1What is the primary function of a network firewall?
configure firewalls
Easy
A.To automatically back up server data
B.To monitor and control incoming and outgoing network traffic based on security rules
C.To increase the speed of the internet connection
D.To scan for viruses on user computers
Correct Answer: To monitor and control incoming and outgoing network traffic based on security rules
Explanation:
A firewall acts as a barrier between a trusted internal network and an untrusted external network, filtering traffic to protect against unauthorized access.
Incorrect! Try again.
2Which protocol provides a secure, encrypted method for remote command-line administration of a server?
configure security protocols
Easy
A.FTP
B.HTTP
C.Telnet
D.SSH (Secure Shell)
Correct Answer: SSH (Secure Shell)
Explanation:
SSH (Secure Shell) is a cryptographic network protocol used for secure remote login and other secure network services over an unsecured network. It replaced the insecure Telnet protocol.
Incorrect! Try again.
3What is the main purpose of an Intrusion Detection System (IDS)?
implement intrusion detection systems
Easy
A.To manage user passwords and permissions
B.To encrypt all data on the server's hard drive
C.To monitor network traffic and alert administrators to suspicious activity
D.To actively block malicious network traffic
Correct Answer: To monitor network traffic and alert administrators to suspicious activity
Explanation:
An IDS is a monitoring system. Its primary role is to detect potential security breaches and report them, but unlike an Intrusion Prevention System (IPS), it does not actively block the activity.
Incorrect! Try again.
4The principle of giving users only the permissions they need to perform their job and no more is known as what?
implement logical access control methods
Easy
A.The Principle of Full Trust
B.The Principle of Least Privilege
C.The Principle of Open Access
D.The Principle of Maximum Permissions
Correct Answer: The Principle of Least Privilege
Explanation:
The Principle of Least Privilege is a fundamental security concept that minimizes risk by ensuring users, programs, or processes have only the minimum access levels necessary for their function.
Incorrect! Try again.
5What is the primary goal of data encryption?
implement data security models
Easy
A.To speed up data transmission
B.To make data files smaller
C.To organize data more efficiently
D.To convert data into a coded format to prevent unauthorized access
Correct Answer: To convert data into a coded format to prevent unauthorized access
Explanation:
Encryption transforms plaintext data into unreadable ciphertext using an algorithm, protecting its confidentiality so that only authorized parties can read it.
Incorrect! Try again.
6Which of the following is a common first step in hardening a new server?
apply server hardening techniques
Easy
A.Changing default passwords and disabling unnecessary services
B.Granting all users administrator access
C.Connecting it directly to the public internet
D.Installing social media applications
Correct Answer: Changing default passwords and disabling unnecessary services
Explanation:
Server hardening aims to reduce the server's attack surface. Changing default credentials and removing unneeded software or services are critical initial steps.
Incorrect! Try again.
7Which of the following is a measure of physical security for a server room?
implement physical security
Easy
A.Keeping the server room door locked
B.Encrypting network traffic
C.Using a strong administrator password
D.Installing a software firewall
Correct Answer: Keeping the server room door locked
Explanation:
Physical security involves protecting hardware from unauthorized physical access, theft, or damage. A locked door is a fundamental physical security control.
Incorrect! Try again.
8What does a VLAN (Virtual Local Area Network) allow an administrator to do?
create virtual networks
Easy
A.Create backups of virtual machines
B.Provide wireless internet access
C.Increase the physical speed of the network cables
D.Logically segment a single physical network into multiple separate networks
Correct Answer: Logically segment a single physical network into multiple separate networks
Explanation:
VLANs allow network devices on different physical LAN segments to be grouped into one logical network, improving security and network management by isolating traffic.
Incorrect! Try again.
9In a firewall's ruleset, what is the purpose of an implicit 'deny all' rule at the very end?
configure firewalls
Easy
A.To speed up the firewall's processing
B.To log all network activity
C.To allow all traffic by default
D.To ensure that any traffic not explicitly allowed by a previous rule is blocked
Correct Answer: To ensure that any traffic not explicitly allowed by a previous rule is blocked
Explanation:
This is a security best practice. It ensures that the firewall operates on a principle of 'default deny,' where only specifically permitted traffic can pass through.
Incorrect! Try again.
10What does the 'S' in HTTPS stand for?
configure security protocols
Easy
A.Server
B.Simple
C.Secure
D.Standard
Correct Answer: Secure
Explanation:
HTTPS stands for Hypertext Transfer Protocol Secure. The 'Secure' part indicates that the communication between your browser and the website is encrypted using SSL/TLS.
Incorrect! Try again.
11Using your password (something you know) and a code from a mobile app (something you have) is an example of:
implement logical access control methods
Easy
A.Multi-Factor Authentication (MFA)
B.Role-Based Access Control (RBAC)
C.Password complexity requirement
D.Single-Factor Authentication (SFA)
Correct Answer: Multi-Factor Authentication (MFA)
Explanation:
Multi-Factor Authentication (MFA), often Two-Factor Authentication (2FA), enhances security by requiring two or more different methods of verification to grant access.
Incorrect! Try again.
12Why is it important to regularly apply security patches to a server?
apply server hardening techniques
Easy
A.To free up disk space
B.To add new features to the operating system
C.To change the server's hostname
D.To fix known security vulnerabilities that could be exploited
Correct Answer: To fix known security vulnerabilities that could be exploited
Explanation:
Software vendors release patches to fix bugs and, more importantly, to close security holes that have been discovered. Patch management is a critical part of server hardening.
Incorrect! Try again.
13What is the function of an Uninterruptible Power Supply (UPS) in a server closet?
implement physical security
Easy
A.It provides temporary battery power in case of an electrical outage.
B.It cools the server hardware.
C.It provides a secondary internet connection.
D.It serves as a backup hard drive for the server.
Correct Answer: It provides temporary battery power in case of an electrical outage.
Explanation:
A UPS contains a battery that provides power to connected equipment for a short period during a power failure, allowing for a graceful shutdown and preventing data loss.
Incorrect! Try again.
14What is the primary benefit of using a VPN (Virtual Private Network)?
create virtual networks
Easy
A.To manage user account passwords
B.To create a secure, encrypted connection over an untrusted public network
C.To physically connect two different buildings
D.To increase the processing power of a server
Correct Answer: To create a secure, encrypted connection over an untrusted public network
Explanation:
A VPN creates a secure 'tunnel' for your data to travel through when using public networks like the internet, protecting it from eavesdropping.
Incorrect! Try again.
15What is the key difference between an IDS and an IPS?
implement intrusion detection systems
Easy
A.An IDS is for networks, while an IPS is for single computers.
B.An IDS is software, while an IPS is hardware.
C.There is no difference; the terms are interchangeable.
D.An IDS only detects and alerts, while an IPS can also take action to block the threat.
Correct Answer: An IDS only detects and alerts, while an IPS can also take action to block the threat.
