726 - 750 Flashcards

1
Q

A newly purchased corporate WAP needs to be configured in the MOST secure manner possible.

Please click on the below items on the network diagram and configure them accordingly:

  • WAP
  • DHCP Server
  • AAA Server
  • Wireless Controller
  • LDAP Server

If at any time you would like to bring back the initial state of the simulation, please dick the Reset All button.

A

Word Doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security engineer is setting up passwordless authentication for the first time.

Drag and drop the MINIMUM set of commands to set this up and verify that it works. Commands may only be used once, and not all will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A

Word Doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

A. SSO
B. LEAP
C. MFA
D. PEAP

A

A. SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would be best suited for constantly changing environments?

A. RTOS
B. Containers
C. Embedded systems
D. SCADA

A

B. Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A newly identified network access vulnerability has been found in the OS of legacy IoT devices. Which of the following would best mitigate this vulnerability quickly?

A. Insurance
B. Patching
C. Segmentation
D. Replacement

A

C. Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The local administrator account for a company’s VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have prevented this from happening?

A. Using least privilege
B. Changing the default password
C. Assigning individual user IDs
D. Implementing multifactor authentication

A

D. Implementing multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are a security administrator investigating a potential infection on a network.

Click on each host and firewall. Review all logs to determine which host originated the infection and then identify if each remaining host is clean or infected.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A

Word Doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following describes the exploitation of an interactive process to gain access to restricted areas?

A. Persistence
B. Port scanning
C. Privilege escalation
D. Pharming

A

C. Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.

Click on each firewall to do the following:

  1. Deny cleartext web traffic.
  2. Ensure secure management protocols are used.
  3. Resolve issues at the DR site.

The ruleset order cannot be modified due to outside constraints.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A

Word Doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A data owner has been tasked with assigning proper data classifications and destruction methods for various types of data contained within the environment.

From the options below, drag each item to its appropriate classification as well as the MOST appropriate form of disposal.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A

Word Doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security analyst is assessing several company firewalls. Which of the following tools would the analyst most likely use to generate custom packets to use during the assessment?

A. hping
B. Wireshark
C. PowerShell
D. netstat
Reveal Solution

A

A. hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A local business was the source of multiple instances of credit card theft. Investigators found that most payments at this business were made at self-service kiosks. Which of the following is the most likely cause of the exposed credit card Information?

A. Insider threat
B. RAT
C. Backdoor
D. Skimming
E. NFC attack

A

D. Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?

A. Job rotation
B. Retention
C. Outsourcing
D. Separation of duties

A

A. Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Following a recent security breach, an analyst discovered that user permissions were added when joining another part of the organization but were not removed from existing groups. Which of the following policies would help to correct these issues in the future?

A. Service accounts
B. Account audits
C. Password complexity
D. Lockout policy

A

B. Account audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following ensures an organization can continue to do business with minimal interruption in the event of a major disaster?

A. Business recovery plan
B. Incident response plan
C. Communication plan
D. Continuity of operations plan

A

D. Continuity of operations plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In a rush to meet an end-of-year *business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer’s response?

A. Risk tolerance
B. Risk acceptance
C. Risk importance
D. Risk appetite

A

B. Risk acceptance*

17
Q

A security team created a document that details the order in which critical systems should be brought back online after a major outage. Which of the following documents did the team create?

A. Communication plan
B. Incident response plan
C. Data retention policy
D. Disaster recovery plan

A

D. Disaster recovery plan

18
Q

A company wants to reconfigure an existing wireless infrastructure. The company needs to ensure the projected WAP placement will provide proper signal strength to all workstations. Which of the following should the company use to best fulfill the requirements?

A. Network diagram
B. WPS
C. 802.1X
D. Heat map

A

D. Heat map

19
Q

Topic 1
A company wants to pragmatically grant access to users who have the same job. Which of the following access controls should the company most likely use?

A. Role-based
B. Need-to-know
C. Mandatory
D. Discretionary

A

A. Role-based

20
Q

A security engineer is working to address the growing risks that shadow IT services are introducing to the organization. The organization has taken a cloud-first approach and does not have an on-premises IT infrastructure. Which of the following would best secure the organization?

A. Upgrading to a next-generation firewall
B. Deploying an appropriate in-line CASB solution
C. Conducting user training on software policies
D. Configuring double key encryption in SaaS platforms

A

B. Deploying an appropriate in-line CASB solution

21
Q

An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has been given all the developer’s documentation about the internal architecture. Which of the following best represents the type of testing that will occur?

A. Bug bounty
B. White-box
C. Black-box
D. Gray-box

A

B. White-box

22
Q

Which of the following are the most likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company’s final software releases? (Choose two).

A. Certificate mismatch
B. Use of penetration-testing utilities
C. Weak passwords
D. Included third-party libraries
E. Vendors/supply chain
F. Outdated anti-malware software

A

A. Certificate mismatch
D. Included third-party libraries

23
Q

A hosting provider needs to prove that its security controls have been in place over the last six months and have sufficiently protected customer data. Which of the following would provide the best proof that the hosting provider has met the requirements?

A. NIST CSF
B. SOC 2 Type 2 report
C. CIS Top 20 compliance reports
D. Vulnerability report

A

B. SOC 2 Type 2 report

24
Q

Which of the following are common VoIP-associated vulnerabilities? (Choose two).

A. SPIM
B. Vishing
C. VLAN hopping
D. Phishing
E. DHCP snooping
F. Tailgating

A

A. SPIM
B. Vishing

25
Q

A security administrator received an alert for a user account with the following log activity:

5/23/22 10:07.16.301 AM 197.42.32.110 Shell_Client US

5/23/22 10:07.16.301 AM 197.42.32.110 Shell_Client US

5/23/22 10:07.16.301 AM 197.42.32.110 Shell_Client US

5/23/22 11:15.16.301 AM 210.167.76.13 Sign In Shell_Client AT

Which of the following best describes the trigger for the alert the administrator received?

A. Number of failed log-in attempts
B. Geolocation
C. Impossible travel time
D. Time-based log-in attempt

A

Geolocation

26
Q

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?

A. Order of volatility
B. Preservation of event logs
C. Chain of custody
D. Compliance with legal hold

A

B. Preservation of event logs