Certmaster practice questions Flashcards

1
Q

5

A multinational company has partnered with several smaller, younger companies. To protect their supply chain and improve their own risk posture, the company offers to provide network security services for their new partners. Conclude what type of risk the company is addressing.

External
Legacy systems
Multiparty
Internal

A

Multiparty

Multiparty risk occurs when an adverse event impacts multiple organizations. If a breach occurs for one party, all parties share the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1

A vulnerability database loaded on a scanning tool such as Tenable Nessus will commonly show which of the following properties?

Select all that apply.

Score
Dictionary
Security data inputs
Packet data

A

Score
Dictionary

Score-Common Vulnerability Scoring System (CVSS) is maintained by the Forum of Incident Response and Security Teams (first.org/cvss). Scores range from 0 (low) to 9+ (critical).
Dictionary-Common Vulnerabilities and Exposures (CVE) is a dictionary of vulnerabilities in published operating systems and applications software provided by cve.mitre.org. It includes CVE ID, brief descriptions, a URL reference list, and data of entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3

A company provides smartphones to their employees. IT administrators have the ability to deploy, secure, and remove specific applications and data from the employees’ smartphones. Analyze the selections and determine how IT can perform this type of control.

Push notifications
Content management
Baseband update
Storage segmentation

A

Storage segmentation

Storage segmentation is personal data segmented from organizational data on a mobile device. It gives IT administrators control over corporate assets on employees’ mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1

Experts at a scientific facility suspect that operatives from another government entity have planted malware and are spying on one of their top-secret systems. Based on the attacker’s location and likely goals, which attacker type is likely responsible?

Hacktivists
Script kiddies
State actors
Criminal syndicates

A

State actors

State actors have been implicated in many attacks, particularly on energy and health network systems. They typically work at arm’s length from the national government that sponsors and protects them, maintaining “plausible deniability.” A criminal syndicate can operate across the internet from different jurisdictions than its victim, increasing the complexity of prosecution. Syndicates will seek any opportunity for criminal profit, but typical activities are financial fraud. A script kiddie is someone who uses hacker tools without necessarily understanding how they work or having the ability to craft new attacks. Hacktivists might attempt to obtain and release confidential information to the public domain, perform denial of service (DoS) attacks, or deface websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1

What would be the highest concern for an e-commerce company whose top priority is to ensure customers can shop online 24/7?

Increase of data breaches
Loss of reputation
Loss of availability
Increase of fines

A

Loss of availability

Availability loss in this case is losing redundancy in applications and servers that host and run the e-commerce website. Service availability is important to an e-commerce company that advertises 24/7 services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1

Today’s hackers are keen on knowing that security teams are actively hunting for threats on the network. Hackers may use resources to trigger a diversion to keep threat hunters busy, while another attack is initiated to carry out the primary objective of the planned penetration attack. How can a security team best circumvent this strategic hacking technique?

Monitor threat feeds from ISACs.
Review security advisories.
Apply intelligence fusion techniques.
Use a defensive maneuver.

A

Use a defensive maneuver.

A defense maneuver uses passive discovery techniques so that threat actors do not know they have been discovered. This gives the security team a chance to investigate the source of the attack and plan a resolution before the threat moves on to the next objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5

A severe tropical storm devastates an island where a small company stores data. Which disaster types have impacted the company?

Select all that apply

External
Internal
Environmental
Person-made

A

External
Environmental

An environmental or natural disaster is one that could not be prevented through human agency. Environmental disasters include floods, earthquakes, storms, or disease.

External disaster events are caused by threat actors who have no privileged access and includes disasters that have an impact on the organization through wider environmental or social impacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2

A cardiovascular patient is sent home with a monitoring device that records and sends data to a healthcare provider when triggered by abnormal cardiac activity. Response time to the data is critical to patient health. Which embedded platform is the medical device using?

Real-time
Standalone
Distributed
Networked

A

Real-time

A real-time operating system (RTOS) is in an embedded system intended to serve real-time applications that process data as it comes in. It provides a quicker reaction to external events than a typical operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3

A network administrator can conduct a site survey to find potential placement locations of wireless access points (WAP) using which of the following?

Select all that apply

Wi-Fi Protected Setup (WPS)
Wi-Fi analyzer
Wireless controller
Heat map

A

Wi-Fi analyzer
Heat map

A Wi-Fi analyzer is software on a laptop or mobile device with a wireless network adapter. Information about the signal is obtained at regularly spaced points as the surveyor moves around.
A heat map is a visual of the information gathered from a Wi-Fi analyzer. It can show where a signal is strong (red) or weak (green/blue), and which channel is being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5

An employee at a financial firm is responsible for ensuring that data is stored in accordance with applicable laws and regulations. What role does the employee have in terms of data governance?

Data steward
Data processor
Data owner
Data custodian

A

Data steward

The data steward is primarily responsible for data quality. This involves tasks such as ensuring data is labeled and identified with appropriate metadata, as well as ensuring the data is collected and stored in a format containing values that comply with applicable laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3

A small company has set up the domain environment to prevent the installation of a list of prohibited software. Employees received this same list via email. What type of method prevents the installation of specific software on workstations?

Whitelisting
Blacklisting
Anti-malware
Application hardening

A

Blacklisting

Execution control, to prevent the use of unauthorized software, can be implemented as a blacklist. This control means that anything not on the prohibited blacklist can run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3

Which certificate attribute describes the computer or machine it belongs to?

Select all that apply

Certificate authority name
Common name
Company name
Subject alternate name

A

Common name
Subject alternate name

The common name (CN) attribute identifies the computer or machine by name, usually a fully qualified domain name (FQDN), such as www.comptia.org.
The subject alternative name (SAN) extension field is structured to represent different types of identifiers, including domain names. This is more commonly used as the CN attribute has been deprecated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3

Evaluate and select the differences between WPA and WPA2.

Select all that apply

WPA2 supports an encryption algorithm based on the Advanced Encryption Standard (AES) rather than the version of RC4 “patched” with the Temporal Key Integrity Protocol (TKIP).
WPA2 is a security protocol developed by the Wi-Fi Alliance for use in securing wireless networks.
WPA2 is much more secure than WEP, where WPA is not.
WPA2 requires entering a longer password than WPA.

A

WPA2 supports an encryption algorithm based on the Advanced Encryption Standard (AES) rather than the version of RC4 “patched” with the Temporal Key Integrity Protocol (TKIP).
WPA2 requires entering a longer password than WPA.

WPA2 supports an encryption algorithm based on the Advanced Encryption Standard (AES) rather than the version of RC4 “patched” with the Temporal Key Integrity Protocol (TKIP).
WPA and WPA2 are both much more secure than WEP (wired equivalent privacy).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3

IT management wants to make it easier for users to request certificates for their devices and web services. The company has multiple intermediate certificate authorities spread out to support multiple geographic locations. In a full chain of trust, which entity would be able to handle processing certificate requests and verifying requester identity?

OCSP
RA
CA
CSR

A

RA

A Registration Authority (RA) is a function of certificate enrollment and its services would be combined with a Certificate Authority (CA) in a single CA hierarchy. An RA is responsible for validating and submitting a request on behalf of end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1

IT discovers a flaw in a web application where it allows queries without encryption. As a result, requests are being spoofed and directories containing private files are viewable. What is happening?

Structured Query Language (SQL) injection
Dynamic Link Library (DLL) injection
Lightweight Directory Access Protocol (LDAP) injection
Extensible Markup Language (XML) injection

A

Extensible Markup Language (XML) injection

Extensible Markup Language (XML) can be used for data exchange. Without encryption, it is vulnerable to spoofing, request forgery, and injection of arbitrary code. For example, an XML External Entity (XXE) attack embeds a request for a local resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2

A test team performs an in-depth review of completed code and analyzes its compatibility with the environment it will be deployed to. Which of the following environments is the test occurring in?

Development
Test
Staging
Production

A

Staging

A staging environment mimics that of a production environment. It is used for dynamic analysis of an application in a complete but separate production-like environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2

A consumer uses a Samsung SmartThings coordinator to turn on lights in the home and start the dishwasher. Which communications protocol is the hub using?

Baseband
Bluetooth
Narrowband
Zigbee

A

Zigbee

Zigbee is a two-way wireless radio frequency communication between a sensor and a control system. It is an Institute of Electrical and Electronics Engineers (IEEE) 802.15.4-based specification for communication protocols and is used for home automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3

A company stages its computing power in a centralized environment. All workstations run off of one desktop hosted in the data center. When the admin makes changes at individual workstations, the changes only get saved locally, until a user signs off, and the system then reverts back to the previous state. What technology does this represent?

