Exam Winter 2023 Flashcards

(167 cards)

1
Q

920.) Which of the following control types fixes a previously identified issue and mitigates a risk?

A. Detective
B. Corrective
C. Preventative
D. Finalized

A

B. Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

919.) A technician enables full disk encryption on a laptop that will be taken on a business trip. Which of the following does this process BEST protect?
A. Data in transit
B. Data in processing
C. Data at rest
D. Data tokenization

A

C. Data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

918.) A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements? (Select TWO).
A. Full device encryption
B. Network usage rules
C. Geofencing
D. Containerization
E. Application whitelisting
F. Remote control

A

A. Full device encryption
D. Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

917.) A company is working on mobile device security after a report revealed that users granted non-verified software access to corporate data. Which of the following is the MOST effective security control to mitigate this risk?
A. Block access to application stores
B. Implement OTA updates
C. Update the BYOD policy
D. Deploy a uniform firmware

A

C. Update the BYOD policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

916.) While investigating a recent security incident, a security analyst decides to view all network connections on a particular server. Which of the following would provide the desired information?
A. arp
B. nslookup
C. netstat
D. nmap

A

C. netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

915.) A Chief Information Security Officer wants to ensure the organization is validating and checking the integrity of zone transfers. Which of the following solutions should be implemented?
A. DNSSEC
B. LDAPS
C. NGFW

A

A. DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

914.) Which of the following is the MOST effective way to detect security flaws present on third-party libraries embedded on software before it is released into production?
A. Employ different techniques for server and client-side validations
B. Use a different version control system for third-party libraries
C. Implement a vulnerability scan to assess dependencies earlier on SDLC
D. Increase the number of penetration tests before software release

A

C. Implement a vulnerability scan to assess dependencies earlier on SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

913.) Which of the following is a risk that is specifically associated with hosting applications in the public cloud?
A. Unsecured root accounts
B. Zero-day
C. Shared tenancy
D. Insider threat

A

C. Shared tenancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

912.) An untrusted SSL certificate was discovered during the most recent vulnerability scan. A security analyst determines the certificate is signed properly and is a valid wildcard. This same certificate is installed on other company servers without issue. Which of the following is the MOST likely reason for this finding?
A. The required intermediate certificate is not loaded as part of the certificate chain
B. The certificate is on the CRL and is no longer valid
C. The corporate CA has expired on every server, causing the certificate to fail verification
D. The scanner is incorrectly configured to not trust this certificate when detected on the server

A

A. The required intermediate certificate is not loaded as part of the certificate chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

911.) A security analyst is receiving several alerts per user and is trying to determine if various logins are malicious. The security analyst would like to create a baseline of normal operations and reduce noise. Which of the following actions should the security analyst perform?
A. Adjust the data flow from authentication sources to the SIEM
B. Disable email alerting and review the SIEM directly
C. Adjust the sensitivity levels of the SIEM correlation engine
D. Utilize behavioral analysis to enable the SIEMs learning mode

A

C. Adjust the sensitivity levels of the SIEM correlation engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

910.) An organization is planning to roll out a new mobile device policy and issue each employee a new laptop. These laptops would access the users’ corporate operating system remotely and allow them to use the laptops for purposes outside of their job roles. Which of the following deployment models is being utilized?
A. MDM and application management
B. BYOD and containers
C. COPE and VDI
D. CYOD and VMs

A

C. COPE and VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

909.) Which of the following BEST helps to demonstrate integrity during a forensic investigation?
A. Event logs
B. Encryption
C. Hashing
D. Snapshots

A

C. Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

908.) A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?
A. Look for tampering on the evidence collection bag
B. Encrypt the collected data using asymmetric encryption
C. Ensure proper procedures for chain of custody are being followed
D. Calculate the checksum using a hashing algorithm

A

D. Calculate the checksum using a hashing algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

907.) A SOC operator is receiving continuous alerts from multiple Linux systems indicating that unsuccessful SSH to a functional user ID have been attempted on each one of them in a short period of time. Which of the following BEST explains this behavior?
A. Rainbow table attack
B. Password spraying
C. Logic bomb
D. Malware bot

A

B. Password spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

906.) An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
A. Bug bounty
B. Black-box
C. Gray-box
D. White-box

A

C. Gray-box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

905.) A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?
A. Semi-authorized hackers
B. State actors
C. Script kiddies
D. Advanced persistent threats

A

B. State actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

904.) Which of the following is the MOST likely reason for securing an air-gapped laboratory HVAC system?
A. To avoid data leakage
B. To protect surveillance logs
C. To ensure availability
D. To facilitate third-party access

