201-250 Flashcards
An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system. Which of the following best describes the actions taken by the organization?
A Exception
B Segmentation
C Risk transfer
D Compensating controls
D. Compensating controls
A security manager has tasked the security operations center with locating all web servers that respond to an unsecure protocol. Which of the following commands could an analyst run to find the requested servers?
A nslookup 10.10.10.0
B nmар -p 80 10.10.10.0/24
C pathping 10.10.10.0 -p 80
D ne -I-p 80
B. nmар -p 80 10.10.10.0/24
The Chief Information Security Officer (CIS) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?
A Lessons learned
B Preparation
C Detection
D Containment
E Root cause analvsis
E. Root cause analysis
An administrator is configuring a firewall rule set for a subnet to only access DHCP, web pages, and SHTP, and to specifically block FTP. Which of the following would BEST accomplish this goal?
A [Permission Source Destination Port]
Allow: An An 80
Allow: Any An 443
Allow: An An 67
Allow: Any Any 68
Allow: Any An 22
Deny: Any Any 21
Deny: Any Any
B [Permission Source Destination Port]
Allow: Any Any 80
Allow: Any Any 443
Allow: Any Any 67
Allow: Any Any 68
Deny: Any Any 22
Allow: Any Any 21
Deny Any Any
C
[Permission Source Destination Port]
Allow: Any Anv 80
Allow: Anv Anv 443
Allow: An Anv 22
Deny: Any Any 67
Deny: Any Any 68
Deny: Any Any 21
Allow. Any Any
D
[Permission Source Destination Port]
Allow: Any Any 80
Allow: Any Any 443
Deny: Any Any 67
Allow: Any Any 68
Allow: Any Any 22
Allow: Any Any 21
Allow Any Any
D
[Permission Source Destination Port]
Allow: Any Any 80
Allow: Any Any 443
Deny: Any Any 67
Allow: Any Any 68
Allow: Any Any 22
Allow: Any Any 21
Allow Any Any
Which of the following ISO standards is certified for privacy?
A ISO 9001
B ISO 27002
C ISO 27701
D ISO 31000
C. ISO 27701
A security assessment determines DES and 3DES are still being used on recently deployed production servers. Which of the following did the assessment identity?
A Unsecure protocols
B Default settings
C Open permissions
D Weak encryption
D. Weak encryption
Practical(Q. 206)
A root cause analysis reveals that a web application outage was caused by one of the company’s developers uploading a newer version of the third-party libraries that were shared among several applications. Which of the following implementations would be BEST to prevent this issue from reoccurring?
A CASB
B SWG
C Containerization
D Automated failover
C. Containerization
A security analyst is investigating suspicious traffic on the web server located at IP address 10.10.1.1. A search of the WAF logs reveals the following output
Source IP
172.16.1.3 10.10.1.1
172.16.1.3
10.10.1.1
Destination IP
Requested URI
/web/cgi-bin/contact? categorv-custname’_-/web/cgi-bin/contact?
category=custname+OR+1=1-
Action Taken
permit and log
permit and log
Which of the following is MOST likely occurring?
A XSS attack
B SQLi attack
C Replay attack
D XSRF attack
B. SQLi attack
An attacker has determined the best way to impact operations is to infiltrate third-party software vendors. Which of the following vectors is being exploited?
A Social media
B Cloud
C Supply chain
D Social Engineering
C. Supply chain
A security administrator checks the table of a network switch, which shows the following output:
VLAN
1
1
1
1
1
1
Physical address
001a:42ff: 5113
Ofaa: abcf: ddee c6a9:6616:758e а3aa:b6a3: 1212
8025:2ad8: bfac b839:£995:00a
Type
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Port
GE0/5
GE0/5
GEO/5
GEO/5
GEO/5
GE0/5
Which of the following is happening to this switch?
A MAC flooding
B DNS poisoning
C MAC cloning
D ARP poisoning
A. MAC flooding
An organization just implemented a new security system. Local laws state that citizens must be notified prior to encountering the detection mechanism to deter malicious activities. Which of the following is being implemented?
A Proximity cards with guards
B Fence with electricity
C Drones with alarms
D Motion sensors with signage
D. Motion sensors with signage
A network administrator would like to configure a site to-site VPN utilizing IPSec. The administrator wants the tunnel to be established with data integrity, encryption, authentication, and anti-replay functions. Which of the following should the administrator use when configuring the VPN?
A AH
B EDR
C ESP
D DNSSEC
C. ESP
A security administrator examines the ARP table of an access switch and sees the following output:
IVIAN MAC Address Type.
PArE
A11
01261203£77b STATIC EPO
A11 c656 a1009£1 STATIC CPU
59 de 6ed78385 DYNAMIC FA0/1
Ecadae38506 DYNAMIC Fa0/2
7£40367c6598 DYNAMIC FA0/2
£4182c262c61 DYNAMIC FA0/2
A DDoS on Fa0/2 port
B MAC flooding on Fa0/2 port
C ARP poisoning on Fa0/1 port
D DNS poisoning on port Fa0/1
B. MAC flooding on Fa0/2 port
Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?
A GDPR
B PCIDSS
C ISO 27000
D NIST 800-53
D. NIST 800-53
A company has limited storage space available and an online presence that cannot be down for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time in the event of a failure, while being mindful of the limited available storage space?
A Implement full tape backups every Sunday at 8:00 p.m. and perform nightly tape rotations.
B Implement differential backups every Sunday at 8:00 p.m. and nightly incremental backups at 8:00 p.m.
C Implement nightly full backups every Sunday at 8:00 p.m.
Make Notes
D Implement full backups every Sunday at 8:00 p.m. and nightly differential backups at 8:00 p.m.
D. Implement full backups every Sunday at 8:00 p.m. and nightly differential backups at 8:00 p.m.
The concept of connecting a user account across the systems of multiple enterprises is BEST known as
A federation.
B a remote access policy.
C multifactor authentication.
D single sign-on.
D. Single sign-on
A security analyst needs to be proactive in understanding the types of attacks that could potentially target the company’s executives. Which of the following intelligence sources should the security analvst review?
A Vulnerability feeds
B Trusted automated exchange of indicator information
C Structured threat information expression
D Industry information-sharing and collaboration groups
D. Industry information-sharing and collaboration groups
A company has installed badge readers for building access but is finding unauthorized individuals roaming the hallways. Which of the following is the most likely cause?
A Shoulder surfing
B Phishing
C Tailgating
D Identity fraud
C. Tailgating
A consultant is configuring a vulnerability scanner for a large, global organization in multiple countries. The consultant will be using a service account to scan systems with administrative privileges on a weekly basis, but there is a concern that hackers could gain access to the account and pivot throughout the global network. Which of the following would be BEST to help mitigate this concern?
A Create different accounts for each region, each configured with push MA notifications
B Create one global administrator account and enforce Kerberos authentication.
C Create different accounts for each region, limit their logon times, and alert on risky logins.
D Create a guest account for each region, remember the last ten passwords, and block password reuse.
C. Create different accounts for each region, limit their logon times, and alert on risky logins.