Type 1 hypervisor
Persistent VDE
Snapshot
Non-persistent VDE

A

Non-persistent VDE

Non-persistent Virtual Desktop Environments (VDE) utilizes a central desktop through a remote server. When a user accesses logs on to the desktop, changes and work completed are not saved locally long term. As soon as the user logs off, the desktop reverts back to the image on the central location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

2

A logistics facility provides transportation services globally for many clients. Clients require their planning information to be kept in a secure environment not connected to a network until the needs have been fulfilled. Which of the following solutions would be the most ideal method of meeting this requirement for the company?

Air gap
Faraday cage
Container
Mantrap

A

Air gap

An air gap is a host that is not physically connected to any network. Air gaps are secure areas that protect resources against unauthorized users and spillage of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2

A systems administrator plans to protect a data center with various security controls and safety mechanisms. Which solution does the administrator plan based on a “triangle” principle?

Noise detection
Industrial camouflage
Motion detection
Fire suppression

A

Fire suppression

The fire triangle works on the principle that fire requires heat, oxygen, and fuel to ignite and burn. Removing any one of those elements provides fire suppression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

4

List methods of containment based on the concept of segmentation.

Select all that apply

Honeynet
Sandboxing
Blackhole
Sinkhole

A

Honeynet
Sinkhole

Sinkhole routing means suspicious traffic that is flooding a specific IP address, routes to another network for analysis. Sinkhole routing is a form of segmentation because it maintains the connection to other networks.
A honeynet is a segmented network composed entirely of honeypots. A honeypot is a decoy node intended to draw the attention of threat actors, to trick them into revealing their presence and potentially more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

4

A Security Information Event System (SIEM) parses network traffic and log data from multiple sensors, appliances, and hosts to implement correlation rules on metrics derived from data sources. SIEM assists the systems admin to detect events that may be potential incidents. Define the term for notifications passed upon detection of a potential incident.

Correlation
Sensitivity
Alerts
Trends

A

Alerts

SIEM dashboards are one of the main sources of automated alerts. The event is listed on a dashboard or incident handling system for an agent to assess. Then, the SIEM dashboard will automatically notify the staff in charge of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2

In which environment can multiple developers check out software code and include change management processes?

Production
Test
Development
Staging

A

Development

A development environment is where developers create a product. Developers check out code for editing or updating. Version control and change management occur in the development environment to track development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

4

Identify types of metadata that would be associated with CDR (call detail records) of mobile devices

