Q 201-400 Flashcards

(54 cards)

1
Q

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

A.To track the status of patching installations
B.To find shadow IT cloud deployments
C.To continuously the monitor hardware inventory
D.To hunt for active attackers in the network

A

Answer: To track the status of patching installations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

A.Memory injection
B.Race condition
C.Side loading
D.SQL injection

A

Answer: Memory injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?

A.Asset inventory
B.Network enumeration
C.Data certification
D.Procurement process

A

Answer: Asset inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies. Which of the following is the most important consideration during development?

A.Scalability
B.Availability
C.Cost
D.Ease of deployment

A

Answer: Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following examples would be best mitigated by input sanitization?

A.

alert("Warning!");

B.nmap - 10.11.1.130
C.Email message: “Click this link to get your free gift card.”
D.Browser message: “Your connection is not private.”
A

Answer:

alert("Warning!");
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company is decommissioning its physical servers and replacing them with an architecture that will reduce the number of individual operating systems. Which of the following strategies should the company use to achieve this security requirement?

A.Microservices
B.Containerization
C.Virtualization
D.Infrastructure as code

A

Answer: Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network engineer deployed a redundant switch stack to increase system availability. However, the budget can only cover the cost of one ISP connection. Which of the following best describes the potential risk factor?

A.The equipment MTBF is unknown.
B.The ISP has no SLA.
C.An RPO has not been determined.
D.There is a single point of failure.

A

Answer: There is a single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A recent penetration test identified that an attacker could flood the MAC address table of network switches. Which of the following would best mitigate this type of attack?

A.Load balancer
B.Port security
C.IPS
D.NGFW

A

Answer: Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company allows customers to upload PDF documents to its public e-commerce website. Which of the following would a security analyst most likely recommend?

A.Utilizing attack signatures in an IDS
B.Enabling malware detection through a UTM
C.Limiting the affected servers with a load balancer
D.Blocking command injections via a WAF

A

Answer: Enabling malware detection through a UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?

A.To reduce implementation cost
B.To identify complexity
C.To remediate technical debt
D.To prevent a single point of failure

A

Answer: To prevent a single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator needs to perform server hardening before deployment. Which of the following steps should the administrator take? (Choose two.)

A.Disable default accounts.
B.Add the server to the asset inventory.
C.Remove unnecessary services.
D.Document default passwords.
E.Send server logs to the SIEM.
F.Join the server to the corporate domain.

A

Answer: Disable default accounts AND Remove unnecessary services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following methods can be used to detect attackers who have successfully infiltrated a network? (Choose two.)

A.Tokenization
B.CI/CD
C.Honeypots
D.Threat modeling
E.DNS sinkhole
F.Data obfuscation

A

Answer: Honeypots AND DNS sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following most likely describes why a security engineer would configure all outbound emails to use S/MIME digital signatures?

A.To meet compliance standards
B.To increase delivery rates
C.To block phishing attacks
D.To ensure non-repudiation

A

Answer : To ensure non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization completed a project to deploy SSO across all business applications last year. Recently, the finance department selected a new cloud-based accounting software vendor. Which of the following should most likely be configured during the new software deployment?

A.RADIUS
B.SAML
C.EAP
D.OpenID

A

Answer: SAML (Security Assertion Markup Language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Easy-to-guess passwords led to an account compromise. The current password policy requires at least 12 alphanumeric characters, one uppercase character, one lowercase character, a password history of two passwords, a minimum password age of one day, and a maximum password age of 90 days. Which of the following would reduce the risk of this incident from happening again? (Choose two.)

A.Increasing the minimum password length to 14 characters.
B.Upgrading the password hashing algorithm from MD5 to SHA-512.
C.Increasing the maximum password age to 120 days.
D.Reducing the minimum password length to ten characters.
E.Reducing the minimum password age to zero days.
F.Including a requirement for at least one special character.

