1 Flashcards
Scott notices that one of the systems on his network contacted a number of systems via encrypted web traffic, downloaded a handful of files, and then uploaded a large amount of data to a remote system. What type of infection should he look for?
A keylogger
A backdoor
A logic bomb
A bot
A bot
Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela’s organization play when they authenticate their users and assert that those users are valid to other members of the federation?
Authentication provider
Relying party
Identity provider
Service provider
Identity provider
Samantha wants to set an account policy that ensures that devices can be used only while the user is in the organization’s main facility. What type of account policy should she set?
Geofencing
Impossible travel time
Time of day
Time-based logins
Geofencing
Brian has deployed a system that monitors sensors and uses that data to manage the power distribution for the power company that he works for. Which of the following terms is commonly used to describe this type of control and monitoring solution?
HVAC
SCADA
SIM
AVAD
SCADA
Every time Susan checks code into her organization’s code repository, it is tested and validated, and then if accepted, it is immediately put into production. What is the term for this?
Continuous delivery
Continuous integration
Agile development
A security nightmare
Continuous delivery
Connor believes that there is an issue between his organization’s network and a remote web server, and he wants to verify this by checking each hop along the route. Which tool should he use if he is testing from a Windows 10 system?
pathping
route
tracert
traceroute
pathping
Howard is assessing the legal risks to his organization based upon its handling of PII. The organization is based in the United States, handles the data of customers located in Europe, and stores information in Japanese datacenters. What law would be most important to Howard during his assessment?
Japanese law
U.S. law
All should have equal weight
European Union law
All should have equal weight
Naomi has discovered the following TCP ports open on a system she wants to harden. Which ports are used for unsecure services and thus should be disabled to allow their secure equivalents to continue to be used?
21
22
23
80
443
22 and 443
21 and 80
21, 23, and 80
21, 22, and 80
21, 23, and 80
Mike wants to stop vehicles from traveling toward the entrance of his building. What physical security control should he implement?
A hot aisle
An air gap
A robotic sentry
A bollard
A bollard
Joe checks his web server logs and sees that someone sent the following query string to an application running on the server:
http://www.mycompany.com/servicestatus.php?serviceID=892&serviceID=892’ ;
DROP TABLE Services;–
What type of attack was most likely attempted?
Cross-site scripting
Session hijacking
Man-in-the-middle
Parameter pollution
Parameter pollution
Charles has implemented LDAP for his organization. What type of service has he enabled?
A federation
An attestation service
A directory service
A biometric identity provider
A directory service
Rick believes that a system he is responsible for has been compromised with malware that uses a rootkit to obtain and retain access to the system. When he runs a virus scan, the system doesn’t show any malware. If he has other data that indicates the system is infected, what should his next step be if he wants to determine what malware may be on the system?
The system is not infected and he should move on.
Mount the drive on another system and scan it that way.
Disable the systems antivirus because it may be causing a false negative.
Rerun the antimalware scan.
Mount the drive on another system and scan it that way.
Michael wants to log directly to a database while also using TCP and TLS to protect his log information and to ensure it is received. What tool should he use?
journalctl
syslog
rsyslog
syslog-ng
syslog-ng
Nina’s organization uses SSH keys to provide secure access between systems. Which of the following is not a common security concern when using SSH keys?
Weak encryption
Inadvertent exposure of the private key
SSH key sprawl
Weak passwords/passphrases
Weak encryption
Greg believes that an attacker may have installed malicious firmware in a network device before it was provided to his organization by the supplier. What type of threat vector best describes this attack?
Cloud
Removable media
Supply chain
Direct access
Supply chain
As part of their yearly incident response preparations, Ben’s organization goes through a sample incident step by step to validate what each person will do in the incident. What type of exercise is this?
A simulation
A checklist exercise
A tabletop exercise
A walk-through
A walk-through