351-380 Flashcards
An organization has expanded its operations by opening a remote office. The new office is fully
furnished with office resources to support up to 50 employees working on any given day.
Which of the following VPN solutions would BEST support the new office?
A. Always On B. Remote access C. Site-to-site D. Full tunnel Answer: C
When used at the design stage, which of the following improves the efficiency, accuracy, and speed
of a database?
A. Tokenization B. Data masking C. Normalization D. Obfuscation Answer: C
A customer called a company’s security team to report that all invoices the customer has received
over the last five days from the company appear to have fraudulent banking details.
An investigation into the matter reveals the following
* The manager of the accounts payable department is using the same password across multiple external
websites and the corporate account.
* One of the websites the manager used recently experienced a data breach.
* The manager’s corporate email account was successfully accessed in the last five days by an IP
address located in a foreign country
Which of the following attacks has MOST likely been used to compromise the manager’s corporate
account?
A. Remote access Trojan B. Brute-force C. Dictionary D. Credential stuffing E. Password spraying Answer: D
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and
data processors?
A. SSAE SOC 2 B. PCI DSS C. GDPR D. ISO 31000 Answer: C
An organization has implemented a policy requiring the use of conductive metal lockboxes for
personal electronic devices outside of a secure research lab.
Which of the following did the organization determine to be the GREATEST risk to intellectual property
when creating this policy?
A. The theft of portable electronic devices
B. Geotagging in the metadata of images
C. Bluesnarfing of mobile devices
D. Data exfiltration over a mobile hotspot
Answer: D
An organization that is located in a flood zone is MOST likely to document the concerns associated
with the restoration of IT operation in a:
A. business continuity plan B. communications plan. C. disaster recovery plan. D. continuity of operations plan Answer: C
Which of the following would MOST likely support the integrity of a voting machine?
A. Asymmetric encryption B. Blockchain C. Transport Layer Security D. Perfect forward secrecy Answer: D
A financial institution would like to stare is customer data a could but still allow the data ta he
accessed and manipulated while encrypted. Doing se would prevent the cloud service provider from
being able to decipher the data due to its sensitivity. The financial institution is not concern about
computational overheads and slow speeds.
Which of the following cryptographic techniques would BEST meet the requirement?
A. Asymmatric B. Symmetric C. Homeomorphic D. Ephemeral Answer: B
A small business office is setting up a wireless infrastructure with primary requirements centered
around protecting customer information and preventing unauthorized access to the business network.
Which of the following would BEST support the office’s business needs? (Select TWO)
A. Installing WAPs with strategic placement
B. Configuring access using WPA3
C. Installing a WIDS
D. Enabling MAC filtering
E. Changing the WiFi password every 30 days
F. Reducing WiFi transmit power throughout the office
Answer: B,D
A systems administrator needs to install the same X.509 certificate on multiple servers.
Which of the following should the administrator use?
A. Key escrow B. A self-signed certificate C. Certificate chaining D. An extended validation certificate Answer: B
A security analyst notices several attacks are being blocked by the NIPS but does not see anything
on the boundary firewall logs. The attack seems to have been thwarted.
Which of the following resiliency techniques was applied to the network to prevent this attack?
A. NIC Teaming B. Port mirroring C. Defense in depth D. High availability E. Geographic dispersal Answer: C
A bank detects fraudulent activity on user’s account. The user confirms transactions completed
yesterday on the bank’s website at https://www.company.com. A security analyst then examines the
user’s
Internet usage logs and observes the following output:
date; username; url;destinationport; responsecode
2020-03-01; userann; http: //www.company.org/;80;302
2020-03-01; userann: http: //www.company.org/secure_login/;80;200
2020-03-01; userann:http: //www.company.org/dashboard/;80;200
Which of the following has MOST likely occurred?
A. Replay attack B. SQL injection C. SSL stripping D. Race conditions Answer: A
Which of the following is the BEST reason to maintain a functional and effective asset management
policy that aids in ensuring the security of an organization?
A. To provide data to quantity risk based on the organization’s systems.
B. To keep all software and hardware fully patched for known vulnerabilities
C. To only allow approved, organization-owned devices onto the business network
D. To standardize by selecting one laptop model for all users in the organization
Answer: A
Which of the following BEST explains the difference between a data owner and a data custodian?
A. The data owner is responsible for adhering to the rules for using the data, while the data custodian is
responsible for determining the corporate governance regarding the data
B. The data owner is responsible for determining how the data may be used, while the data custodian is
responsible for implementing the protection to the data
C. The data owner is responsible for controlling the data, while the data custodian is responsible for
maintaining the chain of custody when handling the data
D. The data owner grants the technical permissions for data access, while the data custodian maintains
the database access controls to the data
Answer: B
A security administrator checks the table of a network switch, which shows the following output:
Which of the following is happening to this switch?
A. MAC Flooding B. DNS poisoning C. MAC cloning D. ARP poisoning Answer: A