Created by - Mary Smith
Questions 1. The company has a set of instances of EC2, which are placed through the ELB. Some of the applications hosted in these cases communicate with the legacy protocol. There is a security mandate of all traffic and customer EC2 instances need to be safe. How to implement? Please choose:A) NoneB) Use Classic Load balancer and stop the SSL connection to EC2 InstancesC) Use Classic Load balancer and stop the SSL connection ELBD) Use the Application Load balancer and stop the SSL connection ELBE) Use the Application Load balancer with SSL connection and stop EC2 Instances2. You VPC setup a couple of, among others, the following public IP addresses. These EC2 instances need to get an external web server port 443. The cases do not reach the web server. You have ensured the following Internet gateway address in the VPC (1 0.0.0.0/16) route table is the route 0.0.0.0/0 the Internet gateway, the Security Groups allow outgoing traffic from the Port of NaCl 443 allows the outgoing traffic port 443 and incoming traffic for short-term ports of the above information which could be in the background. Please choose:A) NoneB) You should not use the Internet gateway. Instead use a NAT gateway for routing trafficC) The route table should be the route 10.0.0.0/16 Internet gatewayD) External web server is to avoid requestsE) Security Group should allow incoming traffic port 4433. EC2 Instance had to setup AWS. Software successfully download and install EC2 Instance. This software uses the IPv6 communication. Once the program is installed and you were trying to use the software via IPv6, port 80, you were not able to do so. What must be done to alleviate this issue?A) Add an instance of Internet connections.B) NoneC) Add your incoming rule of the security group that allows inbound port 80 :: IO.D) Add your incoming rule of the security group that allows incoming traffic on port 80 0.0.0.0/0.E) just add the outlet of the Internet gateway.4. You have set with the classic behind a load balancer EC2 Instances. You're going to the DNS name of the load balancer, but you do not hear cases in the background. Which of the following are the checks should be carried out? Select 2 response options below(Select 2answers)A) Make sure that the load balancer to create a public subnetB) To ensure the safety for the group load balancer accepts traffic on port 80 from 0.0.0.0/0.C) Make sure that the load balancer is created in the private subnetD) To ensure the safety for the group load balancer accepts traffic on port 80 from 10.0.0.01165. Which of the following is a key requirement to create AWS(Amazon Web Service) Maintenance Microsoft AD directory? Select 2 response options below(Select 2answers)A) The opening of several ports including the port 53B) NAT gateway public subnetC) Use NAT-grade VPCD) AVPCwith2subnets Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: A,BExplanation: 5. Right Answer: A,DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. How can one AWS account use Reserved Instances from another AWS account?A) A.By using Amazon EC2 Dedicated InstancesB) B.By using AWS Organizations consolidated billingC) C. By using the AWS Cost Explorer toolD) D. By using AWS Budgets2. A customer runs an On-Demand Amazon Linux EC2 instance for 3 hours, 5 minutes, and 6 seconds.For how much time will the customer be billed?A) A. 3 hours, 5 minutesB) B. 3 hours, 5 minutes, and 6 secondsC) C. 3 hours, 6 minutesD) D. 4 hours3. Which of the following AWS services provide compute resources? (Choose two.)(Select 2answers)A) A. AWS LambdaB) B. Amazon Elastic Container Service (Amazon ECS)C) C. AWS CodeDeployD) D. Amazon GlacierE) E. AWS Organizations4. Which AWS service enables users to deploy infrastructure as code by automating the process of provisioningresources?A) A. Amazon GameLiftB) B.AWS CloudFormationC) C.AWS Data PipelineD) D. AWS Glue5. Which AWS services provide a way to extend an on-premises architecture to the AWS Cloud? (Choose two.)(Select 2answers)A) A. Amazon EBSB) B. AWS Direct ConnectC) C. Amazon CloudFrontD) D. AWS Storage GatewayE) E. Amazon Connect Right Answer and Explanation: 1. Right Answer: BExplanation: The account that originally purchased the Reserved Instance receives the discount first. If the purchasingaccount doesn't have any instances that match the terms of the Reserved Instance, the discount for theReserved Instance is assigned to any matching usage on another account in the organization.https://aws.amazon.com/premiumsupport/knowledge-center/ec2-ri-consolidated-billing/2. Right Answer: BExplanation: https://aws.amazon.com/about-aws/whats-new/2017/10/announcing-amazon-ec2-per-second-billing/3. Right Answer: A,BExplanation: https://docs.aws.amazon.com/whitepapers/latest/aws-overview/compute-services.html4. Right Answer: BExplanation: AWS CloudFormation provides a common language for you to model and provision AWS and third partyapplication resources in your cloud environment. AWS CloudFormation allows you to use programminglanguages or a simple text file to model and provision, in an automated and secure manner, all the resourcesneeded for your applications across all regions and accounts. This gives you a single source of truth for yourAWS and third party resources.https://aws.amazon.com/cloudformation/5. Right Answer: B,DExplanation: https://aws.amazon.com/hybrid/ .