A

Answer: Increasing the minimum password length to 14 characters AND Including a requirement for at least one special character.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following best describes a use case for a DNS sinkhole?

A.Attackers can see a DNS sinkhole as a highly valuable resource to identify a company’s domain structure.
B.A DNS sinkhole can be used to draw employees away from known-good websites to malicious ones owned by the attacker.
C.A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.
D.A DNS sinkhole can be set up to attract potential attackers away from a company’s network resources.

A

Answer: A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A utility company is designing a new platform that will host all the virtual machines used by business applications. The requirements include:

*A starting baseline of 50% memory utilization
*Storage scalability
*Single circuit failure resilience

Which of the following best meets all of these requirements?
A.Connecting dual PDUs to redundant power supplies
B.Transitioning the platform to an IaaS provider
C.Configuring network load balancing for multiple paths
D.Deploying multiple large NAS devices for each host

A

Answer: Transitioning the platform to an IaaS provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network team segmented a critical, end-of-life server to a VLAN that can only be reached by specific devices but cannot be reached by the perimeter network. Which of the following best describe the controls the team implemented? (Choose two.)

A.Managerial
B.Physical
C.Corrective
D.Detective
E.Compensating
F.Technical
G.Deterrent

A

Answer : Compensating AND Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A threat actor was able to use a username and password to log in to a stolen company mobile device. Which of the following provides the best solution to increase mobile data security on all employees’ company mobile devices?

A.Application management
B.Full disk encryption
C.Remote wipe
D.Containerization

A

Answer: Remote Wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user downloaded software from an online forum. After the user installed the software, the security team observed external network traffic connecting to the user’s computer on an uncommon port. Which of the following is the most likely explanation of this unauthorized connection?

A.The software had a hidden keylogger.
B.The software was ransomware.
C.The user’s computer had a fileless virus.
D.The software contained a backdoor.

A

Answer: The software contained a backdoor.

6
Q

Which of the following considerations is the most important regarding cryptography used in an IoT device?

A.Resource constraints
B.Available bandwidth
C.The use of block ciphers
D.The compatibility of the TLS version

A

Answer: The use of block ciphers

6
Q

A hosting provider needs to prove that its security controls have been in place over the last six months and have sufficiently protected customer data. Which of the following would provide the best proof that the hosting provider has met the requirements?

A.NIST CSF
B.SOC 2 Type 2 report
C.CIS Top 20 compliance reports
D.Vulnerability report

