Exam Questions Flashcards
(104 cards)
753.) A SOC is currently being outsourced. Which of the following is being used?
A. Microservices
B. SaaS
C. MSSP
D. PaaS
C. MSSP
752.) A security analyst is investigating a phishing email that contains a malicious document directed to the company’s Chief Executive Officer (CEO). Which of the following should the analyst perform to understand the threat and retrieve possible IoCs?
A. Run a vulnerability scan against the CEO’s computer to find possible vulnerabilities
B. Install a sandbox to run the malicious payload in a safe environment
C. Perform a traceroute to identify the communication path
D. Use netstat to check whether communication has been made with a remote host
B. Install a sandbox to run the malicious payload in a safe environment
751.) A security analyst was deploying a new website and found a connection attempting to authenticate on the site’s portal. While Investigating The incident, the analyst identified the following Input in the username field:
admin’ or 1=1–
Which of the following BEST explains this type of attack?
A. DLL injection to hijack administrator services
B. SQLi on the field to bypass authentication
C. Execution of a stored XSS on the website
D. Code to execute a race condition on the server
D. Code to execute a race condition on the server
750.) A developer is building a new portal to deliver single-pane-of-glass management capabilities to customers with multiple firewalls. To Improve the user experience, the developer wants to implement an authentication and authorization standard that uses security tokens that contain assertions to pass user Information between nodes. Which of the following roles should the developer configure to meet these requirements? (Select TWO).
A. Identity processor
B. Service requestor
C. Identity provider
D. Service provider
E. Tokenized resource
F. Notarized referral
C. Identity provider
E. Tokenized resource
749.) A cyberthreat intelligence analyst is gathering data about a specific adversary using OSINT techniques. Which of the following should the analyst use?
A. Internal log files
B. Government press releases
C. Confidential reports
D. Proprietary databases
B. Government press releases
748.) A security modern may have occurred on the desktop PC of an organization’s Chief Executive Officer (CEO). A duplicate copy of the CEO’s hard drive must be stored securely to ensure appropriate forensic processes and custody chain is followed.
Which of the following should be performed to accomplish this task?
A. Install a new hard drive in the CEO’s PC, and then remove the old hard drive and place it in a tmper-evident bag
B. Connect a write blocker to the hard drive. Then leveraging a forensic workstation, utilize the dd command in a live linux environment to create a duplicate copy
C. Remove the CEO’s hard drive from the PC, connect to the forensic workstation, and copy all the contents onto a remote file share while the CEO watches
D. Refrain from completing forensic analysts of the CEO’s hard drive until after the incident is confirmed; duplicating the hard drive at this stage could destroy evidence.
D. Refrain from completing forensic analysts of the CEO’s hard drive until after the incident is confirmed; duplicating the hard drive at this stage could destroy evidence.
747.) When planning to build a virtual environment, an administrator needs to achieve the following:
- Establish Policies to limit who can create ne VMs
- Allocate resources according to actual virtualization
- Require justification for requests outside of the standard requirements
- Create standardization categories based on size and resource requirements
Which of the following is the administrator MOST likely trying to do?
A. Implement IaaS replication
B. Protect against VM escape
C. Deploy a PaaS
D. Avoid VM sprawl
D. Avoid VM sprawl
746.) Several employees return to work the day after attending an industry trade show. That same day, the security manager notices several malware alerts coming from each of the employees’ workstations. The security manager investigates but finds no evidence of attack by reviewing network-based sources like the perimeter firewall or the NIDS. Which of the following is MOST likely causing the malware alerts?
A. A worm that has propagated itself across the intranet, which was initiated by presentation media
B. A malicious PowerShell script that was attached to an email and transmitted to multiple employees
C. A Trojan that has passed through the gateway router and executed malicious code on the hosts
D. A USB flash drive that is trying to run malicious code but is being blocked by the host firewall
A. A worm that has propagated itself across the intranet, which was initiated by presentation media
745.) A security researcher is tracking an adversary by noting its attacks and techniques based on its capabilities, infrastructure, and victims. Which of the following is the researcher MOST likely using?