Select all that apply

List of towers connected to
Call durations
SMS text timestamps
GPS location data

A

Call durations
SMS text timestamps
GPS location data

Call detail records (CDR) routinely contain times and durations of incoming, outgoing, and attempted calls, as well as the phone numbers of said calls.
By examining the** list of towers **a device has connected to in the call detail records (CDR), it is possible to ascertain the general vicinity of locations in which the device has been present.
SMS text time, duration, and phone number of origin are recorded in the call detail records (CDR) metadata associated with mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
# 5 An organization that is planning a move to the cloud checks to see that the chosen CSP uses a standard method for creating and following security competencies. Which method does the CSP likely implement? ## Footnote Cloud controls matrix Reference architecture Service Organization Control (SOC2) National, territory, or state laws
Cloud controls matrix ## Footnote Cloud controls consists of specific controls and assessment guidelines that should be implemented by CSPs. A matrix acts as a starting point for agreements as it provides a baseline level of security competency that the CSP should meet.
26
# 1 Which of the following are deployed similarly to a credit card skimmer? ## Footnote Card cloner Malicious USB plug Keyloggers Malicious flash drive
Malicious USB plug ## Footnote A malicious Universal Serial Bus (USB) charging cable and plug are deployed similar to card skimmers. The device may be placed over a public charging port at airports and other transit locations. The device can then access a smartphone when connected.
27
# 5 Which resource can help for a cloud consumer to evaluate a cloud service provider as services relate to integrating on-premise controls? ## Footnote Reference architecture Security guidance Cloud control matrix Service Organization Control
Security guidance ## Footnote Security guidance offers a best practice summary analyzing the unique challenges of cloud environments and how on-premises controls can be adapted to them.
28
# 4 Investigators perform analysis on a breached system. When looking at data timestamps, what should be noted about any time offset? | Select all that apply ## Footnote Daylight savings time Valid time source Clock synchronization UTC time
Daylight savings time UTC time ## Footnote Local time is the time within a particular time zone, which is offset from UTC by several hours. NTFS uses UTC "internally." It is vital to establish how a timestamp is calculated and note the offset. The local time offset on a system may vary if daylight savings time is in place. Investigators must note the offset between the local system time and UTC.
29
# 2 An unmanned aerial vehicle is equipped with a component to ensure position and movement sensors are aligned and relays information to a ground control. Which of the following computing devices does this best describe? ## Footnote Embedded system SoC Microprocessor Microcontroller
Embedded system ## Footnote An embedded system is a combination of hardware and software that contains a dedicated function and uses a computer component to complete the function.
30
# 5 A global corporation assesses risk appetite and how risks in various regions could influence mission-critical operations. They are assessing compliance with local laws and licensing requirements to prevent financial risk or resolve security risks, and changing the risk posture and implementing risk controls to compensate. Conclude what type of assessment the team is performing. ## Footnote Penetration testing Vulnerability assessment Risk control assessment Site risk assessment
Risk control assessment ## Footnote Risk and control self-assessment (RCSA) is the method by which companies evaluate and analyze the operational risks and the efficacy of the controls used to manage them.
31
# 4 A systems administrator learns Linux commands to view log files. Which command should be used if line numbers are required to view an entire file? ## Footnote grep tail cat head
cat ## Footnote The Linux command cat allows for viewing the entire contents of one or more files. For example, to view the contents of two log files, use cat -n access.log access2.log. The -n switch adds line numbers.
32
# 1 Which attack is a brute-force type that mixes common passwords with usernames? ## Footnote Dictionary Skimming Rainbow Spraying
Spraying ## Footnote Password spraying is a horizontal brute-force online attack. The attacker chooses one or more common passwords (for example, password) and tries them in conjunction with multiple usernames.
33
# 4 Flow analysis tools, such as IPFIX or Netflow, collect metadata about network traffic without capturing each frame. Evaluate the type of analysis that uses these tools. ## Footnote Vulnerability analysis Trend analysis Log analysis Packet analysis
Trend analysis ## Footnote Since flow analyzers gather metadata and statistics about network traffic, they are commonly used to visualize traffic statistics in order to assist in identifying trends.
34
# 3 The RADIUS server is down, and employees need immediate access to Wi-Fi routers in the office building. The WAPs (Wireless Access Points) service smartphones and tablets. After disabling Enterprise mode, how will users connect to the WAPs? ## Footnote Use company credentials Use 5 GHz band Use a pre-shared key Set devices to 802.11n
Use a pre-shared key ## Footnote PSK (Pre-shared Key) is the password needed to gain access to a WAP (Wireless Authentication Protocol) that is WPA2 enabled, for example.
35
# 2 A network administrator needs a service to easily manage Virtual Private Cloud (VPC) and edge connections. The service must have a central console for ease of monitoring all components. Which of the following is the best solution for the administrator to use in a cloud computing environment? ## Footnote Transit gateway NAT gateway Cloud storage gateway gateway endpoint
Transit gateway ## Footnote A transit gateway is a cloud network hub that allows users to interconnect virtual private clouds (VPC) and on-premises networks through a central console.
36
# 4 A large business works with a consulting group to develop a business continuity plan. The goal of the plan is to provide a potentially uninterrupted workflow in the event of an incident. Examine the descriptions and determine which one matches this goal. ## Footnote Retention of data for a specified period Ensuring processing redundancy supports the workflow Performing mission critical functions without IT support Recovery of primary business functions when disrupted
Ensuring processing redundancy supports the workflow ## Footnote Business continuity planning identifies how business processes should deal with both minor and disaster-level disruption. It ensures that there is processing redundancy supporting the workflow through failover.
37
# 5 After reading an article online, a business stakeholder is concerned about a risk associated with Denial of Service (DoS) attacks. The stakeholder requests information about what countermeasures would be taken during an attack. Where would the security analyst look to find this information? ## Footnote Risk regulations Risk heat map Risk register Risk and Control Assessmen
Risk register ## Footnote The risk register shows the results of risk assessments in a comprehensible document format. Information in the register includes impact, likelihood ratings, date of identification, description, countermeasures, owner/route for escalation, and status.
38
# 4 The NIST Computer Security Incident Handling Guide describes six stages of the incident response lifecycle. Indicate in which stage of the incident response lifecycle the incident response team would review and analyze their response and possibly integrate changes into the team's Incident Response Plan. ## Footnote Preparation Recovery Lessons learned Identification
Lessons learned ## Footnote The "lessons learned" phase occurs when the team's response is evaluated. It is for this reason that it is important to document the entire response process.
39
# 1 Security content automation protocol (SCAP) allows compatible scanners to compare computers with which of the following? ## Footnote Log collector Common Vulnerability Scoring System Configuration baseline Security bulletin
Configuration baseline ## Footnote Security content automation protocol (SCAP) allows compatible scanners to determine whether a computer meets a configuration baseline. The Extensible Configuration Checklist Description Format (XCCDF) audits for best-practice configuration checklists and rules.
40
# 1 A user notices several new icons for unknown applications after downloading and installing a free piece of software. IT support determines that the applications are not malicious but are classified as which type of software? ## Footnote PUPs Fileless viruses Worms Trojans
PUPs ## Footnote Potentially unwanted programs (PUP) are software installed alongside a package selected by the user, or perhaps bundled with a new computer system.
41
# 5 Which value is the result of a quantitative or qualitative risk analysis? ## Footnote Annualized loss expentancy Single loss expentency Inherent risk Risk factors
Inherent risk ## Footnote The result of quantitative or qualitative analysis is a measure of inherent risk. Inherent risk is the level of risk before any type of mitigation has been attempted.
42
# 5 Conclude what type of data has high trade values in black markets, is often anonymized or deidentified for use in scientific research, and when compromised, can lead to its use in blackmail or insurance fraud, as well as cause reputational damage to the responsible organization. ## Footnote Government Data Customer Data Financial Information Personal health information (PHI)
Personal health information (PHI) ## Footnote Personal health information (PHI), such as medical and insurance records, laboratory test results, etc., has a high value in black markets because of its potential use for blackmail and insurance fraud. It is often anonymized and used for research.
43
# 4 An enterprise has recently experienced a severe malware attack. Admin has identified and removed the cause, and they are now checking the systems and bringing them back online. How would one categorize the cause with respect to incident response procedures? ## Footnote Recovery Eradication Containment Preparation
Eradication ## Footnote Eradication is an incident response lifecycle phase requiring the identification of the root cause of an incident. For instance, a user clicking on a suspicious attachment in an email is a root cause of a potentially larger problem.
44
# 2 An application requires continuity of operations within a 24 hour period due to the command and control capabilities it maintains. The failover site must be physically separated from the program office and be available within the required timeframe with live data. Which of the following redundancy solutions best meets the failover requirement? ## Footnote Recovery time objective Geographical dispersal Failover clusters Meantime between failure
Geographical dispersal ## Footnote Geographical dispersal is a failover consideration that replicates data in hot and warm sites physically distanced from one another in the event of a catastrophe.
45
# 1 Which of the following are examples of weak patch management for operating systems and device firmware in a classified network? | Select all that apply
non-centralized deployment undocumented process ## Footnote A **non-centralized deployment** process makes patch management difficult. For example, Microsoft Endpoint Configuration Manager can schedule, monitor, and auto-deploy patches to Windows systems and applications. An **undocumented process** makes it difficult to maintain a consistent workflow for patch management in a closed or classified network. Personnel should know how to download patches from the Internet and upload them to the closed network.
