301-350 Flashcards
A company has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements?
A CASB
B VPC
C Perimeter network
D WAF
B. VPC
An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb worth of inbound network traffic to the server and transfers the pap back to the machine for analysis. Which of the following tools should the analyst use to further review the pap?
O A Nmap
O B cURI
O c Netcat
O D Wireshark
D. Wireshark
On the way into a secure building, an unknown individual strikes up a conversation with an employee. The employee scans the required badge at the door while the unknown individual holds the door open, seemingly out of courtesy, for the employee. Which of the following social engineering techniques is being utilized?
A Shoulder surfing
B Watering-hole attack
C Tailgating
D Impersonation
C. Tailgating
Which of the following components can be used to consolidate and forward inbound internet traffic to multiple cloud environments though a single firewall?
A Transit gateway
B Cloud hot site
C Edge computing
D DNS sinkhole
A. Transit Gateway
Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?
A Intellectual property theft
B Elevated privileges
C Unknown backdoor
D Quality assurance
C. Unknown backdoor
A systems administrator needs to implement an access control scheme that will allow an object’s access policy to be determined by its owner. Which of the following access control schemes
BEST fits the requirements?
A Role-based access control
B Discretionary access control
C Mandatory access control
D Attribute-based access control
B. Discretionary access control
Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company’s final software releases? (Choose two.)
A Unsecure protocols
B Use of penetration-testing utilities
C Weak passwords
D Included third-party libraries
E Vendors/supply chain
F Outdated anti-malware software
D. Included third-party libraries
E. Vendors/supply chain
A network technician is installing a guest wireless network at a coffee shop. When a customer purchases an item, the password for the wireless network is printed on the receipt so the customer can log in. Which of the following will the technician MOST likely configure to provide the highest level of security with the least amount of overhead?
A WA-EAP
B WEP_TP
C WA-PSK
D WPS-PIN
C. WA-PSK
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicate a directory traversal attack has occurred. Which of the following is the analyst MOST likely seeing?
A http://sample.url.com/«script>Please-Visit-Our-Phishing-Site</script>
B http: //sample.url.com/someotherpageonsite/.///etc/shadow
C http: //sample.url.com/select-from-database where-password-null
D http://redirect.sameple.url sampleurl.com/malicious-dns-redirect
B. http: //sample.url.com/someotherpageonsite/.///etc/shadow
Which of the following would BEST provide detective and corrective controls for thermal regulation?
A A smoke detector
B A fire alarm
C An HVAC system
D A fire suppression system
E Guards
C. An HVAC system
A security analyst is investigating what appears to be unauthorized access to a corporate web application. The security analyst reviews the web server logs and finds the flowing entries.
Which of the following password attacks is taking place?
A security analyst needs to implement security features across smartphones, laptops, and tablets. Which of the following would be the MOST effective across heterogeneous platforms?
A Enforcing encryption
B Deploying GPOs
C Removing administrative permissions
D Applving MDM software
D. Applying MDM software
All security analysts’ workstations at a company have network access to a critical server VLAN. The information security manager wants to further enhance the controls by requiring that all access to the secure VLAN be authorized only from a given single location. Which of the following will the information security manager most likely implement?
A A forward proxy server
B A jump server
C A reverse proxy server
D A stateful firewall server
B. A jump server
Which of the following supplies non-repudiation during a forensics investigation?
A Dumping volatile memory contents first
B Duplicating a drive with de
C Using a SHA-2 signature of a drive image
D Logging everyone in contact with evidence
E Encrypting sensitive data
C. Using a SHA-2 signature of a drive image
A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)
A Dual power supply
B Off-site backups
C Automatic OS upgrades
D NIC teaming
E Scheduled penetration testing
F Network-attached storage
A. Dual power supply
D. NIC teaming