Study Guide 301-400 Flashcards
(100 cards)
A security officer is implementing a security awareness program and has placed security-themed posters around the building and assigned online user training. Which of the following will the security officer most likely implement?
A. Password policy B. Access badges C. Phishing campaign D. Risk assessment
C. Phishing campaign
A malicious update was distributed to a common software platform and disabled services at many organizations. Which of the following best describes this type of vulnerability?
A. DDoS attack B. Rogue employee C. Insider threat D. Supply chain
D. Supply chain
A company web server is initiating outbound traffic to a low-reputation, public IP on non-standard pat. The web server is used to present an unauthenticated page to clients who upload images the company. An analyst notices a suspicious process running on the server hat was not created by the company development team. Which of the following is the most likely explanation for his security incident?
A. A web shell has been deployed to the server through the page. B. A vulnerability has been exploited to deploy a worm to the server. C. Malicious insiders are using the server to mine cryptocurrency. D. Attackers have deployed a rootkit Trojan to the server over an exposed RDP port.
A. A web shell has been deployed to the server through the page
An organization requests a third-party full-spectrum analysis of its supply chain. Which of the following would the analysis team use to meet this requirement?
A. Vulnerability scanner B. Penetration test C. SCAP D. Illumination tool
D. Illumination tool
A systems administrator deployed a monitoring solution that does not require installation on the endpoints that the solution is monitoring. Which of the following is described in this scenario?
A. Agentless solution B. Client-based soon C. Open port D. File-based solution
A. Agentless solution
A security analyst is reviewing the source code of an application in order to identify misconfigurations and vulnerabilities. Which of the following kinds of analysis best describes this review?
A. Dynamic B. Static C. Gap D. Impact
B. Static
Which of the following agreement types is used to limit external discussions?
A. BPA B. NDA C. SLA D. MSA
B. NDA
A security analyst is evaluating a SaaS application that the human resources department would like to implement. The analyst requests a SOC 2 report from the SaaS vendor. Which of the following processes is the analyst most likely conducting?
A. Internal audit B. Penetration testing C. Attestation D. Due diligence
D. Due diligence
Which of the following is used to conceal credit card information in a database log file?
A. Tokenization B. Masking C. Hashing D. Obfuscation
B. Masking
A systems administrator is configuring a site-to-site VPN between two branch offices. Some of the settings have already been configured correctly. The systems administrator has been provided the following requirements as part of completing the configuration:
- Most secure algorithms should be selected
- All traffic should be encrypted over the VPN
- A secret password will be used to authenticate the two VPN concentrators
Click on the two VPN Concentrators to configure the appropriate settings.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Refer to picture
Refer to picture
An organization recently started hosting a new service that customers access through a web portal. A security engineer needs to add to the existing security devices a new solution to protect this new service. Which of the following is the engineer most likely to deploy?
A. Layer 4 firewall B. NGFW C. WAF D. UTM
C. WAF
Which of the following topics would most likely be included within an organization’s SDLC?
A. Service-level agreements B. Information security policy C. Penetration testing methodology D. Branch protection requirements
D. Branch protection requirements
Which of the following control types is AUP an example of?
A. Physical B. Managerial C. Technical D. Operational
B. Managerial
An organization is adopting cloud services at a rapid pace and now has multiple SaaS applications in use. Each application has a separate log-in, so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first step the security team should take?
A. Enable SAML. B. Create OAuth tokens. C. Use password vaulting. D. Select an IdP.
D. Select an IdP
A company’s online shopping website became unusable shortly after midnight on January 30, 2023. When a security analyst reviewed the database server, the analyst noticed the following code used for backing up data:
IF DATE() = “01/30/2023” THEN BEGIN DROP DATABASE WebShopOnline; END
Which of the following should the analyst do next?
A. Check for recently terminated DBAs. B. Review WAF logs for evidence of command injection. C. Scan the database server for malware. D. Search the web server for ransomware notes.
A. Check for recently terminated DBAs
Which of the following would be the best way to test resiliency in the event of a primary power failure?
A. Parallel processing B. Tabletop exercise C. Simulation testing D. Production failover
D. Production failover
Which of the following would be the most appropriate way to protect data in transit?
A. SHA-256 B. SSL3.0 C. TLS 1.3 D. AES-256
C. TLS 1.3
Which of the following is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?
A. Open-source intelligence B. Port scanning C. Pivoting D. Exploit validation
A. Open-source intelligence
Which of the following threat actors is the most likely to seek financial gain through the use of ransomware attacks?
A. Organized crime B. Insider threat C. Nation-state D. Hacktivists
A. Organized crime
Which of the following would a systems administrator follow when upgrading the firmware of an organization’s router?
A. Software development life cycle B. Risk tolerance C. Certificate signing request D. Maintenance window
D. Maintenance window
The security team has been asked to only enable host A (10.2.2.7) and host B (10.3.9.9) to the new isolated network segment (10.9.8.14) that provides access to legacy devices.
Access from all other hosts should be blocked. Which of the following entries would need to be added on the firewall?
A.Permit 10.2.2.2.0/24 to 10.9.8.14/27 Permit 10.3.9.0/24 to 10.9.8.14/27 Deny 0.0.0.0/0 to 10.9.8.14/27 B.Deny 0.0.0.0/0 to 10.9.8.14/27 Permit 10.2.2.0/24 to 10.9.8.14/27 Permit 10.3.9.0/24 to 10.9.8.14/27 C.Permit 10.2.2.7/32 to 10.9.8.14/27 Permit 10.3.9.9/32 to 10.9.8.14/27 Deny 0.0.0.0/0 to 10.9.8.14/27
D. Permit 10.2.2.7/32 to 10.9.8.14/27
Permit 10.3.9.0/24 to 10.9.8.14/27
Deny 10.9.8.14/27 to 0.0.0.0/0
C.Permit 10.2.2.7/32 to 10.9.8.14/27
Permit 10.3.9.9/32 to 10.9.8.14/27
Deny 0.0.0.0/0 to 10.9.8.14/27
A security analyst is creating the first draft of a network diagram for the company’s new customer-facing payment application that will be hosted by a third-party cloud service provider.
Click the ? to select the appropriate icons to create a secure, redundant web application. Then use the dropdown menu to select the appropriate subnet type. Every space in the diagram must be filled.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Refer to picture
A systems administrator needs to ensure the secure communication of sensitive data within the organization’s private cloud. Which of the following is the best choice for the administrator to implement?
A. IPSec B. SHA-1 C. RSA D. TGT
A. IPSec
Which of the following should an internal auditor check for first when conducting an audit of the organization’s risk management program?
A. Policies and procedures B. Asset management C. Vulnerability assessment D. Business impact analysis
A. Policies and procedures