601 Flashcards
The firewall administrator is adding a new certificate for the company’s remote access solution. The solution requires that the uploaded file contain the entire certificate chain for the certificate to load properly. The administrator loads the company certificate and the root CA certificate into the file. This file upload was rejected. Which of the following is required to complete the certificate chain?
- Intermediate authority
Joe, a user, wants to configure his workstation to make certain that the certificate he receives when connecting to websites is still valid. Which of the following should joe enable on his station to achieve this?
Certificate Revocation
Which of the following attacks could be used to initiate a subsequent man-in-the-middle attack?
ARP Poisoning
Which of the following best describes a security exploit for which a vendor patch is not readily available?
- Zero Day
An organization wants to move its operations to the cloud. The orgs systems admin will still maintain control of the servers, firewalls, and load balancers in the cloud environment. Which of the following models is the organization considering?
Iaas
A CSO’s key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would best meet the CSOs objectives?
Implement application whitelisting and centralized even-log management, and perform regular testing and validation of full backups.
The IT dept is deploying new computers. To ease the transition, users will be allowed to access their old and new systems. The helpdesk is receiving reports that users are experiencing the following error when attempting to log in to their previous system:
Login failure: Access denied
Which of the following can cause the issue?
- Misconfigured Devices
During a routine audit, it is discovered that someone has been using a stale administrator account to log into a seldom used server. The person has been using the server to view inappropriate websites that are prohibited to end users. Which of the following could best prevent this from occurring again?
- Account expiration policies
An attacker captures the encrypted communication between two parties for a week but is unable to decrypt the message. The attacker then compromises the session keys during one exchange and successfully compromises a single message. The attacker plans to use this key to decrypt previously captured and future communications but is unable to. This is because the encryption scheme in use adheres to:
- Perfect forward secrecy
A chief information security officer (CISO) is concerned about the organization’s ability to continue business ops in the event of a prolonged Ddos attack on it’s local datacenter that consumes database resources. Which of the following will the CISO most likely recommend to mitigate this risk?
- Implement a hot-site failover location
A manufacturer creates designs for very high security products that are required to be protected and controlled by government regulations. These designs are not accessible by corporate networks of the internet. Which of the following is the best solution to protect these designs?
- An air gap
An organization wants to upgrade its enterprise-wide desktop computer solution. The organization currently has 500 PCs active on the network. The CISO suggests that the organization employ desktop imaging technology for such a large-scale upgrade. Which of the following is a security benefit of implementing an imaging solution?
- It provides a consistent baseline
An employee receives an email stating that he won the lottery. The email includes a link that requests a name, phone number, address and date of birth be provided to confirm joes ID before sending him the prize. Which of the following best describes the email?
Phishing
Which of the following can be used by PPP for authentication?
- CHAP
An attacker is attempting to determine the patch level version that a web server is running on its open ports. Which of the following is an active technique that will most efficiently determine the information the attacker is seeking?
- Vulnerability scanning
Which of the following scenarios would make a DNS sinkhole effective in thwarting attacks?
- Malware is trying to resolve an unregistered domain name to determine if its still running in an isolated sandbox
In which of the following situations would it be best to use a detective control type for mitigation?
- A company purchased an IPS system, but after reviewing the requirements, the appliance was supposed to monitor, not block, any traffic.
A user contacts the help the desk after being unable to log into a corporate website. The user can log into the site from another computer in the next office, but not from the PC. The users PC was able to connect earlier in the day. The helpdesk has the user restart NTP service. Afterwards, the user is able to log into the website . The most likely reason for the initial failure was that the website was configured to use which of the following authentication mechanisms?
Kerberos
A penetration testing team deploys a specifically crafted payload to a web server, which results in operating a new session as the web server daemon. The session has full read/write access to the file system and the admin console. Which of the following best describes the attack?
- Privilege escalation
A security analyst needs to produce a document that details how a security incident occurred, the steps that were taken for recovery, and how future incidents can be avoided. During which of the following stages of the response process will this activity take place?
- Lessons learned
An organization received a subpoena requesting access to data that resides on an employees computer. The organization uses PKI. Which of the following is the best way to comply with the request?
- Key recovery agent
Which of the following access control methodologies provides an individual with the most restrictive access rights to successfully perform their authorized duties?
-Least Privilege
Which of the following best explains the reason why a server admin would place a doc named password.txt on the desktop of an admin account on a server?
- The doc is a honeyfile and is meant to attract the attention of a cyberintruder
In which of the following common use cases would steganography be employed?