Explanation:
An Intrusion Detection System (IDS) is passive, functioning like a burglar alarm. An Intrusion Prevention System (IPS) is active, functioning like a security guard who can stop a break-in.
Incorrect! Try again.
16The Bell-LaPadula model is a data security model focused primarily on enforcing what?
implement data security models
Easy
A.Data Recovery
B.Data Confidentiality
C.Data Integrity
D.Data Availability
Correct Answer: Data Confidentiality
Explanation:
The Bell-LaPadula model is known for its rules like 'no read up, no write down,' which are designed to prevent information from flowing to a less secure classification level, thus protecting confidentiality.
Incorrect! Try again.
17Assigning permissions to groups like 'Sales' or 'HR' and then adding users to those groups is an example of what access control method?
implement logical access control methods
Easy
A.Attribute-Based Access Control (ABAC)
B.Discretionary Access Control (DAC)
C.Role-Based Access Control (RBAC)
D.Mandatory Access Control (MAC)
Correct Answer: Role-Based Access Control (RBAC)
Explanation:
RBAC simplifies administration by managing permissions for roles, not individual users. A user inherits the permissions of the role(s) they are assigned to.
Incorrect! Try again.
18A packet-filtering firewall operates at which layers of the OSI model?
configure firewalls
Easy
A.Layers 3 and 4 (Network and Transport)
B.Layer 7 (Application)
C.Layers 5 and 6 (Session and Presentation)
D.Layers 1 and 2 (Physical and Data Link)
Correct Answer: Layers 3 and 4 (Network and Transport)
Explanation:
A basic packet-filtering firewall makes its decisions based on information in the network and transport layer headers, such as source/destination IP addresses (Layer 3) and port numbers (Layer 4).
Incorrect! Try again.
19Which of the following describes the process of reducing a server's attack surface?
apply server hardening techniques
Easy
A.Server hardening
B.Intrusion detection
C.Network segmentation
D.Data encryption
Correct Answer: Server hardening
Explanation:
Server hardening is the general term for the process of securing a system by reducing its vulnerabilities. This is often achieved by removing unnecessary software, accounts, or services.
Incorrect! Try again.
20What is the name of the software that creates and runs virtual machines?
create virtual networks
Easy
A.A firmware
B.A hypervisor
C.A compiler
D.An operating system
Correct Answer: A hypervisor
Explanation:
A hypervisor, or virtual machine monitor (VMM), is the software or firmware that allows one host computer to support multiple guest virtual machines by sharing its resources.
Incorrect! Try again.
21A system administrator needs to configure a firewall to allow web traffic on ports 80 and 443 and allow SSH access from a specific management network (10.10.0.0/24), while denying all other inbound traffic. What is the most secure and efficient way to write these rules, assuming the firewall processes rules in order?
configure firewalls
Medium
A.1. DENY IN from any to any port 22; 2. ALLOW IN from 10.10.0.0/24 to any port 22; 3. ALLOW IN from any to any port 80, 443
B.1. ALLOW IN from any to any; 2. DENY IN from not 10.10.0.0/24 to any port 22; 3. DENY IN from any to any port not 80, 443
C.1. DENY IN from any to any; 2. ALLOW IN from 10.10.0.0/24 to any port 22; 3. ALLOW IN from any to any port 80, 443
D.1. ALLOW IN from any to any port 80; 2. ALLOW IN from any to any port 443; 3. ALLOW IN from 10.10.0.0/24 to any port 22; 4. DENY IN from any to any
Correct Answer: 1. ALLOW IN from any to any port 80; 2. ALLOW IN from any to any port 443; 3. ALLOW IN from 10.10.0.0/24 to any port 22; 4. DENY IN from any to any
Explanation:
The standard security practice for firewalls is to follow an 'implicit deny' or 'default deny' policy. This involves explicitly defining all ALLOW rules first and then ending with a single DENY ALL rule. This ensures that only specified traffic is permitted and everything else is blocked. Option A is incorrect because a DENY ALL rule at the beginning would block all traffic, making subsequent ALLOW rules useless.
Incorrect! Try again.
22An administrator is tasked with securing a new web server. The requirement is to ensure all communication between clients and the server is encrypted, authenticated, and its integrity is verifiable. The company policy strictly forbids using protocols with known major vulnerabilities like POODLE.
configure security protocols
Medium
A.Implement FTP over SSL (FTPS) to handle web traffic.
B.Implement SSL 3.0, as it is widely supported.
C.Implement HTTPS using a self-signed certificate for internal use.
D.Implement TLS 1.3, disabling all older SSL/TLS versions.
Correct Answer: Implement TLS 1.3, disabling all older SSL/TLS versions.
Explanation:
TLS 1.3 is the latest and most secure version of the Transport Layer Security protocol, offering improved security and performance. SSL 3.0 is highly vulnerable (e.g., POODLE attack) and must be disabled. A self-signed certificate will cause trust warnings in browsers and does not provide proper authentication from a trusted third party. FTPS is for secure file transfer, not for general web traffic (HTTP).
Incorrect! Try again.
23A security analyst receives an alert about unusual network traffic patterns from a server at 2 AM, a time when legitimate traffic is typically nonexistent. The traffic does not match any known malware signatures. Which type of Intrusion Detection System (IDS) is most likely to have generated this alert?
implement intrusion detection systems
Medium
A.A honeypot
B.Anomaly-based Host-based Intrusion Detection System (HIDS)
C.A stateful firewall
D.Signature-based Network Intrusion Detection System (NIDS)
Correct Answer: Anomaly-based Host-based Intrusion Detection System (HIDS)
Explanation:
Anomaly-based (or behavior-based) detection systems work by establishing a baseline of normal activity and then flagging any significant deviations. Since the alert was for unusual traffic at an odd time and did not match a known signature, an anomaly-based system is the most likely source. A HIDS is plausible as it monitors a specific host's behavior. A signature-based system would not catch this, as there was no signature match. A stateful firewall tracks connections but doesn't typically analyze behavior patterns.
Incorrect! Try again.
24A system administrator is hardening a newly deployed Linux server. Which of the following actions best applies the 'principle of least functionality' to reduce the server's attack surface?
apply server hardening techniques
Medium
A.Uninstalling unnecessary services and packages, such as mail servers or compilers, if not needed.
B.Enforcing a strong password policy for all user accounts.
C.Disabling direct root login over SSH.
D.Changing the default SSH port from 22 to a non-standard port like 2222.
Correct Answer: Uninstalling unnecessary services and packages, such as mail servers or compilers, if not needed.
Explanation:
The principle of least functionality dictates that a system should only have the services and software required to perform its primary role. By uninstalling unneeded packages, you remove potential vulnerabilities associated with that software, directly reducing the attack surface. While the other options are also good hardening practices, they do not directly relate to the principle of least functionality.
Incorrect! Try again.
