4 Flashcards
(40 cards)
Greg would like to create an umbrella agreement that provides the security terms and conditions for all future work that his organizations does with a vendor. What type of agreement should Greg use?
MOU
SLA
MSA
BPA
MSA
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. What should she choose?
STIX 2.0
STIX 1.0
TAXII
OpenIOC
TAXII
Gwen is building her organization’s documentation and processes and wants to create the plan for what the organization would do if her datacenter burned down. What type of plan would typically cover that type of scenario?
A disaster recovery plan
A stakeholder management plan
An incident response plan
A business continuity plan
A disaster recovery plan
Lila is working on a penetration testing team and she is unsure whether she is allowed to conduct social engineering as part of the test. What document should she consult to find this information?
Statement of work
Rules of engagement
Lessons learned report
Contract
Rules of engagement
James is concerned about preventing broadcast storms on his network. Which of the following solutions is not a useful method of preventing broadcast storms on his network?
Enable Spanning Tree Protocol
Enable loop protect features on switches
Limit the size of VLANs
Disable ARP on all accessible ports
Disable ARP on all accessible ports
Greg wants to use a tool that can directly edit disks for forensic purposes. What commercial tool could he select from this list?
dd
WinHex
memdump
df
WinHex
Alyssa wants to use her Android phone to store and manage cryptographic certificates. What type of solution could she choose to do this using secure hardware?
SEAndroid
MDM
A wireless TPM
A microSD HSM
A microSD HSM
Megan’s organization uses the Diamond Model of Intrusion Analysis as part of their incident response process. A user in Megan’s organization has discovered a compromised system. What core feature would help her determine how the compromise occurred?
Infrastructure
Adversary
Victim
Capability
Capability
Ben searches through an organization’s trash looking for sensitive documents, internal notes, and other useful information. What term describes this type of activity?
Dumpster diving
Dumpster harvesting
Trash pharming
Waste engineering
Dumpster diving
Randy wants to prevent DHCP attacks on his network. What secure protocol should he implement to have the greatest impact?
ARPS
LDAPS
SDHCP
None of the above
None of the above
Ian has been receiving hundreds of false positive alerts from his SIEM every night when scheduled jobs run across his datacenter. What should he adjust on his SIEM to reduce the false positive rate?
Dashboard configuration
Trend analysis
Correlation rules
Sensitivity
Sensitivity
Lucca’s organization runs a hybrid datacenter with systems in Microsoft’s Azure cloud and in a local facility. Which of the following attacks is one that he can establish controls for in both locations?
Dumpster diving
Tailgating
Phishing
Shoulder surfing
Phishing
Susan wants to ensure that the threat of a lost phone creating a data breach is minimized. What two technologies should she implement to do this?
Remote wipe and FDE
Geofencing and remote wipe
Containerization and NFC
Wi-Fi and NFC
Remote wipe and FDE
Alan reads Susan’s password from across the room as she logs in. What type of technique has he used?
A man-in-the-middle attack
Shoulder surfing
Pretexting
A man-in-the-room attack
Shoulder surfing
Madhuri is designing a load-balancing configuration for her company and wants to keep a single node from being overloaded. What type of design will meet this need?
Active/active
Active/passive
Duck-duck-goose
A daisy chain
Active/active
During a vulnerability scan, Brian discovered that a system on his network contained this vulnerability:
File integrity monitoring
Threat hunting
Patch management
Intrusion detection
Patch management
Selah wants to ensure that malware is completely removed from a system. What should she do to ensure this?
Use the delete setting in her antimalware software rather than the quarantine setting.
Wipe the drive and reinstall from known good media.
There is no way to ensure the system is safe and it should be destroyed.
Run multiple antimalware tools and use them to remove all detections.
Wipe the drive and reinstall from known good media.
Acme Widgets has 10 employees and they all need the ability to communicate with one another using a symmetric encryption system. The system should allow any two employees to securely communicate without other employees eavesdropping. If an 11th employee is added to the organization, how many new keys must be added to the system?
11
2
10
1
10
Michael wants to acquire the firmware from a running device for analysis. What method is most likely to succeed?
Remove the firmware chip from the system.
Use disk forensic acquisition techniques.
Shut down the system and boot to the firmware to copy it to a removable device.
Use forensic memory acquisition techniques.
Use forensic memory acquisition techniques.
Charles is worried about users conducting SQL injection attacks. Which of the following solutions will best address his concerns?
Performing user input validation
Enabling logging on the database
Using secure session management
Implementing TLS
Performing user input validation
Grace would like to determine the operating system running on a system that she is targeting in a penetration test. Which one of the following techniques will most directly provide her with this information?
Port scanning
Vulnerability scanning
Footprinting
Packet capture
Footprinting
Charles wants to monitor changes to a log file via a command line in real time. Which of the following command-line Linux tools will let him see the last lines of a log file as they change?
head
tail
chmod
logger
tail
Florian wants to ensure that systems on a protected network cannot be attacked via the organization’s network. What design technique should he use to ensure this?
An air gap
Protected cable distribution
A hot aisle
A cold aisle
An air gap
Bruce is conducting a penetration test for a client. The client provided him with details of their systems in advance. What type of test is Bruce conducting?
Gray-box test
White-box test
Black-box test
Blue-box test
White-box test