QA Flashcards

1
Q

A chief information security officer requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the ciso requesting?

A

Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A web server has been compromised due to a ransomware attack. Further investigation reveals the ransomware has been in the server for the past 72 hours. The system administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?

A

The last incremental backup that was conducted 72 hours ago

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the most effective control against zero-day vulnerabilities?

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A chief information security officer has defined resiliency requirements for a new data center architecture. The requirements are as follows:
- Critical file shares will remain accessible during and after a natural disaster
- Five percent of hard disks can fail at any given time without impacting the data
- Systems will be forced to shut down gracefully when battery levels are below 20%
Which of the following are required to best meet these requirements?

A

IaC, NAS and RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user wanted to catch up on some work over the weekend but has issues logging into the corporate network using a VPN. On Monday, the user opened a ticket for this issue but was able to log in successfully. Which of the following best describes the policy that is being implemented?

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A routine audit of medical billing claims revealed that several claims were submitted without the subscriber’s knowledge. A review of the audit logs for the medical billing company’s system indicated a company employee downloaded customer records and adjusted the direct deposit information to a personal bank account. Which of the following does this action describe?

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security manager has tasked the security operations center with locating all web servers that respond to an unsecure protocol. Which of the following commands could an analyst run to find the requested servers?

A

nmap -p 80 10.10.10.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following tools is effective in preventing a user from accessing unauthorized removable media?

A

USB data blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security proposal was set up to track requests for remote access by creating a baseline of the user’s common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?

A

Context-aware authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following best reduces the security risks introduced when running systems that have expired vendor support and lack an immediate replacement?

A

Implement proper network access restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user reports falling for a phishing email to an analyst. Which of the following system logs would the analyst check first?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company wants to improve end users experiences when they log in to a trusted partner website. The company does not want the users to be issued separate credentials for the partner website. Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner’s website?

A

AAA server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organization wants to participate in threat intelligence information sharing with peer groups. Which of the following would most likely meet the organization’s requirements?

A

Implement a TAXII server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security analysts are conducting an investigation of an attack that occurred inside the organizations network. An attacker was able to collect network traffic between workstations throughout the network. The analysts review the following logs:
VLAN. Address
1. 0007.1e5d.3213
1. 002a.7d.44.8801
1. 0011.aab4.344d
The layer 2 address table has hundreds of entries similar to the ones above. Which of the following attacks has most likely occurred?

A

MAC flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security analyst is evaluating the risks of authorizing multiple security solutions to collect data from the company’s cloud environment. Which of the following is an immediate consequence of these integrations?

A

Non-Compliance with data sovereignty rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company wants to restrict emailing of PHI documents. The company is implementing a DLP solution. In order to restrict PHI documents, which of the following should be performed first?

A

Classification

17
Q

Which of the following is used to ensure that evidence is admissible in legal proceedings when it is collected and provided to the authorities?

A

Chain of custody

18
Q

Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following:
- All users share workstations throughout the day
- Endpoint protection was disabled on several workstations throughout the network
- Travel times on logins from the affected users are impossible
- Sensitive data is being uploaded to external sites
- All user account passowrds were forced to be reset and the issue continued
Which of the following attacks is being used to compromise the user accounts?

A

Keylogger

19
Q

Which of the following is the most relevant security check to be performed before embedding third-party libraries in developed code?

A

Assess existing vulnerabilities affecting the third-party code and the remediation efficiency of the libraries developers

20
Q

A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst most likely use?

A

Calculate the checksum using a hashing algorithm

21
Q

Several attempts have been masde to pick the door lock of a secure facility. As a result, the security engineer has been assigned to implement a stronger preventative access control. Which of the following would best complete the engineers assignment?

A

Replacing the traditional key with an RFID key

22
Q

Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?

A

Push notifications

23
Q

Several Universities are participating in a collaborative research project and need to share compute and storage resources. Which of the following cloud deployment strategies would best meet this need?

A

Community

24
Q

The board of directors at a company contracted with an insurance firm to limit the organizations liability. Which of the following risk management practices does this best describe?

A

Transference

25
Q

As a part of a security compliance assessment, an auditor performs automated vulnerability scans. In additon, which of the following should the auditor do to complete the assessment?

A

User behavior analysis

26
Q

Which of the following terms describes a broad range of information that is sensitive to a specific organization?

A

Proprietary

27
Q

A company is moving its retail website to a public cloud provider. The company wants to tokenize credit card data but not allow the cloud provider to see the stored credit card information. Which of the following would best meet these objectives?

A

TLS

28
Q

During a trial, a judge determined evidence gathered from a hard drive was not admissible. Which of the following best explains this reasoning?

A

The chain of custody form did not note time zone offsets between transportation regions

29
Q

Which of the following best describes the process of documenting who has access to evidence?

A

Chain of custody

30
Q

An organization has decided to purchase an insurance policy because a risk assessment determined that the cost to remediate the risk is greater than the five-year cost of the insurance policy. The organization is enabling risk:

A

Transference

31
Q

A company needs to validate its updated incident response plan using a real-world scenario that will test decision points and relevant incident response actions without interrupting daily operations. Which of the following would best meet the company’s requirements?

A

Tabletop exercise

32
Q

A report delivered to the chief information security officer shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the ciso use to prevent someone from using the exfiltrated credentials?

A

MFA

33
Q

A chief security officer is looking for a solution that can provide increased scalability and flexibilty for back-end infrastructure, allowing it to be updated and modified without disruption to services. The security architect would like the solution selected to reduce the back-end server resources and has highlighted that session persistence is not important for the applications running on the back-end servers. Which of the following would best meet the requirements?

A

Snapshots