100 questions v1.pdf Flashcards
A systems administrator needs to integrate multiple IoT and small embedded devices into the company’s wireless network securely. Which of the following should the administrator implement to ensure low-power and legacy devices can connect to the wireless network?
A. WPS
B. WPA
C. EAP-FAST
D. 802.1X
A. WPS
When backing up a database server to LTO tape drives, the following backup schedule is used. Backups take
one hour to complete:
On Friday at 9:00 p.m., there is a RAID failure on the database server. The data must be restored from
backup. Which of the following is the number of backup tapes that will be needed to complete this operation?
A. 1
B. 2
C. 3
D. 4
E. 6
D. 4
Management wants to ensure any sensitive data on company-provided cell phones is isolated in a single location that can be remotely wiped if the phone is lost. Which of the following technologies BEST meets this need?
A. Geofencing
B. Containerization
C. Device encryption
D. Sandboxing
B. Containerization
A company is planning to utilize its legacy desktop systems by converting them into dummy terminals and
moving all heavy applications and storage to a centralized server that hosts all of the company’s required
desktop applications. Which of the following describes the BEST deployment method to meet these
requirements?
A. IaaS
B. VM sprawl
C. VDI
D. PaaS
C. VDI
Joe, a user, reports to the help desk that he can no longer access any documents on his PC. He states that he saw a window appear on the screen earlier, but he closed it without reading it. Upon investigation, the technician sees high disk activity on Joe’s PC. Which of the following types of malware is MOST likely indicated by these findings?
A. Keylogger
B. Trojan
C. Rootkit
D. Crypto-malware
D. Crypto-malware
An administrator is implementing a secure web server and wants to ensure that if the web server application is compromised, the application does not have access to other parts of the server or network. Which of the following should the administrator implement? (Choose two.)
A. Mandatory access control
B. Discretionary access control
C. Rule-based access control
D. Role-based access control
E. Attribute-based access control
A. Mandatory access control
C. Rule-based access control
A developer has incorporated routines into the source code for controlling the length of the input passed to the
program. Which of the following types of vulnerabilities is the developer protecting the code against?
A. DLL injection
B. Memory leak
C. Buffer overflow
D. Pointer dereference
C. Buffer overflow
An application developer has neglected to include input validation checks in the design of the company’s new
web application. An employee discovers that repeatedly submitting large amounts of data, including custom
code, to an application will allow the execution of the custom code at the administrator level. Which of the
following BEST identifies this application attack?
A. Cross-site scripting
B. Clickjacking
C. Buffer overflow
D. Replay
C. Buffer overflow
Which of the following identity access methods creates a cookie on the first login to a central authority to allow
logins to subsequent applications without re-entering credentials?
A. Multifactor authentication
B. Transitive trust
C. Federated access
D. Single sign-on
D. Single sign-on
A network technician is designing a network for a small company. The network technician needs to implement
an email server and web server that will be accessed by both internal employees and external customers.
Which of the following would BEST secure the internal network and allow access to the needed servers?
A. Implementing a site-to-site VPN for server access.
B. Implementing a DMZ segment for the server.
C. Implementing NAT addressing for the servers.
D. Implementing a sandbox to contain the servers.
B. Implementing a DMZ segment for the server.
When used together, which of the following qualify as two-factor authentication?
A. Password and PIN
B. Smart card and PIN
C. Proximity card and smart card
D. Fingerprint scanner and iris scanner
B. Smart card and PIN
Ann, a new employee, received an email from an unknown source indicating she needed to click on the
provided link to update her company’s profile. Once Ann clicked the link, a command prompt appeared with
the following output:
Which of the following types of malware was executed?
A. Ransomware
B. Adware
C. Spyware
D. Virus
A. Ransomware
A company has a team of penetration testers. This team has located a file on the company file server that they
believe contains cleartext usernames followed by a hash. Which of the following tools should the penetration
testers use to learn more about the content of this file?
A. Exploitation framework
B. Vulnerability scanner
C. Netcat
D. Password cracker
D. Password cracker
The Chief Information Security Officer (CISO) in a company is working to maximize protection efforts of
sensitive corporate data. The CISO implements a “100% shred” policy within the organization, with the intent
to destroy any documentation that is not actively in use in a way that it cannot be recovered or reassembled.
Which of the following attacks is this deterrent MOST likely to mitigate?
A. Dumpster diving
B. Whaling
C. Shoulder surfing
D. Vishing
A. Dumpster diving
A Chief Information Security Officer (CISO) has instructed the information assurance staff to act upon a fastspreading
virus.
Which of the following steps in the incident response process should be taken NEXT?