25A company policy states that permissions should be assigned to job functions, not to individual employees. A new employee joining the 'Database Admins' team should automatically receive all necessary permissions to manage the company's databases. Which access control model best supports this requirement?
implement logical access control methods
Medium
A.Discretionary Access Control (DAC)
B.Attribute-Based Access Control (ABAC)
C.Mandatory Access Control (MAC)
D.Role-Based Access Control (RBAC)
Correct Answer: Role-Based Access Control (RBAC)
Explanation:
Role-Based Access Control (RBAC) is specifically designed for this scenario. In RBAC, permissions are associated with roles (e.g., 'Database Admins', 'Accountants'), and users are assigned to these roles. This simplifies administration and enforces policies based on job function. DAC is user-centric, and MAC is data-centric based on security labels.
Incorrect! Try again.
26A datacenter wants to implement a control to prevent 'tailgating,' where an unauthorized person follows an authorized individual into a secure area. Which physical security measure is specifically designed to mitigate this threat?
implement physical security
Medium
A.A mantrap with interlocking doors.
B.An armed security guard posted at the door.
C.Video surveillance (CCTV) cameras aimed at the door.
D.Biometric retina scanners at the entrance.
Correct Answer: A mantrap with interlocking doors.
Explanation:
A mantrap is a physical security control consisting of a small room with two doors, where the first door must close before the second can be opened. This system forces individuals to be authenticated one at a time, making it the most effective technical control for preventing tailgating. While biometrics, CCTV, and guards are valuable, the mantrap is the specific solution for this problem.
Incorrect! Try again.
27A developer needs to create a virtual lab with three VMs: a web server, an application server, and a database server. For security testing, these VMs must be able to communicate with each other but must be completely isolated from the host machine's physical network. Which virtual network type should be used for these VMs?
create virtual networks
Medium
A.Bridged Networking
B.Host-only Networking
C.Internal-only Networking
D.Network Address Translation (NAT) Networking
Correct Answer: Internal-only Networking
Explanation:
An 'Internal-only' network creates a completely isolated virtual switch that only the VMs connected to it can use. They can communicate with each other but have no connectivity to the host machine or the external network. 'Host-only' is similar but allows communication with the host machine. 'Bridged' connects the VM directly to the physical network, and 'NAT' allows outbound connections from the VM to the external network.
Incorrect! Try again.
28A financial services application needs to enforce integrity rules. Specifically, it must ensure that a user cannot modify data in a way that is less trustworthy than their own clearance level (e.g., a 'trusted' user cannot write 'untrusted' data). This principle is often summarized as 'no write down'. Which security model is primarily focused on this type of data integrity?
implement data security models
Medium
A.Clark-Wilson Model
B.Biba Integrity Model
C.Bell-LaPadula Model
D.Discretionary Access Control (DAC)
Correct Answer: Biba Integrity Model
Explanation:
The Biba Integrity Model is focused on maintaining data integrity. Its core principles are 'no read down' (a subject cannot read data at a lower integrity level) and 'no write up' (a subject cannot write data to a higher integrity level). The 'no write down' rule mentioned in similar models also aligns with the Biba philosophy of preventing contamination of high-integrity data. Bell-LaPadula is focused on confidentiality ('no read up', 'no write down').
Incorrect! Try again.
29An administrator is using iptables on a Linux server to allow established and related connections for return traffic, while dropping invalid packets. Which iptables command accomplishes this for the INPUT chain?
configure firewalls
Medium
A.iptables -A INPUT -p all -j ACCEPT
B.iptables -A INPUT -m state --state NEW -j DROP
C.iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
This command uses the connection tracking (conntrack) module to identify packets that are part of an already ESTABLISHED connection or are RELATED to one (like FTP data connections). Allowing this traffic is a fundamental part of a stateful firewall configuration, as it lets the server respond to legitimate requests it initiated or accepted, while a default deny policy can block new, unsolicited connections.
Incorrect! Try again.
30An Intrusion Prevention System (IPS) is deployed in-line on a network segment. If the IPS appliance loses power or fails, all traffic passing through it stops, causing a network outage. What is the term for this behavior?
implement intrusion detection systems
Medium
A.Fail-open
B.Fail-closed
C.Fail-safe
D.Fail-secure
Correct Answer: Fail-closed
Explanation:
A 'fail-closed' or 'fail-secure' state is when a security device blocks all traffic upon failure. This prioritizes security over availability, as it prevents potentially malicious traffic from passing through uninspected. The opposite is 'fail-open', where the device would act as a simple wire and allow all traffic to pass, prioritizing availability over security.
Incorrect! Try again.
31An administrator needs to harden a Windows Server that runs a critical application. The application's service account currently runs with Local System privileges. To adhere to the principle of least privilege, what is the best alternative?
apply server hardening techniques
Medium
A.Switch the service to run as a member of the Domain Admins group.
B.Configure the service to run as the built-in Network Service account.
C.Create a Managed Service Account (MSA) and grant it only the specific file and registry permissions it requires.
D.Run the service as the Local Administrator account.
Correct Answer: Create a Managed Service Account (MSA) and grant it only the specific file and registry permissions it requires.
Explanation:
Using a Managed Service Account (MSA) or Group Managed Service Account (gMSA) is the modern best practice. These accounts have automatically managed passwords and can be granted very specific, minimal permissions required for the application to function. This perfectly embodies the principle of least privilege. Using powerful built-in accounts like Local System, Network Service, or any administrator account grants excessive privileges.
Incorrect! Try again.
32A sysadmin is configuring a VPN server and needs to decide which protocol to use. The primary requirement is security, and performance is a secondary concern. Which VPN protocol is generally considered obsolete and should be avoided due to significant security flaws?
PPTP is an outdated VPN protocol with numerous well-documented security vulnerabilities, particularly in its use of the MS-CHAPv2 authentication protocol. It is susceptible to brute-force attacks and is considered insecure for modern use. OpenVPN, IPsec/IKEv2, and WireGuard are all considered secure and robust modern alternatives.
Incorrect! Try again.
33A company wants to strengthen its server authentication by requiring users to provide a password and then tap a physical USB security key (like a YubiKey) to log in. This approach combines which two authentication factors?
implement logical access control methods
Medium
A.Something you know and Somewhere you are
B.Something you know and Something you have
C.Something you know and Something you are
D.Something you have and Something you are
Correct Answer: Something you know and Something you have
Explanation:
Multi-factor authentication relies on combining different categories of factors. A password is 'something you know'. A physical USB security key is 'something you have'. This combination provides a strong two-factor authentication (2FA) solution. 'Something you are' refers to biometrics (e.g., fingerprint, face scan).
Incorrect! Try again.
34To prevent a compromised web server from being able to access or modify the underlying operating system files, an administrator decides to run the web server process within an isolated environment with its own virtualized filesystem and process space. What is this technique called?
apply server hardening techniques
Medium
A.Role-Based Access Control (RBAC)
B.Kernel patching
C.Chroot jail or containerization
D.Port knocking
Correct Answer: Chroot jail or containerization
Explanation:
Running a process in a 'chroot jail' or a modern container (like Docker) restricts its view of the filesystem and limits its ability to interact with the host operating system. If the web server process is compromised, the attacker is confined to this isolated environment, preventing them from escalating their attack to the rest of the server. This is a powerful application-level hardening technique.
