701 Q&A Flashcards
(248 cards)
NO.1 After performing an assessment, an analyst wants to provide a risk rating for the findings. Which of the following concepts should most likely be considered when calculating the ratings?
Impact and likelihood
NO.2 A certificate vendor notified a company that recently invalidated certificates may need to be updated. Which of the following mechanisms should a security administrator use to determine whether the certificates installed on the company’s machines need to be updated?
CRL
NO.3 The CIRT is reviewing an incident that involved a human resources recruiter exfiltrating sensitive company data. The CIRT found that the recruiter was able to use HTTP over port 53 to upload documents to a web server.
Which of the following security infrastructure devices could have identified and blocked this activity?
NGFW utilizing application inspection
NO.4 A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?
EDR
NO.5 Malware spread across a company’s network after an employee visited a compromised industry blog. Which of the following best describes this type of attack?
Watering-hole
NO.6 A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering.
Which of the following teams will conduct this assessment activity?
Red
NO.7 A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?
Performing code signing on company-developed software
NO.8 Which of the following would be used to detect an employee who is emailing a customer list to a personal account before leaving the company?
DLP (Data Loss Prevention)
NO.9 An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?
WAF (Web Application Firewall)
NO.10 Which of the following best practices gives administrators a set period to perform changes to an operational system to ensure availability and minimize business impacts?
Scheduled downtime
NO.11 Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?
Availability
NO.12 An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Choose two.)
Network
Firewall
NO.13 Which of the following is used to quantitatively measure the criticality of a vulnerability?
CVSS (Common Vulnerability Scoring System)
NO.14 A security engineer needs to configure an NGFW to minimize the impact of the increasing number of various traffic types during attacks. Which of the following types of rules is the engineer the most likely to configure?
Behavioral-based
NO.15 A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?
Certification
NO.16 An organization recently updated its security policy to include the following statement: Regular expressions are included in source code to remove special characters such as $, |, ;. &,`, and ? from variables set by forms in a web application. Which of the following best explains the security technique the organization adopted by making this addition to the policy?
Input validation
NO.17 Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
Side loading
NO.18 A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?
Pushing GPO update
NO.19 Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?
Fines
NO. 20 Which of the following would be the best way to block unknown programs from executing ?
Application allow list
NO.21 A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
Endpoint
NO.22 An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.
Which of the following best describes the user’s activity?
Insider threat
NO.23 A company tested and validated the effectiveness of network security appliances within the corporate network. The IDS detected a high rate of SQL injection attacks against the company’s servers, and the company’s perimeter firewall is at capacity. Which of the following would be the best action to maintain security and reduce the traffic to the perimeter firewall?
Set the appliance to IPS mode and place it in front of the company firewall.
NO.25 Which of the following penetration testing teams is focused only on trying to compromise an organization using an attacker’s tactics?
Red