Chapter 4 Flashcards

(49 cards)

1
Q

During a security test, the security analyst found a critical application with a buffer over a vulnerability, which of the following would be the best way to mitigate the vulnerability at the application level

A

Implement input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Doing a training exercise, a security analyst must determine the vulnerabilities for prioritize, the angle reviews, the following vulnerability scan output which of the following issues should the analyst address first

A

Allows anonymous read access to/etc./password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During a security scanning a security analyst finds the same vulnerabilities in a critical application which of the following recommendations would best mitigate this problem if applied along the SDLC phase

A

Use application security scanning as part of the pipeline for the CI/CD flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An analysis aspects clear text passwords are being sent over the network which of the following tools were best support the analyst investigation

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an important aspect that should be included in the lessons learned step-by-step after an incident

A

Identify any improvements or changes in the incident response, plan or procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best explains the importance of communicating with staff regarding the official public communication plan related to incidents impacting the organization

A

To establish what information is allowed to be released by designated employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The security endless has found the following suspicious DNS traffic while analyzing a packet capture DNS traffic while in session is active. The meantime between queries is less than one second. The average length exceeds 100 characters which of the following attacks most likely occurred.

A

DNS exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An organization needs to bring in data, collected and aggregation from various and points which of the following is the best tool to deploy to help analysts gather the data

A

EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A SOC manager is establishing a reporting process to manage vulnerabilities which of the following would best solution to identify a potential loss incurred by an issue

A

Risk score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An analyst reviewed the following web server log entries parentheses two parentheses two parentheses 2/etc/password

No attack or malicious attempts have been discovered which of the following most likely describes what took place

A

Directories transversal was performed to obtain a sensitive file for further reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A SOC receive several alerts, indicating user accounts are connecting to the companies identity provider through non-secure communications user credentials for accessing sensitive business critical systems could be exposed which of the following. Should the SOC use when determining, malicious intent.

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is most appropriate to use with SOAR when the security team would like to automate actions across different vendor platforms

A

API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following actions with an analyst most likely performed after an incident has been investigated

A

Root cause analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security analyst scans a host and generates the following output. HTTP it works.

A

The host is vulnerable to web based exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A list of IOC’s release by government Kitty organization contains the SHA 256 hash for Microsoft signed legitimate binary SVC host.EXC, which of the following best describes result of security teams add this indicator to their detection signatures

A

This indicator would fire on the majority of Windows devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A true finance officer receive an email from someone who is possibly in person in the company, chief executive officer and requesting a financial operation. Which of the following should the analysis used to verify whether the email is an impersonation attempt.

A

DKIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Organization has activated the CSIRT security analyst use a single virtual server was compromised and immediately isolated from the network which of the following should the CSIRT conduct next

A

Take a snapshot of the comprised server and verify its integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A security analyst is writing a shell script to identify IP addresses from the same country which of the following functions would help analyst achieve the objective

A

Gio IP look up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following best describes the key elements of a successful information security program

A

Security policy, implementation, assignment of rules and responsibilities information asset classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Based on an internal assessment of vulnerability management team wants to proactively identify risks to the infrastructure prior to production appointments, which of the following best supports this approach

A

Threaten modeling

21
Q

The chief information security officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach, the IT security team is required to come up with priorities for the program, which is the best priority based on common attack frameworks

A

Reduce the administrator and privileged access accounts

22
Q

An IDS is triggered during after hours operations, the indicator records, and a no abnormal amount of sin request being sent to port 21 from numerous external systems a security analyst reports this information to the IR team for further investigation, which of the following best describes this incident

A

DDOS attack through the FTP port

23
Q

Which of the following is the benefit of the diamond model of intrusion analysis?

A

It provides analytical, pivoting and identifies knowledge gaps

24
Q

Security analyst identified the following suspicious entry on host based IDS logs which of the following shell scripts should the endless use to most accurately confirm what activity is going on

A

Netstat -antp | grep 8080>dev/null&&echo “ malicious activity” || echo “ok”

