426-450 Flashcards
A police department is using the cloud to share information with city officials. Which of the following cloud models describes this scenario?
A. Hybrid
B. Private
C. Public
D. Community
D. Community
A user reports that a bank’s website no longer displays a padlock symbol. A security analyst views the user’s screen and notices the connection is using HTTP instead of HTTPS. Which of the following attacks is most likely occurring?
A. Memory leak
B. SSL stripping
C. API
D. Pass the hash
B. SSL stripping
A data center has experienced an increase in under-voltage events following electrical grid maintenance outside the facility. These events are leading to occasional losses of system availability. Which of the following would be the most cost-effective solution for the data center to implement?
A. Uninterruptible power supplies with battery backup
B. Managed power distribution units to track these events
C. A generator to ensure consistent, normalized power delivery
D. Dual power supplies to distribute the load more evenly
A. Uninterruptible power supplies with battery backup
A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avoid managing a password for authentication and additional software installation. Which of the following should the architect recommend?
A. Soft token
B. Smart card
C. CSR
D. SSH key
D. SSH key
A security analyst is assisting a team of developers with best practices for coding. The security analyst would like to defend against the use of SQL injection attacks. Which of the following should the security analyst recommend first?
A. Tokenization
B. Input validation
C. Code signing
D. Secure cookies
B. Input validation
Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure access is granted properly?
A. API integrations
B. Auditing
C. Resource policies
D. Virtual networks
C. Resource policies
A security operations technician is searching the log named /var/messages for any events that were associated with a workstation with the IP address 10.1.1.1. Which of the following would provide this information?
A. cat /var/messages | grep 10.1.1.1
B. grep 10.1.1.1 | cat /var/messages
C. grep /var/messages | cat 10.1.1.1
D. cat 10.1.1.1 | grep /var/messages
A. cat /var/messages | grep 10.1.1.1
A security analyst is investigating a report from a penetration test. During the penetration test, consultants were able to download sensitive data from a back-end server. The back-end server was exposing an API that should have only been available from the company’s mobile application. After reviewing the back-end server logs, the security analyst finds the following entries:
10.35.45.53 - - [22/May/2020:06:57:31 +0100] “GET /spi/cliend_id=1 HTTP/1.1” 403 1705 “http://www.example.com/api/” “PostmanRuntime/7.26.5”
10.35.45.53 - - [22/May/2020:07:00:58 +0100] “GET /spi/cliend_id=1 HTTP/1.1” 403 1705 “http://www.example.com/api/” “PostmanRuntime/7.22.0”
10.32.40.13 - - [22/May/2020:08:08:52 +0100] “GET /spi/cliend_id=1 HTTP/1.1” 403 1705 “http://www.example.com/api/” “PostmanRuntime/1.1.1”
10.32.40.25 - - [22/May/2020:08:13:52 +0100] “GET /spi/cliend_id=1 HTTP/1.1” 403 1705 “http://www.example.com/api/” “PostmanRuntime/2.3.1”
10.35.45.53 - - [22/May/2020:08:20:18 +0100] “GET /spi/cliend_id=1 HTTP/1.1” 403 1705 “http://www.example.com/api/” “PostmanRuntime/2.3.0”
Which of the following is the most likely cause of the security control bypass?
A. IP address allow list
B. User-agent spoofing
C. WAF bypass
D. Referrer manipulation
B. User-agent spoofing
Which of the following processes would most likely help an organization that has conducted an incident response exercise to improve performance and identify challenges?
A. Lessons learned
B. Identification
C. Simulation
D. Containment
A. Lessons learned
Which of the following control types is patch management classified under?
A. Deterrent
B. Physical
C. Corrective
D. Detective
C. Corrective
A security analyst is investigating what appears to be unauthorized access to a corporate web application. The security analyst reviews the web server logs and finds the flowing entries:
106.35.45.53 - - [22/May/2020:07:00:58 +0100] “GET /login?username=admin&pin=0000 HTTP/1.1” 200 11705 “http://www.example.com/login.php”
106.35.45.53 - - [22/May/2020:07:01:21 +0100] “GET /login?username=admin&pin=0001 HTTP/1.1” 200 11705 “http://www.example.com/login.php”
106.35.45.53 - - [22/May/2020:07:01:52 +0100] “GET /login?username=admin&pin=0002 HTTP/1.1” 200 11705 “http://www.example.com/login.php”
106.35.45.53 - - [22/May/2020:07:02:18 +0100] “GET /login?username=admin&pin=0003 HTTP/1.1” 200 11705 “http://www.example.com/login.php”
106.35.45.53 - - [22/May/2020:07:02:18 +0100] “GET /login?username=admin&pin=0004 HTTP/1.1” 200 11705 “http://www.example.com/login.php”
Which of the following password attacks is taking place?
A. Dictionary
B. Brute-force
C. Rainbow table
D. Spraying
B. Brute-force
A company that provides an online streaming service made its customers’ personal data, including names and email addresses, publicly available in a cloud storage service. As a result, the company experienced an increase in the number of requests to delete user accounts. Which of the following BEST describes the consequence of this data disclosure?
A. Regulatory fines
B. Reputation damage
C. Increased insurance costs
D. Financial loss
B. Reputation damage
An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sale systems. The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the best options to accomplish this objective? (Choose two.)
A. Load balancing
B. Incremental backups
C. UPS
D. RAID
E. Dual power supply
F. VLAN
A. Load balancing
D. RAID
Which of the following can be used to detect a hacker who is stealing company data over port 80?
A. Web application scan
B. Threat intelligence
C. Log aggregation
D. Packet capture
D. Packet capture
A company recently enhanced mobile device configuration by implementing a set of security controls biometrics context-aware authentication and full device encryption. Even with these settings in place, an unattended phone was used by a malicious actor to access corporate data. Which of the following additional controls should be put in place first?
A. GPS tagging
B. Remote wipe
C. Screen lock timer
D. SEAndroid
C. Screen lock timer