hỏi 24
Which of the following can Joe, a security administrator, implement on his network to capture
attack details that are occurring while also protecting his production network?
Đáp án đúng: c. Honeypot Câu hỏi 25
A user has several random browser windows opening on their computer. Which of the following
programs can be installed on his machine to help prevent this from happening?
Đáp án đúng: a. Pop-up blocker Câu hỏi 26
A network administrator has purchased two devices that will act as failovers for each other.
Which of the following concepts does this BEST illustrate?
Đáp án đúng: c. Availability Câu hỏi 27
A rogue wireless access point is created with the same SSID as the corporate SSID. The attacker
has employees connect to the SSID and watches the information as it’s relayed to the original
SSID. What type of attack is described here?
Đáp án đúng: d. Man in the middle attack Câu hỏi 28
Several employees clicked on a link in a malicious message that bypassed the spam filter and
their PCs were infected with malware as a result. Which of the following BEST prevents this
situation from occurring in the future?
Đáp án đúng: b. Security awareness training Câu hỏi 29
Pete, a security administrator, has observed repeated attempts to break into the network. Which
of the following is designed to stop an intrusion on the network?
Đáp án đúng: a. NIPS Câu hỏi 30
Users have reported receiving unsolicited emails in their inboxes, often times with malicious
links embedded. Which of the following should be implemented in order to redirect these messages?
Đáp án đúng: b. Spam filter Câu hỏi 31
Which of the following types of application attacks would be used to identify malware causing
security breaches that have NOT yet been identified by any trusted sources?
Đáp án đúng: c. Zero-day Câu hỏi 32
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provide?
Đáp án đúng: c. Protection against malware introduced by banner ads Câu hỏi 33
The network security engineer just deployed an IDS on the network, but the Chief Technical
Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the
following types of IDS has been deployed?
Đáp án đúng: c. Signature Based IDS Câu hỏi 34
Which attack can be used on a native VLAN?
Đáp án đúng: d. Double tagging Câu hỏi 35
A security administrator needs to implement a system that detects possible intrusions based upon
a vendor provided list. Which of the following BEST describes this type of IDS?
Đáp án đúng: c. Signature based Câu hỏi 36
Timestamps and sequence numbers act as countermeasures against which of the following types of attacks?
Đáp án đúng: c. Replay Câu hỏi 37
When dealing with firewalls, the term trusted network is used to describe what?
Đáp án đúng: d. Internal network Câu hỏi 38
Which statement is TRUE about the operation of a packet sniffer?
Đáp án đúng: d. The Ethernet card must be placed in promiscuous mode Câu hỏi 39
A Windows-based computer is infected with malware and is running too slowly to boot and run a
malware scanner. Which of the following is the BEST way to run the malware scanner?
Đáp án đúng: a. Boot from CD/USB Câu hỏi 40
Which of the following security architecture elements also has sniffer functionality? (Select TWO).
Đáp án đúng: b. IDS, e. IPS Câu hỏi41 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following will help prevent smurf attacks? Câu hỏi 41Select one: a.
Allowing necessary UDP packets in and out of the network b.
Disabling unused services on the gateway firewall c.
Flash the BIOS with the latest firmware d.
Disabling directed broadcast on border routers
A smurf attack involves sending PING requests to a broadcast address. Therefore, we
can prevent smurf attacks by blocking broadcast packets on our external routers. Phản hồi Your answer is correct.
The correct answer is: Disabling directed broadcast on border routers Câu hỏi42 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Joe, the Chief Technical Officer (CTO), is concerned about new malware being
introduced into the corporate network. He has tasked the security engineers
to implement a technology that is capable of alerting the team when unusual
traffic is on the network. Which of the following types of technologies will
BEST address this scenario?
Câu hỏi 42Select one: a. Anomaly Based IDS b. Proxy Firewall c. Signature IDS d. Application Firewall Phản hồi Your answer is correct.
The correct answer is: Anomaly Based IDS Câu hỏi43 Sai Đạt điểm 0,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A company wants to prevent end users from plugging unapproved
smartphones into PCs and transferring data. Which of the following would be
the BEST control to implement?
Câu hỏi 43Select one: a. DLP b. HIPS c. IDS d. MDM Phản hồi Your answer is incorrect. The correct answer is: DLP Câu hỏi44 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following would the security engineer set as the subnet mask for
the servers below to utilize host addresses on separate broadcast domains?
Server 1: 192.168.100.6 Server 2: 192.168.100.9 Server 3: 192.169.100.20 Câu hỏi 44Select one: a. /30 b. /29 c. /28 d. /24 e. /27 Phản hồi Your answer is correct. The correct answer is: /29 Câu hỏi45 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following software allows a network administrator to inspect the
protocol header in order to troubleshoot network issues?
