256 Q & A Flashcards
1.Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)
D. Weak encryption
F. Server-side request forgery
2.A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again.
Which of the following should the IT administrator do FIRST after recovery?
A. Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis
3.An attacked is attempting to exploit users by creating a fake website with the URL www.validwebsite.com. The attacker’s intent is to imitate the look and feel of a legitimate website to obtain personal information from unsuspecting users.
Which of the following social-engineering attacks does this describe?
D. Watering-hole attack
4.Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?
A. Red Team
5.To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving.
Which of the following cloud models would BEST meet the needs of the organization?
C. SaaS
6.A security engineer at an offline government facility is concerned about the validity of an SSL certificate. The engineer wants to perform the fastest check with the least delay to determine if the certificate has been revoked.
Which of the following would BEST these requirement?
B. OCSP
7.A security analyst needs to complete an assessment. The analyst is logged into a server and must use native tools to map services running on it to the server’s listening ports.
Which of the following tools can BEST accomplish this talk?
B. Netstat
8.On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)
E. Value and volatility of data
F. Right-to-audit clauses
9.An organization’s Chief Security Officer (CSO) wants to validate the business’s involvement in the incident response plan to ensure its validity and thoroughness.
Which of the following will the CSO MOST likely use?
C. A tabletop exercise
10.During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company’s naming convention and are not in the asset Inventory. WiFi access Is protected with 255-Wt encryption via WPA2. Physical access to the company’s facility requires two-factor authentication using a badge and a passcode.
Which of the following should the administrator implement to find and remediate the Issue? (Select TWO).
B. Enable MAC filtering on the switches that support the wireless network.
E. Scan the wireless network for rogue access points.
11.Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?
C. GDPR
12.An organization routes all of its traffic through a VPN Most users are remote and connect into a corporate datacenter that houses confidential information There is a firewall at the Internet border followed by a DIP appliance, the VPN server and the datacenter itself.
Which of the following is the WEAKEST design element?
C. Encrypted VPN traffic will not be inspected when entering or leaving the network
13.Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe’s identity before sending him the prize.
Which of the following BEST describes this type of email?
C. Phishing
14.A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area.
Which of the following would MOST likely have prevented this breach?
C. A USB data blocker
15.A security analyst discovers several .jpg photos from a cellular phone during a forensics investigation involving a compromised system. The analyst runs a forensics tool to gather file metadata.
Which of the following would be part of the images if all the metadata is still intact?
A. The GPS location
16.A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plan text.
Which of the following would mitigate the damage done by this type of data exfiltration in the future?
A. Create DLP controls that prevent documents from leaving the network
17.Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?
D. AnMOU
18.A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set.
Which of the following recommendations would BEST prevent this from reoccurring?
C. Enforce application whitelisting.
19.Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log into any thin client located throughout the building and see the same desktop each time.
Which of the following technologies are being utilized to provide these capabilities? (Select TWO)
B. VDI
E. RFID
20.A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server. Which of the following files should be given to the forensics firm?
C. Dump
21.A security administrator currently spends a large amount of time on common security tasks, such aa report generation, phishing investigations, and user provisioning and deprovisioning This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members.
Which of the following should the administrator implement?
D. SOAR
22.A security analyst needs to be proactive in understand the types of attacks that could potentially target the company’s execute.
Which of the following intelligence sources should to security analyst review?
D. Industry information-sharing and collaboration groups
23.Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).
B. Mandatory vacation
C. Job rotation
24.A user enters a password to log in to a workstation and is then prompted to enter an authentication code.
Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).
B. Something you have
E. Something you are