Incorrect! Try again.
35A server room's environmental monitoring system alerts an administrator that the temperature has exceeded the safe operating threshold. Which physical security control has failed or is inadequate?
implement physical security
Medium
A.Fire Suppression System
B.Access Control Vestibule
C.HVAC (Heating, Ventilation, and Air Conditioning)
D.UPS (Uninterruptible Power Supply)
Correct Answer: HVAC (Heating, Ventilation, and Air Conditioning)
Explanation:
The HVAC system is responsible for maintaining the ambient temperature and humidity within a server room to ensure equipment operates correctly. An alert about excessive temperature indicates a failure or inadequacy of the cooling component of the HVAC system. The UPS provides backup power, and a fire suppression system deals with fires.
Incorrect! Try again.
36An administrator places a specially configured, vulnerable-looking server on the public network with no production data on it. The server's purpose is to be attacked, so the administrator can study the attackers' methods and gather threat intelligence. What is this type of server called?
implement intrusion detection systems
Medium
A.Honeypot
B.Bastion Host
C.Proxy Server
D.Jump Box
Correct Answer: Honeypot
Explanation:
A honeypot is a decoy computer system set up to attract and trap cyberattackers. It appears to be a legitimate part of the network but is actually isolated and monitored. Its purpose is to gather information about the identity, methods, and motives of attackers without putting any production systems at risk.
Incorrect! Try again.
37A hospital's patient record system must ensure that only authorized doctors can access patient files, and that every access, modification, or deletion is logged to a non-repudiable audit trail. This focus on controlled, logged transactions and maintaining data integrity aligns best with which security model?
implement data security models
Medium
A.Clark-Wilson Model
B.Bell-LaPadula Model
C.Take-Grant Model
D.Biba Model
Correct Answer: Clark-Wilson Model
Explanation:
The Clark-Wilson model is highly focused on commercial data integrity and is built around the concept of well-formed transactions. It requires that data can only be modified through trusted procedures (Transformation Procedures), enforces separation of duties, and mandates strong auditing. This makes it a perfect fit for systems like financial or medical records where the integrity of transactions is paramount.
Incorrect! Try again.
38A company has a web server in a DMZ with the IP address 192.168.100.10. An administrator wants to use Network Address Translation (NAT) on the external firewall to map the public IP address 203.0.113.5 to the internal DMZ server for inbound web traffic. What is this specific type of NAT configuration called?
configure firewalls
Medium
A.NAT Overload
B.Static NAT (or Port Forwarding)
C.Dynamic NAT
D.Port Address Translation (PAT)
Correct Answer: Static NAT (or Port Forwarding)
Explanation:
Static NAT creates a one-to-one, persistent mapping between a public IP address (and often a specific port) and a private IP address. This is commonly used to make an internal server, like a web server, accessible from the internet. It is also known as port forwarding or destination NAT. PAT and Dynamic NAT are typically used for outbound connections from many internal clients sharing one or a few public IPs.
Incorrect! Try again.
39An administrator is configuring sudo on a Linux server to allow the user webadmin to restart the apache web server service, but nothing else. Which of the following /etc/sudoers entries is the most secure and precise way to grant this permission?
This entry is the most precise application of the principle of least privilege. It specifies the exact user (webadmin), the command they can run (/usr/sbin/service), and the specific arguments (httpd restart). This prevents the user from using sudo service to restart other critical daemons. Granting access to ALL, /bin/bash (a root shell), or the entire service command would provide excessive, unnecessary permissions.
Incorrect! Try again.
40A server administrator needs to transfer log files securely from a production server to an analysis server. The process must be automated via a script and must use key-based authentication instead of passwords. Which protocol is best suited for this task?
configure security protocols
Medium
A.SCP (Secure Copy Protocol) or SFTP (SSH File Transfer Protocol)
B.FTP
C.Telnet
D.TFTP
Correct Answer: SCP (Secure Copy Protocol) or SFTP (SSH File Transfer Protocol)
Explanation:
Both SCP and SFTP are built on top of the SSH protocol. They provide strong encryption for data in transit and natively support public key authentication, which is ideal for automated, non-interactive scripting. FTP and Telnet are insecure as they transmit credentials and data in cleartext. TFTP is also insecure and has very limited functionality.
Incorrect! Try again.
41A stateful firewall monitors a network segment. An attacker sends a TCP packet with the FIN, PSH, and URG flags set (an 'Xmas scan') to a closed port on a target server. The firewall's connection tracking table has no existing entry for this source IP and port. How will a properly configured stateful firewall most likely respond to this packet?
configure firewalls
Hard
A.Send an ICMP Destination Unreachable message back to the attacker, since there is no listening service on the destination port.
B.Send a TCP RST packet back to the attacker on behalf of the server to actively reject the connection attempt.
C.Drop the packet silently and log the event as a potential scan, as it's a non-SYN packet attempting to initiate a connection.
D.Forward the packet to the server, as the packet is technically valid according to RFC 793, and wait for the server's RST response to determine the connection state.
Correct Answer: Drop the packet silently and log the event as a potential scan, as it's a non-SYN packet attempting to initiate a connection.
Explanation:
A stateful firewall tracks connections based on their state. A legitimate new TCP connection must start with a SYN packet. Any non-SYN packet arriving without a corresponding entry in the connection tracking table is considered invalid or part of a potential scanning attempt. The most secure and common response is to silently drop the packet (DROP) to prevent the attacker from gaining any information about the firewall's presence or the state of the target port. Forwarding it or sending a RST/ICMP message would leak information.
Incorrect! Try again.
42A critical Linux server is being hardened. A security engineer has enabled Address Space Layout Randomization (ASLR) at the kernel level (kernel.randomize_va_space = 2), compiled all key binaries as Position-Independent Executables (PIE), and enabled a strict SELinux policy. A zero-day exploit attempts a buffer overflow to execute a return-to-libc attack. Which hardening measure provides the primary and most direct mitigation against this specific attack technique?
apply server hardening techniques
Hard
A.Position-Independent Executables (PIE), as it randomizes the base address of the executable's code segment.
B.Data Execution Prevention (DEP/NX bit), by marking the stack and heap as non-executable.
C.SELinux policy, by preventing the exploited process from calling forbidden library functions.
D.Address Space Layout Randomization (ASLR), as it randomizes the base address of loaded shared libraries, including libc.
Correct Answer: Address Space Layout Randomization (ASLR), as it randomizes the base address of loaded shared libraries, including libc.
Explanation:
A return-to-libc attack works by overwriting the return address on the stack to point to a function within a standard library (like system() in libc), thereby bypassing non-executable stack protections. ASLR is the primary defense here because it randomizes the memory location of libc each time it's loaded. This makes it extremely difficult for the attacker to know the correct address of the system() function to jump to. While PIE randomizes the executable's base and SELinux provides mandatory access control, ASLR specifically targets the location of shared libraries, which is the core of a return-to-libc attack.
