51-100 Flashcards
Which of the following is the correct order of volatility from most to least volatile?
A Memory, temporary filesystems, routing tables, disk, network storage
B Cache memory, temporary filesystems, disk, archival media
C Memory, disk temporary filesystems, cache, archival media
D Cache, disk, temporary filesystems, network storage, archival media
B. Cache memory, temporary filesystems, disk, archival media
Which of the following would detect intrusions at the perimeter of an airport?
A Signage
B Fencing
C Motion sensors
D Lighting
E Bollards
C. Motion sensors
An analyst is concerned about data leaks and wants to restrict access to internet services to authorized users only. The analyst also wants to control the actions each user can perform on each service. Which of the following would be the best technology for the analyst to consider Implementing?
A DLP
B VPC
C CASB
D Content filtering
C. CASB
An attacker is attempting to harvest user credentials on a client’s website. A security analyst notices multiple attempts of random usernames and passwords. When the analyst types in a random username and password, the logon screen displays the following message:
The username you entered does not exist.
Which of the following should the analyst recommend be enabled?
A Input valuation
B Obfuscation
C Error handling
D Username lockout
C. Error handling
Which of the following should an organization consider implementing in the event executives need to speak to the media after a publicized data breach?
A Incident response plan
B Business continuity plan
C Communication plan
D Disaster recovery plan
C. Communication plan
A manufacturing organization wants to control and monitor access from the internal business network to the segregated production network, while ensuring minimal exposure of the production network to devices. Which of the following solutions would best accomplish this goal?
A Proxy server
B NGEW
C WAF
D Jump server
D. Jump server
A company wants to build a new website to sell products online. The website will host a storefront application that will allow visitors to add products to a shopping cart and pay for the products using a credit card. Which of the following protocols would be the MOST secure to implement?
A SSL
B SETP
C SNMP
D TLS
D. TLS
A user wanted to catch up on some work over the weekend but had issues logging in to the corporate network using a VPN. On Monday, the user opened a ticket for this issue but was able to log in successfully. Which of the following BEST describes the policy that is being implemented?
A Time based logins
B Geofencing
C Network location
D Password history
B. Geofencing
Which of the following is assured when a user signs an email using a private key?
A Non-repudiation
B Confidentiality
C Availability
D Authentication
D. Authentication
Which of the following describes the BEST approach for deploying application patches?
A Apply the patches to systems in a testing environment, then to systems in a staging environment, and finally to production systems.
B Test the patches in a staging environment, develop against them in the development environment, and then apply them to the production systems.
C Test the patches in a test environment, apply them to the production systems, and then apply them to a staging environment.
D Apply the patches to the production systems, apply them in a staging environment, and then test all of them in a testing environment.
A. Apply the patches to systems in a testing environment, then to systems in a staging environment, and finally to production systems.
A secunty analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?
A DDOS
B Privilege escalation
C DNS poisoning
D Buffer overflow
A. DDOS
Which of the following best represents an application that does not have an on-premises requirement and is accessible from anywhere?
A PaaS
B Hybrid cloud
C Private cloud
D laaS
E SaaS
E. SaaS
A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels, however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee’s COPE tablet and passed to the competitor via cloud storage. Which of the following is the BEST remediation for this data leak?
A User training
B CASB
C MDM
D DLP
D. DLP
Recent changes to a company’s BYOD policy require all personal mobile devices to use a two-factor authentication method that is not something you know or have. Which of the following will meet this requirement?
A Facial recognition
B Six-digit PIN
C PKI certificate
D Smart card
A. Facial recognition
A cybersecurity analyst at Company A is working to establish a secure communication channel with a counterpart at Company B, which is 3,000 miles (4,828 kilometers) away. Which of the following concepts would help the analyst meet this goal in a secure manner?
A Digital signatures
B Key exchange
C Salting
D PPTP
B. Key exchange
A company wants to improve end users’ experiences when they log in to a trusted partner website. The company does not want the users to be issued separate credentials for the partner website. Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner’s website?
A Directory service
B AAA server
C Federation
D Multifactor authentication
C. Federation
Which of the following documents provides guidance regarding the recommended deployment of network security systems from the manufacturer?
A Cloud control matrix
B Reference architecture
C NIST RME
D CIS Top 20
B. Reference architecture
Which of the following controls would provide the BEST protection against tailgating?
A Access control vestibule
B Closed-circuit television
C Proximity card reader
D Faraday cage
C. Proximity card reader
A police department is using the cloud to share information with city officials. Which of the following cloud models describes this scenario?
A Hybrid
B Private
C Public
D Community
D. Community
A technician enables full disk encryption on a laptop that will be taken on a business trip. Which of the following does this process BEST protect?
A Data in transit
B Data in processing
C Data at rest
D Data tokenization
C. Data at rest