46
# 1 An attacker launches a vishing social engineering attack by impersonating a police officer. The attacker calls the victims and tries to exploit this behavior by demanding the victims give the attacker their name and address immediately. This type of attack does NOT demonstrate what type of social engineering principle? ## Footnote Urgency Authority Intimidation Familiarity/liking
Familiarity/liking ## Footnote One of the basic tools of a social engineer is simply to be affable, likable, and persuasive, and to present the requests they make as completely reasonable and unobjectionable.
47
# 5 Information security and cybersecurity tasks can be classified into five functions. Which regulatory concept or entity relates to these functions? ## Footnote Center for Internet Security (CIS) Payment Card Industry Data Security Standard (PCI DSS) General Data Protection Regulation (GDPR) National Institute of Standards and Technology (NIST)
National Institute of Standards and Technology (NIST) ## Footnote Information security and cybersecurity tasks can be classified as five functions (Identify, Protect, Detect, Respond, Recover), following the framework developed by the National Institute of Standards and Technology.
48
# 5 How might responsibilities be divided among individuals to prevent abuse of power in an organization? ## Footnote Separation of duties Least privilege Job rotation Clean desk space
Separation of duties ## Footnote Separation of duties is a means of establishing checks and balances against the possibility that critical systems or procedures can be compromised by insider threats. Divided duties among individuals prevent ethical conflicts or abuses of power.
49
# 1 Which of the following is TRUE about false negatives in relation to vulnerability scanning tools? | Select all that apply ## Footnote Is identified Is not high risk Is a high risk Is not identified
Is a high risk Is not identified ## Footnote **False negatives** are the potential vulnerabilities that are not identified by the scanning tool. It is possible the vulnerability has not been discovered, or a hacker may have spoofed the vulnerability as if nothing is wrong. A **false negative** is a high security risk because a possible threat could go unnoticed for long periods. This can be mitigated by running repeat scans and by using scanning tools from other vendors.
50
# 4 A piece of data that may or may not be relevant to the investigation or incident response such as registry keys, files, time stamps, and event logs are known as what? ## Footnote Artifacts Cache Checksums Tags
Artifacts ## Footnote An artifact is a piece of data, such as registration keys, files, timestamps, and event logs that may or may not be important to the investigative analysis or incident response.
51
# 5 A small department at a company manages a server, separate from IT, for data access and backup purposes. What role does the department fulfill? ## Footnote Data owner Data processor Data controller Data custodian
data custodian ## Footnote The data custodian role handles managing the system on which the data assets are stored. This includes responsibility for enforcing access control, encryption, and backup/recovery measures.
52
# 2 Devices deployed in a network and that send data to the local area network (LAN) level and process it with an Internet of things (IoT) sensor are which of the following? ## Footnote Fog computing On-premise computing Cloud computing Edge computing
Fog computing ## Footnote Fog computing provides decentralized local access by deploying fog nodes throughout the network. Fog computing analyzes data on the network edge to avoid the need to transfer unnecessary data back to the LAN.
53
# 5 A new company implements a datacenter that will hold proprietary data that is output from a daily workflow. As the company has not received any funding, no risk controls are in place. How does the company approach risk during operations? ## Footnote Mitigation Avoidance Transference Acceptance
Acceptance ## Footnote Risk acceptance means that no countermeasures are put in place either because the level of risk does not justify the cost or because there will be an unavoidable delay before the countermeasures are deployed.
54
# 1 Choose the components a threat actor may use to set up a distributed denial of service attack (DDoS) on a local network. | Select all that apply ## Footnote Remote access trojan Botnet Command and control Spyware
Remote access trojan Botnet Command and control ## Footnote A **botnet** is a group of bots that are all under the control of the same malware instance. A bot is an automated script or tool that performs some malicious activity. A **command and control** (C2 or C&C) host or network controls the bots or botnet to carry out remote tasks on the local network. A **remote access trojan** (RAT) is backdoor malware that mimics the functionality of legitimate remote control programs but is designed specifically to operate covertly.
55
# 4 Identify security control options that can be categorized as "corrective." | Select all that apply ## Footnote Firewall rules Quarantine of infected hosts Digital Loss Prevention (DLP) software configurations Containment of the threat
Quarantine of infected hosts Containment of the threat ## Footnote **Corrective** controls act to eliminate or reduce the impact of an intrusion event. During an attack, for instance, a corrective control can eliminate the threat. **Quarantining** infected or compromised machines is a corrective control.
56
# 1 Where should a systems administrator search for more information on how to fix a CPU vulnerability on a Dell rack server? ## Footnote Best Buy Geek Squad Facebook Vendor support page Black Hat conference
Vendor support page ## Footnote Vendors will provide guides, templates, and tools for configuring and securing operating systems, applications, and physical devices like a rack server. CPU vulnerabilities may require firmware updates that may only be available from the vendor. Conferences are hosted and sponsored by various institutions and provide an opportunity for presentations on the latest threats and technologies. The Black Hat conferences showcase the latest threats and hacker techniques in the industry. Social media platforms, such as Facebook, can showcase "How to" videos and posts, but they are limited. Support files are only available on vendor support pages. A local industry group or company like Best Buy's Geek Squad helps with smaller commercial and consumer products and is not ideal for rack server related items.
57
# 4 Identify which tools would be used to identify suspicious network activity. | Select all that apply ## Footnote tcpdump tcpreplay Wireshark Metasploit
tcpdump tcpreplay Wireshark ## Footnote **tcpdump** is a command-line packet capture utility for Linux. The utility will display captured packets until halted manually, and it can save frames to a .pcap file. This tool commonly uses filter expressions to reduce the number of frames captured, such as Type, Direction, or Protocol. **Wireshark** is a graphical application that can capture all types of traffic by sniffing the network, and save that data to a .pcap file. **tcpreplay** is a command-line utility for Linux that can replay data from a .pcap file, for example, to analyze traffic patterns and data.
58
# 4 An IT technician at a London-based company is setting up a new VoIP system in the CEO's office. The CEO has asked the technician to set up encryption for calls and informs the CEO that session-to-session encryption is implemented at the endpoints. The CEO wants not only the session encrypted but also the call data itself. Recommend a protocol that will encrypt VoIP call data. ## Footnote SIPS SRTP SFTP HTTPS
SRTP ## Footnote SRTP, which stands for Secure Real-time Transport Protocol, provides encryption and authentication for RTP (Real-Time Protocol) data in unicast and multicast data flows. SRTP will encrypt all data sent and received by each SIP endpoint for the entire journey.
59
# 5 Systems administrators rely on ACLs to determine access to sensitive network data. What control type do the administrators implement? ## Footnote Preventative Corrective Detective Deterrent
Preventative ## Footnote Preventative controls act to eliminate or reduce the likelihood that an attack can succeed. A preventative control operates before an attack can take place. An ACL is an example of this control type.
60
# 1 Companies often update their website links to redirect users to new web pages that may feature a new promotion or to transition to a new web experience. How would an attacker take advantage of these common operations to lead users to fake versions of the website? | Select all that apply ## Footnote Ruin the company's reputation with reviews. Add redirects to .htaccess files. Hijack the website's domain. Craft phishing links in email.
Add redirects to .htaccess files. Craft phishing links in email. ## Footnote **An** attacker can craft a phishing link that might appear legitimate to a naïve user, such as: https://trusted.foo/login.php?url="https://tru5ted.foo". **The** .htaccess file controls high-level configuration of a website. This file runs on an Apache server and can be edited to redirect users to other URLs.
61
# 2 A lack of which of the following measures of disorder can leave a cryptosystem vulnerable and unable to encrypt data securely? ## Footnote Integrity Longevity Nonce Entropy
Entropy ## Footnote Entropy is a measure of cryptographic unpredictability. Using high entropy sources of data provides more security than using low sources. A lack of good entropy can leave a system vulnerable.
62
# 4 Cuckoo is a software package that provides a system configuration allowing the system to be completely isolated from its host. It provides a safe environment for potentially dangerous research, such as on malware, while recording file system and registry changes, as well as network activity. What is this type of isolated system called? ## Footnote Vulnerability test Sandbox Exploitation framework ARP cache
Sandbox ## Footnote A sandbox, such as Cuckoo, is an isolated environment created to safely analyze malware and exploits. Sandboxing is an isolation technique commonly used in cybersecurity research, particularly malware research.
63
# 2 After software testing activities have been completed, a system administrator moves the .war file to an environment that allows end users to access the application. Which environment is the completed software being deployed to? ## Footnote Test Production Staging Development
Production ## Footnote A production environment is where the final product is placed. All testing and development are complete at this point.
64
# 5 A European company that offers subscription services has recently experienced a data breach wherein private data, including personally identifiable information (PII), was compromised. What step should be taken by the company to avoid regulatory fines or lawsuits? ## Footnote Identify the vulnerability that led to the breach. Hide the occurrence of the breach. Fix the vulnerability that led to the breach. Notify those affected by the breach.
Notify those affected by the breach. ## Footnote Many laws and regulations require immediate notification of all third parties affected by a breach, including the GDPR in the EU. Failing to do so could lead to fines and potential reputation damage.
65
