SecurityX Practice Exam #2 (Dion) Flashcards
(91 cards)
An enterprise implements multifactor authentication (MFA) for all employees. A user reports being unable to complete the login process because they do not receive the second factor authentication prompt. What is the most appropriate troubleshooting step?
Reset the user’s account and disable MFA temporarily
Assign the user to a different group with no MFA requirement
Check the configuration of the user’s second-factor device or service
Verify that the user’s primary credentials are correct
Check the configuration of the user’s second-factor device or service
Explanation:
OBJ 3.1: MFA requires both the primary credentials and the second-factor authentication to work properly. If the second factor is not triggered, the issue is likely related to the device or service configuration (e.g., a misconfigured app, outdated device, or incorrect association with the user’s account). Verifying credentials or resetting the account without addressing the second factor will not resolve this specific issue, and bypassing MFA entirely would compromise security. For support or reporting issues, include Question ID: 67513e716a9dc9d16f2d0303 in your ticket. Thank you.
You have been asked to help design a new architecture for Dion Training’s website. The current architecture involves a single server that hosts the website in its entirety. The company’s newest course has been creating a lot of interest on social media. The CIO is concerned that the single server will not be able to handle the increased demand that could result from this increased publicity. What technology should you implement in the new architecture to allow multiple web servers to serve up the courses and meet this expected increase in demand from new students?
Load balancer
VPN concentrator
DLP
RAID
Load balancer
Explanation:
OBJ 2.1: A load balancer allows for high availability and the ability to serve increased demand by splitting the workload across multiple servers. RAID is a high availability technology that allows for multiple hard disks to act logically as one to handle more throughput, but this will not solve the higher demand on the server’s limited processing power as a load balancer would. A VPN concentrator is a networking device that provides the secure creation of VPN connections and the delivery of messages between VPN nodes. A data loss prevention (DLP) system is focused on ensuring that intellectual property theft does not occur. Therefore, a DLP will not help meet the increased demand from new students. For support or reporting issues, include Question ID: 63fe07093b7322449ddbc8e2 in your ticket. Thank you.
Dion Training wants to implement a software-defined network when installing a new enterprise network. The company prefers to use open-source software to reduce the risk of vendor lock-in. Which of the following approaches to implementing a software-defined network should Dion Training utilize?
Peering SDN
Hybrid SDN
Open SDN
SDN Overlay
Open SDN
Explanation:
OBJ 2.5: Open SDN uses open standards and open-source software as a strategy to reduce the risks of vendor lock-in. Hybrid SDN uses a combination of traditional and software-defined networks in the same environment to achieve its objectives. SDN Overlay allows the use of software to create and manage new virtual networks which leverage your existing hardware. All network management and configuration is performed using software and new virtual networking devices are defined within that software. This virtualized overlay moves the data across the existing physical network devices, but that hardware no longer is directly configured or managed by administrators. Peering SDN is not a real type of SDN and is therefore incorrect. For support or reporting issues, include Question ID: 63fe06fe3b7322449ddbc856 in your ticket. Thank you.
After conducting a recent vulnerability assessment, Dion Training has decided that they need to upgrade the security of their authentication system. The current system allowed the use of a simple alphanumeric password of only 8 digits. The team is currently trying to decide between implementing a long, strong, and complex password policy and implementing two-factor authentication. While the two-factor authentication would be more secure, it is also more costly to implement. The Chief Financial Officer prefers using the complex password policy as the solution to save money, but the Chief Security Officer prefers using multi-factor authentication for higher security. They have both created their course of action and will present it to the CEO for final approval and decision. Based on the information provided, which of the following types of analysis is the team at Dion Training performing?
Tradeoff analysis
Business impact analysis
Privacy impact analysis
Gap analysis
Tradeoff analysis
Explanation:
OBJ 1.2: A tradeoff analysis compares potential benefits to potential risks and determines a course of action based on adjusting factors that contribute to each area. A business impact analysis describes the collaborative effort to identify those systems and software that perform essential functions, meaning the organization cannot run without them. A privacy impact assessment is conducted by an organization for it to determine where its privacy data is stored and how that privacy data moves throughout an information system. It evaluates the impacts that may be realized by a compromise to the confidentiality, integrity, and/or availability of the data. A gap analysis measures the difference between the current state and desired state to assess the scope of work included in a project. By measuring ALE, MTTR, MTBF, TCO, and other factors, the organization can identify how closely it is performing to the desired outcomes or requirements. For support or reporting issues, include Question ID: 63fe07fb3b7322449ddbd4b4 in your ticket. Thank you.
