A2 Build your Own Flashcards
(86 cards)
An attacker inserts malicious code into a library file that several different applications can access simultaneously. What type of attack are they performing?
DLL injection
LDAP injection
SQL injection
XML injection
DLL injection
Testing an application for vulnerabilities after each code update falls under which of the following?
Continuous monitoring
Continuous integration
Continuous deployment
Continuous validation
Continuous validation
During the second phase of responding to an incident, after a potential incident has been reported, time should be taken to vet the report before determining whether the incident is valid or not.
What is this step in incident response?
Detection
Containment
Recovery
Eradication
Detection
An employee in the finance department of a company needs access to a specific folder on a file server in order to retrieve a file to perform their work. The administrator gives the employee read and write access to the folder with the file they need.
What type of security policy is being ignored in this situation?
Job rotation
Mandatory vacation
Least privilege
Separation of duties
Least privilege
After deploying a new business system application, a security administrator discovered a potentially misconfigured piece of software that may lead to a weakness. They are concerned that there may be more, but they do not want to impact the system’s performance as it is already in use in the organization.
Which of the following should they perform?
Risk assessment
PING sweep
Penetration test
Vulnerability scan
Vulnerability scan
A contractor inadvertently causing a power outage that takes down a company’s servers is an example of what?
Unskilled attacker
Internal threat
Shadow IT
APT
Internal threat
A security engineer is consulting for a local hospital. Their IT systems do not use any methods for sustained emergency power, which has the executives concerned. What can the security engineer recommend as an emergency power system in case of a power outage?
Surge protector
UPS
Load balancer
Backup generator
Backup generator
Which authentication method is a “something you know” factor that can commonly be broken into by using brute-force methods?
USB security key
Password
Retina scan
GPS
Password
What is an example of an object in a MAC access control system?
Permissions
Access
Users
Files
Files
Which type of operating system is designed for use in mission-critical embedded devices that need to process data as it comes in rather than using system interrupts?
Android
RTOS
iOS
SELinux
RTOS
Which solution is responsible for authenticating email by allowing organizations to publish a list of authorized email servers in their DNS records?
DMARC
SMTP
DKIM
SPF
SPF
A law firm needs to communicate securely with other firms that are working with them on a rather large case. They are transferring sensitive information and need authentication, integrity, nonrepudiation, privacy, and data security for their electronic communications.
What is an IETF standard that provides cryptographic security for electronic messages such as email?
POP
S/MIME
SPF
SNMP
S/MIME
An administrator of a file server wants to ensure that they have a complete backup of the entire storage contents every day so they can restore data from only one backup if needed.
What type of backup should they perform?
Grandfather-father-son
Incremental
Full
Differential
Full
Which weakness occurs when administrators install new network devices without making any changes?
XSS
Default credentials
Race conditions
SQLi
Default credentials
Which element of security governance ensures that data is protected from eavesdropping while in transit?
Access control
Encryption
Multifactor authentication
Passwords
Encryption
At which stage in the incident response process does the first responder first become involved in the incident response process?
Preparation
Containment
Eradication
Identification
Identification
You are a student learning about all of the security standards that must be understood when working as a security analyst. Who is the world’s largest developer and publisher of international standards?
IEEE
ISO
CCPA
GDPR
ISO
An administrator wants to configure a network share so that users can only see and run the files that exist on it. They don’t want anyone to be able to put files into this folder. Which of the following permissions would they select in a Windows system?
Read
Write
Modify
Read and execute
Read and execute
By sending a user an email, an attacker successfully got the user to navigate to a website and install malicious software. This software is now sending all the user’s typing activity to the attacker, who is looking for credit card and banking information.
Which of the following did the attacker install?
RAT
Trojan
Keylogger
Ransomware
Keylogger
An online real estate firm uses an automated tool to scan its network for vulnerabilities. Once they have compiled the list of known vulnerabilities on their network, how should they prioritize addressing them?
Date discovered
CVE
Vendor
CVSS
CVSS
Which of the following could be used to prevent sensitive data from being leaked via email?
MDM
DLP
Content filters
Firewall rules
DLP
Which process is used by both sides of a legal case to search through a company’s emails, documents, and other digital artifacts?
Root cause analysis
Due diligence
Attestation
E-discovery
E-discovery
A company wants to perform a penetration test of its network. They will give the testers some information about the network but will not give credentials or configuration details.
Which type of test are they performing?
Known environment
Fuzz test
Unknown environment
Partially known environment
Partially known environment
Question 13
/ 247
Which of the following RAID levels requires a minimum of four disk drives, combines mirroring and striping for redundancy and performance, and organizes drives in pairs?
0
1
5
10
Correct answer: 10
RAID 10 (also known as RAID 1+0) combines mirroring and striping to provide both redundancy and performance. A minimum of four disks is required, with drives added in pairs. Data is mirrored within each pair to ensure redundancy ( fault tolerance), and the pairs are striped to improve read and write performance. If one drive in a pair fails, its mirror provides the backup. RAID 10 is ideal for environments that need both high performance and fault tolerance, but it requires more drives than other RAID levels to implement effectively.