Test Questions Flashcards
A governmental agency is storing information for a new project on a fileshare. The system has been classified as critical to the project. How should this project data be classified? (Select TWO)
� Private
� Confidential
� Public
� Unrestricted
� Restricted
Confidential
Restricted
A perimeter firewall is set up to block suspicious connections. The system administrator notices a suspicious connection between internal hosts. Which of the following should be used to prevent this communication?
� Host-based firewall
� Cloud Access Security Broker
� Access control list
� Application allow list
Host Based Firewall - installed on individual computers or hosts and can be used to control traffic between internal hosts
A technician has been tasked with applying a firmware update. Which of the following is being affected?
� Application
� BIOS
� Dump file
� Windows 10
BIOS.
Which of the following exercises should an organization use to thoroughly review a new incidence response procedure?
� Tabletop
� High availability
� Failover
� Simulation
Tabletop exercises involve discussing and analyzing hypothetical scenarios, allowing teams to walk through the incident response procedure step by step, identify gaps, and ensure that all stakeholders understand their roles and responsibilities
A system administrator is setting up authentication for a new SaaS application and would like to reduce the overhead burden for authentication of each user between Active Directory and the cloud application. The company has decided to use Active Directory credentials for the application. Which of the following methods would meet this requirement?
� SSO
� 802.1x
� EAP-TTLS
� EAP-FAST
SSO allows users to log in once and access multiple applications without re-entering credentials, meeting the requirement of reducing authentication overhead between Active Directory and the SaaS application.
A company is planning a disaster recovery site and needs to ensure any environmental disaster does not result in complete loss of data. Which of the following should be implemented?
� Warm site
� Clustering
� Hot site
� Geographic dispersion
Geographic dispersion involves the set up of data centers or disaster recovery sites in different geographical regions, thereby reducing the risk of data loss due to environmental disasters in any single location.
A network technician is going to upgrade the mail server to a newer version of software. Which of the following steps should be completed first?
� Perform a firmware upgrade.
� Submit a change control request.
� Remove the mail server from the network.
� Ensure the current mail server is fully patched.
Submitting a change control request is an important step in a controlled IT environment. The change control request outlines the changes being made.
A suspicious caller rang the Human Resources Manager and requested her credit card information to pay a bill. This is MOST LIKELY an example of which of the following attacks?
� Phishing
� Social engineering
� Impersonation
� Whaling
Social engineering
A network engineer placed a firewall in front of a legacy critical system. Which of the following best describes the action that the engineer carried out?
� Compensating controls
� Segmentation
� Risk transfer
� Risk tolerance
Compensating controls are security measures put in place to mitigate risks when the primary control is not feasible or effective.
A military unit is leaving a location in the middle east and has hired a Department of Defense contractor to dispose of the data on classified systems and paper classified waste. Which of the following will the contractor provide to the military unit?
� Asset Register
� Certificate
� Inventory List
� Method of destruction
When sensitive or classified data and materials are disposed of, a Certificate of Destruction is often issued as proof that the data or materials have been properly and securely destroyed.
Which of the following automation use cases would benefit the company’s security posture by updating security permissions immediately after an employee leaves the organization?
� Disabling access.
� Implementing least privilege.
� Change Advisory Board
� Escalating permission requests
Disabling access promptly upon an employee’s departure enhances security by helping to prevent unauthorized access to company resources and data.
Which of the following is a vulnerability that could affect a router or a printer?
� Firmware version
� Buffer overflow
� SQL injection
� Integer overflow
The firmware version of a device can contain security vulnerabilities. Manufacturers often release updates to patch these vulnerabilities and improve device security.
A security administrator finds files with a file extension of .ryk on three of their systems during an attack. Which of the following types of malware has infected the systems?
� Polymorphic Virus
� Backdoor
� Ransomware
� Remote Access Trojan (RAT)
Ransomware is when malware is used to encrypt files and then a ransom is demanded for decryption. The presence of a .ryk extension is an application called RYUK ransomware
A Cloud Service Provider based in Texas is considering expanding its operations internationally to include major European businesses. Which of the following should the hosting provider consider first prior to this expansion? (Choose TWO)
� General Data Protection Regulations
� Threats from Nation States
� Local data protection regulations
� CCPA
Local Data Protection Regulations
GDPR - General Data Protection Requlations
During a security inspection, an employee was found to have installed a computer game on his company desktop. This could have been more serious had it been malware. What can the security team do to stop incidents like this?
� Windows defender firewall
� Least privilege
� Application block list
� Application allow list
Application Allow List - Ensures that only approved and trusted software can run on company desktops, thereby effectively preventing the installation and execution of unauthorized software or malware.
Which of the following topics should the cybersecurity administrator include in their upcoming presentation in the annual security awareness program? (Choose TWO)
� How to recognize and report a phishing attack
� Detecting insider threats using anomalous behavior recognition.
� Confirming information on a word document.
� Reporting suspicious activities
How to recognize and report a phishing attack
Reporting suspicious activities
A cybersecurity administrator is creating a way to present a monthly report of data collected in the IT infrastructure to the board of directors. Which of the following should the systems administrator use?
� Excel spreadsheet
� Dashboard
� Metadata
� PowerPoint presentation
Dashboards
A user attended a presentation based on how to identify and report a phishing attack. To which of the following categories does this presentation belong?
� Annual risk training
� Security awareness training
� Compliance training
� Communication skills training
Security Awareness Training
The chief executive officer of an organization has decided to use a third party to complete a penetration test to measure the organization’s security. Which of the following needs to be carried out before the penetration tester can begin their work?
� Sign a contract
� Right to audit clause
� Rules of engagement
� Obtain a network diagram
Rules of Engagement - This document outlines the scope of the test, what systems can be tested, the testing methodologies, the schedule, and any limitations or restrictions imposed by the organization
You are a change manager overseeing a critical system upgrade. What key component of change management provides comprehensive and detailed instructions for routine operations, contributing to consistent and secure execution during the change process?
� Operational guidelines
� A procedural framework
� A standard operating procedure
� An operational manual
A standard operating procedure is an essential element of change management that comprises comprehensive and detailed instructions for routine operations, ensuring consistent and secure execution during the change process.
The cybersecurity team has been tasked with finding the root cause of a recent security incident. Why is this important?
� To see how the incident was dealt with.
� To prevent it from happening again.
� To gather Indicators of Compromise
� To update threat feeds.
To prevent it from happening again.
A cybersecurity administrator found a honey file on the corporate database server. To determine who created the honeyfile, the last access date, and any changes made to the honey file which of the following actions should be carried out?
� Check the files hash.
� Use hexdump on the file’s contents.
� Check endpoint logs.
� Check the metadata.
Check the metadata. Examining the metadata associated with the file can provide information about its creation, last access, and changes made
After a test showed that a form on a website can be overwhelmed and possibly hacked due to too much data, which security method should an analyst suggest the coder use to stop this from happening?
� Secure cookies
� Input validation
� Stored procedure
� Code signing
Input Validation - Ensures that data entered into form fields adheres to specified criteria, preventing malicious input that could lead to buffer overflow vulnerabilities.
Which of the following are you protecting using a L2TP/IPSec VPN?
� Data at rest
� Data in transit
� Data in use
� Data sovereignty
Data in Transit