Chapter 1 Flashcards
(48 cards)
A cyber security team lead is developing metrics to present in the weekly executive briefs executives are interested in knowing how long it takes to stop the spread of malware that enters the network which of the following metrics should the team lead include in the briefs ?
Meantime to remediate 
A regulated organization experienced a security breach that exposed a list of customer names with corresponding PII data which of the following is the best reason for developing the organization communications plans
To ensure incidents are immediately reported to a regulatory agency
Which of the following actions with an analyst most likely perform after an incident has been investigated
Root cause analysis
System administrator needs to gather security events with repeatable patterns from Linox log files which of the following would the administrator most likely use for this task?
A regular expression in bash
Which of the following best describes the actions taken by an organization after the resolution of an incident that addresses issues and reflects on the grow growth opportunities for future incidents
Lessons learned
I managed security service provider is having difficulty retaining talent due to an increased increasing workload caused by a client doubling the number of devices connected to the network, which of the following words best and decreasing the workload without increasing the staff
SOAR
An organization discovered a data breach that resulted in PII being released to the public during the lessons learned review the identified discrepancies regarding who was responsible for external reporting as well as the timing requirements. Which of the following actions would best address the reporting issue.
Researching federal laws, regulatory compliance requirements and organizational policies to document specific reporting SLAs
A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when prompted by phone calls which of the following would best address this issue
Increased training and awareness for all staff
Which of the following is a commonly used for component framework to communicate threat act behavior
Diamond model of intrusion analysis
Security operations team is required to consolidate several threat intelligence feeds due to redundant tools and portals which of the following will best achieve the goal and maximize results
Single pain of glass
The security team needs to demonstrate how prepared the team is in the event of a cyber attack, which of the following would best demonstrate a real world incident without impacting operations
Gather all internal incident response, party members, and perform a simulation
A regulated organization experienced a security breach that exposed a list of customer names with corresponding PII data which of the following is the best reason for developing the organizations communications plans
To ensure instance are immediately reported to a regulatory agency
Chief information security officer wants to lock down the user’s ability to change applications that are installed on their window systems. Which of the following is the best enterprise level solution
GPO
A chief information, security officer, CISO is concerned that a specific threat actor who is known to target the companies business type, may be able to breach the network and remain inside of it for an extended period of time which of the following techniques should be performed to meet the CISO goals
Adversary emulation
A security analyst needs to provide evidence of regular vulnerability, scanning on the companies network for an auditing process which of the following is an example of a tool that can produce such evidence
Open VAS
A development team is preparing to roll out a beta version of a web application and wants to quickly test for vulnerabilities, including SQL injection, path, transversal, and cross site scripting, which of the following tools with the security team most likely recommend to perform this test
OWASPZAP
A company has a primary control in place to restrict access to sensitive data database. However, the company discovered an authentication vulnerability that could bypass this control. Which of the following is the best compensating control.
Deploying an additional layer of access controls to verify authorized individuals
Which of the following is the best metric to use when reviewing an addressing findings that caused an incident?
Meantime to remediate MTTR
While reviewing the Web server logs, a security analyst notices the following snippet boot.INI, which of the following is being attempted
Directory transversal attack in this type of attack the attacker try to navigate outside the web route directory by using sequences, which attempt to move up directories. The goal is to access files that are normally restricted such as a boot INI on Windows systems which gains which contains boot configuration information this indicates an attempt to access sensitive fileson the server through directory navigation.
A security analyst needs to identify services in a small critical infrastructure network ICS many components in this network are likely to break if they received malformed or unusually large requests, which of the following is the safest method to use when identifying service versions
 Use Nessus with restricted concurrent connections
The vulnerability analyst is writing a report, documenting the newest most critical vulnerabilities identified in the past month which of the following public MITRE repositories would be best to review
Common vulnerabilities and exposures the common vulnerabilities and exposures CVE repository maintained by MITRE is a public list of known cyber security vulnerabilities
An incident response analyst is investigating the root cause of recent malware outbreak initial binary analysis indicates that this Malware, disabled host, security services and performs, cleanup routines on its infected hosts, including deletion of initial dropper and removal of event log entries and pre-fetch files from the host, which of the following data sources would most likely reveal evidence of the root cause
Registry artifacts file system meta data
Which of the following would best mitigate the effects of a new ransom ware attack that was not properly stopped by the company antivirus
Deploy sandboxing
The cyber security analyst is participating with the DLP project team to classify the organization which of the following is the primary purpose for classifying data
To establish the value of data to the organization