Incorrect! Try again.
43A Network IDS (NIDS) is monitoring traffic and flags a potential SQL injection attack based on the signature /(?i)union\s+all\s+select/. The traffic is over HTTPS (port 443). The NIDS is placed on a SPAN port on a core switch, but it does not have access to the web server's private SSL/TLS keys. What is the most likely outcome of this detection scenario?
implement intrusion detection systems
Hard
A.A true positive alert, as the NIDS can analyze the payload of the encrypted packets using advanced deep packet inspection.
B.A false positive alert, because the NIDS is misinterpreting encrypted data as a malicious string.
C.A true positive alert, as the NIDS can infer the attack based on the size and timing of the encrypted packets.
D.A false negative, because the NIDS cannot inspect the encrypted payload and will not see the SQL injection string.
Correct Answer: A false negative, because the NIDS cannot inspect the encrypted payload and will not see the SQL injection string.
Explanation:
A standard NIDS placed on a network segment cannot inspect the contents of encrypted traffic (like HTTPS) without being configured for SSL/TLS inspection, which requires the server's private keys to decrypt the traffic (acting as a man-in-the-middle). Since the NIDS does not have these keys, the application layer payload containing the SQL injection string remains encrypted and unreadable. Therefore, the signature /(?i)union\s+all\s+select/ will never be matched, resulting in a false negative (the attack occurs but is not detected). Inference based on packet size/timing is unreliable for specific signature matching.
Incorrect! Try again.
44A multi-level security system is designed to handle classified military intelligence. A user with 'Secret' clearance attempts to write a summary of a 'Secret' document into a file designated as 'Top Secret'. In a separate action, the same user attempts to read data from a file with 'Confidential' classification. Which statement correctly analyzes these actions based on the Bell-LaPadula model?
implement data security models
Hard
A.Both the Simple Integrity Axiom and the *-Integrity Axiom were violated.
B.The *-Integrity Axiom ('no write up') was violated, and the Simple Integrity Axiom ('no read down') was enforced.
C.The Simple Integrity Axiom ('no read down') was violated, and the *-Integrity Axiom ('no write up') was enforced.
D.Both the Simple Integrity Axiom and the *-Integrity Axiom were enforced correctly.
Correct Answer: The *-Integrity Axiom ('no write up') was violated, and the Simple Integrity Axiom ('no read down') was enforced.
Explanation:
The Biba Integrity Model is the inverse of Bell-LaPadula. Its goal is to protect data integrity. The rules are: 1) The Simple Integrity Axiom ('no read down'): A subject cannot read an object of lower integrity. This prevents high-integrity processes from being contaminated by low-integrity data. 2) The *-Integrity Axiom ('no write up'): A subject cannot write to an object of higher integrity. This prevents low-integrity processes from corrupting high-integrity data. In the scenario:
The low-integrity process writing to the high-integrity database violates the 'no write up' rule (the *-Integrity Axiom).
The high-integrity process being blocked from reading the low-integrity file shows the 'no read down' rule (the Simple Integrity Axiom) being correctly enforced.
Incorrect! Try again.
45You are configuring an IPsec VPN tunnel between two gateways. The internal network behind Gateway A is 10.10.0.0/16 and the internal network behind Gateway B is 10.20.0.0/16. The requirement is to encrypt all traffic between any host in network A and any host in network B, while leaving the original source and destination IP headers intact for internal routing inspection tools. However, the path between the gateways includes a NAT device. Which IPsec configuration is required?
configure security protocols
Hard
A.Transport Mode with ESP and NAT Traversal (NAT-T), because it only encrypts the payload and NAT-T handles the NAT issue.
B.Tunnel Mode with ESP, because it encapsulates the entire original IP packet.
C.Transport Mode with AH, because it provides authentication for the original IP header.
D.Tunnel Mode with ESP and NAT Traversal (NAT-T), because it encapsulates the original packet and NAT-T allows ESP to pass through NAT.
Correct Answer: Tunnel Mode with ESP and NAT Traversal (NAT-T), because it encapsulates the original packet and NAT-T allows ESP to pass through NAT.
Explanation:
The scenario requires connecting two entire networks, which dictates the use of Tunnel Mode. Tunnel mode encapsulates the original IP packet (with internal 10.x.x.x addresses) inside a new IP packet (with the gateways' public IP addresses). The requirement to leave original headers 'intact' refers to them being present inside the encrypted payload, not as the outer headers. Transport Mode would not work because it retains the original IP header, which would be the private 10.x.x.x addresses, and these are not routable over the internet. Since a NAT device is present, standard ESP (IP Protocol 50) will likely be blocked. NAT Traversal (NAT-T) is required, which encapsulates the ESP packet within a UDP packet (usually on port 4500), allowing it to pass through the NAT device.
Incorrect! Try again.
46In a software-defined network (SDN) environment using OpenFlow, a network administrator pushes a policy to block all FTP traffic (TCP port 21) from the engineering segment to the public internet. However, monitoring tools show that FTP connections are still being established successfully. The SDN controller dashboard confirms the policy is active and has been sent to the switches. What is the most probable cause of this policy failure?
create virtual networks
Hard
A.A pre-existing, higher-priority flow rule on the switches allows all TCP traffic, and the new rule was inserted with a lower priority.
B.The SDN controller has a bug and is not translating the policy into the correct OpenFlow rules.
C.The Northbound API failed to properly transmit the administrator's intent to the controller's policy engine.
D.The Southbound API (e.g., OpenFlow) is incompatible with the physical switches.
Correct Answer: A pre-existing, higher-priority flow rule on the switches allows all TCP traffic, and the new rule was inserted with a lower priority.
Explanation:
OpenFlow-enabled switches process packets by matching them against a series of flow rules in a flow table, processed in order of priority. A common configuration is to have a low-priority 'catch-all' rule that allows general traffic. If the new, more specific FTP-blocking rule was installed with a priority value lower than a more general 'allow TCP' rule, the general rule would be matched first, and the packet would be forwarded before the blocking rule is ever evaluated. This is a frequent and subtle misconfiguration issue in SDN deployments. The other options are less likely if the controller dashboard shows the policy as successfully pushed, which implies that the APIs and translation are likely working.
Incorrect! Try again.
47A company is migrating from TOTP-based MFA to FIDO2/WebAuthn using hardware security keys. A security team is analyzing the resilience of this new system against a sophisticated Man-in-the-Middle (MitM) phishing attack. The attacker sets up a proxy that perfectly clones the company's login portal and forwards credentials in real-time. How does FIDO2/WebAuthn defeat this specific attack where TOTP would fail?
implement logical access control methods
Hard
A.The FIDO2 protocol includes the domain name (origin) of the requesting site in the cryptographic challenge-response signature.
