Deck1 Flashcards
Which of the following is not a metadata feature of the Diamond Model? A. Direction B. Result C. Devices D. Resources
C. Devices
Which data type is protected under the PCI compliance framework? A. credit card type B. primary account number C. health conditions D. provision of individual care
B. primary account number
Which of the following are core responsibilities of a national CSIRT and CERT?
A. Provide solutions for bug bounties
B. Protect their citizens by providing security vulnerability information, security awareness
training, best practices, and other information
C. Provide vulnerability brokering to vendors within a country
D. Create regulations around cybersecurity within the country
B. Protect their citizens by providing security vulnerability information, security awareness
training, best practices, and other information
REFER TO EXHIBIT
A customer reports that they cannot access your organization’s website. Which option is a
possible reason that the customer cannot access the website?
A. The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service.
B. The server at 10.67.10.5 has a virus.
C. A vulnerability scanner has shown that 10.67.10.5 has been compromised.
D. Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors.
D. Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors.
In addition to cybercrime and attacks, evidence found on a system or network may be presented in a court of law to support accusations of crime or civil action, including which of the following? A. Fraud, money laundering, and theft B. Drug-related crime C. Murder and acts of violence D. All of the above
D. All of the above
An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group. Which term defines the initial event in the NIST SP800-61 r2? A. instigator B. precursor C. online assault D. trigger
B. precursor
Which of the following is an example of a managed security offering where incident response experts monitor and respond to security alerts in a SOC? A. Cisco CloudLock B. Cisco’s Active Threat Analytics (ATA) C. Cisco Managed Firepower Service D. Cisco Jasper
B. Cisco’s Active Threat Analytics (ATA)
Which kind of evidence can be considered most reliable to arrive at an analytical assertion? A. direct B. corroborative C. indirect D. circumstantial E. textual
A. direct
What is NAC? A. Non-Admin Closure B. Network Access Control C. Nepal Airline Corporations D. Network Address Control
B. Network Access Control
Which data element must be protected with regards to PCI? A. past health condition B. geographic location C. full name / full account number D. recent payment amount
C. full name / full account number
What is the process of remediation the system from attack so that responsible threat actor can be revealed?
A. Validating the Attacking Host’s IP Address
B. Researching the Attacking Host through Search Engines.
C. Using Incident Databases.
D. Monitoring Possible Attacker Communication Channels.
A. Validating the Attacking Host’s IP Address
Which CVSSv3 metric value increases when attacks consume network bandwidth, processor cycles, or disk space? A. confidentiality B. integrity C. availability D. complexity
C. availability
Which regular expression matches "color" and "colour"? A. col[0-9]+our B. colo?ur C. colou?r D. ]a-z]{7}
C. colou?r
Which option filters a LibPCAP capture that used a host as a gateway? A. tcp|udp] [src|dst] port B. [src|dst] net [{mask }|{len }] C. ether [src|dst] host D. gateway host
D. gateway host
What protocol is related to NAC? A. 802.1Q B. 802.1X (EAP-TLS, EAP-PEAP or EAP-MSCHAP) C. 802.1E D. 802.1F
B. 802.1X (EAP-TLS, EAP-PEAP or EAP-MSCHAP)
A CMS plugin creates two files that are accessible from the Internet myplugin.html and exploitable.php. A newly discovered exploit takes advantage of an injection vulnerability in exploitable.php. To exploit the vulnerability, one must send an HTTP POST with specific
variables to exploitable.php. You see traffic to your webserver that consists of only HTTP GET requests to myplugin.html. Which category best describes this activity?
A. weaponization
B. exploitation
C. installation
D. reconnaissance
D. reconnaissance
From a security perspective, why is it important to employ a clock synchronization protocol on a network?
A. so that everyone knows the local time
B. to ensure employees adhere to work schedule
C. to construct an accurate timeline of events when responding to an incident
D. to guarantee that updates are pushed out according to schedule
C. to construct an accurate timeline of events when responding to an incident
Which option is generated when a file is run through an algorithm and generates a string specific to the contents of that file? A. URL B. hash C. IP address D. destination port
B. hash
Which identifies both the source and destination location? A. IP address B. URL C. ports D. MAC address
A. IP address
Explanation:
The IP Address is used to uniquely identify the desired host we need to contact. This information is not shown in the above packet because it exists in the IP header
section located right above the TCP header we are analysing. If we were to expand the IP header, we would (certainly) find the source and destination IP Address fields in there.
What mechanism does the Linux operating system provide to control access to files? A. privileges required B. user interaction C. file permissions D. access complexity
C. file permissions
Which of the following are the three broad categories of cybersecurity investigations?
A. Public, private, and individual investigations
B. Judiciary, private, and individual investigations
C. Public, private, and corporate investigations
D. Government, corporate, and private investigations
A. Public, private, and individual investigations
Which source provides reports of vulnerabilities in software and hardware to a Security Operations Center? A. Analysis Center B. National CSIRT C. Internal CSIRT D. Physical Security
C. Internal CSIRT
Which netstat command show ports? (Choose two) A. netstat –a B. netstat -l C. netstat -v D. netstat -g
A. netstat –a
B. netstat -l
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity? A. collection B. examination C. reporting D. investigation
A. collection