4 Flashcards
Greg would like to create an umbrella agreement that provides the security terms and conditions for all future work that his organizations does with a vendor. What type of agreement should Greg use?
MOU
SLA
MSA
BPA
MSA
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. What should she choose?
STIX 2.0
STIX 1.0
TAXII
OpenIOC
TAXII
Gwen is building her organization’s documentation and processes and wants to create the plan for what the organization would do if her datacenter burned down. What type of plan would typically cover that type of scenario?
A disaster recovery plan
A stakeholder management plan
An incident response plan
A business continuity plan
A disaster recovery plan
Lila is working on a penetration testing team and she is unsure whether she is allowed to conduct social engineering as part of the test. What document should she consult to find this information?
Statement of work
Rules of engagement
Lessons learned report
Contract
Rules of engagement
James is concerned about preventing broadcast storms on his network. Which of the following solutions is not a useful method of preventing broadcast storms on his network?
Enable Spanning Tree Protocol
Enable loop protect features on switches
Limit the size of VLANs
Disable ARP on all accessible ports
Disable ARP on all accessible ports
Greg wants to use a tool that can directly edit disks for forensic purposes. What commercial tool could he select from this list?
dd
WinHex
memdump
df
WinHex
Alyssa wants to use her Android phone to store and manage cryptographic certificates. What type of solution could she choose to do this using secure hardware?
SEAndroid
MDM
A wireless TPM
A microSD HSM
A microSD HSM
Megan’s organization uses the Diamond Model of Intrusion Analysis as part of their incident response process. A user in Megan’s organization has discovered a compromised system. What core feature would help her determine how the compromise occurred?
Infrastructure
Adversary
Victim
Capability
Capability
Ben searches through an organization’s trash looking for sensitive documents, internal notes, and other useful information. What term describes this type of activity?
Dumpster diving
Dumpster harvesting
Trash pharming
Waste engineering
Dumpster diving
Randy wants to prevent DHCP attacks on his network. What secure protocol should he implement to have the greatest impact?
ARPS
LDAPS
SDHCP
None of the above
None of the above
Ian has been receiving hundreds of false positive alerts from his SIEM every night when scheduled jobs run across his datacenter. What should he adjust on his SIEM to reduce the false positive rate?
Dashboard configuration
Trend analysis
Correlation rules
Sensitivity
Sensitivity
Lucca’s organization runs a hybrid datacenter with systems in Microsoft’s Azure cloud and in a local facility. Which of the following attacks is one that he can establish controls for in both locations?
Dumpster diving
Tailgating
Phishing
Shoulder surfing
Phishing
Susan wants to ensure that the threat of a lost phone creating a data breach is minimized. What two technologies should she implement to do this?
Remote wipe and FDE
Geofencing and remote wipe
Containerization and NFC
Wi-Fi and NFC
Remote wipe and FDE
Alan reads Susan’s password from across the room as she logs in. What type of technique has he used?
A man-in-the-middle attack
Shoulder surfing
Pretexting
A man-in-the-room attack
Shoulder surfing
Madhuri is designing a load-balancing configuration for her company and wants to keep a single node from being overloaded. What type of design will meet this need?
Active/active
Active/passive
Duck-duck-goose
A daisy chain
Active/active
During a vulnerability scan, Brian discovered that a system on his network contained this vulnerability:
File integrity monitoring
Threat hunting
Patch management
Intrusion detection
Patch management