Q 401-601 Flashcards
(103 cards)
The private key for a website was stolen, and a new certificate has been issued. Which of the following needs to be updated next?
A.SCEP
B.CRL
C.OCSP
D.CSR
CRL(Certificate Revocation List)
An organization’s web servers host an online ordering system. The organization discovers that the servers are vulnerable to a malicious JavaScript injection, which could allow attackers to access customer payment information. Which of the following mitigation strategies would be most effective for preventing an attack on the organization’s web servers? (Choose two.)
A.Regularly updating server software and patches
B.Implementing strong password policies
C.Encrypting sensitive data at rest and in transit
D.Utilizing a web-application firewall
E.Performing regular vulnerability scans
F.Removing payment information from the servers
Regularly updating server software and patches AND Utilizing a web-application firewall
A group of developers has a shared backup account to access the source code repository. Which of the following is best way to secure the backup account if there is an SSO failure?
A.RAS
B.EAP
C.SAML
D.PAM
PAM(Privileged access management)
A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline. Which of the following should the analyst use?
A.Intrusion prevention system
B.Sandbox
C.Endpoint detection and response
D.Antivirus
Endpoint detection and response
A security architect wants to prevent employees from receiving malicious attachments by email. Which of the following functions should the chosen solution do?
A.Apply IP address reputation data.
B.Tap and monitor the email feed.
C.Scan email traffic inline.
D.Check SPF records.
Scan email traffic inline.
Which of the following can be used to compromise a system that is running an RTOS?
A.Cross-site scripting
B.Memory injection
C.Replay attack
D.Ransomware
Memory injection
Which of the following threat actors would most likely deface the website of a high-profile music group?
A.Unskilled attacker
B.Organized crime
C.Nation-state
D.Insider threat
Unskilled attacker
Which of the following is the main consideration when a legacy system that is a critical part of a company’s infrastructure cannot be replaced?
A.Resource provisioning
B.Cost
C.Single point of failure
D.Complexity
Single point of failure
An organization is implementing a COPE mobile device management policy. Which of the following should the organization include in the COPE policy? (Choose two.)
A.Remote wiping of the device
B.Data encryption
C.Requiring passwords with eight characters
D.Data usage caps
E.Employee data ownership
F.Personal application store access
Remote wiping of the device AND Data Encryption
Which of the following should a security team do first before a new web server goes live?
A.Harden the virtual host.
B.Create WAF rules.
C.Enable network intrusion detection.
D.Apply patch management.
Harden the virtual host.
A company discovered its data was advertised for sale on the dark web. During the initial investigation, the company determined the data was proprietary data. Which of the following is the next step the company should take?
A.Identify the attacker’s entry methods.
B.Report the breach to the local authorities.
C.Notify the applicable parties of the breach.
D.Implement vulnerability scanning of the company’s systems.
Report the breach to the local authorities.
Which of the following techniques can be used to sanitize the data contained on a hard drive while allowing for the hard drive to be repurposed?
A.Degaussing
B.Drive shredder
C.Retention platform
D.Wipe tool
Wipe tool
A systems administrator discovers a system that is no longer receiving support from the vendor. However, this system and its environment are critical to running the business, cannot be modified, and must stay online. Which of the following risk treatments is the most appropriate in this situation?
A.Reject
B.Accept
C.Transfer
D.Avoid
Transfer
An organization wants to implement a secure solution for remote users. The users handle sensitive PHI on a regular basis and need to access an internally developed corporate application. Which of the following best meet the organization’s security requirements? (Choose two.)
A.Local administrative password
B.Perimeter network
C.Jump server
D.WAF
E.MFA
F.VPN
MFA And VPN
Which of the following best describe the benefits of a microservices architecture when compared to a monolithic architecture? (Choose two.)
A.Easier debugging of the system
B.Reduced cost of ownership of the system
C.Improved scalability of the system
D.Increased compartmentalization of the system
E.Stronger authentication of the system
F.Reduced complexity of the system
Improved scalability of the system AND Increased compartmentalization of the system
A company is in the process of migrating to cloud-based services. The company’s IT department has limited resources for migration and ongoing support. Which of the following best meets the company’s needs?
A.IPS
B.WAF
C.SASE
D.IAM
SASE
Which of the following types of vulnerabilities is primarily caused by improper use and management of cryptographic certificates?
A.Misconfiguration
B.Resource reuse
C.Insecure key storage
D.Weak cipher suites
Insecure key storage
Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device’s drive if the device is lost?
A.TPM
B.ECC
C.FDE
D.HSM
FDE
A user’s workstation becomes unresponsive and displays a ransom note demanding payment to decrypt files. Before the attack, the user opened a resume they received in a message, browsed the company’s website, and installed OS updates. Which of the following is the most likely vector of this attack?
A.Spear-phishing attachment
B.Watering hole
C.Infected website
D.Typosquatting
Watering Hole
Which of the following is the primary reason why false negatives on a vulnerability scan should be a concern?
A.The system has vulnerabilities that are not being detected.
B.The time to remediate vulnerabilities that do not exist is excessive.
C.Vulnerabilities with a lower severity will be prioritized over critical vulnerabilities.
D.The system has vulnerabilities, and a patch has not yet been released.
The system has vulnerabilities that are not being detected.
A company is concerned about theft of client data from decommissioned laptops. Which of the following is the most cost-effective method to decrease this risk?
A.Wiping
B.Recycling
C.Shredding
D.Deletion
Shredding
A company that has a large IT operation is looking to better control, standardize, and lower the time required to build new servers. Which of the following architectures will best achieve the company’s objectives?
A.IoT
B.IaC
C.IaaS
D.ICS
IaC
Which of the following would a security administrator use to comply with a secure baseline during a patch update?
A.Information security policy
B.Service-level expectations
C.Standard operating procedure
D.Test result report
Standard operating procedure
Which of the following options will provide the lowest RTO and RPO for a database?
A.Snapshots
B.On-site backups
C.Journaling
D.Hot site
Journaling