A

A. To avoid data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

903.) After gaining access to a dual-homed multifunction device by exploiting a vulnerability in the device’s firmware, a penetration tester then gains shell access on another networked asset. This technique is an example of:
A. privilege escalation
B. footprinting
C. persistence
D. pivoting

A

A. privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

902.) Which of the following is used to ensure that evidence is admissible in legal proceedings when it is collected and provided to the authorities?
A. Chain of custody
B. Legal hold
C. Event log
D. Artifacts

A

A. Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

901.) The Chief Information Security Officer (CISO) of a bank recently updated the incident response policy. The CISO is concerned that members of the incident response team do not understand their roles. The bank wants to test the policy but with the least amount of resources or impact. Which of the following BEST meets the requirements?
A. Warm site failover
B. Tabletop walk-through
C. Parallel path testing
D. Full outage simulation

A

B. Tabletop walk-through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

900.) Which of the following processes will eliminate data using a method that will allow the storage device to be reused after the process is complete?
A. Pulverizing
B. Overwriting
C. Shredding
D. Degaussing

A

B. Overwriting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

899.) The database administration team is requesting guidance for a secure solution that will ensure confidentiality of cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a sensitive data field with an non-sensitive field that is rendered useless if a data breach occurs. Which of the following is the BEST solution to meet the requirement?
A. Tokenization
B. Masking
C. Full disk encryption
D. Mirroring

A

A. Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

898.) Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?
A. Smart card
B. Push notifications
C. Attestation service
D. HMAC-based, one-time password

A

D. HMAC-based, one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

897.) A recent phishing campaign resulted in several compromised user accounts. The security incident response team has been tasked with reducing the manual labor of filtering through all the phishing emails as they arrive and blocking the sender’s email address, along with other time-consuming mitigation actions. Which of the following can be configured to streamline those tasks?
A. SOAR playbook
B. MDM policy
C. Firewall rules
D. URL filter
E. SIEM data collection

A

A. SOAR playbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
896.) During a security incident investigation, an analyst consults the company’s SIEM and sees an event concerning high traffic to a known, malicious command-and-control server. The analyst would like to determine the number of company workstations that may be impacted by this issue. Which of the following can provide this information? A. WAF logs B. DNS logs C. System logs D. Application logs
C. System logs
26
895.) Which of the following is an effective tool to stop or prevent the exfiltration of data from a network? A. DLP B. NIDS C. TPM D. FDE
A. DLP
27
894.) Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM? A. Set up hashing on the source log file servers that complies with local regulatory requirements. B. Back up the aggregated log files at least two times a day or as stated by local regulatory requirements. C. Write protect the aggregated log files and move them to an isolated server with limited access D. Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements
A. Set up hashing on the source log file servers that complies with local regulatory requirements.
28
893.) Which of the following technologies is used to actively monitor for specific file types being transmitted on the network? A. File integrity monitoring B. Honeynets C. Tcpreplay D. Data loss prevention
A. File integrity monitoring
29
892.) Which of the following secure coding techniques makes compromised code more difficult for hackers to use? A. Obfuscation B. Normalization C. Execution D. Reuse
A. Obfuscation
30
891.) A company is implementing BYOD and wants to ensure all users have access to the same cloud-based services. Which of the following would BEST allow the company to meet this requirement? A. IaaS B. PaaS C. MaaS D. SaaS
B. PaaS
31
890.) A company was recently breached. Part of the company’s new cybersecurity strategy is to centralize the logs from all security devices. Which of the following components forwards the logs to a central source? A. Log enrichment B. Log aggregation C. Log parser D. Log collector
D. Log collector
32
889.) After a recent external audit, the compliance team provided a list of several non-compliant, in-scope hosts that were not encrypting cardholder data at rest. Which of the following compliance frameworks would address the compliance team’s GREATEST concern? A. PCI DSS B. GDPR C. ISO 27001 D. NIST CSF
A. PCI DSS
33
888.) Which of the following actions would be recommended to improve an incident response process? A. Train the team to identify the difference between events and incidents B. Modify access so the IT team has full access to the compromised assets C. Contact the authorities if a cybercrime is suspected D. Restrict communication surrounding the response to the IT team
A. Train the team to identify the difference between events and incidents
34
887.) A Chief Security Officer is looking for a solution that can provide increased scalability and flexibility for back-end infrastructure, allowing it to be updated and modified without disruption to services. The security architect would like the solution selected to reduce the back-end server resources and has highlighted that session persistence is not important for the applications running on the back-end servers. Which of the following would BEST meet the requirements? A. Reverse proxy B. Automated patch management C. Snapshots D. NIC teaming
A. Reverse proxy
35
886.) A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicate a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing? A. http://sample.url.com/