1. An analyst is using a vulnerability scanner to look for common security misconfigurations on devices. Which of the following might be identified by the scanner? (Select TWO).(Select 2answers)
A) The firewall is disabled on workstations. B) SSH is enabled on servers. C) Browser homepages have not been customized. D) Default administrator credentials exist on networking hardware. E) The OS is only set to check for updates once a day.
2. An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sending packets to the wrong gateway. Which of the following network devices is misconfigured and which of the following should be done to remediate the issue?
A) Firewall,implement an ACL on the interface B) Router,place the correct subnet on the interface C) Switch,modify the access port to trunk port D) Proxy,add the correct transparent interface
3. An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?
A) PEAP B) EAP C) WPA2 D) RADIUS
4. An application developer has neglected to include input validation checks in the design of the company - s new web application. An employee discovers that repeatedly submitting large amounts of data,including custom code,to an application will allow the execution of the custom code at the administrator level. Which of the following BEST identifies this application attack?
A) Cross-site scripting B) Clickjacking C) Buffer overflow D) Replay
5. An application developer is designing an application involving secure transports from one service to another that will pass over port 80 for a request. Which of the following secure protocols is the developer MOST likely to use?
A) FTPS B) SFTP C) SSL D) LDAPS E) SSH
1. Right Answer: A,E Explanation:
2. Right Answer: B Explanation:
3. Right Answer: A Explanation: EAP by itself is only an authentication framework. PEAP (Protected Extensible Authentication Protocol) fully encapsulates EAP and is designed to work within a TLS (Transport Layer Security) tunnel that may be encrypted but is authenticated. The primary motivation behind the creation of PEAP was to help correct the deficiencies discovered within EAP since that protocol assumes that the communications channel is protected. As a result,when EAP messages are able to be discovered in the clear they do not provide the protection that was assumed when the protocol was originally authored. PEAP,EAP-TTLS,and EAP-TLS protect inner EAP authentication within SSL/TLS sessions.
Leave a comment