cas-003 Flashcards

study questions

1
Q

A forensics analyst suspects that a breach has occurred. Security logs show the company’s OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication between a client computer and the patch server. Which of the following should the analyst use to confirm this suspicion?

A. File size

B. Digital signature

C. Checksums

D. Anti-malware software

E. Sandboxing

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company wants to perform analysis of a tool that is suspected to contain a malicious payload. A forensic analyst is given the following snippet:

A32A[34fda 19(fdA43gfd/home/user/lib/module_so_343jkArfvv(342fds43g

Which of the following did the analyst use to determine the location of the malicious payload?

A. Code deduplicators

B. Binary reverse-engineering

C. Fuzz testing

D. Security containers

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board meeting.

Which of the following would be the BEST methods to prepare this report? (Choose two.)

A. Review the CVE database for critical exploits over the past year

B. Use social media to contact industry analysts

C. Use intelligence gathered from the Internet relay chat channels

D. Request information from security vendors and government agencies

E. Perform a penetration test of the competitor’s network and share the results with the board

A

Answer: A, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An infrastructure team is at the end of a procurement process and has selected a vendor. As part of the final negotiations, there are a number of outstanding issues, including:
1. Indemnity clauses have identified the maximum liability
2. he data will be hosted and managed outside of the company’s geographical location
The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project’s security consultant recommend as the NEXT step?

A. Develop a security exemption, as it does not meet the security policies
B. Mitigate the risk by asking the vendor to accept the in-country privacy principles
C. Require the solution owner to accept the identified risks and consequences
D. Review the entire procurement process to determine the lessons learned

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An agency has implemented a data retention policy that requires tagging data according to type before storing it in the data repository. The policy requires all business emails be automatically deleted after two years. During an open records investigation, information was found on an employee’s work computer concerning a conversation that occurred three years prior and proved damaging to the agency’s reputation.

Which of the following MOST likely caused the data leak?

A. The employee manually changed the email client retention settings to prevent deletion of emails
B. The file that contained the damaging information was mistagged and retained on the server for longer than it should have been
C. The email was encrypted and an exception was put in place via the data classification application
D. The employee saved a file on the computer’s hard drive that contained archives of emails, which were more than two years old

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Due to a recent breach, the Chief Executive Officer (CEO) has requested the following activities be conducted during incident response planning:
• Involve business owners and stakeholders
• Create an applicable scenario
• Conduct a biannual verbal review of the incident response plan
• Report on the lessons learned and gaps identified

Which of the following exercises has the CEO requested?

A. Parallel operations
B. Full transition
C. Internal review
D. Tabletop
E. Partial simulation

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Given the following code snippet:
Sec Cond = “1SS”
SecStatus = false
try (
if (SecStatus)
SecCond = “2SS”
console.log (“ship to ship”)

else
SecCond = “normal operations”
console. log ( “nothing to see here”)
} catch (e) {
SecCond = “normal operations”
console.log (e)
console.log (“Exception logged”)

}

Which of the following failure modes would the code exhibit?

A. Open
B. Secure
C. Halt
D. Exception

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An insurance company has buo million customers and is researching the top transactions on its customer portal. It identifies that the top transaction is currently password reset.

Due to users not remembering their secret questions, a large number of calls are consequently routed to the contact center for manual password resets. The business wants to develop a mobile application to improve customer engagement in the future, continue with a single factor of authentication, minimize management overhead of the solution, remove passwords, and eliminate to the contact center.

Which of the following techniques would BEST meet the requirements? (Choose two.)

A. Magic link sent to an email address
B. Customer ID sent via push notification
C. SMS with OTP sent to a mobile number
D. Third-party social login
E. Certificate sent to be installed on a device
F. Hardware tokens sent to customers

A

Answer: C, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A forensics analyst suspects that a breach has occurred. Security logs show the company’s OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication bebueen a client computer and the patch server.

Which of the following should the analyst use to confirm this suspicion?

