201-225 Flashcards
Which of the following prevents an employee from seeing a colleague who is visiting an inappropriate website?
A. Job rotation policy
B. NDA
C. AUP
D. Separation of duties policy
C. AUP
A user reports falling for a phishing email to an analyst. Which of the following system logs would the analyst check FIRST?
A. DNS
B. Message gateway
C. Network
D. Authentication
B. Message gateway
An attacker has determined the best way to impact operations is to infiltrate third-party software vendors. Which of the following vectors is being exploited?
A. Social media
B. Cloud
C. Supply chain
D. Social Engineering
C. Supply chain
An organization would like to give remote workers the ability to use applications hosted inside the corporate network. Users will be allowed to use their personal computers, or they will be provided organization assets. Either way, no data or applications will be installed locally on any user systems. Which of the following mobile solutions would accomplish these goals?
A. VDI
B. MDM
C. COPE
D. UTM
A. VDI
Which of the following is used to ensure that evidence is admissible in legal proceedings when it is collected and provided to the authorities?
A. Chain of custody
B. Legal hold
C. Event log
D. Artifacts
A. Chain of custody
The Chief Information Security Officer (CISO) of a bank recently updated the incident response policy. The CISO is concerned that members of the incident response team do not understand their roles. The bank wants to test the policy but with the least amount of resources or impact. Which of the following BEST meets the requirements?
A. Warm site failover
B. Tabletop walk-through
C. Parallel path testing
D. Full outage simulation
B. Tabletop walk-through
Which of the following control types fixes a previously identified issue and mitigates a risk?
A. Detective
B. Corrective
C. Preventative
D. Finalized
B. Corrective
An analyst is reviewing logs associated with an attack. The logs indicate an attacker downloaded a malicious file that was quarantined by the AV solution. The attacker utilized a local non-administrative account to restore the malicious file to a new location. The file was then used by another process to execute a payload.
Which of the following attacks did the analyst observe?
A. Privilege escalation
B. Request forgeries
C. Injection
D. Replay attack
C. Injection
A security engineer must deploy two wireless routers in an office suite. Other tenants in the office building should not be able to connect to this wireless network.
Which of the following protocols should the engineer implement to ensure the STRONGEST encryption?
A. WPS
B. WPA2
C. WAP
D. HTTPS
B. WPA2
An attacker browses a company’s online job board attempting to find any relevant information regarding the technologies the company uses. Which of the following BEST describes this social engineering technique?
A. Hoax
B. Reconnaissance
C. Impersonation
D. Pretexting
B. Reconnaissance
During an incident response process involving a laptop, a host was identified as the entry point for malware. The management team would like to have the laptop restored and given back to the user. The cybersecurity analyst would like to continue investigating the intrusion on the host. Which of the following would allow the analyst to continue the investigation and also return the laptop to the user as soon as possible?
A. dd
B. memdump
C. tcpdump
D. head
A. dd
An analyst is trying to identify insecure services that are running on the internal network. After performing a port scan, the analyst identifies that a server has some insecure services enabled on default ports. Which of the following BEST describes the services that are currently running and the secure alternatives for replacing them? (Choose three.)
A. SFTP, FTPS
B. SNMPv2, SNMPv3
C. HTTP, HTTPS
D. TFTP, FTP
E. SNMPv1, SNMPv2
F. Telnet, SSH
G. TLS, SSL
H. POP, IMAP
I. Login, rlogin
B. SNMPv2, SNMPv3
C. HTTP, HTTPS
F. Telnet, SSH
A security analyst needs to produce a document that details how a security incident occurred, the steps that were taken for recovery, and how future incidents can be avoided. During which of the following stages of the response process will this activity take place?
A. Recovery
B. Identification
C. Lessons learned
D. Preparation
C. Lessons learned
An administrator is configuring a firewall rule set for a subnet to only access DHCP, web pages, and SFTP, and to specifically block FTP. Which of the following would BEST accomplish this goal?
A. [Permission Source Destination Port]
Allow: Any Any 80 -
Allow: Any Any 443 -
Allow: Any Any 67 -
Allow: Any Any 68 -
Allow: Any Any 22 -
Deny: Any Any 21 -
Deny: Any Any
B. [Permission Source Destination Port]
Allow: Any Any 80 -
Allow: Any Any 443 -
Allow: Any Any 67 -
Allow: Any Any 68 -
Deny: Any Any 22 -
Allow: Any Any 21 -
Deny: Any Any
C. [Permission Source Destination Port]
Allow: Any Any 80 -
Allow: Any Any 443 -
Allow: Any Any 22 -
Deny: Any Any 67 -
Deny: Any Any 68 -
Deny: Any Any 21 -
Allow: Any Any
D. [Permission Source Destination Port]
Allow: Any Any 80 -
Allow: Any Any 443 -
Deny: Any Any 67 -
Allow: Any Any 68 -
Allow: Any Any 22 -
Allow: Any Any 21 -
Allow: Any Any
A. [Permission Source Destination Port]
Allow: Any Any 80 -
Allow: Any Any 443 -
Allow: Any Any 67 -
Allow: Any Any 68 -
Allow: Any Any 22 -
Deny: Any Any 21 -
Deny: Any Any
While investigating a recent security incident, a security analyst decides to view all network connections on a particular server. Which of the following would provide the desired information?
A. arp
B. nslookup
C. netstat
D. nmap
C. netstat