An organization adopts a SASE framework to improve security and performance in its deperimeterized environment. Which of the following actions would align with this implementation?
Routing all user traffic through cloud-based security services for monitoring and control
Deploying physical firewalls at all remote locations to enforce security policies
Consolidating sensitive resources into a single data center for easier access control
Using IP-based access lists to manage connections to internal applications
Routing all user traffic through cloud-based security services for monitoring and control
Explanation:
OBJ 2.6 - SASE frameworks route all user traffic through cloud-based security services, such as SWG or CASB, ensuring consistent monitoring and policy enforcement. Physical firewalls and IP-based access lists are insufficient for dynamic, scalable environments. Consolidating resources into a single data center conflicts with the decentralized nature of deperimeterization. For support or reporting issues, include Question ID: 674f72ff25e0bdcbe9af8fa8 in your ticket. Thank yo
William evaluates the potential impact of a confidentiality risk and determines that the disclosure of information contained on a system could have a limited adverse effect on the organization. Using FIPS 199, how should he classify the confidentiality impact?
High
Low
Moderate
Medium
Low
Explanation:
OBJ 1.2: FIPS 199 classifies any risk where “the unauthorized disclosure of information could be expected to have a limited adverse effect” as a low impact confidentiality risk. If there were a serious adverse effect expected, then it would be a moderate impact. If there were a severe or catastrophic adverse effect expected, then it would be a high impact. Medium is not an impact under FIPS 199. This question may seem beyond the scope of the exam. Still, the objectives allow for “other examples of technologies, processes, or tasks about each objective may also be included on the exam although not listed or covered” in the objectives’ bulletized lists. The content examples listed in the objectives are meant to clarify the test objectives and should not be construed as a comprehensive listing of this examination’s content. Therefore, questions like this are fair game on test day. That said, your goal isn’t to score 100% on the exam; it is to pass it. Don’t let questions like this throw you off on test day. If you aren’t sure, take your best guess and move on! For support or reporting issues, include Question ID: 63fe07e83b7322449ddbd3cc in your ticket. Thank you.
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company’s owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
Shredding
Purging
Wiping
Degaussing
Wiping
Explanation:
OBH 4.2: Data wiping or clearing occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media. Data wiping may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse. Degaussing a hard drive involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed. Therefore, it is a bad solution for this scenario. Purging involves removing sensitive data from a hard drive using the device’s internal electronics or an outside source such as a degausser, or by using a cryptographic erase function if the drive supports one. Shredding involves the physical destruction of the hard drive. This is a secure method of destruction but doesn’t allow for device reuse. For support or reporting issues, include Question ID: 63fe07f53b7322449ddbd473 in your ticket. Thank you.
Dion Training has configured a group of web servers that will expand and contract automatically based on the current workloads being experienced by their website. The company has set up maximum capacity settings to help control its costs. Which of the following BEST describes the type of action used to meet user demand?
Horizontal scaling
Autoscaling
Clustering
Vertical scaling
Autoscaling
Explanation:
OBJ 2.1: Autoscaling is the ability to expand and contract the performance of workloads based on policies with specific maximum and minimum capacity specifications. Autoscaling can be used with either horizontal or vertical scaling depending on your cloud service provider. Vertical scaling allows additional resources to be added to an individual system, such as adding processors, memory, and storage to an existing server. Horizontal scaling allows additional capacity to be achieved by adding servers to help process the same workload, such as adding nodes to a distributed system or adding web servers to an existing server farm. Clustering allows multiple redundant processing nodes that share data to accept connections. The cluster appears to be a single server to the clients but provides additional levels of redundancy and resiliency. For support or reporting issues, include Question ID: 63fe06cd3b7322449ddbc5f8 in your ticket. Thank you.
You want to provide controlled remote access to the remote administration interfaces of multiple servers hosted on a private cloud. What type of segmentation security solution is the best choice for this scenario?
Airgap
Physical
Jumpbox
Bastion hosts
Jumpbox
Explanation:
OBJ 2.6: Installing a jumpbox as a single point of entry for the administration of servers within the cloud is the best choice for this requirement. The jumpbox only runs the necessary administrative port and protocol (typically SSH). Administrators connect to the jumpbox then use the jumpbox to connect to the admin interface on the application server. The application server’s admin interface has a single entry in its ACL (the jumpbox) and denies any other hosts’ connection attempts. A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application. For example, a proxy server and all other services are removed or limited to reduce the threat to the computer. An airgap system is a network or single host computer with unique security requirements that may physically be separated from any other network. Physical separation would prevent a system from accessing the remote administration interface directly and require an airgap system to reach the private cloud. For support or reporting issues, include Question ID: 63fe06d23b7322449ddbc635 in your ticket. Thank you.