A. Identification
B. Eradication
C. Escalation
D. Containment
A. Identification
An organization has air gapped a critical system.
Which of the following BEST describes the type of attacks that are prevented by this security measure?
A. Attacks from another local network segment
B. Attacks exploiting USB drives and removable media
C. Attacks that spy on leaked emanations or signals
D. Attacks that involve physical intrusion or theft
A. Attacks from another local network segment
An organization wants to ensure network access is granted only after a user or device has been authenticated.
Which of the following should be used to achieve this objective for both wired and wireless networks?
A. CCMP
B. PKCS#12
C. IEEE 802.1X
D. OCSP
C. IEEE 802.1X
A security administrator is choosing an algorithm to generate password hashes.
Which of the following would offer the BEST protection against offline brute force attacks?
A. MD5
B. 3DES
C. AES
D. SHA-1
C. AES
A security administrator is investigating many recent incidents of credential theft for users accessing the
868B7E94756F6685AFF3084F8F0DEC40
company’s website, despite the hosting web server requiring HTTPS for access. The server’s logs show the
website leverages the HTTP POST method for carrying user authentication details.
Which of the following is the MOST likely reason for compromise?
A. The HTTP POST method is not protected by HTTPS.
B. The web server is running a vulnerable SSL configuration.
C. The HTTP response is susceptible to sniffing.
D. The company doesn’t support DNSSEC.
A. The HTTP POST method is not protected by HTTPS.
A user from the financial aid office is having trouble interacting with the finaid directory on the university’s ERP
system. The systems administrator who took the call ran a command and received the following output:
Subsequently, the systems administrator has also confirmed the user is a member of the finaid group on the
ERP system.
Which of the following is the MOST likely reason for the issue?
A. The permissions on the finaid directory should be drwxrwxrwx.
B. The problem is local to the user, and the user should reboot the machine.
C. The files on the finaid directory have become corrupted.
D. The finaid directory is not formatted correctly
A. The permissions on the finaid directory should be drwxrwxrwx.
An organization wants to deliver streaming audio and video from its home office to remote locations all over
the world. It wants the stream to be delivered securely and protected from intercept and replay attacks.
Which of the following protocols is BEST suited for this purpose?
A. SSH
B. SIP
C. S/MIME
D. SRTP
D. SRTP
A manager makes an unannounced visit to the marketing department and performs a walk-through of the
office. The manager observes unclaimed documents on printers. A closer look at these documents reveals
employee names, addresses, ages, birth dates, marital/dependent statuses, and favorite ice cream flavors.
The manager brings this to the attention of the marketing department head. The manager believes this
information to be PII, but the marketing head does not agree. Having reached a stalemate, which of the
following is the MOST appropriate action to take NEXT?
A. Elevate to the Chief Executive Officer (CEO) for redress; change from the top down usually succeeds.
B. Find the privacy officer in the organization and let the officer act as the arbiter.
C. Notify employees whose names are on these files that their personal information is being compromised.
D. To maintain a working relationship with marketing, quietly record the incident in the risk register.
B. Find the privacy officer in the organization and let the officer act as the arbiter.
A security administrator is implementing a secure method that allows developers to place files or objects onto
a Linux server. Developers are required to log in using a username, password, and asymmetric key.
Which of the following protocols should be implemented?
A. SSL/TLS
B. SFTP
C. SRTP
D. IPSec
B. SFTP
Which of the following BEST describes the purpose of authorization?
A. Authorization provides logging to a resource and comes after authentication.
B. Authorization provides authentication to a resource and comes after identification.
C. Authorization provides identification to a resource and comes after authentication.
D. Authorization provides permissions to a resource and comes after authentication.
D. Authorization provides permissions to a resource and comes after authentication.
A security analyst is emailing PII in a spreadsheet file to an audit validator for after-actions related to a security
assessment. The analyst must make sure the PII data is protected with the following minimum requirements:
Ensure confidentiality at rest.
Ensure the integrity of the original email message.
Which of the following controls would ensure these data security requirements are carried out?
A. Encrypt and sign the email using S/MIME.
B. Encrypt the email and send it using TLS.
C. Hash the email using SHA-1.
D. Sign the email using MD5.
A. Encrypt and sign the email using S/MIME.
The network information for a workstation is as follows:
When the workstation’s user attempts to access www.example.com, the URL that actually opens is
www.notexample.com. The user successfully connects to several other legitimate URLs. Which of the
following have MOST likely occurred? (Choose two.)
A. ARP poisoning
B. Buffer overflow
C. DNS poisoning
D. Domain hijacking
E. IP spoofing
C. DNS poisoning
D. Domain hijacking
Which of the following implements a stream cipher?
