726 - 750 Flashcards
A newly purchased corporate WAP needs to be configured in the MOST secure manner possible.
Please click on the below items on the network diagram and configure them accordingly:
- WAP
- DHCP Server
- AAA Server
- Wireless Controller
- LDAP Server
If at any time you would like to bring back the initial state of the simulation, please dick the Reset All button.
Word Doc
A security engineer is setting up passwordless authentication for the first time.
Drag and drop the MINIMUM set of commands to set this up and verify that it works. Commands may only be used once, and not all will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Word Doc
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?
A. SSO
B. LEAP
C. MFA
D. PEAP
A. SSO
Which of the following would be best suited for constantly changing environments?
A. RTOS
B. Containers
C. Embedded systems
D. SCADA
B. Containers
A newly identified network access vulnerability has been found in the OS of legacy IoT devices. Which of the following would best mitigate this vulnerability quickly?
A. Insurance
B. Patching
C. Segmentation
D. Replacement
C. Segmentation
The local administrator account for a company’s VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have prevented this from happening?
A. Using least privilege
B. Changing the default password
C. Assigning individual user IDs
D. Implementing multifactor authentication
D. Implementing multifactor authentication
You are a security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the infection and then identify if each remaining host is clean or infected.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Word Doc
Which of the following describes the exploitation of an interactive process to gain access to restricted areas?
A. Persistence
B. Port scanning
C. Privilege escalation
D. Pharming
C. Privilege escalation
A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.
Click on each firewall to do the following:
- Deny cleartext web traffic.
- Ensure secure management protocols are used.
- Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Word Doc
A data owner has been tasked with assigning proper data classifications and destruction methods for various types of data contained within the environment.
From the options below, drag each item to its appropriate classification as well as the MOST appropriate form of disposal.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Word Doc
A security analyst is assessing several company firewalls. Which of the following tools would the analyst most likely use to generate custom packets to use during the assessment?
A. hping
B. Wireshark
C. PowerShell
D. netstat
Reveal Solution
A. hping
A local business was the source of multiple instances of credit card theft. Investigators found that most payments at this business were made at self-service kiosks. Which of the following is the most likely cause of the exposed credit card Information?
A. Insider threat
B. RAT
C. Backdoor
D. Skimming
E. NFC attack
D. Skimming
An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?
A. Job rotation
B. Retention
C. Outsourcing
D. Separation of duties
A. Job rotation
Following a recent security breach, an analyst discovered that user permissions were added when joining another part of the organization but were not removed from existing groups. Which of the following policies would help to correct these issues in the future?
A. Service accounts
B. Account audits
C. Password complexity
D. Lockout policy
B. Account audits
Which of the following ensures an organization can continue to do business with minimal interruption in the event of a major disaster?
A. Business recovery plan
B. Incident response plan
C. Communication plan
D. Continuity of operations plan
D. Continuity of operations plan