All questions Flashcards
246. An email recipient is unable to open a message encrypted through PKI that was sent from another organization. Which of the following does the recipient need to decrypt the message? • A. The sender's private key • B. The recipient's private key • C. The recipient's public key • D. The CA's root certificate • E. The sender's public key • F. An updated CRL
Correct Answer: E
245. A security administrator found the following piece of code referenced on a domain controller's task scheduler: $var = GetDomainAdmins If $var != "˜fabio' SetDomainAdmins = NULL With which of the following types of malware is the code associated? • A. RAT • B. Backdoor • C. Logic bomb • D. Crypto-malware
Correct Answer: C
- Which of the following is the proper use of a Faraday cage?
• A. To block electronic signals sent to erase a cell phone
• B. To capture packets sent to a honeypot during an attack
• C. To protect hard disks from access during a forensics investigation
• D. To restrict access to a building allowing only one person to enter at a time
Correct Answer: A
- In highly secure environments where the risk of malicious actors attempting
to steal data is high, which of the following is the BEST reason to deploy Faraday
cages?
• A. To provide emanation control to prevent credential harvesting
• B. To minimize signal attenuation over distances to maximize signal strength
• C. To minimize external RF interference with embedded processors
• D. To protect the integrity of audit logs from malicious alteration
Correct Answer: C
- A security professional wants to test a piece of malware that was isolated on
a user’s computer to document its effect on a system.
Which of the following is the FIRST step the security professional should take?
• A. Create a sandbox on the machine.
• B. Open the file and run it.
• C. Create a secure baseline of the system state.
• D. Harden the machine.
Correct Answer: C
- The exploitation of a buffer-overrun vulnerability in an application will MOST
likely lead to:
• A. arbitrary code execution.
• B. resource exhaustion.
• C. exposure of authentication credentials.
• D. dereferencing of memory pointers.
Correct Answer: A
240. Using a one-time code that has been texted to a smartphone is an example of: • A. something you have. • B. something you know. • C. something you do. • D. something you are.
Correct Answer: A
- Which of the following BEST explains the difference between a credentialed
scan and a non-credentialed scan?
• A. A credentialed scan sees devices in the network, including those behind NAT, while
a non-credentialed scan sees outward-facing applications.
• B. A credentialed scan will not show up in system logs because the scan is running with
the necessary authorization, while non-credentialed scan activity will appear in the logs.
• C. A credentialed scan generates significantly more false positives, while a noncredentialed scan generates fewer false positives.
• D. A credentialed scan sees the system the way an authorized user sees the system,
while a non-credentialed scan sees the system as a guest.
Correct Answer: D
- A first responder needs to collect digital evidence from a compromised
headless virtual host.
Which of the following should the first responder collect FIRST?
- A. Virtual memory
- B. BIOS configuration
- C. Snapshot
- D. RAM
Correct Answer: C
- An organization wants to set up a wireless network in the most secure way.
Budget is not a major consideration, and the organization is willing to accept
some complexity when clients are connecting. It is also willing to deny wireless
connectivity for clients who cannot be connected in the most secure manner.
Which of the following would be the MOST secure setup that conforms to the
organization’s requirements?
• A. Enable WPA2-PSK for older clients and WPA2-Enterprise for all other clients.
• B. Enable WPA2-PSK, disable all other modes, and implement MAC filtering along with
port security.
• C. Use WPA2-Enterprise with RADIUS and disable pre-shared keys.
• D. Use WPA2-PSK with a 24-character complex password and change the password
monthly.
Correct Answer: C
- Which of the following serves to warn users against downloading and
installing pirated software on company devices?
- A. AUP
- B. NDA
- C. ISA
- D. BPA
Correct Answer: A
- A security analyst is investigating a call from a user regarding one of the
websites receiving a 503: Service Unavailable error. The analyst runs a netstat-an
command to discover if the web server is up and listening. The analyst receives
the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
- A. Buffer overflow
- B. Domain hijacking
- C. Denial of service
- D. ARP poisoning
Correct Answer: C
- Which of the following documents would provide specific guidance
regarding ports and protocols that should be disabled on an operating system?