A

Answer: SOC 2 Type 2 report

6
A city municipality lost its primary data center when a tornado hit the facility. Which of the following should the city staff use immediately after the disaster to handle essential public services? A.BCP B.Communication plan C.DRP D.IRP
DRP (Disaster Recovery Plan)
6
A company needs to keep the fewest records possible, meet compliance needs, and ensure destruction of records that are no longer needed. Which of the following best describes the policy that meets these requirements? A.Security policy B.Classification policy C.Retention policy D.Access control policy
Retention policy
6
Which of the following is a common source of unintentional corporate credential leakage in cloud environments? A.Code repositories B.Dark web C.Threat feeds D.State actors E.Vulnerability databases
Code repositories
6
Which of the following is the best reason an organization should enforce a data classification policy to help protect its most sensitive information? A.End users will be required to consider the classification of data that can be used in documents. B.The policy will result in the creation of access levels for each level of classification. C.The organization will have the ability to create security requirements based on classification levels. D.Security analysts will be able to see the classification of data within a document before opening it.
The organization will have the ability to create security requirements based on classification levels.
6
An analyst is performing a vulnerability scan against the web servers exposed to the internet without a system account. Which of the following is most likely being performed? A.Non-credentialed scan B.Packet capture C.Privilege escalation D.System enumeration E.Passive scan
Non-credentialed scan
6
A security administrator is hardening corporate systems and applying appropriate mitigations by consulting a real-world knowledge base for adversary behavior. Which of the following would be best for the administrator to reference? A.MITRE ATT&CK B.CSIRT C.CVSS D.SOAR
MITRE ATT&CK
6
An architect has a request to increase the speed of data transfer using JSON requests externally. Currently, the organization uses SFTP to transfer data files. Which of the following will most likely meet the requirements? A.A website-hosted solution B.Cloud shared storage C.A secure email solution D.Microservices using API
Microservices using API
6
Which of the following addresses individual rights such as the right to be informed, the right of access, and the right to be forgotten? A.GDPR B.PCI DSS C.NIST D.ISO
GDPR (General Data Protection Regulation)
6
An administrator is installing an LDAP browser tool in order to view objects in the corporate LDAP directory. Secure connections to the LDAP server are required. When the browser connects to the server, certificate errors are being displayed, and then the connection is terminated. Which of the following is the most likely solution? A.The administrator should allow SAN certificates in the browser configuration. B.The administrator needs to install the server certificate into the local truststore. C.The administrator should request that the secure LDAP port be opened to the server. D.The administrator needs to increase the TLS version on the organization's RA.
The administrator needs to install the server certificate into the local truststore.
6
A user is requesting Telnet access to manage a remote development web server. Insecure protocols are not allowed for use within any environment. Which of the following should be configured to allow remote access to this server? A.HTTPS B.SNMPv3 C.SSH D.RDP E.SMTP
SSH
6
A security administrator is working to find a cost-effective solution to implement certificates for a large number of domains and subdomains owned by the company. Which of the following types of certificates should the administrator implement? A.Wildcard B.Client certificate C.Self-signed D.Code signing
Wildcard
7
A security analyst received a tip that sensitive proprietary information was leaked to the public. The analyst is reviewing the PCAP and notices traffic between an internal server and an external host that includes the following: ... 12:47:22.327233 PPPoE [ses 0x8122] IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto IPv6 (41), length 331) 10.5.1.1 > 52.165.16.154: IP6 (hlim E3, next-header TCP (6) paylcad length: 271) 2001:67c:2158:a019::ace.53104 > 2001:0:5ef5:79fd:380c:dddd:a601:24fa.13788: Flags [P.], cksum 0xd7ee (correct), seq 97:348, ack 102, win 16444, length 251 ... Which of the following was most likely used to exfiltrate the data? A.Encapsulation B.MAC address spoofing C.Steganography D.Broken encryption E.Sniffing via on-path position
Encapsulation
7
A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize? A.Serverless architecture B.Thin clients C.Private cloud D.Virtual machines
Serverless architecture.
7
A security administrator is performing an audit on a stand-alone UNIX server, and the following message is immediately displayed: (Error 13): /etc/shadow: Permission denied. Which of the following best describes the type of tool that is being used? A.Pass-the-hash monitor B.File integrity monitor C.Forensic analysis D.Password cracker
Password cracker
7
A security administrator needs to create firewall rules for the following protocols: RTP, SIP, H.323. and SRTP. Which of the following does this rule set support? A.RTOS B.VoIP C.SoC D.HVAC
VoIP
7
Which of the following best describes a social engineering attack that uses a targeted electronic messaging campaign aimed at a Chief Executive Officer? A.Whaling B.Spear phishing C.Impersonation D.Identity fraud