A. File size
B. Digital signature
C. Checksums
D. Anti-malware somvare
E. Sandboxing

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Given the following code snippet:

< FORM ACTION=”http://192.168.51. 10/cgi—bin/order.pl” method=”port”>

QUANTITY:
< /FORM>

Of which of the following is this snippet an example?

A. Data execution prevention
B. Buffer overflow
C. Failure to use standard libraries
D. Improper filed usage
E. Input validation

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A software development team is conducting functional and user acceptance testing of internally developed web applications using a COTS solution. For automated testing, the solution uses valid user credentials from the enterprise directory to authenticate to each application. The solution stores the username in plain text and the corresponding password as an encoded string in a script within a file, located on a globally accessible network share. The account credentials used belong to the development team lead.

To reduce the risks associated with this scenario while minimizing disruption to ongoing testing, which of the following are the BEST actions to take? (Choose two.)
A. Restrict access to the network share by adding a group only for developers to the share’s ACL
B. Implement a new COTS solution that does not use hard-coded credentials and integrates with directory services
C. Obfuscate the username within the script file with encoding to prevent easy identification and the account used
D. Provision a new user account within the enterprise directory and enable its use for authentication to the target applications. Share the username and password with all developers for use in their individual scripts
E. Redesign the web applications to accept single-use, local account credentials for authentication

A

Answer: A, B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the GREATEST security concern with respect to BYOD?

A. The filtering of sensitive data out of data flows at geographic boundaries.
B. Removing potential bottlenecks in data transmission paths.
C. The transfer of corporate data onto mobile corporate devices.
D. The migration of data into and out of the network in an uncontrolled manner.

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

As a result of an acquisition, a new development team is being integrated into the company. The development team has BYOD laptops with IDES installed, build severs, and code repositories that utilize SaaS. To have the team up and running effectively, a separate Internet connection has been procured. A stand up has identified the following additional requirements:

  1. Reuse of the existing network infrastructure
  2. Acceptable use policies to be enforced
  3. Protection of sensitive files
  4. Access to the corporate applications

Which of the following solution components should be deployed to BEST meet the requirements? (Select three.)

A. IPSec VPN
B. HIDS
C. Wireless controller
D. Rights management
E. SSL VPN
F. NAC
G. WAF
H. Load balancer

A

Answer: D, E, F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A threat advisory alert was just emailed to the IT security staff. The alert references specific types of host operating systems that can allow an unauthorized person to access files on a system remotely. A fix was recently published, but it requires a recent endpoint protection engine to be installed prior to running the fix.

Which of the following MOST likely need to be configured to ensure the system are mitigated accordingly? (Select two)

A. Antivirus
B. HIPS
C. Application whitelisting
D. Patch management
E. Group policy implementation
F. Firmware updates

A

Answer: D, F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A server (10.0.0.2) on the corporate network is experiencing a DOS from a number of marketing desktops that have been compromised
and are connected to a separate nebuork segment. The security engineer implements the following configuration on the management
router:
Router (config) # ip route 192.168.3.1 2ss.2ss.2ss.2SS Null0
Router (config) # route—map DATA
Router (config—route—map) #match tag 101
Router (config—route—map) #set ip next—hop 192.168.3.1
Router (config—route—map) # set cornrnunity no—export

Router (config—router) #redistribute static route—map DATA

Router (config) ip route 10.0.0.2 255. 2SS .2SS.2SS Null 0 tag 101

Which of the following is the engineer implementing?

A. Remotely triggered black hole
B. Route protection
C. Port security
D. Transport security
F. Address space layout randomization

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A security controls assessor intends to perform a holistic configuration compliance test of networked assets. The assessor has been
handed a package of definitions provided in XML format, and many of the files have two common tags within them: “<object>/>” and “<state>".</state></object>

Which of the following tools BEST supports the use of these definitions?