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Your development team has started using AWS(Amazon Web Service) resources for development purposes. The AWS(Amazon Web Service) account has just been created. Your IT Security team is worried about possible leakage of AWS(Amazon Web Service) keys. What is the first level of measure that should be taken to protect the AWS(Amazon Web Service) account.A) Restrict access using IAM policies (Incorrect)B) Create IAM RolesC) Create IAM GroupsD) Delete the AWS(Amazon Web Service) keys for the root account2. Your current setup in AWS(Amazon Web Service) consists of the following architecture. 2 public subnets, one subnet which has the web servers accessed by users across the internet and the other subnet for the database server. Which of the following changes to the architecture would add a better security boundary to the resources hosted In your setup Please select:A) Consider moving the web server to a private subnetB) Consider moving both the web and database server to a private subnetC) Consider creating a private subnet and adding a NAT instance to that subnetD) Consider moving the database server to a private subnet3. You are building a large-scale confidential documentation web server on AWS(Amazon Web Service) and all of the documentation for it will be stored on 53. One of the requirements is that it cannot be publicly accessible from S3 directly, and you will need to use Cloud Front to accomplish this. Which of the methods listed below would satisfy the requirements as outlined? Choose an answer from the options below Please select:A) Create individual policies for each bucket the documents are stored in and in that policy grant access to only Cloud FrontB) Create an Identity and Access Management (IAM) user for Cloud Front and grant access to the objects in your 53 bucket to that IAM User.C) Create an 53 bucket policy that lists the Cloud Front distribution ID as the Principal and the target bucket as the Amazon Resource NameD) Create an Origin Access Identity (CAl) for Cloud Front and grant access to the objects in your S3 bucket to that CAl.4. You have an instance setup in a test environment in AWS. You installed the required application and the promoted the server to a production environment. Your IT Security team has advised that there maybe traffic flowing In from an unknown IP address to port 22. How can this be mitigated immediately? Please select:A) Remove the rule for incoming traffic on port 22 for the Security GroupB) Change the Instance type for the InstanceC) Shutdown the instanceD) Change the AMI for the instance5. You want to get a list of vulnerabilities for an EC2 Instance as per the guidelines set by the Center of Internet Security. How can you go about doing this?A) Use AWS(Amazon Web Service) InspectorB) Use AWS(Amazon Web Service) Macie (Incorrect)C) Use AWS(Amazon Web Service) Trusted AdvisorD) Enable AWS(Amazon Web Service) Guard Duty for the Instance Right Answer and Explanation: 1. Right Answer: DExplanation: The first level or measure that should be taken is to delete the keys for the IAM root user When you log into your account and go to your Security Access dashboard , this is the first step that can be seen Option B and C are wrong because creation of IAM groups and roles will not change the impact of leakage of AWS(Amazon Web Service) root access keys Option D is wrong because the first key aspect is to protect the access keys for the root account For more information on best practises for Security Access keys, please visit the below URL https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: The AWS(Amazon Web Service) Inspector service can inspect EC2 Instances based on specific Rules. One of the rules packages is based on the guidelines set by the Center of Internet Security Option A is invalid because this can be used to protect an instance but not give the list of vulnerabilities Option B and D are invalid because these services cannot give a list of vulnerabilities For more information on the guidelines, please visit the below URL https://docs.aws.amazon.com/inspector/latest/userguide/inspector_cis.html .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following attack includes social engineering, link manipulation or web site forgery techniques?A) surf attackB) Traffic analysisC) PhishingD) Interrupt attack2. Which of the following attack is MOSTLY performed by an attacker to steal the identity information of a user such as credit card number, passwords, etc?A) Smurf attackB) Traffic analysisC) HarmingD) Interrupt attack3. Which of the following biometrics methods provides the HIGHEST accuracy and is LEAST accepted by users?A) Palm ScanB) Hand GeometryC) FingerprintD) Retina scan4. Which of the following attack could be avoided by creating more security awareness in the organization and provide adequate security knowledge to all employees?A) surf attackB) Traffic analysisC) PhishingD) Interrupt attack5. Which of the following Confidentiality, Integrity, Availability (CIA) attribute supports the principle of least privilege by providing access to information only to authorized and intended users?A) ConfidentialityB) IntegrityC) AvailabilityD) Accuracy Right Answer and Explanation: 1. Right Answer: CExplanation: Phishing technique include social engineering, link manipulation or web site forgery techniques.For your exam you should know the information below:Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.Spear phishing - Phishing attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success.Link manipulation -Most methods