A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network. The FTP server must be accessible from the Internet. The security team is concerned that the FTP server could be compromised and used to attack the domain controller hosted within the company’s internal network. What is the BEST way to mitigate this risk?
Upgrade the FTP server to an SFTP server since it is more secure
Add a deny rule to the firewall’s ACL that blocks port 21 outbound
Migrate the FTP server from the internal network to a screened subnet
Configure the firewall to utilize an implicit deny statement
Migrate the FTP server from the internal network to a screened subnet
Explanation:
OBJ 2.3: A screened subnet (formerly called a demilitarized zone or DMZ) is a perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic. A screened subnet is placed between the public internet and private networks. Public servers, such as the FTP server, should be installed in a screened subnet so that additional security mitigations like a web application firewall or application-aware firewall can be used to protect them. SFTP (Secure File Transfer Protocol) is a file transfer protocol that leverages a set of utilities that provide secure access to a remote computer to deliver secure communications by leveraging a secure shell (SSH) connection to encrypt the communication between the client and the server. This will prevent an attacker from eavesdropping on the communications between the SFTP server and a client, but it will not prevent an attacker from exploiting the SFTP server itself. An implicit deny is when a user or group is not granted specific permission in the security settings of an object, but they are not explicitly denied either. This is a best practice to enable, but the FTP server would still have some open ports, such as ports 20 and 21, to operate. These ports could then be used by the attacker to connect to the FTP server and exploit it. Adding a deny rule to the firewall’s ACL that blocks port 21 outbound would simply prevent internal network users and servers from accessing external FTP servers. This would in no way prevent the exploitation of the company’s FTP server since it has port 21 open and listening for inbound connections. For support or reporting issues, include Question ID: 63fe070d3b7322449ddbc914 in your ticket. Thank you.
A financial institution needs a highly secure system to manage cryptographic keys for its payment processing operations. The system must comply with strict regulatory requirements for key storage and provide hardware-based tamper resistance. Which technology should the organization implement?
HSM
Secure enclave
TPM
vTPM
HSM
Explanation:
OBJ 3.4: Hardware Security Modules (HSMs) are purpose-built devices for managing cryptographic keys with hardware-based security and compliance capabilities. Trusted Platform Modules (TPMs) are typically embedded in devices and lack the scalability and performance required for enterprise-level key management. Secure enclaves are designed for isolating sensitive computations, not enterprise key management. Virtual Trusted Platform Modules (vTPMs) provide virtualization of TPM functions but do not offer the physical tamper resistance of HSMs. For support or reporting issues, include Question ID: 6751acc297eb9dce4020fc13 in your ticket. Thank you.
Which of the following layers within software-defined networking consists of the physical networking devices, such as switches and routers?
Application layer
Infrastructure layer
Management plane
Control layer
Infrastructure layer
Explanation:
OBJ 2.3: The infrastructure layer contains the physical networking devices that receive information from the control layer about where to move the data and then perform those movements. The application layer focuses on the communication resource requests or information about the network. The control layer uses the information from applications to decide how to route a data packet on the network and to make decisions about how traffic should be prioritized, how it should be secured, and where it should be forwarded to. The management plane is used to monitor traffic conditions, the status of the network, and allows network administrators to oversee the network and gain insight into its operations. For support or reporting issues, include Question ID: 63fe06fd3b7322449ddbc851 in your ticket. Thank you.
A global enterprise uses context-based reauthentication in its Zero Trust architecture. A sales employee attempts to access sensitive customer data while traveling internationally. The system detects the access request coming from an unrecognized IP address and a non-typical time zone for the employee. What is the most appropriate action for the system to take?
Grant access to the requested data without any additional steps
Prompt the user for additional reauthentication steps, such as MFA
Log the event but allow the access to proceed for continuity
Your answer is incorrect
Deny the request and lock the user’s account until further verification
Prompt the user for additional reauthentication steps, such as MFA
Explanation:
OBJ 2.6: Context-based reauthentication dynamically evaluates access requests based on risk factors such as location, time zone, and IP address. Prompting the user for additional reauthentication ensures the legitimacy of the request without causing unnecessary disruptions. Granting access without additional steps fails to mitigate the risk. Denying the request and locking the account is overly restrictive and disrupts the user unnecessarily. Logging the event but allowing access does not align with Zero Trust principles of continuous verification. For support or reporting issues, include Question ID: 675100b223df37e1b5ec6004 in your ticket. Thank you.