• A. Regulatory requirements
• B. Secure configuration guide
• C. Application installation guides
• D. User manuals
Correct Answer: B
- A security engineer is analyzing the following line of JavaScript code that
was found in a comment field on a web forum, which was recently involved in a
security breach:
Given the line of code above, which of the following BEST represents the attack performed during the breach? • A. CSRF • B. DDoS • C. DoS • D. XSS
Correct Answer: D
- An organization is concerned about video emissions from users’ desktops.
Which of the following is the BEST solution to implement?
• A. Screen filters
• B. Shielded cables
• C. Spectrum analyzers
• D. Infrared detection
Correct Answer: A
- Which of the following BEST distinguishes Agile development from other
methodologies in terms of vulnerability management?
• A. Cross-functional teams
• B. Rapid deployments
• C. Daily standups
• D. Peer review
• E. Creating user stories
Correct Answer: C
- A systems administrator is receiving multiple alerts from the company NIPS.
A review of the NIPS logs shows the following: reset both: 70.32.200.2:3194 “”>
10.4.100.4:80 buffer overflow attempt reset both: 70.32.200.2:3230 “”>
10.4.100.4:80 directory traversal attack reset client: 70.32.200.2:4019 “”>
10.4.100.4:80 Blind SQL injection attack
Which of the following should the systems administrator report back to
management?
• A. The company web server was attacked by an external source, and the NIPS blocked
the attack.
• B. The company web and SQL servers suffered a DoS caused by a misconfiguration of
the NIPS.
• C. An external attacker was able to compromise the SQL server using a vulnerable web
application.
• D. The NIPS should move from an inline mode to an out-of-band mode to reduce
network latency.
Correct Answer: A
- A contracting company recently completed its period of performance on a
government contract and would like to destroy all information associated with
contract performance.
Which of the following is the best NEXT step for the company to take?
• A. Consult data disposition policies in the contract.
• B. Use a pulper or pulverizer for data destruction.
• C. Retain the data for a period no more than one year.
• D. Burn hard copies containing PII or PHI
Correct Answer: A
- A security analyst is interested in setting up an IDS to monitor the company
network. The analyst has been told there can be no network downtime to
implement the solution, but the IDS must capture all of the network traffic.
Which of the following should be used for the IDS implementation?
• A. Network tap
• B. Honeypot
• C. Aggregation
• D. Port mirror
Correct Answer: A
- A company employee recently retired, and there was a schedule delay
because no one was capable of filling the employee’s position.
Which of the following practices would BEST help to prevent this situation in the
future?
• A. Mandatory vacation
• B. Separation of duties
• C. Job rotation
• D. Exit interviews
Correct Answer: C
- After discovering a security incident and removing the affected files, an
administrator disabled an unneeded service that led to the breach.
Which of the following steps in the incident response process has the
administrator just completed?
• A. Containment
• B. Eradication
• C. Recovery
• D. Identification
Correct Answer: B
225. Which of the following is the MOST likely motivation for a script kiddie threat actor? • A. Financial gain • B. Notoriety • C. Political expression • D. Corporate espionage
Correct Answer: B
- An administrator is disposing of media that contains sensitive information.
Which of the following will provide the MOST effective method to dispose of the
media while ensuring the data will be unrecoverable?
• A. Wipe the hard drive.
• B. Shred the hard drive.
• C. Sanitize all of the data.
• D. Degauss the hard drive
Correct Answer: B
- An organization is building a new customer services team, and the manager
needs to keep the team focused on customer issues and minimize distractions.
The users have a specific set of tools installed, which they must use to perform
their duties. Other tools are not permitted for compliance and tracking purposes.
Team members have access to the Internet for product lookups and to research
customer issues.
Which of the following should a security engineer employ to fulfill the
requirements for the manager?
- A. Install a web application firewall.
- B. Install HIPS on the team’s workstations.
- C. Implement containerization on the workstations.
- D. Configure whitelisting for the team.
Correct Answer: C