wk2-78-154 Flashcards
(37 cards)
78)Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?
A.
Preparation
B.
Recovery
C.
Lessons learned
D.
Analysis
C.
Lessons learned
79)After a recent vulnerability scan, a security engineer needs to harden the routers within the corporate network. Which of the following is the most appropriate to disable?
A.
Console access
B.
Routing protocols
C.
VLANs
D.
Web-based administration
D.
Web-based administration
82)A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Choose two.)
A.
Key escrow
B.
TPM presence
C.
Digital signatures
D.
Data tokenization
E.
Public key management
F.
Certificate authority linking
A.
Key escrow
B.
TPM presence
83)A security analyst scans a company’s public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?
A.
Changing the remote desktop port to a non-standard number
B.
Setting up a VPN and placing the jump server inside the firewall
C.
Using a proxy for web connections from the remote desktop server
D.
Connecting the remote server to the domain and increasing the password length
B.
Setting up a VPN and placing the jump server inside the firewall
84)An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?
A.
ACL
B.
DLP
C.
IDS
D.
IPS
D.
IPS
85)Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?
A.
Remote access points should fail closed.
B.
Logging controls should fail open.
C.
Safety controls should fail open.
D.
Logical security controls should fail closed
C.
Safety controls should fail open
86)Which of the following would be best suited for constantly changing environments?
A.
RTOS
B.
Containers
C.
Embedded systems
D.
SCADA
B.
Containers
87)Which of the following incident response activities ensures evidence is properly handled?
A.
E-discovery
B.
Chain of custody
C.
Legal hold
D.
Preservation
B.
Chain of custody
88)An accounting clerk sent money to an attacker’s bank account after receiving fraudulent instructions to use a new account. Which of the following would most likely prevent this activity in the future?
A.
Standardizing security incident reporting
B.
Executing regular phishing campaigns
C.
Implementing insider threat detection measures
D.
Updating processes for sending wire transfers
D.
Updating processes for sending wire transfers
89)A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?
A.
Off-the-shelf software
B.
Orchestration
C.
Baseline
D.
Policy enforcement
B.
Orchestration
90)A company’s marketing department collects, modifies, and stores sensitive customer data. The infrastructure team is responsible for securing the data while in transit and at rest. Which of the following data roles describes the customer?
A.
Processor
B.
Custodian
C.
Subject
D.
Owner
C.
Subject
91)Which of the following describes the maximum allowance of accepted risk?
A.
Risk indicator
B.
Risk level
C.
Risk score
D.
Risk threshold
D.
Risk threshold
92)A security analyst receives alerts about an internal system sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Which of the following is most likely occurring?
A.
A worm is propagating across the network.
B.
Data is being exfiltrated.
C.
A logic bomb is deleting data.
D.
Ransomware is encrypting files.
B.
Data is being exfiltrated
93)A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?
A.
Default credentials
B.
Non-segmented network
C.
Supply chain vendor
D.
Vulnerable software
D.
Vulnerable software
94)A systems administrator is working on a solution with the following requirements:Provide a secure zone.Enforce a company-wide access control policy.*Reduce the scope of threats.Which of the following is the systems administrator setting up?
A.
Zero Trust
B.
AAA
C.
Non-repudiation
D.
CIA
A.
Zero Trust
95)Which of the following involves an attempt to take advantage of database misconfigurations?
A.
Buffer overflow
B.
SQL injection
C.
VM escape
D.
Memory injection
B.
SQL injection
96)Which of the following is used to validate a certificate when it is presented to a user?
A.
OCSP
B.
CSR
C.
CA
D.
CRC
A.
OCSP
97)One of a company’s vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?
A.
Virtualization
B.
Firmware
C.
Application
D.
Operating system
B.
Firmware
98)Which of the following is used to quantitatively measure the criticality of a vulnerability?
A.
CVE
B.
CVSS
C.
CIA
D.
CERT
B.
CVSS
99)Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?
A.
Configure all systems to log scheduled tasks.
B.
Collect and monitor all traffic exiting the network.
C.
Block traffic based on known malicious signatures.
D.
Install endpoint management software on all systems
D.
Install endpoint management software on all syst
100)An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?
A.
Data in use
B.
Data in transit
C.
Geographic restrictions
D.
Data sovereignty
B.
Data in transit
101) Which biometric error would allow an unauthorized user to access a system?
A.False acceptance
B.False entrance
C.False rejection
D.False denial
A.False acceptance
False Acceptance - There are only two metrics that are used to determine the performance of biometrics: FAR (False Acceptance Rate) & FRR (False Rejection Rate). False Acceptance Rate is a metric for biometric performance that determines the number of instances where unauthorized persons were incorrectly authorized. For this question, a biometric error would mean that someone was authorized when they weren’t supposed to be authorized.
102) A company is auditing the manner in which its European customers’ personal information is handled. Which of the following should the company consult?
A.GDPR
B.ISO
C.NIST
D.PCI DSS
A.GDPR
GDPR is the General Data Protection Regulation implements security and privacy requirements for personal info of European residents worldwide.
103) Which of the following describes the exploitation of an interactive process to gain access to restricted areas?
A.Persistence
B.Buffer overflow
C.Privilege escalation
D.Pharming
C.Privilege escalation
Privilege escalation is the exploitation of an interactive process to gain access to resources that are normally unavailable to an unauthorized user. This can occur when an attacker gains access to a low-privileged account on a system and then uses that access to escalate privileges to a higher level, allowing the attacker to perform actions they wouldn’t normally be able to do. For example, an attacker might use a privilege escalation exploit to gain administrative access to a system or to gain access to sensitive data