NA
Which of the following would an adversary do during the ‘command and control’ phase of the Lockheed Martin kill chain? (SELECT TWO)
Destroy systems
Create a point of presence by adding services, scheduled tasks, or AutoRun keys
Utilize web, DNS, and email protocols to conduct control of the target
Conduct internal reconnaissance of the target network
Open up a two-way communication channel to an established infrastructure
Release of malicious email
Utilize web, DNS, and email protocols to conduct control of the target
Open up a two-way communication channel to an established infrastructure
Explanation:
OBJ 1.4: During the command and control (C2) phase, the adversary is testing that they have control over any implants that have been installed. This can be conducted using the web, DNS, and email protocols to control the target and relies on an established two-way communication infrastructure to control the target system using remote access. Internal reconnaissance or destructive actions occur in the actions on objectives phase. The release of malicious emails occurs in the delivery phase. For support or reporting issues, include Question ID: 63fe07953b7322449ddbcfb3 in your ticket. Thank you.
Which protocol is paired with OAuth2 to provide authentication of users in a federated identity management solution?
SAML
ADFS
OpenID Connect
Kerberos
OpenID Connect
Explanation:
OBJ 2.4: OAuth 2 is explicitly designed to authorize claims and not to authenticate users. The implementation details for fields and attributes within tokens are not defined. Open ID Connect (OIDC) is an authentication protocol that can be implemented as special types of OAuth flows with precisely defined token fields. Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is an XML-based markup language for security assertions. Active Directory Federation Services (ADFS) is a software component developed by Microsoft that can run on Windows Server operating systems to provide users with single sign-on access to systems and applications located across organizational boundaries. Kerberos is a computer network authentication protocol that works based on tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. For support or reporting issues, include Question ID: 63fe07053b7322449ddbc8ab in your ticket. Thank you.
A software assurance laboratory performs a dynamic assessment on an application by automatically generating random data sets and inputting them to cause an error or failure condition. Which of the following is the laboratory performing?
Stress testing
Fuzzing
Security regression testing
User acceptance testing
Fuzzing
Explanation:
OBJ 2.2: Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks. User Acceptance Testing is the process of verifying that a created solution/software works for the user. Security regression testing ensures that changes made to a system do not harm its security, are therefore of high significance, and the interest in such approaches has steadily increased. Stress testing verifies the system’s stability and reliability by measuring its robustness and error handling capabilities under heavy load conditions. For support or reporting issues, include Question ID: 63fe06be3b7322449ddbc53f in your ticket. Thank you.
Which one of the following methods would provide the most current and accurate information about any vulnerabilities present in a system with a misconfigured operating system setting?
Agent-based monitoring
Scheduled vulnerability scanning
On-demand vulnerability scanning
Continuous vulnerability scanning
Agent-based monitoring
Explanation:
OBJ 3.6: An agent-based monitoring solution would be the best choice to meet these requirements. Agent-based monitoring provides more details of the configuration settings for a system and can provide an internal perspective. While vulnerability scans can give you a snapshot of a system’s status at a certain time, they will not remain current and accurate without continual rescanning. For support or reporting issues, include Question ID: 63fe077f3b7322449ddbce9e in your ticket. Thank you.
An organization implements subject access control to restrict access to resources based on user roles. A user reports they cannot access a specific application necessary for their job, even though they have the correct role assigned. Which of the following is the most likely cause?
The user has not completed the multifactor authentication process
The organization uses DAC instead of RBAC
The user’s device is not compliant with corporate security policies and needs to be replaced
The application permissions are not properly mapped to the assigned role
The application permissions are not properly mapped to the assigned role
Explanation:
OBJ 3.1: In a role-based access control (RBAC) system, access is granted based on roles, and if the application permissions are not mapped to the correct role, the user will be unable to access it. MFA completion is unrelated to role-based permissions. Device compliance would block access at a policy level, not due to role misconfiguration. Discretionary access control (DAC) may cause inconsistencies but does not explain the issue within a role-based access control (RBAC) system. For support or reporting issues, include Question ID: 67513b7aeb96f8a01c17535f in your ticket. Thank you.
After an employee complains that her computer is running abnormally slow, so you conduct an analysis of the NetFlow data from her workstation. Based on the NetFlow data, you identify a significant amount of traffic from her computer to an IP address in a foreign country over port 6667 (IRC). Which of the following is the most likely explanation for this?