of phishing use some form of technical deception designed to make a link in an email (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of sub domains are common tricks used by phishes. In the following example URL, http:// www.yourbank.example.com/, it appears as though the URL will take you to the example section of the your bank website; actually this URL points to the 'your bank' (i.e. phishing) section of the example website. Another common trick is to make the displayed text for a link (the text between the tags) suggest a reliable destination, when the link actually goes to the phishes' site. The following example link, //en.wikipedia.org/wiki/Genuine, appears to direct the user to an article entitled 'Genuine'; clicking on it will in fact take the user to the article entitled 'Deception'. In the lower left hand corner of most browsers users can preview and verify where the link is going to take them. Hovering your cursor over the link for a couple of seconds may do a similar thing, but this can still be set by the phishes through the HTML tooltip tag.Website forgery -Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original bar and opening up a new one with the legitimate URL.An attacker can even use flaws in a trusted website's own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge.The following answers are incorrect:Smurf Attack '' Occurs when mix-configured network device allow packet to be sent to all hosts on a particular network via the broadcast address of the networkTraffic analysis - is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.Interrupt attack- Interrupt attack occurs when a malicious action is performed by invoking the operating system to execute a particular system call.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 323Official ISC2 guide to CISSP CBK 3rd Edition Page number 493http://en.wikipedia.org/wiki/Phishing2. Right Answer: CExplanation: Harming is a cyber attack intended to redirect a website's traffic to another, bogus site. Harming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real IP addresses. Compromised DNS servers are sometimes referred to as 'poisoned'. Harming requires unprotected access to target a computer, such as altering a customer's home computer, rather than a corporate business server.The term 'phrasing' is a neologism based on the words 'farming' and 'phishing'. Phishing is a type of social-engineering attack to obtain access credentials, such as user names and passwords. In recent years, both phrasing and phishing have been used to gain information for online identity theft. Phrasing has become of major concern to businesses hosting ecommerce and online banking websites. Sophisticated measures known as anti-harming are required to protect against this serious threat. Antivirus software and spyware removal software cannot protect against harming.For your exam you should know the information below:Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.Spear phishing - Phishing attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success.Link manipulation -Most methods of phishing use some form of technical deception designed to make a link in an email (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of sub domains are common tricks used by phishes. In the following example URL, http:// www.yourbank.example.com/, it appears as though the URL will take you to the example section of your bank website; actually this URL points to the 'your bank' (i.e. phishing) section of the example website. Another common trick is to make the displayed text for a link (the text between the are tags) suggest a reliable destination, when the link actually goes to the phishes' site. The following example link, //en.wikipedia.org/wiki/Genuine, appears to direct the user to an article entitled 'Genuine'; clicking on it will in fact take the user to the article entitled 'Deception'. In the lower left hand corner of most browsers users can preview and verify where the link is going to take them. Hovering your cursor over the link for a couple of seconds may do a similar thing, but this can still be set by the phishes through the HTML tooltip tag.Website forgery -Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original bar and opening up a new one with the legitimate URL.An attacker can even use flaws in a trusted website's own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge.The following answers are incorrect:Smurf Attack '' Occurs when mix-configured network device allow packet to be sent to all hosts on a particular network via the broadcast address of the networkTraffic analysis - is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.Interrupt attack- Interrupt attack occurs when a malicious action is performed by invoking the operating system to execute a particular system call.