25
An organizations email account was compromised by a bad actor at 8:45 recipients email started learning the organizations helpdesk about the email At 9:10, the IRT was assembled Lead a call bridge was established in the chief information. Security officer declared an incident. Which of the following is the length of time it took for the team to detect the threat.
25 minutes
26
Assistant administrator needs to gather security events with reputable patterns from Lenox log files, which of the following would diminish most likely use for the task
A regular expression and bash
27
A virtual web server in a server pool was infected with Mauer after an analyst use the Internet to research system issue after the server was rebuilt and added back to the server. Pool reported issues with the website, indicating the site could not be trusted which of the following is the most likely cause of the server issue?
The digital certificate on the web server was self signed
28
A security analyst identifies a device on which different mower was detected multiple times even after the systems were scanned and clean several times, which of the following actions would be most effective to ensure the device does not have residual malware
Replace the hard drive and reimage the device
29
A security analyst is reviewing the findings of the latest vulnerability report for a company’s Web application web application accepts files for a bash script to be processed. If the file matches a given has the analyst is able to submit files to the system due to has collision, which of the following, should the analyst adjust to the creative of vulnerability with a few changes to the current script and infrastructure.
 Replace the current MD five with SHA256
30
A security analyst is performing an investigation involving multiple targeted window mower binary analyst wants to gather intelligence without disclosing information to the attackers, which of the following actions would allow the analyst to achieve the objective
Upload the binary to an air gap sandbox for analysis
31
Which of the following document should link to the recovery point objectives and recovery time objectives on critical services
Disaster recovery plan
32
The security analyst has found a moderate risk item and an organizations point of sale application. The organization is currently in a freeze window and has decided that the risk is not high enough to correct at this time which of the following inhibitors to remediation does the scenario illustrate
Business process interruption
33
A pen penetration tester submitted data to a form in a web application which enabled penetration tester to retrieve user credentials which of the following should be recommended for mediation of this application vulnerability
Performing input validation before allowing submission
34
The security administrator has been notified by the IT operations department that some vulnerability reports contain and complete list of findings which of the following methods should be used to resolve this issue
Credentialed scan 
35
The threat hunters seeks to identify new persistence, mechanisms installed on an organizations environment, and collecting scheduled task for all enterprise workstations. The following host details are aggregated which of the following should the hundred perform first base details above
Caught a copy of task hw.exe impacted host
36
An attacker has just gained access to the sis log server on a land reviewing the log entries has allowed attacked a prioritized possible target which of the following is an example of
Passive network foot printing
37
An analyst is remediating. I was associated with the recent incident. The analyst has isolated the vulnerability, and is actively removing it from the system which of the following steps of the process does this describe
Eradication
38
Following a recent security incident, the chief information security officer is concerned with improving visibility and reporting of malicious actors in the environment goals to reduce the time to prevent lateral movement and potential data exfiltration which of the following techniques will best achieve the improvement
Mean time to detect
39
Which of the following attack methodology framework should a cyber security analyst used to identify similar TTP is utilized by nation state actors
MITRE attack matrix
40
An incident response team found IOC‘s in a critical server. The team needs to isolate and collect technical evidence or further investigation which of the following pieces of data should be collected first or preserve sensitive information before isolating the server.
Routing Table
41
The security team is concerned about recently for the DOS attack against the company website which of the following controls best mitigate the attacks
Roll out a CDN
42
An incident response team receives an alert to start an investigation of an Internet outage outage is preventing all users and multiple occasions from accessing external SAAS resources team determines the organization was impacted by a DDOS attack which of the following should the team review first
DNS
43
Security analyst is trying to identify if possible network addresses from different source networks belonging to the same company in region, which of the following shell scripts functions the goal
{dig grep PTR origin.ask.cymru.com
44
A newly hired security manager in an SSC wants to improve efficiency by automated routine tasks which of the following SOC tasks is most suitable for automation
 generating incident reports and notifying the appropriate stakeholders
45
A weekly WAF report shows that a daily strike occurred in the same subnet and open source review indicates the IP address addresses belong to legitimate Internet service provider, but have been flagged for D DOS and reconnaissance scanning in the past year which of the following actions should an SOC analyst take Frst in response to these traffic uptick activities
Review the network logs to identify the context of traffic and what action was taken
46
An organization discovered a data breach that resulted in PI being released to the public during the lessons learning review. The family identified discrepancies regarding who is responsible for external reporting as well as timing requirements which of the following actions would best address the reporting issue.
Researching federal laws, regulatory compliance requirements and organizational policies to document specific reporting SLAs
47
A third-party assessment of a recent incident determined that the incident response team spent too long trying to get the scope needed for the incident timeline and too much time was spent search searching for false positive which of the following. Should the team work on first
Detection tuning
48
The security analyst reviews, the latest vulnerability scan and observed that their vulnerability was similar to CVSS3 scores, but different base score metrics which of the following attack factor should the analyst remediate first
AV:N
49
To minimize the impact of security incident, a cyber security analyst has configured audit settings. That organization is cloud services, which of the following security controls has the analyst configured.
Detective