7 Flashcards
Charles wants to monitor changes to a log file via a command line in real time. Which of the following command-line Linux tools will let him see the last lines of a log file as they change?
A. logger
B. tail
C. chmod
D. head
B. tail
Naomi has discovered the following TCP ports open on a system she wants to harden. Which ports are used for unsecure services and thus should be disabled to allow their secure equivalents to continue to be used?
21
22
23
80
443
A. 21, 22, and 80
B. 21 and 80
C. 21, 23, and 80
D. 22 and 443
C. 21, 23, and 80
Frank’s organization is preparing to deploy a data loss prevention (DLP) system. What key process should they undertake before they deploy it?
A. Define data lifecycles for all nonsensitive data.
B. Encrypt all sensitive data.
C. Implement and use a data classification scheme.
D. Tag all data with the name of the creator or owner.
C. Implement and use a data classification scheme.
The company that Theresa works for has deployed IoT sensors that have built-in cellular modems for communication back to a central server. What issue may occur if the devices can be accessed by attackers?
A. Attackers may change the baseband frequency used by the devices, causing them to fail.
B. Attackers may switch the devices to a narrowband radio mode that limits the range of the cellular modems.
C. Attackers may steal the SIM cards from the devices and use them for their own purposes.
D. Attackers may clone the SIM cards from the devices to conduct attacks against one-time password systems.
C. Attackers may steal the SIM cards from the devices and use them for their own purposes.
Which of the following is not a typical security concern with MFPs?
A. Exposure of sensitive data from copies and scans
B. Acting as a reflector for network attacks
C. Acting as an amplifier for network attacks
D. Use of weak encryption
D. Use of weak encryption
Michelle wants to prevent unauthorized applications from being installed on a system. What type of tool can she use to allow only permitted applications to be installed?
A. A hardening application
B. An allow list application
C. A deny list application
D. A HIPS
B. An allow list application
What term is used to describe tools focused on detecting and responding to suspicious activities occurring on endpoints like desktops, laptops, and mobile devices?
A. EDR
B. IAM
C. FDE
D. ESC
A. EDR
Which of the following is not typically part of a SoC?
A. A CPU
B. A display
C. Memory
D. I/O
C. Memory
What scripting environment is native to Windows systems?
A. Python
B. PowerShell
C. Bash
D. CMD
B. PowerShell
Amanda is assessing a vehicle’s internal network. What type of bus is she most like to discover connecting its internal sensors and controllers?
A. Narrowband bus
B. A Zigbee bus
C. A CAN bus
D. An SoC bus
C. A CAN bus
The company that Hui works for has built a device based on an Arduino and wants to standardize its deployment across the entire organization. What type of device has Hui’s organization deployed, and where should Hui place her focus on securing it?
A. An FPGA, and on network security
B. A microcontroller, and on physical security
C. A GPU, and on network security
D. An ICS, and on physical security
B. A microcontroller, and on physical security
Which of the following is not a typical reason to use an IP addressing schema in an enterprise?
A. Avoiding use of other organizations’ IP addresses
B. Avoiding IP address exhaustion in a subnet
C. Asset and system inventory
D. Consistency of practice with gateway and other IP addresses
A. Avoiding use of other organizations’ IP addresses
Brian has deployed a system that monitors sensors and uses that data to manage the power distribution for the power company that he works for. Which of the following terms is commonly used to describe this type of control and monitoring solution?
A. SCADA
B. AVAD
C. SIM
D. HVAC
A. SCADA
The organization that Lynn works for wants to deploy an embedded system that needs to process data as it comes in to the device without processing delays or other interruptions. What type of solution does Lynn’s company need to deploy?
A. An MFP
B. A HIPS
C. An SoC
D. An RTOS
D. An RTOS
Which of the following is not a common constraint of an embedded system?
A. Compute
B. Form factor
C. Network
D. Authentication
B. Form factor
Jim configures a Windows machine with the built-in BitLocker full disk encryption tool. When is the machine least vulnerable to having data stolen from it?
A. When the machine is off
B. When the machine is booted and logged in but is locked
C. When the machine is booted and logged in but is unlocked
D. When the machine is booted and logged in but is asleep
A. When the machine is off