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 323Official ISC2 guide to CISSP CBK 3rd Edition Page number326http://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Pharming3. Right Answer: DExplanation: Retina based biometric involves analyzing the layer of blood vessels situated at the back of the eye.An established technology, this technique involves using a low-intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point. This is not particularly convenient if you wear glasses or are concerned about having close contact with the reading device. For these reasons, retinal scanning is not warmly accepted by all users, even though the technology itself can work well.For your exam you should know the information below:Biometrics -Biometrics verifies an individual's identity by analyzing a unique personal attribute or behavior, which is one of the most effective and accurate methods of verifying identification and not well received by society. Biometrics is a very sophisticated technology; thus, it is much more expensive and complex than the other types of identity verification processes. A biometric system can make authentication decisions based on an individual's behavior, as in signature dynamics, but these can change over time and possibly be forged. Biometric systems that base authentication decisions on physical attributes (such as iris, retina, or fingerprint) provide more accuracy because physical attributes typically don't change, absent some disfiguring injury, and are harder to impersonateBiometrics is typically broken up into two different categories. The first is the physiological. These are traits that are physical attributes unique to a specific individual. Fingerprints are a common example of a physiological trait used in biometric systems. The second category of biometrics is known as behavioral. The behavioral authentication is also known as continuous authentication. The behavioral/continuous authentication prevents session hijacking attack. This is based on a characteristic of an individual to confirm his identity. An example is signature Dynamics. Physiological is 'what you are' and behavioral is 'what you do.'When a biometric system rejects an authorized individual, it is called a Type I error (false rejection rate). When the system accepts impostors who should be rejected, it is called a Type II error (false acceptance rate). The goal is to obtain low numbers for each type of error, but Type II errors are the most dangerous and thus the most important to avoid.When comparing different biometric systems, many different variables are used, but one of the most important metrics is the crossover error rate (CER). This rating is stated as a percentage and represents the point at which the false rejection rate equals the false acceptance rate. This rating is the most important measurement when determining the system's accuracy. A biometric system that delivers a CER of 3 will be more accurate than a system that delivers a CER of 4.Crossover error rate (CER) is also called equal error rate (EER).Throughput describes the process of authenticating to a biometric system. This is also referred to as the biometric system response time. The primary consideration that should be put into the purchasing and implementation of biometric access control are user acceptance, accuracy and processing speed.Biometric Considerations -In addition to the access control elements of a biometric system, there are several other considerations that are important to the integrity of the control environment. These are:Resistance to counterfeiting -Data storage requirements -User acceptance -Reliability and -Target User and approach -Fingerprint -Fingerprints are made up of ridge endings and bifurcations exhibited by friction ridges and other detailed characteristics called minutiae. It is the distinctiveness of these minutiae that gives each individual a unique fingerprint. An individual places his finger on a device that reads the details of the fingerprint and compares this to a reference file. If the two match, the individual's identity has been verified.Palm Scan -The palm holds a wealth of information and has many aspects that are used to identify an individual. The palm has creases, ridges, and grooves throughout that are unique to a specific person. The palm scan also includes the fingerprints of each finger. An individual places his hand on the biometric device, which scans and captures this information. This information is compared to a reference file, and the identity is either verified or rejected.Hand Geometry -The shape of a person's hand (the shape, length, and width of the hand and fingers) defines hand geometry. This trait differs significantly between people and is used in some biometric systems to verify identity. A person places her hand on a device that has grooves for each finger. The system compares the geometry of each finger, and the hand as a whole, to the information in a reference file to verify that person's identity.Retina Scan -A system that reads a person's retina scans the blood-vessel pattern of the retina on the backside of the eyeball. This pattern has shown to be extremely unique between different people. A camera is used to project a beam inside the eye and capture the pattern and compare it to a reference file recorded previously.Iris Scan -An iris scan is a passive biometric controlThe iris is the colored portion of the eye that surrounds the pupil. The iris has unique patterns, rifts, colors, rings, coronas, and furrows. The uniqueness of each of these characteristics within the iris is captured by a camera and compared with the information gathered during the enrollment phase.When using an iris pattern biometric system, the optical unit must be positioned so the sun does not shine into the aperture; thus, when implemented, it must have proper placement within the facility.Signature Dynamics -When a person signs a signature, usually they do so in the same manner and speed each time. Signing a signature produces electrical signals that can be captured by a biometric system. The physical motions performed when someone is