A. HTTP interceptor
B. Static code analyzer
C. SCAP scanner
D. XML fuzzer

A

Answer: D

17
Q

An organization is preparing to develop a business continuity plan. The organization is required to meet regulatory requirements relating to
confidentiality and availability, which are well-defined. Management has expressed concern following initial meetings that the organization is not fully aware of the requirements associated with the regulations. Which of the following would be MOST appropriate for the project manager to solicit additional resources for during this phase of the project?

A. After-action reports
B. Gap assessment
C. Security requirements traceability matrix
D. Business impact assessment
E. Risk analysis

A

Answer: B

18
Q

A web developer has implemented HTML5 optimizations into a legacy web application. One of the modifications the web developer made
was the following client side optimization:
localStorage.setltem(“session-cookie”, document.cookie);

Which of the following should the security engineer recommend?

A. SessionStorage should be used so authorized cookies expire after the session ends
B. Cookies should be marked as “secure” and “HttpOnly”
C. Cookies should be scoped to a relevant domain/path
D. Client-side cookies should be replaced by sever-side mechanisms

A

Answer: C

19
Q

During a security event investigation, a junior analyst fails to create an image of a server’s hard drive before removing the drive and sending it to the forensics analyst. Later, the evidence from the analysis is not usable in the prosecution of the attackers due to the uncertainty of tampering.

Which of the following should the junior analyst have followed?

A. Continuity of operations
B. Chain of custody
C. Order of volatility
D. Data recovery

A

Answer: C
Reference: https://mw_computer-forensics-recruiter_com/order-of-volatility/

20
Q

Which of the following is the GREATEST security concern with respect to BYOD?

A. The filtering of sensitive data out of data flows at geographic boundaries.
B. Removing potential bottlenecks in data transmission paths.
C. The transfer of corporate data onto mobile corporate devices.
D. The migration of data into and out of the network in an uncontrolled manner.

A

Answer: D

21
Q

The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors. Which of the following BEST meets this
objective?

A. Identify a third-party source for IDS rules and change the configuration on the applicable IDSs to pull in the new rulesets
B. Encourage cybersecurity analysts to review open-source intelligence products and threat database to generate new IDS rules based on those sources
C. Leverage the latest TCP- and UDP-related RFCs to arm sensors and IDSs with appropriate heuristics for anomaly detection
D. Use annual hacking conventions to document the latest attacks and threats, and then develop IDS rules to counter those threats

A

Answer: B

22
Q

A company has decided to lower costs by conducting an internal assessment on specific devices and various internal and external subnets. The assessment will be done during regular office hours, but it must not affect any production servers.

Which of the following would MOST likely be used to complete the assessment? (Select two)

A. Agent-based vulnerability scan
B. Black-box penetration testing
C. Configuration review
D. Social engineering
E. Malware sandboxing
F. Tabletop exercise

A

Answer: A, C

23
Q

A hospital’s security team recently determined its nebuork was breached and patient data was accessed by an external entity. The Chief Information Security Officer (CISO) of the hospital approaches the executive management team with this information, reports the vulnerability that led to the breach has
already been remediated, and explains the team is continuing to follow the appropriate incident response plan. The executive team is concerned about the hospital’s brand reputation and asks the CISO when the incident should be disclosed to the affected patients.

Which of the following is the MOST appropriate response?

A. When it is mandated by their legal and regulatory requirements
B. As soon as possible in the interest of the patients
C. As soon as the public relations department is ready to be interviewed
D. When all steps related to the incident response plan are completed
E. Upon the approval of the Chief Executive Officer (CEO) to release information to the public

A

Answer: A

24
Q

An organization is preparing to develop a business continuity plan. The organization is required to meet regulatory requirements relating to confidentiality and availability, which are well-defined. Management
has expressed concern following initial meetings that the organization is not fully aware of the requirements associated with the regulations.

Which of the following would be MOST appropriate for the project manager to solicit additional resources for during this phase of the project?

A. After-action reports
B. Gap assessment
C. Security requirements traceability matrix
D. Business impact assessment
E. Risk analysis

A

Answer: B

25
Q

Two new technical SMB security settings have been enforced and have also become policies that increase secure communications.