B.The hardware key requires a biometric or PIN input, which cannot be captured and relayed by the proxy.
C.The hardware key encrypts the password with a secret that the MitM proxy cannot decrypt.
D.The user would see a browser warning that the site's SSL certificate is invalid, stopping the attack.
Correct Answer: The FIDO2 protocol includes the domain name (origin) of the requesting site in the cryptographic challenge-response signature.
Explanation:
The key defense of FIDO2/WebAuthn against phishing is origin binding. When the user attempts to log in, the browser communicates the origin (e.g., https://login.company.com) to the security key. The key then uses this origin as part of the data it cryptographically signs. The attacker's phishing site will have a different origin (e.g., https://login.company.com.evil.net). When the server receives the signed response, it checks the signature against the expected origin. Since the signature was generated for the wrong origin, the validation will fail. In contrast, a user can be tricked into entering their password and a valid TOTP code into the phishing site, which the attacker can immediately relay to the real site to gain access. The MitM simply passes the valid code along.
Incorrect! Try again.
48A secure data center is designed with a 'man-trap' system at its entrance, consisting of two interlocking doors where only one can be open at a time. To mitigate tailgating, the system integrates an overhead sensor. Which type of sensor would be most effective at detecting a tailgating attempt (two people entering on one authentication) while minimizing false positives from carried equipment like a large server chassis?
implement physical security
Hard
A.A simple infrared beam sensor placed at waist height.
B.A passive infrared (PIR) motion sensor that detects body heat.
C.A pressure-sensitive mat calibrated for the weight of one average person.
D.A 3D imaging or stereoscopic vision sensor that performs object counting and volumetric analysis.
Correct Answer: A 3D imaging or stereoscopic vision sensor that performs object counting and volumetric analysis.
Explanation:
This is a complex physical security problem. An IR beam can be defeated by stepping over it or by two people walking very close together. A pressure mat can be fooled by two lighter individuals or triggered by heavy equipment, leading to false positives or negatives. A PIR sensor just detects motion/heat and cannot reliably count individuals. A 3D imaging/stereoscopic sensor is the most advanced and effective solution. It can build a three-dimensional model of the space, distinguish between one large object (a server) and two distinct human shapes, and perform accurate people counting, thus reliably detecting tailgating attempts while ignoring inanimate objects.
Incorrect! Try again.
49A network architect is designing a multi-tenant environment and must choose between VLANs and VXLAN for tenant isolation. The design requires over 5000 isolated tenant networks, and some tenant VMs must be able to migrate live between physical data centers connected via a Layer 3 WAN. Why is VXLAN the only viable solution in this scenario?
create virtual networks
Hard
A.VXLAN provides superior encryption by default compared to the clear-text nature of 802.1Q VLAN tags.
B.VLANs cannot be routed over a Layer 3 WAN, whereas VXLAN is designed for L2-over-L3 encapsulation.
C.The VLAN standard supports a maximum of 4094 usable VLANs, which is insufficient for the 5000 required networks.
D.Both A and B are correct and represent fundamental limitations of VLANs for this design.
Correct Answer: Both A and B are correct and represent fundamental limitations of VLANs for this design.
Explanation:
This scenario highlights two critical limitations of VLANs that VXLAN overcomes. First, the 802.1Q VLAN standard uses a 12-bit VLAN Identifier (VID), which allows for a theoretical maximum of VLANs (with 0 and 4095 reserved), making it impossible to support 5000 isolated networks. Second, VLANs are a Layer 2 technology. Extending a VLAN (a single broadcast domain) across a Layer 3 WAN is complex, brittle, and not scalable. VXLAN (Virtual Extensible LAN) solves both problems by using a 24-bit VXLAN Network Identifier (VNI) for up to 16 million segments and by encapsulating the Layer 2 frame inside a UDP packet, which can be easily routed across any standard Layer 3 network. Therefore, both the scale and the L3 transport requirements make VXLAN the only choice.
Incorrect! Try again.
50You are hardening a web server that processes user-uploaded files. To mitigate malware execution, you have mounted the /var/www/uploads directory with the noexec, nosuid, and nodev options in /etc/fstab. An attacker successfully uploads a PHP script disguised as a JPEG file. They then try to execute it by making a web request to http://server/uploads/shell.jpg. Why might this attack still succeed despite the noexec mount option?
apply server hardening techniques
Hard
A.The noexec flag only applies to binaries, not interpreted scripts.
B.The attacker can use a chmod +x command via another vulnerability to make the file executable, overriding the mount option.
C.The nosuid flag is not present, which allows the script to gain root privileges and bypass the noexec flag.
D.The web server process itself (e.g., Apache with mod_php) reads and interprets the script file, and it is the interpreter's process that is executing, not the file itself.
Correct Answer: The web server process itself (e.g., Apache with mod_php) reads and interprets the script file, and it is the interpreter's process that is executing, not the file itself.
Explanation:
The noexec mount option prevents the kernel from executing binary files directly from that filesystem via the execve() system call. However, it does not prevent a program (an interpreter like /usr/bin/php or mod_php running within the Apache process) from opening a file, reading its contents as data, and then executing the instructions within its own process space. In this case, the Apache/mod_php process, which is running from a filesystem withoutnoexec (like /usr/sbin/), reads the shell.jpg file and interprets the PHP code inside it. The execution context is the Apache process, not a new process launched from the uploads directory. This is a classic and critical limitation of noexec for protecting against web script execution.
Incorrect! Try again.
51A company uses a Next-Generation Firewall (NGFW) for perimeter defense and a Web Application Firewall (WAF) in front of its public web servers. An attacker launches a sophisticated attack that involves exploiting a zero-day remote code execution (RCE) vulnerability in the web application's file upload feature. The exploit is delivered within a TLS-encrypted session and is obfuscated to evade common string-based signatures. Which firewall is more likely to detect and block this specific attack, and why?
configure firewalls
Hard
A.The NGFW, because it has application-layer visibility and can identify the protocol as HTTP and apply malware signatures.
B.Both are equally likely to fail, as the traffic is encrypted and the exploit is a zero-day.
C.The NGFW, because its primary function is to block RCE attempts, whereas a WAF focuses only on SQL injection and XSS.
D.The WAF, because it is designed to perform deep inspection of HTTP/S traffic, understand application logic, and detect anomalies and attack patterns specific to web applications.
Correct Answer: The WAF, because it is designed to perform deep inspection of HTTP/S traffic, understand application logic, and detect anomalies and attack patterns specific to web applications.
Explanation:
While both NGFWs and WAFs operate at the application layer, a WAF is a specialized tool built specifically for web application security. It terminates the TLS session, allowing it to inspect the decrypted HTTP request in its entirety. Crucially, a WAF understands the context of web traffic—it can parse file uploads, analyze parameter inputs, and apply complex rules based on application logic (e.g., 'a file uploaded to this endpoint should never contain executable code'). An NGFW, while having some application awareness, typically operates on more general signatures and protocol conformance. It is less likely to have the deep, application-specific context to identify a novel RCE exploit within a legitimate-looking file upload. The WAF's specialization gives it a significant advantage in this scenario.