Integrity
Two companies are partnering to bid on a contract. Normally these companies are fierce competitors but for this procurement they have determined that a partnership is the only way they can the job. Each company is concerned about unauthorized data sharing and wants to ensure other divisions within each company will not have access to property data. To best protect against unauthorized data sharing they should each sign an
- NDA
Several users computers are no longer responding normally and sending out spam email to the users entire contact list. This is an example of which of the following?
- Worm Outbreak
Which of the following attacks initiates a connection by sending specially crafted packets in which multiple TCP flags are set to 1?
Xmas
A company wants to ensure that the validity of publicly trusted certificates used by its web servers can be determined even during an extended internet outage. Which of the following should be implemented?
OCSP
To reduce cost and overhead, an organization wants to move from an on-premises email solutions to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would best meet the needs of the organization?
Saas
A systems administrator wants to generate a self-signed certificate for an internal website. Which of the following steps should the systems admin complete prior to installing the certificate on the server?
- Provide the public key to the internal CA
A pharmaceutical sales rep logs on to a laptop and connects to the public wifi to check emails and update reports. Which of the following would be best to prevent other devices on the network from directly accessing the laptop?
A host based firewall
- A VPN
A security admin suspects there may be unnecessary services running on a server. Which of the following will the admin most likely use to confirm the suspicions?
Nmap
Joe, a salesman, was assigned to a new project that requires him to travel to a client site. While waiting for a flight, Joe decides to connect to the airport wireless network without connecting to a VPN, and then sends confidential emails to fellow colleagues. A few days later, the company experiences a data breach. Upon investigation, the company learns joes emails were intercepted. Which of the following most likely caused the data breach?
- Policy Violation
Which of the following algorithms has well documented collisions?
MD5
- SHA
The IT departments on-site developer has been with the team for many years. Each time an application is released, the security team is able to ID multiple vulnerabilities. Which of the following would best help the team ensure the application is ready to be released to production?
- Submit the application to QA before releasing it
Attackers have been using revoked certificates for MITM attacks to steal credentials from employees of company.com. Which of the following options should company.com implement to mitigate these attacks?
-OCSP Stapling
An org wants to ensure servers and apps can be deployed rapidly, in a consistent manner, and allow flexible configuration changes. Which of the following should the org use to make this process repeatable across multiple locations?
Elasticity
Which of the following are moist susceptible to birthday attacks?
- Hashed passwords
When generating a request for a new x.509 certificate for security a websie, which of the following is the most appropriate hashing algorithm?
MD5
A company must implement management controls to deter system administrators from making unauthorized changes to sensitive systems. Which of the following should the company implement?
-Remove syslog server inaccessible by system administrators.
A CIO recently saw on the news that a significant security flaw exists with a specific version of a technology the company uses to support many critical apps. The CIO wants to know if this reported vulnerability exists in the organization and, if so, to what extent the company could be harmed. Which of the following would best provide the needed information?
-Vulnerability Scan
A security auditor is reviewing vulnerability scan data provided by an internal security team. Which of the following best indicates that valid credentials were used?
- The scan enumerated software versions of installed programs
A security analyst is hardening a WIFI infrastructure. The primary requirements are the following:
The infrastructure must allow staff to authenticate using the most secure method
The infrastructure must allow guests to use the “open” wifi network that logs valid email addresses before granting access to the internet.
Given these, which of the following statements best represents what the analyst should recommend and configure?
- Configure a captive portal for guests and WPA2 Enterprise for staff
Which of the following refers to applications and systems that are used within an org without consent or approval?
-Shadow IT
A CSO is concerned about the amount of PII that is stored locally on each salespersons laptop. The sales department has a higher-than-average rate of lost equipment. Which of the following recommendations would best address the CSOs concern?
- Implement managed FDE
A cyber security manager has scheduled biannual meeting with the IT team and dept leaders to discuss how they would respond to hypothetical cyber attacks. During these meetings, the manager presents a scenario and injects additional info throughout the session to replicate what might occur in a dynamic cybersecurity event involving the company, it’s facilities, it’s data, and its staff. Which of the following describes what the manager is doing?
- Conducting a tabletop exercise
A technician is configuring a wireless guest network. After applying the most recent changes the technician finds that new devices can no longer find the wireless network by name but existing devices are still able to use the wireless network. Which of the following security measures did the technician most likely implement to cause this scenario?
- Deactivation of SSID broadcast
Which of the following is characterized by an attacker attempting to map out an organizations staff hierarchy in order to send targeted emails?
Whaling
The IT dept needs to prevent users from installing apps. Which of the following would provide the best solution?
- Least Privilege
A technician needs to prevent data loss in a laboratory. The lab is not connected to any networks. Which of the following methods would best prevent the exfiltration of data?
Drive Encryption
- USB Blocker
The process of applying a salt and a cryptographic hash to a password then repeating the process many times is known as which of the following?
- Key Stretching