A. File-level encryption
B. IKEv2 exchange
C. SFTP data transfer
D. S/MIME encryption
D. S/MIME encryption
A security technician has been assigned data destruction duties. The hard drives that are being disposed of
contain highly sensitive information. Which of the following data destruction techniques is MOST appropriate?
A. Degaussing
B. Purging
C. Wiping
D. Shredding
D. Shredding
Which of the following BEST explains how the use of configuration templates reduces organization risk?
A. It ensures consistency of configuration for initial system implementation.
B. It enables system rollback to a last known-good state patches break functionality.
C. It facilitates fault tolerance since applications can be migrated across templates.
D. It improves vulnerability scanning efficiency across multiple systems.
A. It ensures consistency of configuration for initial system implementation.
A Chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the following should be at the top of the CISO’s list?
A. Identify redundant and high-availability systems.
B. Identity mission-critical applications and systems.
C. Identify the single point of failure in the system.
D. Identity the impact on safety of the property.
B. Identity mission-critical applications and systems.
Which of the following should a technician use to protect a cellular phone that is needed for an investigation, to
ensure the data will not be removed remotely?
A. Air gap
B. Secure cabinet
C. Faraday cage
D. Safe
C. Faraday cage
Which of the following is the MOST significant difference between intrusive and non-intrusive vulnerability
scanning?
A. One uses credentials, but the other does not.
B. One has a higher potential for disrupting system operations.
C. One allows systems to activate firewall countermeasures.
D. One returns service banners, including running versions.
B. One has a higher potential for disrupting system operations.
While reviewing system logs, a security analyst notices that a large number of end users are changing their
passwords four times on the day the passwords are set to expire. The analyst suspects they are cycling their
passwords to circumvent current password controls. Which of the following would provide a technical control
to prevent this activity from occurring?
A. Set password aging requirements.
B. Increase the password history from three to five.
C. Create an AUP that prohibits password reuse.
D. Implement password complexity requirements.
A. Set password aging requirements.
A security analyst is running a credential-based vulnerability scanner on a Windows host. The vulnerability scanner is using the protocol NetBIOS over TCP/IP to connect to various systems, However, the scan does not return any results. To address the issue, the analyst should ensure that which of the following default ports is open on systems?
A. 135
B. 137
C. 3389
D. 5060
B. 137
An organization’s research department uses workstations in an air-gapped network. A competitor released products based on files that originated in the research department. Which of the following should management do to improve the security and confidentiality of the research files?
A. Implement multifactor authentication on the workstations.
B. Configure removable media controls on the workstations.
C. Install a web application firewall in the research department. D. Install HIDS on each of the research workstations.
B. Configure removable media controls on the workstations.
A company network is currently under attack. Although security controls are in place to stop the attack, the security administrator needs more information about the types of attacks being used. Which of the following network types would BEST help the administrator gather this information?
A. DMZ
B. Guest network
C. Ad hoc
D. Honeynet
D. Honeynet
Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing further control of a system is known as:
A. pivoting.
B. persistence.
C. active reconnaissance.
D. a backdoor
A. pivoting.
A systems administrator is increasing the security settings on a virtual host to ensure users on one VM cannot
access information from another VM. Which of the following is the administrator protecting against?
A. VM sprawl
B. VM escape
C. VM migration
D. VM sandboxing
B. VM escape
A network administrator is implementing multifactor authentication for employees who travel and use company
devices remotely by using the company VPN. Which of the following would provide the required level of
authentication?
A. 802.1X and OTP
B. Fingerprint scanner and voice recognition
C. RBAC and PIN
D. Username/Password and TOTP
A. 802.1X and OTP
Which of the following encryption algorithms require one encryption key? (Choose two.)
A. MD5
B. 3DES
C. BCRYPT
D. RC4
E. DSA
B. 3DES
D. RC4
A preventive control differs from a compensating control in that a preventive control is:
A. put in place to mitigate a weakness in a user control.
B. deployed to supplement an existing control that is EOL.
C. relied on to address gaps in the existing control structure.
D. designed to specifically mitigate a risk.
C. relied on to address gaps in the existing control structure.
A systems administrator has installed a new UTM that is capable of inspecting SSL/TLS traffic for malicious
payloads. All inbound network traffic coming from the Internet and terminating on the company’s secure web
servers must be inspected. Which of the following configurations would BEST support this requirement?
A. The web servers’ CA full certificate chain must be installed on the UTM.
B. The UTM certificate pair must be installed on the web servers.
C. The web servers’ private certificate must be installed on the UTM.
D. The UTM and web servers must use the same certificate authority.
A. The web servers’ CA full certificate chain must be installed on the UTM.