Network Client: Digitally sign communication
Nebuork Sever: Digitally sign communication

A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect to their department shares.

Which of the following mitigation strategies should an information security manager recommend to the data owner?

A. Accept the risk, reverse the settings for the remote location, and have the remote location file a risk exception until the legacy storage device can be upgraded
B. Accept the risk for the remote location, and reverse the settings indefinitely since the legacy storage device will not be upgraded
C. Mitigate the risk for the remote location by suggesting a move to a cloud service provider. Have the remote location request an indefinite risk exception for the use of cloud storage
D. Avoid the risk, leave the settings alone, and decommission the legacy storage device

A

Answer: A

26
Q

The government is concerned with remote military missions being negatively being impacted by the use of technology that may fail to protect operational security. To remediate this concern, a number of solutions have been implemented, including the following:
• End-to-end encryption of all inbound and outbound communication, including personal email and chat sessions that allow soldiers to securely communicate with families.
• Layer 7 inspection and TCP/IJDP port restriction, including firewall rules to only allow TCP port 80 and 443 and approved applications
• A host-based whitelist of approved websites and applications that only allow mission-related tools and sites
• The use of satellite communication to include multiple proxy servers to scramble the source IP address

Which of the following is of MOST concern in this scenario?

A. Malicious actors intercepting inbound and outbound communication to determine the scope of the mission
B. Family members posting geotagged images on social media that were received via email from soldiers
C. The effect of communication latency that may negatively impact real-time communication with mission control
D. The use of centrally managed military newvork and computers by soldiers when communicating with external parties

A

Answer: A

27
Q

Two competing companies experienced similar attacks on their nebuorks from various threat actors. To improve response times, the companies wish to share some threat intelligence about the sources and methods of attack.

Which of the following business documents would be BEST to document this
engagement?

A. Business partnership agreement
B. Memorandum of understanding
C. Service-level agreement
D. Interconnection security agreement

A

Answer: D

Reference: https://nvlpubs_nist_gov/nistpubs/legacy/sp/nistspecialpublication800-47_pdf

28
Q

A medical device company is implementing a new COTS antivirus solution in its manufacturing plant. All validated machines and instruments must be retested for interoperability with the new software.

Which of the following would BEST ensure the software and instruments are working as designed?

A. System design documentation
B. User acceptance testing
C. Peer review
D. Static code analysis testing
E. Change control documentation

A

Answer: A

29
Q

A consultant is hired to perform a passive vulnerability assessment of a company to determine what information might be collected about the company and its employees. The assessment will be considered successful if the consultant can discover the name of one of the IT administrators.

Which of the following is MOST likely to produce the needed information?

A. Whois
B. DNS enumeration
C. Vulnerability scanner
D. Fingerprinting

A

Answer: A

30
Q

An organization enables BYOD but wants to allow users to access the corporate email, calendar, and contacts from their devices. The data associated with the user’s accounts is sensitive, and therefore, the
organization wants to comply with the following requirements:
• Active full-device encryption
• Enabled remote-device wipe
• Blocking unsigned applications
• Containerization of email, calendar, and contacts

Which of the following technical controls would BEST protect the data from attack or loss and meet the above requirements?

A. Require frequent password changes and disable NFC.
B. Enforce device encryption and activate MAM
C. Install a mobile antivirus application.
D. Configure and monitor devices with an MDM

A

Answer: B

31
Q

The Chief Information Officer (CIO) has been asked to develop a security dashboard with the relevant metrics. The board of directors will use the dashboard to monitor and track the overall security posture of the organization. The CIO
produces a basic report containing both KPI and KRI data in buo separate sections for the board to review.
Which of the following BEST meets the needs of the board?