# 3 Mobile Android operating system (OS) encryption software might allow encryption of which of the following? ## Footnote MicroSD SMS Passwords RCS
MicroSD ## Footnote Micro Secure Digital (MicroSD) is an external media device supported by many Android devices. Built-in and third-party encryption applications on the mobile OS may encrypt these types of removable storage.
66
# 1 Which of the following represents a non-intrusive scanning type of framework? ## Footnote Metasploit An exploitation framework Penetration testing Vulnerability scanning
Vulnerability scanning ## Footnote Whether they use purely passive techniques or some sort of active session or agent, vulnerability scanners represent a non-intrusive scanning type. The scanner identifies vulnerabilities from its database by analyzing things, such as build and patch levels or system policies.
67
# 4 Identify the most volatile form of memory. ## Footnote Cache Pagefile Random Access Memory (RAM) Hard disk
Cache ## Footnote System cache is one of the most volatile data, similar to the CPU. This data should be captured before powering a device off.
68
# 3 Which wireless configuration provides the most up-to-date and secure way of connecting wireless devices to an office or home network? | Select all that apply ## Footnote PEAP SAE EAP-TTLS WPA3
SAE WPA3 ## Footnote **Wi-Fi Protected Access 3** (WPA3) is the most up-to-date wireless specification that provides security features and mechanisms that improve the weaknesses of WPA2. **Simultaneous Authentication of Equals** (SAE) is a feature of WPA3. It replaces WPA's 4-way handshake authentication and association mechanism with a protocol based on the Diffie-Hellman key agreement.
69
# 3 Which of the following describes a device that only runs administrative protocols such as secure shell (SSH) or remote desktop protocol (RDP) to securely manage application servers in a demilitarized zone (DMZ)? ## Footnote Reverse proxy server Forward proxy server Jump server Hardware security module
Jump server ## Footnote A jump server only runs the necessary administrative ports and protocols (typically SSH or RDP). Administrators connect to the jump server then use the jump server to connect to the admin interface of application servers in a demilitarized zone (DMZ).
70
# 3 A private network where employees can communicate and share resources is available for authorized users only. A network perimeter provides boundary protection between it and the public internet. Which of the following does this represent? ## Footnote Ad hoc Extranet Intranet Guest
Intranet ## Footnote An intranet is an internal company zone established to allow employees the ability to share content and communicate more effectively. Only authorized individuals can access the intranet.
71
# 5 A military organization is evaluating its disaster recovery plan (DRP) to assess risk and in particular identify any single points of failure. Suggest an initial action for the organizations evaluation. ## Footnote Create a heat map Renew cybersecurity insurance Identify critical systems and mission essential functions Assess site risk
Identify critical systems and mission essential functions ## Footnote Identifying critical systems and mission essential functions is often the first step of the risk management process, and will reveal any potential single points of failure.
72
# 5 In a particular workplace, all user actions are recorded and accounted for. Any time a resource is updated, archived, or a user has their clearance level changed, it must be approved by a root user. Users that leave, arrive, or change jobs (roles) must have their user accounts regularly recertified, and any account changes must be approved by an administrator. What are these measures known as? ## Footnote Change control Acceptable use policy Job rotation Separation of duties
Change control ## Footnote Change control of quality management systems and information technology systems is a process used to ensure that changes to the product or system are implemented in a managed and organized manner.
73
# 2 A large firm uses a non-persistent operating system for its remote users. This allows the employees to access company resources while teleworking. When the computers are turned off, the operating system disappears. Which of the following operating systems is the company using? ## Footnote Full disk encryption Trusted operating system TPM Live boot media
Live boot media ## Footnote Live boot media is a non-persistent operating system on a compact disk or USB. Live boot media can be run on any computer to provide the user a complete operating system while the computer is on.
74
# 3 Evaluate the following properties and determine which set relates to Domain Name System Security Extension (DNSSEC). ## Footnote RRset, Signing key Master key, Transport protocol Public key, Private key Community name, Agent
RRset, Signing key ## Footnote DNS Security Extensions (DNSSEC) help to mitigate spoofing and poisoning attacks. When enabled, a "package" of resource records (called an RRset) is signed with a private key (the Zone Signing Key).
75
# 4 Describe the general function of the command echo "head" when used in conjunction with a resource pointer, such as a filename or IP address. ## Footnote Generates a log file Identifies vulnerabilities Prints a web resource header Prints the first lines of the target
Prints the first lines of the target ## Footnote The head command, by default, outputs the oldest ten lines in a file. The echo command is a command that outputs the strings passed as an argument; in this case, the first lines of the provided target.
76
# 2 A company leases access to resources from a service provider as agreed upon in a service level agreement. The company pays only for what is used on a monthly basis. Which of the following computing concepts is being used? ## Footnote PaaS On-premise Cloud computing Community cloud
Cloud computing ## Footnote In cloud computing, a company uses a cloud service provider to deliver computing resources. A cloud-based server utilizes virtual technology to host a company’s applications offsite.
77
# 3 A web administrator notices a few security vulnerabilities that must be addressed on the company Intranet. The portal must force a secure browsing connection, mitigate script injection, and prevent caching on shared client devices. Determine the secure options to set on the web server's response headers. | Select all that apply ## Footnote Secure Cookies HTTP Strict Transport Security (HSTS) Cache-Control Content Security Policy (CSP)
HTTP Strict Transport Security (HSTS) Cache-Control Content Security Policy (CSP) ## Footnote **HTTP Strict Transport Security** (HSTS) is a header option that forces the browser to connect using HTTPS only, mitigating downgrade attacks, such as SSL stripping. **Content Security Policy** (CSP) is a header option that mitigates clickjacking, script injection, and other client-side attacks. **Cache-Control** is a header option that sets whether the browser can cache responses. Preventing data caching protects confidential and personal information where the client device is shared by multiple users.
78
# 1 A brute-force attack compromises a server in a company's data center. Security experts investigate the attack type and discover which vulnerability on the server? ## Footnote Default settings Unsecure protocols Open ports and services Weak encryption
Weak encryption ## Footnote Weak encryption vulnerabilities allow unauthorized access to data. An algorithm used for encryption may have known weaknesses that allow brute-force enumeration.
79
# 3 A new administrator completed setting up an admin account on the network. The admin successfully logged on to a remote file server with the new credentials but not on a remote domain controller (DC) server. Determine the most likely cause for not being able to log in to a DC server. ## Footnote Disabled account Account permission Access policy Account audit
Access policy ## Footnote Access policies determine things such as the right to log on to a computer locally or via remote desktop, install software, change the network configuration, and so on.
80
# 2 A database export allows personally identifiable information (PII) to display in report format and on screen. This poses a potential data leakage concern. In order to protect this PII, what de-identification method should the programmer consider implementing? ## Footnote Hashing Data masking Salting Tokenization
Data masking ## Footnote Data masking is a secure coding technique used to hide sensitive or private data from disclosure. All or part of the data fields are altered by substituting character strings with a random character.
81
# 3 A company is looking into integrating on-premise services and cloud services with a cloud service provider (CSP) using an Infrastructure as a Service (IaaS) plan. As a cloud architect works on architectural design, which of the following statements would NOT apply in this case? ## Footnote The company must establish separation of duties mechanisms. The provider is responsible for the availability of the software. The company is liable for legal and regulatory requirements for customer data. The provider must update the firmware and security patches of physical servers.
The provider is responsible for the availability of the software. ## Footnote In a Software as a Service (SaaS) plan, the provider is responsible for the availability of the software. The software may include an appliance with Windows Server 2016 already installed and available to use.
82
# 3 A Local Area Network (LAN) is set up with an Authentication, Authorization, and Account (AAA) server. The AAA server allows remote supplicants to access the LAN through a Network Access Point (NAP). Which of the following best describes the type of remote authentication solution that is set up on the LAN? ## Footnote EAP 802.1x RADIUS PAP
RADIUS ## Footnote Remote Authentication Dial-in User Service (RADIUS) is made up of an Authentication, Authorization, and Account (AAA) server, a Network Access Control (NAC) or RADIUS client, and the supplicant. A supplicant is any device that is trying to access the local network remotely.
83
# 4 Specify elements that a playbook should include | Select all that apply ## Footnote When to report compliance incidents Incident categories and definitions Backup passwords and private keys Query strings to identify incident types
When to report compliance incidents Incident categories and definitions Query strings to identify incident types ## Footnote **Specific** query strings and signatures easily scan and detect specific types of incidents. These strings improve response and resolution time. **How** to address compliance incidents with, for example, Health Insurance Portability and Accountability Act (HIPAA) laws should be outlined. It may include a list of contacts and their information, how to contact them, and when. **Incident** categories and descriptions help ensure that all management and operational staff have a shared framework for interpreting the meaning of terms, concepts, and definitions.
84
# 4 A support technician wants to test a system’s connectivity by examining TCP and UDP ports. If the technician requires the ability to test both Linux and Windows systems, which tools qualify? | Select all that apply ## Footnote nmap netstat netcat pathping
nmap netstat netcat ## Footnote The **netstat** command is useful in showing the state of TCP/UDP ports on a system. The same command is used on both Windows and Linux, though with different options for syntax. **Netcat** is a simple but effective tool for testing connectivity. It is available for both Windows and Linux. Netcat can be used for port scanning and fingerprinting. The **Nmap** Security Scanner is one of the most popular open-source IP scanners. Nmap can use diverse methods of host and port discovery, some of which can operate stealthily.
85