signing a document create these electrical signals. The signals provide unique characteristics that can be used to distinguish one individual from another. Signature dynamics provides more information than a static signature, so there are more variables to verify when confirming an individual's identity and more assurance that this person is who he claims to be.Keystroke Dynamics -Whereas signature dynamics is a method that captures the electrical signals when a person signs a name, keystroke dynamics captures electrical signals when a person types a certain phrase. As a person types a specified phrase, the biometric system captures the speed and motions of this action. Each individual has a certain style and speed, which translate into unique signals. This type of authentication is more effective than typing in a password, because a password is easily obtainable. It is much harder to repeat a person's typing style than it is to acquire a password.Voice Print -People's speech sounds and patterns have many subtle distinguishing differences. A biometric system that is programmed to capture a voice print and compare it to the information held in a reference file can differentiate one individual from another. During the enrollment process, an individual is asked to say several different words.Facial Scan -A system that scans a person's face takes many attributes and characteristics into account. People have different bone structures, nose ridges, eye widths, forehead sizes, and chin shapes. These are all captured during a facial scan and compared to an earlier captured scan held within a reference record. If the information is a match, the person is positively identified.Hand Topography -Whereas hand geometry looks at the size and width of an individual's hand and fingers, hand topology looks at the different peaks and valleys of the hand, along with its overall shape and curvature. When an individual wants to be authenticated, she places her hand on the system. Off to one side of the system, a camera snaps a side-view picture of the hand from a different view and angle than that of systems that target hand geometry, and thus captures different data. This attribute is not unique enough to authenticate individuals by itself and is commonly used in conjunction with hand geometry.Vascular Scan -Vascular Scan uses the blood vessel under the first layer of skin.The following answers are incorrect:Fingerprint - Fingerprints are made up of ridge endings and bifurcations exhibited by friction ridges and other detailed characteristics called minutiae. It is the distinctiveness of these minutiae that gives each individual a unique fingerprint. An individual places his finger on a device that reads the details of the fingerprint and compares this to a reference file. If the two match, the individual's identity has been verified.Hand Geometry - The shape of a person's hand (the shape, length, and width of the hand and fingers) defines hand geometry. This trait differs significantly between people and is used in some biometric systems to verify identity. A person places her hand on a device that has grooves for each finger. The system compares the geometry of each finger, and the hand as a whole, to the information in a reference file to verify that person's identity.Palm Scan - The palm holds a wealth of information and has many aspects that are used to identify an individual. The palm has creases, ridges, and grooves throughout that are unique to a specific person. The palm scan also includes the fingerprints of each finger. An individual places his hand on the biometric device, which scans and captures this information. This information is compared to a reference file, and the identity is either verified or rejected.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 330 and 331Official ISC2 guide to CISSP CBK 3rd Edition Page number 9244. Right Answer: CExplanation: Phishing techniques include social engineering, link manipulation, spear phishing, whaling, dishing, or web site forgery techniques.For your exam you should know the information below:Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.Spear phishing -Phishing attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success.Link manipulation -Most methods of phishing use some form of technical deception designed to make a link in an email (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of sub domains are common tricks used by phishes. In the following example URL, http:// www.yourbank.example.com/, it appears as though the URL will take you to the example section of your bank website; actually this URL points to the 'your bank' (i.e. phishing) section of the example website. Another common trick is to make the displayed text for a link (the text between the tags) suggest a reliable destination, when the link actually goes to the phishes' site. The following example link, //en.wikipedia.org/wiki/Genuine, appears to direct the user to an article entitled 'Genuine'; clicking on it will in fact take the user to the article entitled 'Deception'. In the lower left hand corner of most browsers users can preview and verify where the link is going to take them. Hovering your cursor over the link for a couple of seconds may do a similar thing, but this can still be set by the phishes through the HTML tooltip tag.Website forgery -Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original bar and opening up a new one with the legitimate URL.An attacker can even use flaws in a trusted website's own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service's own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge.The following answers are incorrect:Smurf Attack '' Occurs when mix-configured network device allow packet to be sent to all hosts on a particular network via the broadcast address of the networkTraffic analysis - is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.Interrupt attack- Interrupt attack occurs when a malicious action is performed by invoking the operating system to execute a particular system call.