Incorrect! Try again.
52A financial institution implements the Clark-Wilson integrity model for its core transaction system. A developer introduces a bug into a Transformation Procedure (TP) that is supposed to debit one account and credit another. The bug causes the TP to occasionally fail to complete the credit operation after the debit has already been committed, violating the system's integrity. Which specific part of the Clark-Wilson model has failed in this scenario?
implement data security models
Hard
A.The access control triple (user, TP, CDI), as the user should not have been granted access to this faulty TP.
B.The Integrity Verification Procedure (IVP), because it failed to scan the CDI for an invalid state.
C.The certification of the TP, as the procedure was not properly vetted to ensure it transforms Constrained Data Items (CDIs) from one valid state to another.
D.The Separation of Duty principle, as one developer should not have been able to modify a critical TP alone.
Correct Answer: The certification of the TP, as the procedure was not properly vetted to ensure it transforms Constrained Data Items (CDIs) from one valid state to another.
Explanation:
The core of the Clark-Wilson model is ensuring integrity through well-formed transactions. This is achieved by having certified Transformation Procedures (TPs) be the only way to manipulate Constrained Data Items (CDIs). The certification process is supposed to formally verify that a TP will always transform a CDI from one valid state to another valid state. In this case, the TP leaves the system in an inconsistent state (money is debited but not credited), which is an invalid state. This represents a failure in the certification and vetting of the TP itself. While an IVP might later detect the inconsistency, the root cause of the integrity violation is the faulty TP being certified and put into use.
Incorrect! Try again.
53A web server is configured to support TLS 1.3 exclusively. A client initiates a connection, and after the initial handshake, the client's browser needs to reconnect to download an additional resource. The server supports 0-RTT (Zero Round-Trip Time) resumption. What is the primary security risk associated with the server enabling and the client using 0-RTT, and what is the mitigation?
configure security protocols
Hard
A.The handshake is vulnerable to downgrade attacks to TLS 1.2; mitigation is to disable all older protocols.
B.The 0-RTT data is not forward-secret and is vulnerable to replay attacks; mitigation is to ensure the 0-RTT data is idempotent.
C.Perfect Forward Secrecy is lost; mitigation involves using a DHE cipher suite.
D.The server is vulnerable to denial-of-service from session exhaustion; mitigation is to limit the number of resumable sessions.
Correct Answer: The 0-RTT data is not forward-secret and is vulnerable to replay attacks; mitigation is to ensure the 0-RTT data is idempotent.
Explanation:
In TLS 1.3, 0-RTT allows a client to send application data in its first message to the server, using a pre-shared key (PSK) from a previous session. The critical vulnerability here is that an attacker who captures these initial 0-RTT packets can 'replay' them to the server, and the server might process the request multiple times. For example, if the request was POST /api/transfer?amount=100, a replay attack could cause multiple transfers. Therefore, the primary risk is replay attacks. The standard mitigation is for the application layer to ensure that any request sent via 0-RTT is idempotent, meaning that processing it multiple times has the same effect as processing it once (e.g., a GET request is idempotent, but a request to create a resource is not).
Incorrect! Try again.
54In a complex RBAC model for a cloud provider, a user is a member of two roles: DatabaseAdmin and ProjectAuditor. The DatabaseAdmin role grants db:Write permission. The ProjectAuditor role grants db:Read permission but also has a Deny policy attached for the db:Write permission for auditing purposes. Assuming the system evaluates policies with an explicit 'Deny' overriding any 'Allow', what is the user's effective permission on the database, and which security principle does this illustrate?
implement logical access control methods
Hard
A.The user receives no permissions due to a role conflict, resulting in a denial of all access. This illustrates a fail-safe default.
B.The permissions are merged, granting both db:Read and db:Write. This illustrates role aggregation.
C.Effective permission is db:Read. This illustrates the precedence of explicit denial.
D.Effective permission is db:Write. This illustrates the Principle of Least Privilege.
Correct Answer: Effective permission is db:Read. This illustrates the precedence of explicit denial.
Explanation:
Most robust access control systems, including those from major cloud providers like AWS, operate on the principle that an explicit Deny policy will always override an Allow policy. Even though the user's DatabaseAdmin role grants db:Write, their membership in the ProjectAuditor role brings in a Deny for that same permission. The Deny takes precedence, and the db:Write permission is revoked. The db:Read permission from the ProjectAuditor role is unaffected. Therefore, the user's final effective permission is db:Read only. This demonstrates the critical security concept of precedence of explicit denial, ensuring that restrictive policies can be safely applied for auditing or emergency lockdown roles without being accidentally overridden by permissive roles.
Incorrect! Try again.
55A security analyst is investigating an IDS alert that has triggered on a high volume of single, small UDP packets sent from a single source to a wide range of high, random ports on a target server. The IDS signature is labeled SCAN UDP Portscan. However, the analyst knows the source is a legitimate partner's server running a real-time monitoring application. The application works by sending a UDP packet and waiting for an ICMP Port Unreachable response to determine if the partner's service is down. How should this activity be classified?
implement intrusion detection systems
Hard
A.True Negative: The IDS correctly identified the traffic as benign and did not alert.
B.True Positive: The activity matches the technical definition of a UDP port scan, regardless of intent.
C.False Negative: The IDS has failed to detect the true malicious nature of the traffic.
D.False Positive: The activity is benign, and the IDS signature is too broad, lacking the context of the application's normal behavior.
Correct Answer: False Positive: The activity is benign, and the IDS signature is too broad, lacking the context of the application's normal behavior.
Explanation:
This is a classic example of a false positive. The behavior of the monitoring application—sending UDP probes to various ports—technically mimics the behavior of a UDP port scan. The IDS signature, based purely on this traffic pattern, is therefore technically correct in its match. However, from a security operations perspective, the alert is false because the underlying activity is legitimate and benign. The problem lies with the IDS signature being too generic and lacking the specific context to differentiate between a malicious scan and a legitimate application's keep-alive or discovery mechanism. The correct action would be to tune the IDS, perhaps by whitelisting the partner's IP address for this specific signature.
Incorrect! Try again.
56A system administrator is hardening a minimal-footprint API gateway server. The server's only function is to terminate TLS and proxy requests to backend services. Which of the following service daemons, often found on standard Linux installations, represents the most significant and unnecessary attack surface that should be disabled on this specific server?
apply server hardening techniques
Hard
A.chronyd or ntpd (NTP Daemon)
B.sshd (OpenSSH Server)
C.rsyslogd (System Logging Daemon)
D.rpcbind (RPC Portmapper)
Correct Answer: rpcbind (RPC Portmapper)
Explanation:
This question requires analyzing the role of the server to determine what is truly unnecessary. sshd is essential for remote administration. chronyd/ntpd is critical for accurate time, which is important for logs and TLS certificate validation. rsyslogd is crucial for security logging. rpcbind, however, is a service used to map RPC program numbers to network ports, primarily used by services like NFS and NIS. An API gateway has absolutely no need for these services. Historically, rpcbind and other RPC services have been a source of numerous security vulnerabilities (e.g., amplification attacks, information leaks). Therefore, on a hardened, single-purpose server like this, rpcbind represents a significant and completely unnecessary attack surface and should be disabled.