Whaling
7
During a penetration test, a flaw in the internal PKI was exploited to gain domain administrator rights using specially crafted certificates. Which of the following remediation tasks should be completed as part of the cleanup phase? A.Updating the CRL B.Patching the CA C.Changing passwords D.Implementing SOAR
Updating the CRL
8
The author of a software package is concerned about bad actors repackaging and inserting malware into the software. The software download is hosted on a website, and the author exclusively controls the website's contents. Which of the following techniques would best ensure the software's integrity? A.Input validation B.Code signing C.Secure cookies D.Fuzzing
Code signing
8
Which of the following physical controls can be used to both detect and deter? (Choose two.) A.Lighting B.Fencing C.Signage D.Sensor E.Bollard F.Lock
Lighting AND Sensor
8
A company hired an external consultant to assist with required system upgrades to a critical business application. A systems administrator needs to secure the consultant's access without sharing passwords to critical systems. Which of the following solutions should most likely be utilized? A.TACACS+ B.SAML C.An SSO platform D.Role-based access control E.PAM software
PAM software
9
A newly implemented wireless network is designed so that visitors can connect to the wireless network for business activities. The legal department is concerned that visitors might connect to the network and perform illicit activities. Which of me following should the security team implement to address this concern? A.Configure a RADIUS server to manage device authentication. B.Use 802.1X on all devices connecting to wireless. C.Add a guest captive portal requiring visitors to accept terms and conditions. D.Allow for new devices to be connected via WPS.
Add a guest captive portal requiring visitors to accept terms and conditions
10
A development team is launching a new public-facing web product. The Chief Information Security Officer has asked that the product be protected from attackers who use malformed or invalid inputs to destabilize the system. Which of the following practices should the development team implement? A.Fuzzing B.Continuous deployment C.Static code analysis D.Manual peer review
Fuzzing.
10
During an annual review of the system design, an engineer identified a few issues with the currently released design. Which of the following should be performed next according to best practices? A.Risk management process B.Product design process C.Design review process D.Change control process
Change control process.
11
Which of the following is best to use when determining the severity of a vulnerability? A.CVE B.OSINT C.SOAR D.CVSS
CVSS (Common Vulnerability Scoring System)
11
A security analyst at an organization observed several user logins from outside the organization's network. The analyst determined that these logins were not performed by individuals within the organization. Which of the following recommendations would reduce the likelihood of future attacks? (Choose two.) A.Disciplinary actions for users B.Conditional access policies C.More regular account audits D.Implementation of additional authentication factors E.Enforcement of content filtering policies F.A review of user account permissions
Conditional access policies AND Implementation of additional authentication factors
11
Which of the following is the best resource to consult for information on the most common application exploitation methods? A.OWASP B.STIX C.OVAL D.Threat intelligence feed E.Common Vulnerabilities and Exposures
OWASP (Open Web Application Security Project)
11
An organization experienced a security breach that allowed an attacker to send fraudulent wire transfers from a hardened PC exclusively to the attacker's bank through remote connections. A security analyst is creating a timeline of events and has found a different PC on the network containing malware. Upon reviewing the command history, the analyst finds the following: PS>.\mimikatz.exe "sekurlsa::pth /user:localadmin /domain:corp-domain.com /ntlm:B4B9B02E1F29A3CF193EAB28C8D617D3F327 Which of the following best describes how the attacker gained access to the hardened PC? A.The attacker created fileless malware that was hosted by the banking platform. B.The attacker performed a pass-the-hash attack using a shared support account. C.The attacker utilized living-off-the-land binaries to evade endpoint detection and response software. D.The attacker socially engineered the accountant into performing bad transfers.
The attacker performed a pass-the-hash attack using a shared support account.
11
Which of the following is a common data removal option for companies that want to wipe sensitive data from hard drives in a repeatable manner but allow the hard drives to be reused? A.Sanitization B.Formatting C.Degaussing D.Defragmentation
Sanitization
11
A security team is addressing a risk associated with the attack surface of the organization's web application over port 443. Currently, no advanced network security capabilities are in place. Which of the following would be best to set up? (Choose two.) A.NIDS B.Honeypot C.Certificate revocation list D.HIPS E.WAF F.SIEM
NIDS (Network Intrusion Detection System) AND WAF (Web Application Firewall)
12
A systems administrator would like to create a point-in-time backup of a virtual machine. Which of the following should the administrator use? A.Replication B.Simulation C.Snapshot D.Containerization
Snapshot