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 323Official ISC2 guide to CISSP CBK 3rd Edition Page number 493http://en.wikipedia.org/wiki/Phishing5. Right Answer: AExplanation: Confidentiality supports the principle of 'least privilege' by providing that only authorized individuals, processes, or systems should have access to information on a need-to-know basis.The level of access that an authorized individual should have is at the level necessary for them to do their job. In recent years, much press has been dedicated to the privacy of information and the need to protect it from individuals, who may be able to commit crimes by viewing the information.Identity theft is the act of assuming one's identity through knowledge of confidential information obtained from various sources.An important measure to ensure confidentiality of information is data classification. This helps to determine who should have access to the information (public, internal use only, or confidential). Identification, authentication, and authorization through access controls are practices that support maintaining the confidentiality of information.A sample control for protecting confidentiality is to encrypt information. Encryption of information limits the usability of the information in the event it is accessible to an unauthorized person.For your exam you should know the information below:Integrity -Integrity is the principle that information should be protected from intentional, unauthorized, or accidental changes.Information stored in files, databases, systems, and networks must be relied upon to accurately process transactions and provide accurate information for business decision making. Controls are put in place to ensure that information is modified through accepted practices.Sample controls include management controls such as segregation of duties, approval checkpoints in the systems development life cycle, and implementation of testing practices that assist in providing information integrity. Well-formed transactions and security of the update programs provide consistent methods of applying changes to systems. Limiting update access to those individuals with a need to access limits the exposure to intentional and unintentional modification.Availability -Availability is the principle that ensures that information is available and accessible to users when needed.The two primary areas affecting the availability of systems are:1. Denial-of-Service attacks and2. Loss of service due to a disaster, which could be man-made (e.g., poor capacity planning resulting in system crash, outdated hardware, and poor testing resulting in system crash after upgrade) or natural (e.g., earthquake, tornado, blackout, hurricane, fire, and flood).In either case, the end user does not have access to information needed to conduct business. The criticality of the system to the user and its importance to the survival of the organization will determine how significant the impact of the extended downtime becomes. The lack of appropriate security controls can increase the risk of viruses, destruction of data, external penetrations, or denial-of-service (DOS) attacks. Such events can prevent the system from being used by normal users.CIA -The following answers are incorrect:Integrity- Integrity is the principle that information should be protected from intentional, unauthorized, or accidental changes.Availability - Availability is the principle that ensures that information is available and accessible to users when needed.Accuracy '' Accuracy is not a valid CIA attribute.Following reference(s) were/was used to create this question:CISA review manual 2014 Page number 314Official ISC2 guide to CISSP CBK 3rd Edition Page number 350 .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. The business owner's approval of software changes being moved into production is PRIMARILY necessary to:A) ensure that an application functionality requirement is satisfied.B) prevent unauthorized access to data.C) inform management of deployments of new functionality.D) confirm there is a process to control system changes.2. A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items to the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?A) An edit check for the validity of the inventory transactionB) Separate authorization for input of transactionsC) Unscheduled audits of lost stock linesD) Statistical sampling of adjustment transactions3. Which of the following controls will MOST effectively detect inconsistent records resulting from the lack of referential integrity in a database management system?A) Concurrent access controlsB) Incremental data backupsC) Performance monitoring toolsD) Periodic table link checks4. Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?A) Apply single sign-on for access control.B) Enforce an internal data access policy.C) Enforce the use of digital signatures.D) Implement segregation of duties.5. Which of the following is the MOST effective way for an organization to protect against data leakage?A) Conduct periodic security awareness training.B) Limit employee Internet access.C) Review firewall logs for anomalies.D) Develop a comprehensive data loss prevention policy. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 5. Which principle is key for the governance and management of enterprise IT?A) Managing IT OperationsB) Insure Resource OptimizationC) Enabling a Holistic ApproachD) Managing Information Right Answer and Explanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A user has plugged in a mobile phone to a PC and received a message that the driver was not successfully installed. Which of the following system tools should be used to troubleshoot this error?A) A. Device ManagerB) B. Component ServicesC) C. Windows Memory DiagnosticsD) D. Data Sources2. A turnstile is an example of which of the following forms of physical security?A) A. Entry control rosterB) B. BiometricsC) C. MantrapD) D. Cipher lock3. Which of the following security threats happens when another person enters a secured area with an authorized person?A) A. TailgatingB) B. Shoulder surfingC) C. SpoofingD) D. Phishing4. A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).(Select 2answers)A) A. User trainingB) B. Anti-malwareC) C. Paper shreddingD) D. Time of day restrictionsE) E. Employee badgesF) F. Mantraps5. After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?A) A. Replace the RAID controller and boot.B) B. Reinsert the drive and boot.C) C. Plug the drive back in, the system will resume automatically.D) D. Remove all drives and rebuild the array. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: A,CExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?A) A. Without additional configuration, no users may have user specific crontabs.B) B. Without additional configuration, all users may have user specific crontabs.C) C. The cron daemon will refuse to start and report missing files in the system's logfile.D) D. When a user creates a user specific crontab the system administrator must approve it explicitly.2. Which of the following commands can remove a user from a group?A) A. grouprmB) B. groupmodC) C. passwdD) D. usergroupsE) E. usermod3. Where are user specific crontabs stored?A) A. In the database file /etc/crontab.db which is shared by all users.B) B. As individual per-user files within /var/spool/cron.C) C. As individual per-user files in /etc/cron.user.d.D) D. In the .crontab file in the user's home directory.E) E. In the file /var/cron/user-crontab which is shared by all users.4. Which file contains the date of the last change of a user's password?A) A. /etc/gshadowB) B. /etc/passwdC) C. /etc/pwdlogD) D. /etc/shadowE) E. /var/log/shadow5. After moving data to a new filesystem, how can the former path of the data be kept intact in order to avoid reconfiguration of existing applications? (Choose TWO correct answers.)(Select 2answers)A) A. By creating an ACL redirection from the old to the new path of the data.B) B. By creating a hard link from the old to the new path of the data.C) C. By creating a symbolic link from the old to the new path of the data.D) D. By running the command touch on the old path.E) E. By mounting the new filesystem on the original path of the data. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: EExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: C,EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A security administrator is developing training for corporate users on basic security principles for personal email accounts. Which of the following should be mentioned as the MOST secure way for password recovery?A) Utilizing a single Qfor password recoveryB) Use a different e-mail address to recover passwordC) Sending a PIN to a smartphone through text messageD) Utilizing CAPTCHA to avoid brute force attacks2. A product manager is concerned about continuing operations at a facility located in a region undergoing significant political unrest. After consulting with senior management,a decision is made to suspend operations at the facility until the situation stabilizes. Which of the following risk management strategies BEST describes management's response?A) DeterrenceB) MitigationC) AcceptanceD) Avoidance3. A salesperson often uses a USB drive to save and move files from a corporate laptop. The coprorate laptop was recently updated,and now the files on the USB are read-only. Which of the following was recently added to the laptop?A) File integrity checkB) HIPSC) Antivirus softwareD) DLP4. A recent penetration test revealed several issues with a public-facing website used by customers. The testers were able to: Enter long lines of code and special characters Crash the system Gain unauthorized access to the internal application server Map the internal network The development team has stated they will need to rewrite a significant portion of the code used,and it will take more than a year to deliver the finished product. Which of the following would be the BEST solution to introduce in the interim?A) Content filetingB) TLSC) UTMD) IPS/IDSE) WAF5. A security analyst is acquiring data from a potential network incident. Which of the following evidence is the analyst MOST likely to obtain to determine the incident?A) ScreenshotsB) Volatile memory captureC) System image captureD) Traffic and logs Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review