# 2 A Department of Defense (DoD) application is migrating to the cloud using Amazon Web Services (AWS) as the cloud service provider. As part of the service level agreement (SLA) and DOD mandate, the application must remain within the United States of America. AWS offers the application East, Boston and West, Oregon data centers for operations and failover. Which of the following is AWS providing in accordance with the SLA and DoD mandate? ## Footnote Geographical considerations Continuity of operations Vendor diversity Regulatory framework
Geographical considerations ## Footnote Amazon Web Services (AWS) is taking into account geographical considerations. The agreement mandates the system will stay within the United States.
86
# 1 A user at a company executes a program that displays a threatening message. The message says "files on the computer will remain encrypted until bitcoin is paid to a virtual wallet." Which of the following best describes this type of infection? ## Footnote Crypto-malware A worm A logic bomb A mine
Crypto-malware ## Footnote Ransomware is a type of Trojan malware that extorts money from the victim. The computer remains locked until the user pays the ransom. Crypto-malware is ransomware that attempts to encrypt data files. The user will be unable to access the files without the private encryption key.
87
# 2 A company runs certain applications within isolated cells according to employee job functions to minimize access to resources on the operating system. This type of virtualization is which of the following? ## Footnote VPC Container Hypervisor Intranet
Container ## Footnote Containers decouple services and applications from a host operating system. Containers run within isolated cells and do not have their own kernel. They allow for continuous integration and continuous delivery.
88
# 4 Recommend an immediate response that does not require generating new certificates in a scenario where an attacker has compromised a host on a network by spoofing digital certificates. ## Footnote Remove all root certificates from host Revoke the host's certificate Install a content filter Install a data loss prevention system
Revoke the host's certificate ## Footnote Certificate revocation must always be performed if the associated host is compromised. The Key Compromise property of the certification can allow it to be rekeyed to retain the same subject and expiry information.
89
# 2 Analyze the active defense solution statements and determine which best describes the purpose of a honeyfile. ## Footnote The attempts to reuse can be traced if the threat actor successfully exfiltrates it. It is helpful in analyzing attack strategies and may provide early warnings of attacks. Configurations are in place to route suspect traffic to a different network. A decoy is set as a distraction to emulate a false topology and security zones.
The attempts to reuse can be traced if the threat actor successfully exfiltrates it. ## Footnote A honeyfile is convincingly useful but actually fake data. This data can be made trackable, so that when a threat actor successfully exfiltrates it, the attempts to reuse or exploit it can be traced.
90
# 2 A vendor ensures that each Internet of Things (IoT) device produced uses random, unique cryptographic keys in accordance with the established certificate and key management practices found in The National Institute of Standards and Technology (NIST) publications. Which of the following constraints is the vendor preventing? ## Footnote Reuse Salting Escrow Stretching
Reuse ## Footnote The practice of reusing a cryptographic key can make a system vulnerable to cyber attacks. The longer a key is in use, the easier it is for an attacker to compromise it. Randomly generated, unique keys provide better security.
91
# 3 A network with two normal-working switches has several client computers connected for work and Internet access. After adding two new switches and more client computers, the new computers, as well as some of the old client computers, cannot access the network. What are most likely the cause and the solution? | Select all that apply ## Footnote A loop in the network STP Port security Flood guard
A loop in the network STP ## Footnote A switch **loop** on the network will cause network connections to drop since the packet cannot make the appropriate hop to the next switch to its final destination. Switching loops also generates broadcast storms. **STP** (Spanning Tree Protocol) is a means for the bridges to organize themselves into a hierarchy and prevent loops from forming.
92
# 1 Customers receive a seemingly genuine email from their trusted bank, informing them that their password needs updating. However, when authenticating, an attacker captures the customers' credentials. What kind of attack did the bank customers experience? ## Footnote Phishing SMiShing Whaling Vishing
Phishing ## Footnote Phishing is a combination of social engineering and spoofing, where the attacker sets up a spoof website to imitate a trusted one. The attacker then emails users of the genuine website, informing them that their account must be updated, supplying a disguised link that leads to their spoofed site. When users authenticate with the spoofed site, their logon credentials are captured.
93
# 2 A program office provides a mock production environment where users and test agencies can persistently test application code as it is being checked in after development. This practice ensures the product meets user acceptance testing and design goals. Which Agile product does this most likely represent? ## Footnote Continuous deployment Continuous validation Continuous Integration DevSecOps
Continuous validation ## Footnote Continuous validation is the process in which a product is continually tested throughout the development lifecycle to ensure it is meeting the functional and security goals of a customer.
94
# 4 A network tech is installing an intrusion detection system (IDS) on a corporate network. The system is intended to be a long-term monitoring solution and would ideally split or copy network signals on the physical layer to avoid frame loss. Anticipate the type of sensor the tech will install in conjunction with the IDS. ## Footnote SNMP trap SPAN (switched port analyzer) Test access point (TAP) Bandwidth monitor
Test access point (TAP) ## Footnote A test access point (TAP) is a device that copies signals from the physical layer and the data link layer. Since no network or transport logic is used, every frame is received, allowing reliable packet monitoring.
95
# 1 The local operational network consists of physical electromechanical components controlling valves, motors, and electrical switches. All devices enterprise-wide trust each other in the internal network. Which of the following attacks could overwhelm the network by targeting vulnerabilities in the headers of specific application protocols? ## Footnote Man-in-the-middle attack DDoS attack DNS amplification attack Malicious PowerShell attack
DNS amplification attack ## Footnote Domain name system (DNS) amplification attack is an application attack that targets vulnerabilities in the headers and payloads of specific application protocols. It triggers a short request for a long response at the victim network.
96
# 1 Which principle of social engineering can a threat actor use to get many people to act as others would? ## Footnote Scarcity Liking Consensus Trust
Consensus ## Footnote The principle of consensus or social proof refers to techniques that cause many people to act just as others would without force. The attacker can use this instinct to persuade the target that to refuse a request would be odd.
97
# 1 Security admins are evaluating Windows server vulnerabilities related to Dynamic Link Library (DLL) injections. Modern applications are running on these Windows servers. How would an attacker exploit these vulnerabilities? | Select all that apply ## Footnote Navigate laterally using pass the hash. Evade detection through refactoring. Enable legacy mode through shimming. Use malware with administrator privilege.
Evade detection through refactoring Use malware with administrator privilege ## Footnote The **malware** must evade detection by anti-virus to be successful. This can be done through code refactoring which means the code performs the same function by using different methods, such as changing its signature. **Dynamic Link Library** (DLL) injection is deployed with malware that is already operating on the system with local administrator or system privileges.
98
# 4 Sometimes data is archived after it is past its usefulness for purposes of security or regulatory compliance. What is this called? ## Footnote Correlation Sensitivity Trends Retention
Retention ## Footnote When policy dictates preserving data in an archive after the date it is still being used, whether for regulatory or security purposes, this is known as a retention policy.
99
# 3 A network administrator researched Secure Sockets Layer/Transport Layer Security (SSL/TLS) versions to determine the best solution for the network. Security is a top priority along with a strong cipher. Recommend the version to implement, which will meet the needs of the company. ## Footnote SSL 2.0 SSL 3.0 TLS 1.1 TLS 1.2
TLS 1.2 ## Footnote Transport Layer Security (TLS) 1.2 added support for the strong Secure Hash Algorithm (SHA)-256 cipher along with improvements to the cipher suite negotiation process and protection against known attacks.
100
# 1 A social engineer used a phishing attack to trick users into visiting a website. Once users visit the site, a vulnerability exploit kit installs, which actively exploits vulnerabilities on the client. What type of attack did the users become a victim of? ## Footnote A Man-in-the-Browser (MitB) attack Locally Shared Objects (LSOs) Cross-site Request Forgery (XSRF) HTTP Response Splitting
A Man-in-the-Browser (MitB) attack ## Footnote A MitB attack compromises the web browser by installing malicious plug-ins, scripts, or intercepting API calls. Vulnerability exploit kits installed on a website can actively try to exploit vulnerabilities in clients browsing the site.
101
# 5 An IT company purchases a commercial off the shelf (COTS) product that allows for four developers to access and run the product against developed code for vulnerability and threat assessments. An IT audit indicates that five developers have accessed the product. Which of the following best describes what the company is in violation of? ## Footnote Compliance/Licensing Vendor diversity Terms of agreement Regulatory framework
Compliance/Licensing ## Footnote Software compliance and licensing is a legally binding agreement that means only using a software in accordance with the software developers’ conditions of usage.
102
# 3 Mobile engineers are designing a phone that can support internal key-pair certificates for authentication and encryption/decryption capabilities for an internal organization or corporation. Which component may the engineers want to include in the design of this phone? ## Footnote UBG OTG SEAndroid Tethering MicroSD HSM
MicroSD HSM ## Footnote Micro Secure Digital (MicroSD) Hardware Security Module (HSM) is designed to store cryptographic keys, such as a key-pair certificate, in a secure manner. It requires no extra drivers or uncommon hardware components to use.
103
# 2 A Cloud Service Provider (CSP) outsources the entire cyber security elements to a third party for the infrastructure in which an application resides due to lack of resources. The CSP maintains responsibility of the environment and attributes. What is this an example of? ## Footnote SECaaS MSSP Pay as you go Resource pooling
MSSP ## Footnote A managed service provider (MSP)/Managed security service provider (MSSP) offers fully outsourced responsibility for information assurance to a third party.
