Chapter 4 Flashcards
(49 cards)
During a security test, the security analyst found a critical application with a buffer over a vulnerability, which of the following would be the best way to mitigate the vulnerability at the application level
Implement input validation
Doing a training exercise, a security analyst must determine the vulnerabilities for prioritize, the angle reviews, the following vulnerability scan output which of the following issues should the analyst address first
Allows anonymous read access to/etc./password
During a security scanning a security analyst finds the same vulnerabilities in a critical application which of the following recommendations would best mitigate this problem if applied along the SDLC phase
Use application security scanning as part of the pipeline for the CI/CD flow
An analysis aspects clear text passwords are being sent over the network which of the following tools were best support the analyst investigation
Wireshark
Which of the following is an important aspect that should be included in the lessons learned step-by-step after an incident
Identify any improvements or changes in the incident response, plan or procedures
Which of the following best explains the importance of communicating with staff regarding the official public communication plan related to incidents impacting the organization
To establish what information is allowed to be released by designated employees
The security endless has found the following suspicious DNS traffic while analyzing a packet capture DNS traffic while in session is active. The meantime between queries is less than one second. The average length exceeds 100 characters which of the following attacks most likely occurred.
DNS exfiltration
An organization needs to bring in data, collected and aggregation from various and points which of the following is the best tool to deploy to help analysts gather the data
EDR
A SOC manager is establishing a reporting process to manage vulnerabilities which of the following would best solution to identify a potential loss incurred by an issue
Risk score
An analyst reviewed the following web server log entries parentheses two parentheses two parentheses 2/etc/password
No attack or malicious attempts have been discovered which of the following most likely describes what took place
Directories transversal was performed to obtain a sensitive file for further reconnaissance
A SOC receive several alerts, indicating user accounts are connecting to the companies identity provider through non-secure communications user credentials for accessing sensitive business critical systems could be exposed which of the following. Should the SOC use when determining, malicious intent.
IDS
Which of the following is most appropriate to use with SOAR when the security team would like to automate actions across different vendor platforms
API
Which of the following actions with an analyst most likely performed after an incident has been investigated
Root cause analysis
A security analyst scans a host and generates the following output. HTTP it works.
The host is vulnerable to web based exploits
A list of IOC’s release by government Kitty organization contains the SHA 256 hash for Microsoft signed legitimate binary SVC host.EXC, which of the following best describes result of security teams add this indicator to their detection signatures
This indicator would fire on the majority of Windows devices
A true finance officer receive an email from someone who is possibly in person in the company, chief executive officer and requesting a financial operation. Which of the following should the analysis used to verify whether the email is an impersonation attempt.
DKIM
Organization has activated the CSIRT security analyst use a single virtual server was compromised and immediately isolated from the network which of the following should the CSIRT conduct next
Take a snapshot of the comprised server and verify its integrity
A security analyst is writing a shell script to identify IP addresses from the same country which of the following functions would help analyst achieve the objective
Gio IP look up
Which of the following best describes the key elements of a successful information security program
Security policy, implementation, assignment of rules and responsibilities information asset classification
Based on an internal assessment of vulnerability management team wants to proactively identify risks to the infrastructure prior to production appointments, which of the following best supports this approach
Threaten modeling
The chief information security officer is directing a new program to reduce attack surface risks and threats as part of a zero trust approach, the IT security team is required to come up with priorities for the program, which is the best priority based on common attack frameworks
Reduce the administrator and privileged access accounts
An IDS is triggered during after hours operations, the indicator records, and a no abnormal amount of sin request being sent to port 21 from numerous external systems a security analyst reports this information to the IR team for further investigation, which of the following best describes this incident
DDOS attack through the FTP port
Which of the following is the benefit of the diamond model of intrusion analysis?
It provides analytical, pivoting and identifies knowledge gaps
Security analyst identified the following suspicious entry on host based IDS logs which of the following shell scripts should the endless use to most accurately confirm what activity is going on
Netstat -antp | grep 8080>dev/null&&echo “ malicious activity” || echo “ok”