Questions 1 Flashcards

(30 cards)

1
Q

Which of the following methods would be most effective in ensuring that only authorized personnel an access a secure facility? (select two)

a. fencing
b. video surveillance
c. badge access
d. access control vestibule
e. sign-in sheet
f. sensor

A

c. badge access
d. access control vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which agreement type defines the time frame within which a vendor must respond?

a. statement of work (SOW)
b. Service level agreement (SLA)
c. memorandum of agreement (MOA)
d. memorandum of understanding (MOU)

A

B. Service level agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A U.S. - based cloud-hosting provider plans to expand its data centers internationally. what should they prioritize first?

a. local data protection regulations
b. risks from hackers in other countries
c. impacts on existing contractual obligations
d. time zone differences for log correlation

A

a. local data protection regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A client requires at least 99.99% uptime from a service provider’s hosted security services. which document should include this info?

a. memorandum of agreement (MOA)
b. statement of work (SOW)
c. memorandum of understanding (MOU)
d. service level agreement (SLA)

A

d. service level agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A small business uses kiosks on the sales floor that display product info, but they are running end-of-life operating systems. what is the most likely security implication?

a. patch availability
b. product software compatibility
c. ease of recovery
d. cost of replacement

A

a. patch availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which security principle justifies the use of the least privilege for permissions on a Human Resources file share?

a. integrity
b. availability
c. confidentiality
d. non-repudiation

A

c. confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a company is planning a disaster recovery site and needs to ensure that a single natural disaster will not result in the total loss of regulated backup data. what should the company prioritize?

a. geographic dispersion
b. platform diversity
c. hot site
d. load balancing

A

a. geographic dispersion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which threat actor is most likely to be hired by a foreign government to attack critical systems in other countries?

a. hacktivist
b. whistleblower
c. organized crime
d. unskilled attacker

A

c. organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a company located in a hurricane-prone area needs a disaster recovery site to ensure immediate operational continuity. which site type is best?

a. cold site
b. tertiary site
c. warm site
d. hot site

A

d. hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

malware spread across a company’s network after an employee visited a compromised industry blog? what best describe this type of attack?

a. impersonation
b. disinformation
c. watering-hole
d. smishing

A

c. watering hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An engineer needs to implement a solution that adds an extra layer of security to prevent unauthorized access to internal company systems. which of the following would be the most appropriate solution?

a. RDP server
b. Jump server
c. Proxy server
d. Hypervisor

A

b. jump server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which category of data is most vulnerable when lost or compromised?

a. confidential
b. public
c. private
d. critical

A

d. critical (restricted?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a company is planning to implement a SIEM system and assign an analyst to review logs on a weekly basis. what type of control is being implemented by the company?

a. corrective
b. preventative
c. detective
d. deterrent

A

c. detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security analyst is reviewing an alert triggered by endpoint protection software. after investigation, the analyst determines the event was a false positive caused by an employee trying to download a file. what is the most likely cause for the download being blocked?

a. a misconfiguration in the endpoint protection software
b. a zero-day vulnerability in the file
c. a supply chain attack on the endpoint protection vendor
d. incorrect file permissions

A

a. a misconfiguration in the endpoint protection software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A systems administrator needs to apply a change to a production system. Which of the following documents must the administrator submit to prove that the system can be restored if a performance issues arises?

a. blackout plan
b. impact analysis
c. test procedure
d. approval procedure

A

a. blackout plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the most common method by which data is lost in an air-gapped network?

a. bastion host
b. unsecured bluetooth
c. unpatched OS
d. removable devices

A

d. removable devices

17
Q

An organization wants to hire a third-party vendor to perform a penetration test on a specific device. the organization has provided basic details about the device. what kind of penetration test is this?

a. partially known environment
b. unknown environment
c. integrated
d. known environment

A

a. partially known environment

18
Q

A security analyst scans a company’s public-facing network and discovers that a host is running a Remote Desktop service that could allow access to the production network. which of the following actions should the analyst recommend?

a. changing the Remote Desktop port to a non-standard number
b. setting up a VPN and placing the jump server inside the firewall
c. using a proxy for web connections from the Remote Desktop server
d. connecting the remote server to the domain and increasing the password length

A

b. setting up a VPN and placing the jump server inside the firewall

19
Q

Employees working in the research and development department receive in-depth training on how to protect company data. which type of data is most likely to be handled by these employees in their daily work?

a. encrypted
b. intellectual property
c. critical
d. data privacy

A

b. intellectual property

20
Q

A system administrator is configuring a firewall to allow DNS requests. which port number should be allowed for this traffic?

a. 21
b. 25
c. 53
d. 80

21
Q

A company has been facing attacks targeting vulnerabilities in outdated browser versions, using well-known exploits. which security solution should be set up to effectively monitor and block these attacks based on recognized signatures?

a. ACL
b. DLP
c. IDS
d. IPS

22
Q

Which security concept is implemented when a RADIUS server is installed?

a. CIA
b. AAA
c. ACL
d. PEM

23
Q

During troubleshooting of a firewall configuration, a technician determines that adding a ‘deny any’ rule at the bottom of the ACL will be necessary. After updating the policy, several servers become inaccessible. Which of the following actions can prevent this issue from occurring?

a. documenting the new policy in a change request and submitting the request to change management
b. testing the policy in a non-production environment before enabling the policy in the production network
c. disabling any intrusion prevention signatures on the ‘deny any’ policy prior to enabling the new policy
d. including an ‘allow any’ policy above the ‘deny any’ policy

A

b. testing the policy in a non-production environment before enabling the policy in the production network

24
Q

Which term refers to the max level of risk that an organization is willing to accept?

a. risk indicator
b. risk level
c. risk score
d. risk threshold

A

d. risk threshold

25
what is the most reliable method for daily checking whether the security settings on servers have been altered? a. automation b. compliance checklist c. attestation d. manual audit
a. automation
26
The CIRT is investigating an incident where a Human Resources recruiter stole sensitive company data. The recruiter used HTTP over port 53 to upload documents to a web server. Which security device could have detected and blocked this action? a. WAF utilizing SSL decryption b. NGFW utilizing application inspection c. UTM utilizing a threat feed d. SD-WAN utilizing IPSec
b. NGFW utilizing application inspection
27
After completing a security awareness session, a user contacted the IT help desk to report a suspicious phone call. The caller claimed to be the CFO requesting credit card information to close an invoice. What type of security threat does this situation represent? a. insider threat b. email phishing c. social engineering d. executive whaling
c. social engineering
28
A company is planning to implement a SIEM system and assign an analyst to review the logs weekly. Which type of control is the company setting up? a. corrective b. preventative c. detective d. deterrent
c. detective
29
A technician is configuring firewall ports for a new system being provided by a SaaS vendor. What risk is associated with this new system? a. default credentials b. non-segmented network c. supply chain vendor d. vulnerable software
c. supply chain vendor
30