301-350 Flashcards
A cloud administrator is configuring five compute instances under the same subnet in a VPC Three
instances are required to communicate with one another, and the other two must he logically isolated from
all other instances in the VPC.
Which of the following must the administrator configure to meet this requirement?
A. One security group B. Two security groups C. Three security groups D. Five security groups Answer: B
A security analyst is reviewing the following command-line output:
Which of the following Is the analyst observing?
A. IGMP spoofing B. URL redirection C. MAC address cloning D. DNS poisoning Answer: C
Which of the following represents a biometric FRR?
A. Authorized users being denied access
B. Users failing to enter the correct PIN
C. The denied and authorized numbers being equal
D. The number of unauthorized users being granted access
Answer: A
A security analyst sees the following log output while reviewing web logs:
Which of the following mitigation strategies would be BEST to prevent this attack from being successful?
A. Secure cookies B. Input validation C. Code signing D. Stored procedures Answer: B
A security analyst is reviewing the following output from a system:
Which of the following is MOST likely being observed?
A. ARP palsoning B. Man in the middle C. Denial of service D. DNS poisoning Answer: C
A startup company is using multiple SaaS and IaaS platforms to stand up a corporate infrastructure
and build out a customer-facing web application.
Which of the following solutions would be BEST to provide security, manageability, and visibility into the
platforms?
A. SIEM B. DLP C. CASB D. SWG Answer: C
To further secure a company’s email system, an administrator is adding public keys to DNS records in
the company’s domain.
Which of the following is being used?
A. PFS B. SPF C. DMARC D. DNSSEC Answer: D
A hospital’s administration is concerned about a potential loss of patient data that is stored on tablets.
A security administrator needs to implement controls to alert the SOC any time the devices are near exits.
Which of the following would BEST achieve this objective?
A. Geotargeting B. Geolocation C. Geotagging D. Geofencing Answer: D
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives
against loss or data theft.
Which of the following would be the MOST acceptable?
A. SED B. HSM C. DLP D. TPM Answer: A
An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb
worth of inbound network traffic to the server and transfer the pcap back to the machine for analysis.
Which of the following tools should the analyst use to further review the pcap?
A. Nmap B. cURL C. Netcat D. Wireshark Answer: D
A external forensics investigator has been hired to investigate a data breach at a large enterprise with
numerous assets. It is known that the breach started in the DMZ and moved to the sensitive information,
generating multiple logs as the attacker traversed through the network.
Which of the following will BEST assist with this investigation?
A. Perform a vulnerability scan to identity the weak spots.
B. Use a packet analyzer to Investigate the NetFlow traffic.
C. Check the SIEM to review the correlated logs.
D. Require access to the routers to view current sessions.
Answer: C
Which of the following refers to applications and systems that are used within an organization without
consent or approval?
A. Shadow IT B. OSINT C. Dark web D. Insider threats Answer: Av
A company needs to centralize its logs to create a baseline and have visibility on its security events.
Which of the following technologies will accomplish this objective?
A. Security information and event management B. A web application firewall C. A vulnerability scanner D. A next-generation firewall Answer: A
An incident response technician collected a mobile device during an investigation.
Which of the following should the technician do to maintain chain of custody?
A. Document the collection and require a sign-off when possession changes.
B. Lock the device in a safe or other secure location to prevent theft or alteration.
C. Place the device in a Faraday cage to prevent corruption of the data.
D. Record the collection in a blockchain-protected public ledger.
Answer: A
A network administrator has been asked to install an IDS to improve the security posture of an
organization.
Which of the following control types is an IDS?
A. Corrective B. Physical C. Detective D. Administrative Answer: C
A security analyst is logged into a Windows file server and needs to see who is accessing files and from which computers.
Which of the following tools should the analyst use?
A. netstat B. net share C. netcat D. nbtstat E. net session Answer: A
A security analyst discovers that a company username and password database was posted on an
internet forum. The username and passwords are stored in plan text.
Which of the following would mitigate the damage done by this type of data exfiltration in the future?
A. Create DLP controls that prevent documents from leaving the network
B. Implement salting and hashing
C. Configure the web content filter to block access to the forum.
D. Increase password complexity requirements
Answer: A
An attacker is exploiting a vulnerability that does not have a patch available.
Which of the following is the attacker exploiting?
A. Zero-day B. Default permissions C. Weak encryption D. Unsecure root accounts Answer: A
A security analyst is reviewing the output of a web server log and notices a particular account is
attempting to transfer large amounts of money:
Which of the following types of attack is MOST likely being conducted?
A. SQLi B. CSRF C. Session replay D. API Answer: C
An organization has decided to host its web application and database in the cloud.
Which of the following BEST describes the security concerns for this decision?
A. Access to the organization’s servers could be exposed to other cloud-provider clients
B. The cloud vendor is a new attack vector within the supply chain
C. Outsourcing the code development adds risk to the cloud provider
D. Vendor support will cease when the hosting platforms reach EOL.
Answer: B