Câu hỏi 45Select one: a. Packet sniffer b. URL filter c. Spam filter d. Switch Phản hồi Your answer is correct.
The correct answer is: Packet sniffer Câu hỏi46 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
The finance department just procured a software application that needs to
communicate back to the vendor server via SSL. Which of the following
default ports on the firewall must the security engineer open to accomplish this task?
Câu hỏi 46Select one: a. 130 b. 443 c. 3389 d. 80 Phản hồi Your answer is correct. The correct answer is: 443 Câu hỏi47 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A system administrator has noticed network performance issues and wants to
gather performance data from the gateway router. Which of the following can
be used to perform this action?
Câu hỏi 47Select one: a. SNMP b. iSCSI c. IPSec d. SMTP Phản hồi Your answer is correct. The correct answer is: SNMP Câu hỏi48 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
The Chief Information Officer (CIO) receives an anonymous threatening
message that says “beware of the 1st of the year”. The CIO suspects the
message may be from a former disgruntled employee planning an attack.
Which of the following should the CIO be concerned with?
Câu hỏi 48Select one: a. Smurf Attack b. Virus c. Logic bomb
A logic bomb is a piece of code intentionally inserted into a software system that will set
off a malicious function when specified conditions are met. For example, a programmer
may hide a piece of code that starts deleting files should they ever be terminated from
the company. Software that is inherently malicious, such as viruses and worms, often
contain logic bombs that execute a certain payload at a pre-defined time or when some
other condition is met. This technique can be used by a virus or worm to gain
momentum and spread before being noticed. Some viruses attack their host systems on
specific dates, such as Friday the 13th or April Fool’s Day. Trojans that activate on
certain dates are often called “time bombs”. To be considered a logic bomb, the
payload should be unwanted and unknown to the user of the software. As an example,
trial programs with code that disables certain functionality after a set time are not
normally regarded as logic bombs. d. Trojan Phản hồi Your answer is correct.
The correct answer is: Logic bomb Câu hỏi49 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
An employee reports work was being completed on a company-owned laptop
using a public wireless hot-spot. A pop-up screen appeared, and the user
closed the pop-up. Seconds later, the desktop background was changed to the
image of a padlock with a message demanding immediate payment to recover
the data. Which of the following types of malware MOST likely caused this issue?
Câu hỏi 49Select one: a. Ransomware b. Rootkit c. Scareware d. Spyware Phản hồi Your answer is correct.
The correct answer is: Ransomware Câu hỏi50 Sai Đạt điểm 0,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which method would prevent tampering of data in transit? Câu hỏi 50Select one: a. Spoofing mitigation b. Secure Sockets Layer c. Encryption of the data d. Access control lists Phản hồi Your answer is incorrect.
The correct answer is: Secure Sockets Layer Câu hỏi51 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which the following flags are used to establish a TCP connection? (Select TWO).
Câu hỏi 51Select one or more: a. >PSH b. FIN c. SYN d. ACK e. URG Phản hồi Your answer is correct.
The correct answers are: ACK, SYN Câu hỏi52 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following devices would MOST likely have a DMZ interface? Câu hỏi 52Select one: a. >Firewall b. Proxy c. Switch d. Load balancer Phản hồi Your answer is correct.
The correct answer is:>Firewall Câu hỏi53 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A firewall technician has been instructed to disable all non-secure ports on a
corporate firewall. The technician has blocked traffic on port 21, 69, 80, and
137-139. The technician has allowed traffic on ports 22 and 443. Which of the
following correctly lists the protocols blocked and allowed?
Câu hỏi 53Select one: a.
Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP b.
Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS c.
Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS
The question states that traffic on port 21, 69, 80, and 137-139 is blocked, while ports 22 and 443 are allowed.
Port 21 is used for FTP by default. Port 69 is used for TFTP. Port 80 is used for HTTP.
Ports 137-139 are used for NetBIOS.
VMM uses SFTP over default port 22.
Port 22 is used for SSH by default.
SCP runs over TCP port 22 by default. Port 443 is used for HTTPS. d.
Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS Phản hồi Your answer is correct.
The correct answer is: Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS Câu hỏi54 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A distributed denial of service attack can BEST be described as: Câu hỏi 54Select one: a.
Multiple attackers attempting to gain elevated privileges on a target system. b.
Multiple computers attacking a single target in an organized attempt to deplete its resources. c.
Invalid characters being entered into a field in a database application. d.
Users attempting to input random or invalid data into fields within a web browser application. Phản hồi Your answer is correct.