A. KRI:

  • Compliance with regulations
  • Backlog of unresolved security investigations
  • Severity of threats and vulnerabilities reported by sensors
  • Time to patch critical issues on a monthly basis

KPI

  • Time to resolve open security items
  • % of suppliers with approved security control frameworks
  • EDR coverage across the fleet
  • Threat landscape rating

B. KRI:

  • EDR coverage across the fleet
  • Backlog of unresolved security investigations
  • Time to patch critical issues on a monthly basis
  • Threat landscape rating

KPI
- Time to resolve open security items
- Compliance with regulations
- % of suppliers with approved security control frameworks
- Severity of threats and vulnerabilities reported by sensors
C. KRI:
- EDR coverage across the fleet
- % of suppliers with approved security control framework
- Backlog of unresolved security investigations
- Threat landscape rating

KPI

  • Time to resolve open security items
  • Compliance with regulations
  • Time to patch critical issues on a monthly basis
  • Severity of threats and vulnerabilities reported by sensors

D. KPI:
- Compliance with regulations
- % of suppliers with approved security control frameworks
- Severity of threats and vulnerabilities reported by sensors
- Threat landscape rating
KRI:
- Time to resove open security items
- Backlog of unresolved security investigations
- EDR coverage across the fleet
- Time to patch critical issues on a monthly basis

A

Answer: A

32
Q

As a result of an acquisition, a new development team is being integrated into the company. The development team has BYOD laptops with IDES installed, build servers, and code repositories that utilize SaaS. To have the team up and running effectively, a separate Internet connection has been procured. A stand up has identified the following additional requirements:

  1. Reuse of the existing network infrastructure
  2. Acceptable use policies to be enforced
  3. Protection of sensitive files
  4. Access to the corporate applications

Which of the following solution components should be deployed to BEST meet the requirements? (Select three.)

A. IPSec VPN
B. HIDS
C. Wireless controller
D. Rights management
E. SSL VPN
F. NAC
G. WAF
H. Load balancer

A

Answer: D, E, F

33
Q

An engineer maintains a corporate-owned mobility infrastructure, and the organization requires that all web browsing using corporate-owned resources be monitored.

Which of the following would allow the organization to meet its requirement? (Choose two.)

A. Exempt mobile devices from the requirement, as this will lead to privacy violations
B. Configure the devices to use an always-on IPSec VPN
C. Configure all management traffic to be tunneled into the enterprise via TLS
D. Implement a VDI solution and deploy supporting client apps to devices
E. Restrict application permissions to establish only HITPS connections outside of the enterprise boundary

A

Answer: B, E

34
Q

An agency has implemented a data retention policy that requires tagging data according to type before storing it in the data repository. The policy requires all business emails be automatically deleted after two years. During an open records investigation, information was found on an employee’s work computer concerning a conversation that occurred three years prior and proved damaging to the agency’s reputation.

Which of the following MOST likely caused the data leak?

A. The employee manually changed the email client retention settings to prevent deletion of emails
B. The file that contained the damaging information was mistagged and retained on the server for longer than it should have been
C. The email was encrypted and an exception was put in place via the data classification application
D. The employee saved a file on the computer’s hard drive that contained archives of emails, which were more than two years old

A

Answer: D

35
Q

A security technician is incorporating the following requirements in an RFP for a new SIEM:
• New security notifications must be dynamically implemented by the SIEM engine
• The SIEM must be able to identify traffic baseline anomalies
• Anonymous attack data from all customers must augment attack detection and risk scoring

Based on the above requirements, which of the following should the SIEM support? (Choose two)

A. Autoscaling search capability
B. Machine learning
C. Multisensor deployment
D. Big Data analytics
E. Cloud-based management
F. Centralized log aggregation

A

Answer: B, D

36
Q

A recent CRM upgrade at a branch office was completed after the desired deadline. Several technical issues were found during the upgrade and need to be discussed in depth before the next branch office is upgraded. Which of the following should be used to identify weak processes and other vulnerabilities?

A. Gap analysis
B. Benchmarks and baseline results
C. Risk assessment
D. Lessons learned report

A

Answer: D