Malware has been installed on her computer and is using the IRC protocol to communicate
The computer has likely been compromised by an APT
This is routine machine-to-machine communications in a corporate network
The employee is using IRC to communicate with her friends and family overseas
Malware has been installed on her computer and is using the IRC protocol to communicate
Explanation:
OBJ 4.1: Internet Relay Chat (IRC) used to be extremely popular but was replaced by modern chat applications like Facebook Messenger, Google Hangouts, Slack, and numerous others. These days, IRC traffic is infrequent on most corporate networks. Therefore, this would be classified as suspicious and require additional investigation. The unencrypted nature of the protocol makes it easy to intercept and read communications on this port. Still, even so, many types of malware use IRC as a communication channel. Due to this cleartext transmission, an APT would avoid using IRC for their C2 channel to blend in with regular network traffic and avoid detection. IRC is not normally used for machine-to-machine communications in corporate networks. Because the scenario mentioned a connection to a foreign country, as part of your investigation, you should ask the employee if they have friends or family overseas in the country to rule out the possibility that this is acceptable traffic. For support or reporting issues, include Question ID: 63fe07443b7322449ddbcbba in your ticket. Thank you.
In the context of identity and access management (IAM), what is the primary purpose of logging and monitoring user authentication events?
To enable single sign-on (SSO) across multiple enterprise applications
To enforce password complexity requirements across the organization
To automate the revocation of expired user credentials across the network
To detect unauthorized access attempts and support forensic investigations
To detect unauthorized access attempts and support forensic investigations
Explanation:
OBJ 3.1 - Logging and monitoring authentication events provide visibility into user access activities, enabling the detection of unauthorized attempts and serving as a critical resource for forensic investigations following security incidents. While password complexity, SSO, and credential revocation are important IAM tasks, they are not the primary focus of logging and monitoring. For support or reporting issues, include Question ID: 675063a0f5372d1adb3df726 in your ticket. Thank you.
Which of the following is exploited by an SQL injection to give the attacker access to a database?
Database server
Web application
Firewall
Operating system
Web application
Explanation:
OBJ 4.2: SQL injections target the data stored in enterprise databases by exploiting flaws in client-facing applications. These vulnerabilities being exploited are most often found in web applications. The database server or operating system would normally be exploited by a remote code execution, a buffer overflow, or another type of server-side attack. The firewall would not be subject to an SQL injection. For support or reporting issues, include Question ID: 63fe07363b7322449ddbcb10 in your ticket. Thank you.
A user has called complaining that they have been locked out of their corporate account after attempting to log in while connected to a VPN that they often use. Upon investigation, the security team finds that the user successfully logged in from their home IP address earlier in the day and then attempted another login from an IP address associated with the VPN shortly after. Which of the following actions should the IT team take to resolve the issue while maintaining security?
Allow the user to retry the login attempt without geographical restrictions once their identity has been verified
Modify the IAM policies to disable geographic location checks for all users
Verify the user’s identity and review the impossible travel settings to fine-tune thresholds
Temporarily suspend the user’s account to prevent further suspicious activity from occurring
Verify the user’s identity and review the impossible travel settings to fine-tune thresholds
Explanation:
OBJ 3.1: The “impossible travel” feature in IAM systems detects logins from geographically distant locations within an unrealistic time frame, indicating either a security risk or a false positive caused by VPN use. To resolve the issue, the IT team should verify the user’s identity to confirm the login attempt was legitimate, then fine-tune the “impossible travel” thresholds to account for cases where VPNs may trigger false positives. Temporarily suspending the account would further cause unnecessary accessibility issues for the user. Disabling geographic checks would weaken security and bypassing geographic restrictions could expose the system to real threats. For support or reporting issues, include Question ID: 6751479aee759eace74d72e1 in your ticket. Thank you.
Which of the following will an adversary do during the final phase of the Lockheed Martin kill chain? (SELECT FOUR)
Lateral movement through the environment
Wait for a user to click on a malicious link
Exfiltrate data
Modify data
Release of malicious email
Privilege escalation
Lateral movement through the environment
Exfiltrate data
Modify data
Privilege escalation
Explanation:
OBJ 1.4: The last phase is the actions on objectives phase. During this phase, the targeted network is now adequately controlled by the attacker. If the system or network owner does not detect the attacker, the adversary may persist for months while gaining progressively deeper footholds into the network. This is done through privilege escalation and lateral movement. Additionally, the attacker can now exfiltrate data from the network or modify data that will remain in the network. Waiting for a user to click on a malicious link occurs during the exploitation phase. Releasing a malicious email would occur during the delivery phase. For support or reporting issues, include Question ID: 63fe07923b7322449ddbcf8b in your ticket. Thank you.