Finals Flashcards

(18 cards)

1
Q

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Secured zones

Subject role

Adaptive identity

Threat scope reduction

A

Secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?

Group Policy

Content filtering

Data loss prevention

Access control lists

A

Access control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

Default credentials

Non-segmented network

Supply chain vendor

Vulnerable software

A

Vulnerable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?

Geographic dispersion

Platform diversity

Hot site

Load balancing

A

Geographic dispersion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization wants to limit potential impact to its log-in database in the event of a breach. Which of the following options is the security team most likely to recommend?

Tokenization

Hashing

Obfuscation

Segmentation

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization wants to improve the company’s security authentication method for remote employees. Given the following requirements:

*Must work across SaaS and internal network applications
*Must be device manufacturer agnostic
*Must have offline capabilities

Which of the following would be the most appropriate authentication method?

Username and password

Biometrics

SMS verification

Time-based tokens

A

Time-based tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following should an internal auditor check for first when conducting an audit of the organization’s risk management program?

Policies and procedures

Asset management

Vulnerability assessment

Business impact analysis

A

Policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?

Audit each domain administrator account weekly for password compliance.

Implement a privileged access management solution.

Create IDS policies to monitor domain controller access.

Use Group Policy to enforce password expiration.

A

Implement a privileged access management solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?

Risk assessment

Risk identification

Risk treatment

Risk monitoring and review

A

Risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an example of a treatment strategy for a continuous risk?

Email gateway to block phishing attempts

Background checks for new employees

Dual control requirements for wire transfers

Branch protection as part of the CI/CD pipeline

A

Branch protection as part of the CI/CD pipeline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

While a school district is performing state testing, a security analyst notices all internet services are unavailable. The analyst discovers that ARP poisoning is occurring on the network and then terminates access for the host. Which of the following is most likely responsible for this malicious activity?

Unskilled attacker

Shadow IT

Insider threat

Nation-state

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following analysis methods allows an organization to measure the exposure factor associated with organizational assets?

Heuristic

Quantitative

User-driven

Trend-based

A

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?

Application

IPS/IDS

Network

Endpoint

A

Endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A software development team asked a security administrator to recommend techniques that should be used to reduce the chances of the software being reverse engineered. Which of the following should the security administrator recommend?

Digitally signing the software

Performing code obfuscation

Limiting the use of third-party libraries

Using compile flags

A

Performing code obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following data roles is responsible for identifying risks and appropriate access to data?

Owner

Custodian

Steward

Controller

A

Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security analyst is evaluating a SaaS application that the human resources department would like to implement. The analyst requests a SOC 2 report from the SaaS vendor. Which of the following processes is the analyst most likely conducting?

Internal audit

Penetration testing

Attestation

Due diligence

A

Due diligence

15
Q

Which of the following is the best way to validate the integrity and availability of a disaster recovery site?

Lead a simulated failover.

Conduct a tabletop exercise.

Periodically test the generators.

Develop requirements for database encryption.

A

Conduct a tabletop exercise.

16
Q

Which of the following options will provide the lowest RTO and RPO for a database?

Snapshots

On-site backups

Journaling

Hot site