Exam Flashcards

1
Q

EndPoint Security Settings: - Archives

A

Client Server - Allow - Alert - None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EndPoint Security Settings: - Documents

A

Client Server - Allow - Alert - None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EndPoint Security Settings: - Email

A

Client - Allow - Alert - None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EndPoint Security Settings: - Executables

A

Client - Wait - Quarantine - Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EndPoint Security Settings: - Scripts

A

Client - Wait - Quarantine - Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Carving Refer to?

A

Data Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determine a solution that can combine with a cloud access security broker (CASB) to provide a wholly cloud-hosted platform for client access?

A

Next Generation Security Web Gateweay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IT discovers a flaw in a web application where it allows queries without encryption. As a result, requests are being spoofed and directories containing private files are viewable. What is happening?

A

Extensible Markup Language (XML) injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Homomorphic?

A

Homomorphic encryption is an encryption method that allows computation to be performed directly on encrypted data without requiring access to a secret key. Analysis can apply functions on encrypted data without needing to reveal the values of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Users are only allowed to work in the office. Account policies must provide login security measures. So, users are only working during normal business hours. Identify the policy that establishes the maximum amount of time an account may be logged in for at the workplace?

A

Time-based login policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A logistics company requires a supervisory control and data acquisition (SCADA) system to collect and analyze real-time tracking of equipment and to monitor delays in shipping and receiving. The SCADA must provide reports to management to facilitate data-driven decisions on transporting equipment. What is the SCADA a part of?

A

An industrial control system (ICS) is a complex integration of hardware and software with network connectivity to support the critical infrastructure of a large industry. Supervisory control and data acquisition (SCADA) controls an ICS and can be used in the logistics industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company allows the use of corporate apps on employee-owned mobile devices. Mobile application management (MAM) services make this possible. Examining the list of available enterprise mobility management (EMM) features in today’s market, which of the following would NOT be available for use in this case? (Select all that apply.)

A

Manage camera use and Ability to Remote Wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The company’s current network utilizes EAP-TTLS (EAP-Tunneled TLS) for supplicant clients connecting to the network. Newer model devices and systems are deployed on the network and are not compatible with EAP-TTLS. These systems require MS-CHAPv2 for authentication. Which of the following options will support these new systems?

A

PEAP uses MSCHAPv2 in PEAPv0 (also known as EAP-MSCHAPv2). Where required, another iteration called PEAPv2 (also known as EAP-GTC), which is a Cisco implementation, can be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an antivirus and anti-malware software capable of doing to protect a computer system? (Select all that apply.)

A

Signature-based detection

Detect Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a computer that uses remote desktop protocol to run resources stored on a central server instead of a localized hard drive and provides minimal operating system services?

A

Thin client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which control types does a systems engineer implement when an initial locking mechanism does not perform as expected? (Select all that apply.)

A

Compensating
Preventative

17
Q

A global corporation assesses risk appetite and how risks in various regions could influence mission-critical operations. They are assessing compliance with local laws and licensing requirements to prevent financial risk or resolve security risks, and changing the risk posture and implementing risk controls to compensate. Conclude what type of assessment the team is performing.

A

Risk control assessment

18
Q

Which of the following will reduce the risk of data exposure between containers on a cloud platform? (Select all that apply.)

A

Namespaces
Control Groups

19
Q

hile assisting a customer over the phone to connect a laptop to a new wireless router, the user suddenly reports it is connected. Upon further inquiry into how the connection occurred, the user stated they pushed a circular button. Analyze the situation and determine which button the user pressed, and how it functions. (Select all that appl

A

WPS and 8 Character PIN

20
Q

A network administrator sets up a stateless firewall using an open-source application running on a Linux virtual machine. The immediate benefit of this setup is that it was easy to set up quickly with basic rules. What other reasons may have influenced the administrator’s decision to deploy a stateless rather than a stateful firewall? (Select all that apply.)

A

Block TCP ports

Allow network protocols

21
Q

Finance representatives at an organization meet professional standards by providing reports that are highly detailed and designed to be restricted. As members of the American Institute of Certified Public Accountants (AICPA), which standards do the finance representatives follow?

A

SSAE SOC 2 Type II

22
Q

Which of the following attacks would allow an attacker to sniff all traffic on a switched network?

A

Address Resolution Protocol (ARP) poisoning

23
Q

An attacker is preparing a phishing email mimicking the contents of a legitimate company email. The email will include a fake invoice to request payment for medical services and an email address that looks convincing. What can the attacker modify on the email to make it more convincing?

A

Prepend “RE:” to the subject line.

24
Q

MTD?

A

96

25
Q

RTO

A

Amount of Data loss a system can sustain = 10

26
Q

MTBF

A

Devices * hours/failures = 1500

27
Q

MTTF

A

devices * hours/devices = 1000

28
Q

MTTR

A

24