151-200 Flashcards
Which of the following would be MOST effective to contain a rapidly spreading attack that is affecting a large number of organizations?
A Machine learning
B DNS sinkhole
C Blocklist
D Honeypot
B. DNS sinkhole
A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service provider types should the business engage?
A laaS
B PaaS
C XaaS
D SaaS
A. LaaS
A security analyst needs to implement an MDM solution for BOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements? (Choose two.)
A Full device encryption
B Network usage rules
C Geofencing
D Containerization
E Application approve list
F Remote control
D. Contanerization
F. Remote control
A company currently uses passwords for logging in to company-owned devices and wants to add a second authentication factor. Per corporate policy, users are not allowed to have smartphones at their desks. Which of the following would meet these requirements?
A Smart card
B PIN code
C Knowledge-based question
D Secret key
A. Smart card
Which of the following techniques eliminates the use of rainbow tables for password cracking?
A Hashing
B Tokenization
C Asvmmetric encryption
D Salting
D. Salting
An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?
A Compromise
B Retention
C Analysis
D Transfer
E Inventory
B. Retention
A company is considering transitioning to the cloud. The company employs individuals from various locations around the world. The company does not want to increase its on premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of the company?
A Private cloud
B Hybrid environment
C Managed security service provider
D Hot backup site
B. Hybrid environment
A recent vulnerability scan revealed multiple servers have non-standard ports open for applications that are no longer in use. The security team is working to ensure all devices are patched and hardened. Which of the following would the security team perform to ensure the task is completed with minimal impact to production?
A Enable HIDS on all servers and endpoints.
B Disable unnecessary services
C Configure the deny list appropriately on the NGFW.
D Ensure the antivirus is up to date.
B. Disable unnecessary services
A user downloaded an extension for a browser and the user’s device later became infected. The analyst who is investigating the incident saw various logs where the attacker was hiding activity by deleting data. The following was observed running:
New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -DriveLetter C - FileSystemLabel “New”-FileSystem NTFS - Full -Force -Confirm: $false |
Which of the following is the malware using to execute the attack?
A PowerShell
B Python
C Bash
D Macros
A. PowerShell
An organization maintains several environments in which patches are developed and tested before being deployed to an operational status. Which of the following is the environment in which patches will be deployed just prior to being put into an operational status?
A Development
B Test
C Production
D Staging
C. Production
Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?
A Hashing
B DNS sinkhole
C TLS inspection
D Data masking
C. TLS inspection
A security engineer is hardening existing solutions to reduce application vulnerabilities. Which of the following solutions should the engineer implement FIRST? (Choose two.)
A Auto-update
B HTTP headers
C Secure cookies
D Third-party updates
E Full disk encryption
F Sandboxing
G Hardware encryption
A. Auto-update
F. Sandboxing
Which of the following is the MOST likely reason for securing an air-gapped laboratory HVAC system?
A To avoid data leakage
B To protect surveillance logs
C To ensure availability
D To facilitate third-party access
C. To ensure availability
Which of the following should customers who are involved with UI developer agreements be concerned with when considering the use of these products on highly sensitive projects?
A Weak configurations
B Integration activities
C Unsecure user accounts
D Outsourced code development
C Unsecure user accounts
A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?
A Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis.
B Restrict administrative privileges and patch all systems and applications.
C Rebuild all workstations and install new antivirus software.
D Implement application whitelisting and perform user application hardening
B. Restrict administrative privileges and patch all systems and applications.
During a recent incident, an external attacker was able to exploit an SMB vulnerability over the internet. Which of the following action items should a security analyst perform FIRST to prevent this from occurring again?
A Check for anv recent SMB CVEs.
B Install AV on the affected server.
C Block unneeded TCP 445 connections.
D Deploy a NIDS in the affected subnet.
C. Block unneeded TCP 445 connections.
Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?
A Shut down the VDI and copy off the event logs.
B Take a memory snapshot of the running system.
C Use NetFlow to identify command-and-control IPs.
D Run a full on-demand scan of the root volume
B. Take a memory snapshot of the running system
Which of the following should a security administrator adhere to when setting up a new set of firewall rules?
A Disaster recovery plan
B Incident response procedure
C Business continuity plan
D Change management procedure
D. Change management procedure
Which of the following rales is responsible for defining the protection type and classification type for a given set of files?
A General counsel
B Data owner
C Risk manager
D Chief Information Officer
B Data owner
Audit logs indicate an administrative account that belongs to a security engineer has been locked out multiple times during the day. The security engineer has been on vacation for a few days.
Which of the following attacks can the account lockout be attributed to?
A Backdoor
B Brute-force
C Rootkit
D Trojan
B. Brute-force