A1 Build Your Own Flashcards
During the acquisition process of forensic evidence, it is crucial to take the order of volatility into account. Data stored in which of the following would be considered the MOST volatile?
A
Backups
B
Optical drives
C
RAM
D
Disk drives
C
RAM
Which type of log files holds information about potentially malicious traffic that was blocked on an interface?
A
Network
B
OS-specific
C
Endpoint
D
Firewall
D
Firewall
Acme Inc. is a software development company and is conducting an audit of its security. The auditor notices that the company utilizes numerous third-party libraries in their code but lacks controls for ensuring those libraries are not compromised.
What type of activity should they implement to address this?
Package monitoring
Penetration testing
Data masking
Sandboxing
A
Package monitoring
Which of the following types of security controls is a highly visible CCTV camera?
A
Preventative
B
Compensating
C
Deterrent
D
Corrective
C
Deterrent
For a large company with complex compliance requirements, what can they use to improve efficiency and reduce human error?
A
Attestation
B
External audit
C
Due diligence
D
Automation
D
Automation
An auditor is examining a small company’s network infrastructure. They discover that user workstations are in the same segment as the company’s public web server. What should the auditor recommend that the company implement based on this information?
A Security zones
B Proxy servers
C Load balancing
D Containerization
A
Security zones
Which of the following concerns is a valid security consideration that needs to be taken into account when using cloud compute resources?
A
Running containers on multi-purpose servers to improve efficiency
B
Segmenting containers
C
Removing containers from security groups
D
Disabling dynamic resource allocation for automatically adding or removing containers
B
Segmenting containers
An organization is responding to a security incident to one of their web servers. After removal of the remnants of malware and attacker access to the server, what step of the incident response procedure should they start?
A
Eradication
B
Recovery
C
Detection
D
Containment
B
Recovery
A company wants to block all requests to a known malicious domain name. What type of web filtering should they use?
A
URL scanning
B
Port filtering
C
Reputation-based filtering
D
Content categorization
A
URL scanning
Which of the following components manages security in SDN?
A
Management plane
B
SASE
C
Data plane
D
Controller
D
Controller
Question 15
/ 250
Which type of device includes antivirus and anti-spam capabilities?
A
Application-layer firewall
B
WAF
C
UTM
D
NGFW
C
UTM
What is the purpose of a chain of custody?
A
To provide physical security to end-user computing devices
B
To secure digital forensics data so that it cannot be stolen
C
To provide a complete account of the handling and storage of all evidence
D
To provide a secure and decentralized method of recording and verifying transactions
C
To provide a complete account of the handling and storage of all evidence
Which of the following memory issues can cause a computer to run out of available memory?
A
Memory leak
B
Buffer overflow
C
Pointer dereference
D
Integer overflow
A
Memory leak
What is a specific advantage of using IaC when moving an application to a live environment?
A
Risk transference
B
Patch availability
C
Availability
D
Ease of deployment
D
Ease of deployment
A food processing company allows a third party to log in to some of their systems to update data. After an audit, it was discovered that one of those accounts was logging in from locations that involved impossible travel and was attempting to access other areas of the network.
What threat vector needs to be addressed in this situation?
A Bluetooth
B Vendor
C Removable device
D IM-based
B
Vendor
Which of the following types of logs could record information about failed driver launches or a computer shutting down?
A
System
B
Security
C
Dump files
D
Application
A
System
Payroll in HR is reviewing their payroll and invoice payment processes that involve large sums of money. They want to prevent fraud and provide enhanced accountability. They have decided to incorporate a second employee into the process, so it can’t be done by one person.
Which type of access control is being used?
A Least privilege
B Separation of duties
C Implicit deny
D Job rotation
B
Separation of duties
Which concept is used in risk analysis to describe the chance of a specific event occurring in qualitative terms?
A
Likelihood
B
Threshold
C
Probability
D
Impact
A
Likelihood
A company has many distributed offices that need to connect remotely. They want the network that connects the offices to have high availability and utilize various connectivity services to improve its performance, agility, and cost-effectiveness.
What type of solution should they use for this?
A NAC
B HTTPS
C VLAN
D SD-WAN
D
SD-WAN
A load balancer at Acme Inc. is fielding requests from the internet to Acme’s new web portal that provides hospitals access to their medical tool catalog. They are receiving quite a bit of traffic from around the country and have configured the load balancer to keep users’ requests local to the server that first accepts the request. For example, user 1 visits the website and is routed to server 3; all subsequent visits send user 1 to server 3 for their web access.
This is an example of which of the following?
A Round-robin
B Agent-based
C Source address affinity
D Weight-based
C
Source address affinity
Which of the following vectors is MOST likely to be used during passive reconnaissance?
A
Removable media
B
Social media
C
Supply chain
D
Phishing
B
Social media
An administrator is reviewing a system that hosts a secure site for users to track banking information. In addition to hosting the web application, this server also handles the TLS connections between the server and client. Logs are indicating that the system is maxing out its CPU and RAM usage, which is impacting the website speed.
Which of the following would enhance this secure website’s function?
A Scale up the server with more RAM and CPU
B Limit the number of connections to the server
C Reduce the number of requests accepted per connection
D Offload encryption functionality to a dedicated device
D
Offload encryption functionality to a dedicated device
An administrator has a network that should be kept entirely secret from other networks in an organization. What should they implement so that there is no physical connection between the secret network and other networks in the organization?
A
Firewall
B
Collision domain
C
Modem
D
Air gap
D
Air gap
This phase of the incident response process occurs before an incident and provides guidance to personnel on how to appropriately respond. Which of the following is the first step in the incident response process?
A
Containment
B
Identification
C
Preparation
D
Eradication
C
Preparation