104
# 3 A network uses a framework for management and monitoring that uses the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), which encrypts the contents of traps and query responses. Analyze the types of protocols available for management and monitoring, then deduce the protocol utilized. ## Footnote SNMPv2c MIB SNMPv1 SNMPv3
SNMPv3 ## Footnote Simple Network Management Protocol (SNMP) v3 supports encryption and strong user-based authentication. Instead of community names, the agent is configured with a list of usernames and access permissions.
105
# 1 A hacker can use Microsoft Office applications as an attack vector to automatically run multiple tasks in the background using which of the following? ## Footnote ARP poisoning Bash VBA PowerShell
VBA ## Footnote Microsoft Office uses the Visual Basic for Applications (VBA) languages to script macros, for example, in a Word document to carry out multiple tasks automatically.
106
# 1 Which team performs the offensive role in a penetration exercise? ## Footnote Red team White team Purple team Blue team
Red team ## Footnote The red team performs the offensive role to try to infiltrate the target. This team is one of two competing teams in a penetration testing exercise.
107
# 1 Multiple private data sources ingest pictures to a machine learning tool on Google Cloud Platform to find specific species of butterflies. The pictures are tagged by creator names in the company before being loaded onto the various data source locations. What type of security solution can the IT team implement to prevent tainted training data from getting to the machine learning tool? | Select all that apply ## Footnote Use algorithms that use collision avoidance. Keep ML algorithm a secret. Use SOAR to check picture properties. Prevent infiltration of external vendors.
Keep ML algorithm a secret. Use SOAR to check picture properties. ## Footnote **Security orchestration, automation, and response** (SOAR) and automated runbooks could effectively check saved pictures before they are ingested into the machine learning tool. This will prevent malicious data from being ingested. **Machine Learning** (ML) algorithm is secrecy by obscurity. An adversarial attack can skew image data by tricking the ML tool to recognize an image as something else if the algorithm is known.
108
# 1 Which penetration technique allows a tester to bypass a network boundary and compromise servers on an internal network? ## Footnote Persistence Pivot Cleanup Lateral movement
Pivot ## Footnote A pivot bypasses a network boundary and compromises servers on an internal network. A pivot is normally accomplished using remote access and tunneling protocols.
109
# 3 Which system allows a user to authenticate once to a local device and to be authenticated to other servers or services without entering credentials again? ## Footnote Password vault OAuth Single sign-on OpenID Connect
Single sign-on ## Footnote A single sign-on (SSO) system allows the user to authenticate once to a local device and be authenticated to compatible application servers without having to enter credentials again.
110
# 4 Conclude which terms represent a core feature of the Diamond Model of Intrusion Analysis. | Select all that apply. ## Footnote Victim Eradication Capability Infrastructure
Victim Capability Infrastructure ## Footnote **Victim**-A victim is the target of the adversary and against whom vulnerabilities and exposures are exploited and capabilities used. It is useful to define the victim in terms of both the people or organization targeted, as well as the victim's assets (i.e., the attack surface). **Infrastructure**-The infrastructure feature describes the communication structures the adversary uses to utilize a capability. **Capability**-The capability feature describes the tools and/or techniques of the adversary used in the event. All of the vulnerabilities and exposures utilized by the individual's capability, regardless of the victim, is its capacity.
111
# 1 Which of the following is NOT a critical profiling factor when assessing the risk that any one type of threat actor poses to an organization? ## Footnote Structure Intent Motivation Non-repudiation
Non-repudiation ## Footnote Non-repudiation is a term that describes a property of a secure network where a sender cannot deny having sent a message.
112
# 3 The IT team has purchased a few devices that are compatible with the Trusted Computing Group Security Subsystem Class called Opal. Which of these device specifications will take advantage of Opal's security features? ## Footnote Automatic vendor updates Operating system Disk encryption Registry settings
Disk encryption ## Footnote The Opal security subsystem class is a set of specifications that defines a management interface for a host application to activate, provision, and manage encryption of user data on self-encrypting drives (SED).
113
# 5 Which data governance role is responsible for ensuring compliance with legal and regulatory frameworks specifically related to processing, retention, and/or disclosure of personally identifiable information (PII)? ## Footnote Data Privacy Officer (DPO) Data Owner Data Custodian Data Steward
Data Privacy Officer (DPO) ## Footnote The data privacy officer is responsible for the oversight of assets handled by the organization containing personally identifiable information (PII). The Privacy Officer maintains consistency with legislative and regulatory frameworks of the collection, disclosure, and protection of PII.
114
# 2 An application developer uses a third-party source to send cryptographic data through multiple processors to stretch the data and ensure secure algorithms. What is the developer preventing the use of? ## Footnote Rainbow table attack Weak keys Salting Collision
Weak keys ## Footnote Weak keys are poor or short algorithms in cryptographic keys used with a specific cipher. They are vulnerable to cybersecurity attacks. Stretching keys can strengthen the algorithm to make it more secure.
115
# 2 Which of the following cryptographic algorithm standards is best suited for Internet of Things (IoT) devices? ## Footnote Elliptic curve Asymmetric Lightweight Cipher suite
Lightweight ## Footnote Lightweight cryptography is an encryption method that provides a small footprint and/or low computational complexity for resource-constrained systems such as an Internet of Things (IoT) device.
116
# 2 A developer implements a single sign-on (SSO) login standard using Security Assertion Markup Language (SAML) for logging users into an application to eliminate the need for username/password credentials. This implementation is part of which of the following? ## Footnote SSL/TLS API consideration URL filtering HTTPS
API consideration ## Footnote API considerations are programming code that enables data transmission between one software product to another. It also contains the terms of this data exchange.
117
# 3 A systems admin deploys a new infrastructure for an organization. Examine the given descriptions and determine which applies to the technology used with the LDAP protocol. ## Footnote Forward traffic from one node to another Automatic method for network address allocation Provides privilege management and authorization Resolves names to IP addresses
Provides privilege management and authorization ## Footnote Directory services are the principal means of providing privilege management and authorization on an enterprise network. The Lightweight Directory Access Protocol (LDAP) is a protocol used with X.500 format directories.
118
# 3 Which of the following will reduce the risk of data exposure between containers on a cloud platform? | Select all that apply ## Footnote Namespaces Control groups Public subnets Secrets management
Namespaces Control groups ## Footnote In a **container** engine such as Docker, each container is isolated from others through separate namespaces. Namespaces prevent one container from reading or writing processes in another. **Control** groups ensure that one container cannot overwhelm others in a DoS-type attack. Namespaces and control groups reduce the risk of data exposure between containers.
119
# 4 What type of metadata could contain permissions in the form of an Access Control List? ## Footnote Email metadata Web metadata Mobile phone metadata File metadata
File metadata ## Footnote File metadata includes information about when a file was created, accessed, and modified; access control lists defining who is authorized to read or modify the file; copyright information; or tags for indexing are all possible file metadata.
120
# 3 Using Unified Extensible Firmware Interface (UEFI) to boot a server, the system must also provide secure boot capabilities. Part of the secure boot process requires a secure boot platform key or self-signed certificate. Determine which of the following an engineer can use to generate keys within the server using an available Peripheral Component Interconnect Express (PCIe) slot. ## Footnote Password vault NFC token Hardware security module Trusted platform module
Hardware security module ## Footnote A hardware security module (HSM) is an appliance designed to perform centralized public key infrastructure (PKI) management, key generation, or key escrow for devices. HSM can also be implemented as a plug-in PCIe adapter card to operate within a device.
121
# 1 An administrator goes through regular tasks every morning at the office to quickly gather health metrics of the network and associated systems. The admin connects to a Windows jump server using a secure shell (SSH) to run health scripts which outputs the data to a .xls file on a local shared folder accessible to all employees. The most recent run of the health script failed immediately without any indication of the issue. If an Information System Security Officer (ISSO) examined these morning tasks, what would be considered a weak configuration? | Select all that apply ## Footnote Unsecure remote access Unformatted error messages Open permissions Default settings
Open permissions Default settings ## Footnote **Open permissions** can allow anyone on the network with access to files and services. Although the file share is available to internal employees, only administrators should be reviewing gathered health information. **Default settings** are usually unsecure settings that leave the environment and data open to compromise. A shared folder that provides access to everyone on the Internal network is an example of a default setting when shared folders are created.
122
# 2 A recent change to an API exposes an exploit in a web application. Developers working on the project discover that dead code in the application had been executed as a result of which practice? ## Footnote Code reuse Normalization code Unreachable code Code obfuscation
Code reuse ## Footnote Code reuse is the copying of code from one location into another. Careless or mismanaged code reuse can introduce instances of dead code.
123
# 4 Select the type of incident response exercise that involves recreating system interfaces or using emulators to allow students to practice configuration tasks, or even practice with other trainees to mimic real-time attack scenarios. ## Footnote Capture the Flag Simulations Walkthrough Tabletop
Simulations ## Footnote Simulation is an activity in which two teams replicate a scenario and play the scenario out on real hardware, with one team representing the attackers, and the other team representing the response team.
124
# 1 An attacker evaded antivirus detection in a Linux kernel, as multiple threads attempted to write an object at the same memory location. What type of vulnerability did the attacker use? ## Footnote A race condition A pointer dereference A buffer overflow An integer overflow
A race condition ## Footnote A race condition vulnerability occurs when multiple threads are attempting to write at the same memory location. Race conditions can deploy as an anti-virus evasion technique.