Incorrect! Try again.
57Consider the following nftables ruleset on a Linux router. What is the effect of this configuration on a new SSH connection attempt from a client at 192.168.1.10 to a server at 10.0.0.5?
table inet filter {
chain forward {
type filter hook forward priority 0; policy drop;
ip saddr 192.168.1.0/24 tcp dport 22 ct state new,established accept
ct state related,established accept
}
}
configure firewalls
Hard
A.The connection is dropped because the first rule only allows new and established, but not related.
B.The connection is accepted because the second rule will match the return packets, establishing the connection.
C.The connection is accepted because the first rule explicitly allows new SSH connections from the source subnet.
D.The connection is dropped because the first rule, which is more specific, is placed before the general ct state related,established accept rule, and return packets will not match it.
Correct Answer: The connection is accepted because the first rule explicitly allows new SSH connections from the source subnet.
Explanation:
This question tests a deep understanding of nftables and connection tracking. Let's trace the packets:
Client -> Server (SYN): The initial SYN packet from 192.168.1.10 to 10.0.0.5:22 arrives. ct state is new. The packet matches the first rule (ip saddr 192.168.1.0/24 tcp dport 22 ct state new,established accept). The action is accept. The packet is forwarded.
Server -> Client (SYN/ACK): The return packet arrives. The connection tracker now sees this packet as part of an existing connection and marks its state as established. This packet will now match the second rule (ct state related,established accept). The action is accept. The packet is forwarded.
Client -> Server (ACK): This packet is also established and is accepted by the second rule.
The first rule correctly allows the initial packet, and the second, more general rule correctly allows all subsequent traffic for any established connection. The ruleset is functional and will allow the SSH connection to be established.
Incorrect! Try again.
58A ransomware worm is propagating rapidly within a data center. The existing security architecture uses VLANs to segment the production, development, and database tiers. However, the worm is spreading laterally between different production web servers within the same 'Production' VLAN. Which modern network security concept would be most effective at preventing this specific type of lateral movement?
create virtual networks
Hard
A.Deploying a Next-Generation Firewall (NGFW) at the data center edge.
B.Migrating from VLANs to VXLANs for better scalability.
C.Implementing a microsegmentation policy that creates a default-deny firewall rule between each individual workload.
D.Implementing 802.1X port-based authentication on the physical switches.
Correct Answer: Implementing a microsegmentation policy that creates a default-deny firewall rule between each individual workload.
Explanation:
This scenario highlights the weakness of traditional network segmentation. While VLANs isolate traffic between tiers (e.g., Production vs. Dev), all servers within the Production VLAN can communicate freely with each other. This allows for rapid lateral movement of malware. Microsegmentation solves this problem by treating each individual virtual machine or workload as its own security perimeter. By applying a stateful, default-deny firewall policy to each workload's virtual NIC, you can enforce a 'zero-trust' model. Communication is explicitly whitelisted, meaning one production web server cannot talk to another unless there is a specific rule allowing it. This would effectively contain the worm to the first machine it compromises, preventing lateral spread. The other options are ineffective for this specific problem: 802.1X is about network admission control, an edge NGFW doesn't see intra-VLAN traffic, and VXLAN provides isolation at the same level as VLANs (just more scalably) unless paired with a microsegmentation solution.
Incorrect! Try again.
59A web application in Active Directory uses a service account configured for Kerberos 'Unconstrained Delegation'. A threat actor compromises the web server. Which of the following attack chains is now possible due to this specific misconfiguration?
configure security protocols
Hard
A.The attacker can pass-the-hash to move laterally to other servers using the web server's NTLM hash.
B.The attacker can use the web server's service account to access any resource the web server itself is authorized to access.
C.The attacker can wait for a Domain Admin to authenticate to the web application, extract the admin's forwarded Ticket-Granting Ticket (TGT) from the web server's memory, and use it to impersonate the Domain Admin across the entire domain.
D.The attacker can perform a Kerberoasting attack to crack the service account's password offline.
Correct Answer: The attacker can wait for a Domain Admin to authenticate to the web application, extract the admin's forwarded Ticket-Granting Ticket (TGT) from the web server's memory, and use it to impersonate the Domain Admin across the entire domain.
Explanation:
Unconstrained Delegation is an extremely dangerous configuration. When a user authenticates to a service with unconstrained delegation enabled, a copy of their TGT is forwarded and cached in memory on that service's host (the web server). If an attacker compromises this web server, they can use tools like Mimikatz to extract any TGTs cached in the LSASS process memory. If a privileged user like a Domain Admin has recently authenticated, the attacker can steal their TGT. With the Domain Admin's TGT, the attacker can then request service tickets for any service in the domain, effectively becoming a Domain Admin. This is a classic privilege escalation and lateral movement technique. Kerberoasting targets accounts with SPNs, and pass-the-hash is an NTLM-related attack; while both are valid attacks, they are not the direct result of unconstrained delegation.
Incorrect! Try again.
60A government facility needs to protect a server room containing highly classified data from eavesdropping via electromagnetic emissions (e.g., TEMPEST attacks). The budget is constrained. Which of the following is the most practical and cost-effective solution to mitigate this specific threat for a single room within a larger, non-secured building?
implement physical security
Hard
A.Constructing a full six-sided Faraday cage around the server room using copper mesh embedded in the walls, floor, and ceiling.
B.Deploying broadband RF jamming equipment within the room to overwhelm any potential eavesdropping receivers.
C.Enforcing a 20-meter physical 'red-black' separation perimeter around the room where no unencrypted (black) data lines can cross.
D.Replacing all copper network cables with fiber-optic cables and ensuring all server chassis are properly grounded.
Correct Answer: Replacing all copper network cables with fiber-optic cables and ensuring all server chassis are properly grounded.
Explanation:
While a Faraday cage (Option A) is the most effective solution, it is also extremely expensive and complex to build and maintain correctly (e.g., requiring special doors and filtered power/HVAC). RF jamming (Option B) is often illegal and can interfere with legitimate wireless devices. A large physical perimeter (Option C) is often impractical inside an existing building. The most practical and cost-effective mitigation is to address the primary sources of emanation. Copper network cables act as effective antennas for leaking data-carrying signals. Replacing them with fiber-optic cables completely eliminates this vector, as fiber transmits data as light, which has no significant electromagnetic emanation. Properly grounding server chassis helps to reduce overall emissions. This combination provides a significant reduction in risk for a fraction of the cost of a full Faraday cage.