A. The Diamond Model of Intrusion Analysis
B. The Cyber Kill Chain
C. The MITRE CVE database
D. The incident response process
A. The Diamond Model of Intrusion Analysis
744.) A security analyst needs to implement security features across smartphones, laptops, and tablets. Which of the following would be the MOST effective across heterogeneous platforms?
A. Enforcing encryption
B. Deploying GPOs
C. Removing administrative permissions
D. Applying MDM software
D. Applying MDM software
743.) During a security assessment, a security analyst finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permissions for the existing users and groups and remove the set-user-ID bit from the file?
A. ls
B. chflags
C. chmod
D. lsof
E. setuid
E. setuid
742.) A financial analyst has been accused of violating the company’s AUP and there is forensic evidence to substantiate the allegation. Which of the following would dispute the analyst’s claim of innocence?
A. Legal hold
B. Order of volatility
C. Non-repudiation
D. Chain of custody
C. Non-repudiation
741.) Which of the following would BEST identify and remediate a data-loss event in an enterprise using third-party, web-based services and file-sharing platforms?
A. SIEM
B. CASB
C. UTM
D. EDR
B. CASB
740.) A security administrator is trying to determine whether a server is vulnerable to a range of attacks. After using a tool, the administrator obtains the following output: Which of the following attacks was successfully implemented based on the output?
A. Memory leak
B. Race conditions
C. SQL injection
D. Directory traversal
- Memory leak
- A recent security assessment revealed that an actor exploited a vulnerable workstation within an organization and has persisted on the network for several months. The organization realizes the need to reassess its security strategy for mitigating risks within the perimeter. Which of the following solutions would BEST support the organization’s strategy?
- FIM
- DLP
- EDR
- UTM
- EDR
- The SIEM at an organization has detected suspicious traffic coming from a workstation in its internal network. An analyst in the SOC investigates the workstation and discovers malware that is associated with a botnet is installed on the device. A review of the logs on the workstation reveals that the privileges of the local account were escalated to a local administrator. To which of the following groups should the analyst report this real-world event?
- The NOC team
- The vulnerability management team
- The CIRT
- The read team
- The CIRT
- A company is concerned about its security after a red-team exercise. The report shows the team was able to reach the critical servers due to the SMB being exposed to the internet and running NTLMv1. Which of the following BEST explains the findings?
- Default settings on the servers
- Unsecured administrator accounts
- Open ports and services
- Weak data encryption
Weak data encryption
- A global company is experiencing unauthorized logins due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the company to require from prospective vendors?
- IP restrictions
- Multifactor authentication
- A banned password list
- A complex password policy
- Multifactor authentication
- A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select TWO)
- The order of volatility
- A CRC32 checksum
- The provenance of the artifacts
- The vendor’s name
- The date and time
- A warning banner
- The order of volatility
- The date and time
- A security analyst is concerned about traffic initiated to the dark web from the corporate LAN. Which of the following networks should the analyst monitor?
- SFTP
- AIS (automatic identification system. Used for ships)
- Tor (The onion router)
- IoC
Tor (The onion router)
- A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would BEST meet the requirement?
- Asymmetric
- Symmetric
- Homomorphic
- Ephemeral
Homomorphic
- A forensics investigator is examining a number of unauthorized payments that were reported on the company’s website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to be phishing team, and the forwarded email revealed the link to be: Which of the following will the forensics investigator MOST likely determine has occurred?
- SQL injection
- Broken authentication
- XSS
- XSRF
XSRF
An information security officer at a credit card transaction company is conducting a framework-mapping exercise with the internal controls. The company recently established a new office in Europe. To which of the following frameworks should the security officer map to the existing controls? (Select TWO)
- ISO
- PCI DSS
- SOC
- GDPR
- CSA
- NIST
B. PCI DSS D. GDPR
730
An organization relies on third-party videoconferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources. Which of the following would BEST maintain high-quality videoconferencing while minimizing latency when connected to the VPN?
- Using geographic diversity to have VPN terminators closer to end users
- Utilizing split tunneling so only traffic for corporate resources is encrypted
- Purchasing higher bandwidth connections to meet the increased demand
- Configuring QoS properly on the VPN accelerators
Purchasing higher bandwidth connections to meet the increased demand