125
# 3 A cloud customer prefers separating storage resources that hold different sets of data in virtual private clouds (VPCs). One of those data sets must comply with the Health Insurance Portability and Accountability Act (HIPAA) guidelines for patient data. How should the customer configure these VPCs to ensure the highest degree of network security? ## Footnote Split segments between VPCs. Monitor the virtual instance usage. Use third-party next generation firewall. Create multiple security groups.
Split segments between VPCs. ## Footnote Network segmentation can assist with separating workloads for performance and load balancing, keeping data processing within an isolated segment for compliance with laws and regulations and compartmentalizing data access and processing for different departments or functional requirements.
126
# 3 What identifies the physical location of a device? ## Footnote Geolocation Geofencing Content Management Rooting
Geolocation ## Footnote Geolocation is the use of network attributes to identify (or estimate) the physical position of a device.
127
# 4 Define steganography ## Footnote Concealing messages or information within other data Building a plan for dealing with incidents Using a list of approved applications for security purposes A method of containing malware
Concealing messages or information within other data ## Footnote Steganography obscures data by embedding it in another format. Messages can be covertly inserted into TCP packets in images by modifying specific pixels and even possibly to embed images or other data into audio files.
128
# 3 A basic installation of a web server will require which of the following to allow unauthenticated access? ## Footnote User account Guest account Service account Shared account
Guest account ## Footnote A guest account is a special type of shared account with no password. It allows anonymous and unauthenticated access to a resource. Guest accounts are created when installing web services, as most web servers allow unauthenticated access.
129
# 2 An application processes and transmits sensitive data containing personally identifiable information (PII). The development team uses secure coding techniques such as encryption, obfuscation, and code signing. Which of the following is the development team concerned with? ## Footnote Public data Data exposure Data execution Data exfiltration
Data exposure ## Footnote Sensitive data should be protected to prevent data exposure. Secure coding techniques such as encryption, code obfuscation, and signing can prevent data from being exposed and modified.
130
# 2 A team lead oversees onboarding new system administrators in an IT company. Part of the process is explaining the complex IT infrastructure. Which of the following configuration management strategies would BEST help the team lead explain the infrastructure? ## Footnote Diagrams Master Image Baseline configuration Change management
Diagrams ## Footnote The use of diagrams provides a visual representation of complex relationships between network topologies, workflows, internet protocols, and architecture within a system. Diagrams must be updated as system components change. Baseline configurations are documented and agreed-upon sets of specifications for information systems.
131
# 2 Which of the following are common constraints of embedded systems? | Select all that apply ## Footnote Network range Cryptography capability Reliability Compute power
Network range Cryptography capability Compute power ## Footnote **Compute power** is a common constraint of an embedded system. Embedded systems are relatively small and do not have the average computing capabilities as a standard computer. **Authentication** is a common constraint for embedded systems. Because they lack compute capacity, embedded systems cannot match the authentication technologies of a standard network. The lack of size and computing power also diminishes choices for **network connectivity**. Transmission Control Protocol/Internet Protocol (TCP/IP)-based networking is not up to standards with embedded systems using relatively low processing power.
132
# 3 Consider conditional access to a system and determine which options fit the criteria. | Select all that apply ## Footnote User Account Control (UAC) Non-discretionary system Sudo restrictions Difficult to enforce
User Account Control (UAC) Sudo restrictions ## Footnote **Conditional** access is an example of rule-based access control where policies are determined by system-enforced rules. The User Account Control (UAC) is an example of conditional access. A **conditional** access system monitors account or device behavior throughout a session. An example is sudo restrictions on privileged accounts.
133
# 2 An application user is contacted after an attempt to login to a company application to verify activity. Which form of two-factor authentication is this? ## Footnote Phone call SMS Push notification Voice recognition
Phone call ## Footnote A phone call is a form of two-factor authentication (2FA). An automated service dials the registered number on file to confirm authentication of a user.
134
# 1 Which attack vector makes it possible for a threat actor to compromise a whole platform with just one account? ## Footnote E-mail Social Media Cloud Supply chain
Cloud ## Footnote On a cloud platform, an attacker only needs to find one account, service, or host with weak credentials to gain access. The attacker is likely to target the accounts used to develop services in the cloud or manage cloud systems.
135
# 1 A company purchased a few rack servers from a different vendor to try with their internal cluster. After a few months of integration failures, the company opted to remain with their previous vendor and to upgrade their other rack servers. The current commercial software will be migrated to the new rack servers. What may have caused the company to remain with their previous vendor for new rack servers? | Select all that apply ## Footnote Disks are self-encrypting. Servers are incompatible. Vendor lacks expertise. The code is unsecure.
Servers are incompatible. Vendor lacks expertise. ## Footnote **Devices** or software that are incompatible with other devices or software make them difficult to manage. Companies often seek compatibility factors to ensure full integration with existing assets. A **vendor** that lacks expertise is also unable to support deployment and other activities required for using a rack server in the environment. Customer experience is vital to future purchases.
136
# 1 An attacker came within close proximity of a victim and sent the mobile device user spam of an unsolicited text message. Once the user clicked the link in the message, Trojan malware infected the user's device. What type of attack did the hacker most likely infect the mobile user with? ## Footnote Bluesnarfing Bluejacking WiPhishing Skimming
Bluejacking ## Footnote WHAT YOU NEED TO KNOW A Bluetooth-discoverable device is vulnerable to bluejacking, similar to spam, where someone sends an unsolicited text (or picture/video) message or vCard (contact details). This can also be a vector for Trojan malware.
137
# 3 The 802.1x framework establishes several ways for devices and users to be securely authenticated before they are permitted access to LAN (Local Area Network) or WLAN (Wireless LAN). Identify the actual authentication mechanism established. ## Footnote AES RSA WPA EAP
EAP ## Footnote 802.1x, which is the Port-based Network Access Control framework, establishes several ways for devices and users to be securely authenticated before they are permitted full network access. EAP or extensible authentication protocol is the actual authentication mechanism.
138
# 3 Server B requests a secure record exchange from Server A. Server A returns a package along with a public key that verifies the signature. What does this scenario demonstrate? ## Footnote DNS Server Cache Poisoning DNS Spoofing DNS Security Extensions Dynamic Host Configuration Protocol
DNS Security Extensions ## Footnote Domain Name System Security Extensions (DNSSEC) helps to mitigate against spoofing and poisoning attacks. The authoritative server for the zone creates a package of resource records, called an RRset, signed with a private key known as the zone signing key.
139
# 1 Which of the following is NOT an example of improper or weak application patch management. ## Footnote Application design flaw Unmanaged assets Performance degradation No documentation
Application design flaw ## Footnote An application design flaw is a vulnerability in the software. It can cause the security system to be circumvented or will cause the application to crash. For this reason, proper patch management processes are required to ensure service availability of the application.
140
# 1 A threat actor is using which of the following techniques to circumvent the usual authentication method to a remote host? ## Footnote Keylogger Rootkit Backdoor Logic bomb
Backdoor ## Footnote A backdoor is any type of access method to a host that circumvents the usual authentication method and gives the remote user administrative control.
141
# 3 Users are only allowed to work in the office. Account policies must provide login security measures. So, users are only working during normal business hours. Identify the policy that establishes the maximum amount of time an account may be logged in for at the workplace? ## Footnote Time of day policy Location-based policy Time-based login policy Impossible travel policy
Time-based login policy ## Footnote A time-based login policy establishes the maximum amount of time an account may be logged in for. For example, a user with no activity will be logged off after 6 hours.
142
# 1 Which attack types are client-side attacks that are impacted by malicious code? | Select all that apply ## Footnote Directory traversal Cross-site scripting Integer overflow Session replay
session replay cross-site scripting (XSS) ## Footnote A **session replay** is a client-side attack. This means that the attack executes arbitrary code on the user's browser. A **cross-site scripting (XSS)** attack exploits the fact that the browser is likely to trust scripts that appear to come from a site the user has chosen to visit.
143
# 2 A security administrator notices port scanning from an unknown entity on the company infrastructure. The administrator sets up a router to provide erroneous information to be provided in return to protect the system from breach or attack. What is the router providing in response to the scan? ## Footnote DNS sinkhole Honeyfile HIDS Fake telemetry
Fake telemetry ## Footnote Fake telemetry is false, but realistic, data used to trick an attacker into believing it is legitimate information.
144
# 3 What protocol alters public IP addresses to private IP addresses and vice versa, in an attempt to protect internal computers from the Internet? ## Footnote URL Filter Proxy NAT Firewall
NAT ## Footnote Network addressing protocol (NAT) translates public IP addresses to private and vice versa. By using the NAT protocol on the firewall, a company can hide assets from the public internet.
145
# 5 During a risk assessment, a company indicates the value of employee used laptops to be $1,500.00 a piece. What should the company define to come up with the annual loss expectancy in a quantitative risk assessment ## Footnote ALE ARO RPO RTO
ARO ## Footnote The annual rate of occurrence (ARO) indicates how many times a loss will occur within a year. An ARO is used in conjunction with the single loss expectancy (SLE) to figure the annual loss expectancy (ALE).