The correct answer is: Multiple computers attacking a single target in an organized
attempt to deplete its resources. Câu hỏi55 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
During a server audit, a security administrator does not notice abnormal
activity. However, a network security analyst notices connections to
unauthorized ports from outside the corporate network. Using specialized
tools, the network security analyst also notices hidden processes running.
Which of the following has MOST likely been installed on the server?
Câu hỏi 55Select one: a. SPIM b. Logic bomb c. Rootkit
A rootkit is a collection of tools (programs) that enable administrator-level access to a
computer or computer network. Typically, a cracker installs a rootkit on a computer
after first obtaining user-level access, either by exploiting a known vulnerability or
cracking a password. Once the rootkit is installed, it allows the attacker to mask
intrusion and gain root or privileged access to the computer and, possibly, other
machines on the network. A rootkit may consist of spyware and other programs that:
monitor traffic and keystrokes; create a “backdoor” into the system for the hacker’s
use; alter log files; attack other machines on the network; and alter existing system
tools to escape detection. The presence of a rootkit on a network was first documented
in the early 1990s. At that time, Sun and Linux operating systems were the primary
targets for a hacker looking to install a rootkit. Today, rootkits are available for a
number of operating systems, including Windows, and are increasingly difficult to detect on any network. d. Backdoor Phản hồi Your answer is correct. The correct answer is: Rootkit Câu hỏi56 Đúng một phần Đạt điểm 0,67 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A chief Financial Officer (CFO) has asked the Chief Information Officer (CISO)
to provide responses to a recent audit report detailing deficiencies in the
organization security controls. The CFO would like to know ways in which the
organization can improve its authorization controls. Given the request by the
CFO, which of the following controls should the CISO focus on in the report? (Select Three)

Câu hỏi 56Select one or more: a. Password complexity policies b. Single sign-on c. Biometric systems d. Multifactor authentication e. Hardware tokens f. Role-based permissions g. One time passwords h. Separation of duties i. Lease privilege Phản hồi
Your answer is partially correct. Bạn đã chọn đúng 2.
The correct answers are: Role-based permissions, Separation of duties, Lease privilege Câu hỏi57 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A user casually browsing the Internet is redirected to a warez site where a
number of pop-ups appear. After clicking on a pop-up to complete a survey, a
drive-by download occurs. Which of the following is MOST likely to be contained in the download?
Câu hỏi 57Select one: a. Logic bomb b. Spyware
Spyware is software that is used to gather information about a person or organization
without their knowledge and sends that information to another entity. Whenever
spyware is used for malicious purposes, its presence is typically hidden from the user
and can be difficult to detect. Some spyware, such as keyloggers, may be installed by
the owner of a shared, corporate, or public computer intentionally in order to monitor users. c. Smurf d. Backdoor e. DDoS Phản hồi Your answer is correct. The correct answer is: Spyware Câu hỏi58 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
A news and weather toolbar was accidently installed into a web browser. The
toolbar tracks users online activities and sends them to a central logging
server. Which of the following attacks took place?
Câu hỏi 58Select one: a. Session hijacking b. Flash cookies c. Man-in-the-browser d. Remote code execution e. Malicious add-on Phản hồi Your answer is correct.
The correct answer is: Malicious add-on Câu hỏi59 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which is a common attack method used to overwhelm services from traffic from multiple Internet sources? Câu hỏi 59Select one: a. IP address spoofing b. Session hijacking c. Denial of service d. Distributed denial of service
Distributed denial of service, or DDoS, is a common attack technique used to deny
others of service. It is performed by overwhelming the service with bogus traffic. When
it is performed from multiple hosts on the Internet, it is very difficult to prevent and stop. Phản hồi Your answer is correct.
The correct answer is: Distributed denial of service Câu hỏi60 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Joe has hired several new security administrators and have been explaining
the design of the company’s network. He has described the position and
descriptions of the company’s firewalls, IDS sensors, antivirus server, DMZs,
and HIPS. Which of the following best describes the incorporation of these elements?
Câu hỏi 60Select one: a. Defense in depth b. UTM security appliance c. Network segmentation d. Load balancers Phản hồi Your answer is correct.
The correct answer is: Defense in depth Câu hỏi61 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
It is MOST important to make sure that the firewall is configured to do which of the following? Câu hỏi 61Select one: a.
Deny all traffic based on known signatures. b.
Alert the administrator of a possible intrusion. c.
Deny all traffic and only permit by exception.
Firewalls manage traffic using filters, which is just a rule or set of rules. A recommended
guideline for firewall rules is, “deny by default; allow by exception”. d.
Alert management of a possible intrusion. Phản hồi Your answer is correct.
The correct answer is: Deny all traffic and only permit by exception. Câu hỏi62 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following design components is used to isolate network devices such as web servers?