301-350 Flashcards
A company has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements?
A CASB
B VPC
C Perimeter network
D WAF
B. VPC
An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb worth of inbound network traffic to the server and transfers the pap back to the machine for analysis. Which of the following tools should the analyst use to further review the pap?
O A Nmap
O B cURI
O c Netcat
O D Wireshark
D. Wireshark
On the way into a secure building, an unknown individual strikes up a conversation with an employee. The employee scans the required badge at the door while the unknown individual holds the door open, seemingly out of courtesy, for the employee. Which of the following social engineering techniques is being utilized?
A Shoulder surfing
B Watering-hole attack
C Tailgating
D Impersonation
C. Tailgating
Which of the following components can be used to consolidate and forward inbound internet traffic to multiple cloud environments though a single firewall?
A Transit gateway
B Cloud hot site
C Edge computing
D DNS sinkhole
A. Transit Gateway
Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?
A Intellectual property theft
B Elevated privileges
C Unknown backdoor
D Quality assurance
C. Unknown backdoor
A systems administrator needs to implement an access control scheme that will allow an object’s access policy to be determined by its owner. Which of the following access control schemes
BEST fits the requirements?
A Role-based access control
B Discretionary access control
C Mandatory access control
D Attribute-based access control
B. Discretionary access control
Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company’s final software releases? (Choose two.)
A Unsecure protocols
B Use of penetration-testing utilities
C Weak passwords
D Included third-party libraries
E Vendors/supply chain
F Outdated anti-malware software
D. Included third-party libraries
E. Vendors/supply chain
A network technician is installing a guest wireless network at a coffee shop. When a customer purchases an item, the password for the wireless network is printed on the receipt so the customer can log in. Which of the following will the technician MOST likely configure to provide the highest level of security with the least amount of overhead?
A WA-EAP
B WEP_TP
C WA-PSK
D WPS-PIN
C. WA-PSK
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicate a directory traversal attack has occurred. Which of the following is the analyst MOST likely seeing?
A http://sample.url.com/«script>Please-Visit-Our-Phishing-Site</script>
B http: //sample.url.com/someotherpageonsite/.///etc/shadow
C http: //sample.url.com/select-from-database where-password-null
D http://redirect.sameple.url sampleurl.com/malicious-dns-redirect
B. http: //sample.url.com/someotherpageonsite/.///etc/shadow
Which of the following would BEST provide detective and corrective controls for thermal regulation?
A A smoke detector
B A fire alarm
C An HVAC system
D A fire suppression system
E Guards
C. An HVAC system
A security analyst is investigating what appears to be unauthorized access to a corporate web application. The security analyst reviews the web server logs and finds the flowing entries.
Which of the following password attacks is taking place?
A security analyst needs to implement security features across smartphones, laptops, and tablets. Which of the following would be the MOST effective across heterogeneous platforms?
A Enforcing encryption
B Deploying GPOs
C Removing administrative permissions
D Applving MDM software
D. Applying MDM software
All security analysts’ workstations at a company have network access to a critical server VLAN. The information security manager wants to further enhance the controls by requiring that all access to the secure VLAN be authorized only from a given single location. Which of the following will the information security manager most likely implement?
A A forward proxy server
B A jump server
C A reverse proxy server
D A stateful firewall server
B. A jump server
Which of the following supplies non-repudiation during a forensics investigation?
A Dumping volatile memory contents first
B Duplicating a drive with de
C Using a SHA-2 signature of a drive image
D Logging everyone in contact with evidence
E Encrypting sensitive data
C. Using a SHA-2 signature of a drive image
A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)
A Dual power supply
B Off-site backups
C Automatic OS upgrades
D NIC teaming
E Scheduled penetration testing
F Network-attached storage
A. Dual power supply
D. NIC teaming
A systems administrator receives the following alert from a file integrity monitoring tool.
The hash of the cmd.exe file has changed.
The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?
A The end user changed the file permissions.
B A cryptographic collision was detected.
C A snapshot of the file system was taken.
D A rootkit was deployed.
D. A root kit was deployed
A security analyst has been tasked with ensuring all programs that are deployed into the enterprise have been assessed in a runtime environment. Any critical issues found in the program must be sent back to the developer for verification and remediation. Which of the following BEST describes the type of assessment taking place?
A Input validation
B Dynamic code analvsis
C Fuzzing
D Manual code review
B. Dynamic code analysis
An organization is building a single virtual environment that will host customer applications and data that require availability at all times. The data center that is hosting the environment will provide generator power and ISP services. Which of the following is the best solution to support the organization’s requirement?
A NIC teaming
B Cloud backups
C A load balancer appliance
D UPS
C. A load balancer appliance
Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?
A Compensating control
B Network segmentation
C Transfer of risk
D SNMP traps
B. Network segmentation
A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?
A Private
B Critical
C Sensitive
D Public
C. Sensitive
A web server has been compromised due to a ransomware attack. Further investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?
A The last incremental backup that was conducted 72 hours ago
B The last known-good configuration
C The last full backup that was conducted seven days ago
D The baseline OS configuration
A. The last incremental backup that was conducted 72 hours ago
An administrator identifies some locations on the third floor of the building that have a poor wireless signal Multiple users confirm the incident and report it is not an isolated event. Which of the following should the administrator use to find the areas with a poor or non-existent wireless signal?
A Heat map
B Input validation
C Site survey
D Embedded systems
C. Site survey
An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operations in a:
A business continuity plan.
B communications plan.
C disaster recovery plan.
D continuity of operations plan.
C. Disaster recovery plan
A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?
A Look for tampering on the evidence collection bag.
B Encrypt the collected data using asymmetric encryption.
C Ensure proper procedures for chain of custody are being followed
D Calculate the checksum using a hashing algorithm
D. Calculate the checksum using a hashing algorithm