CySA + Measure Up #1 Flashcards
Pass the First Time
An anomaly-based NIDS is installed on a company’s network. During end-of-quarter accounting activities, the NIDS generates multiple alerts related to network bandwidth and database server activity. The database server is running a signature-based HIDS. What is the MOST likely cause of the alerts?
A. False positive
B. Database server failure
C. DDoS attack
D. Malware infection
The alerts are most likely to be the result of a false positive. An anomaly-based Intrusion Detection System (IDS) generates alerts based on variations from an established activity baseline. End-of-quarter accounting activities would generate additional network traffic and database activity.
This is not likely to be the result of a database server failure. A server failure would more likely result in the inability to access the server or other server performance problems.
This is not likely to be a distributed denial-of-service (DDoS) attack. It is more likely that the alerts are the result of valid, temporary variations in network activity.
This is not likely to be the result of a malware infection. The host-based intrusion detection systems (HIDS) running on the database server would probably detect this and generate alerts from the infection.
Which command should be used to create a forensic image of a hard drive?
A. dd
B. tar
C. mv
D. cp
You should use the dd command to create a forensic image of a hard disk. A forensic image is a bit-by-bit image copy of the entire source disk, including space may contain pieces of files that have been deleted and can be used to hide data. The dd command was originally a UNIX/Linux command, but it is also available for Windows operating systems.
You should not use the cp or mv commands. These are both-file-by-file commands and do not create a full disk image. The cp command is used to copy files, and mv command is sued to move files to a different location. You should not use the tar command. This is an archive (backup) command and cannot be used to create an image copy.
A company works with a cybersecurity consultant to complete a risk assessment profile for network vulnerabilities. The assessment will be used to determine the best actions to take to mitigate risks and set remediation priorities. Which is NOT a factor in determining the likelihood of a potential risk?
A. Awareness
B. Threat actor motivation
C. Ease of exploit
D. Financial impact
Financial impact is not a factor in determining the likelihood of risk. It is a factor in determining risk impact.
Risk assessment ranks based on likelihood and impact. The ranking is commonly broken down as:
*Low likelihood/low impact: This is a low priority risk and is typically considered safe to ignore.
*High likelihood/low impact: This is a medium priority risk and it is recommended that you take action to reduce the risk.
*Low likelihood/high impact: This is a medium priority risk and it is recommended contingency plans in place if it occurs before mediation.
High likelihood/high impact: This is a high priority risk and should be remediated as quickly as possible.
Factors for determining likelihood include:
* Threat actor skill level
* Threat actor opportunity and resources
* Threat actor motivation
* Ease of discovering the vulnerability
* Awareness of the vulnerability by threat actors
* Likelihood of detecting an attempted exploit
Factors for determining impact include:
* Loss of confidentiality
* Loss of integrity
* Loss of availability
* Loss of reputation
* Financial impact
* Forced non-compliance
Factors should be rated individually, then combined to get a risk assessment value.
A company uses NetFlow analysis to provide real-time information about bandwidth usage by protocol and by application. The outgoing TCP traffic from one application rapidly increases to the point that it is using most of the available bandwidth. Incoming traffic levels have not changed by a significant amount. What type of attack does this MOST likely indicate?
A. DDOS
B. Data exfiltration
C. Eavesdropping
D. Sniffing
These traffic patterns most likely indicate that there has been a data exfiltration attack. Data exfiltration is, in simple terms, the theft or unauthorized transfer of data. The large amount of outgoing traffic indicates that a large amount of data is being extracted from the network. There are various ways to detect and help prevent data exfiltration, including implementing data loss prevention (DLP) tools, strengthening authentication requirements and access controls, and closely monitoring sensitive data.
A NetFlow analyzer collects network traffic data and it can perform real-time display and analysis, sorting the data in different categories. A common use of the NetFlow analyzer is to verify traffic statistics by protocol and by application in order to determine how available bandwidth is being used.
The traffic does not indicate a distributed denial-of-service (DDoS) attack. A DDoS attack can cause an increase in outgoing traffic; however, it would also be accompanied by an increase in incoming traffic being sent to the target network or device.
The traffic detected is not representative of what you would see during an eavesdropping attack.
Eavesdropping is a primarily passive data collection activity and it would not cause an increase in traffic.
Eavesdropping typically targets specific computers or specific types of traffic.
The traffic does not indicate a sniffing attack. Sniffing is also a primarily passive data collection activity; however, it is usually a general collection activity that is used as a way to detect patterns, identify hosts, or collect useful data such as passwords sent in clear text.
A hospital plans to deploy a patient management app that will be used on tablets supplied to doctors and nurses. The hospital’s security team needs to ensure that data entered on the tablets is protected while in transit. Which solution does not require any special configuration on the tablets, while still meeting this requirement?
A. Deploy a VPN concentrator to support tablet connections.
B. Deploy a firewall and place the app server behind the firewall.
C. Deploy PKI and configure the app server to require TLS.
D. Configure federated authentication for all app users.
Deploying Public Key Infrastructure (PKI) and configuring the app server to require Transport Layer Security
(TLS) do not require any special configuration on the tables. PKI provides a framework for creating, managing, and deploying X.509 certificates. Certificates are used on app and web servers to facilitate encrypted communications, such as with Hypertext Transfer Protocol Secure (HTTPS). Certificates can also be used to ensure data authenticity and integrity.
Deploying a Virtual Private Network (VPN) concentrator to support table connections requires special configuration on the tables. VPN concentrators facilitate secure access to internal network resources by requiring authentication and transport encryption.
Configuring federated authentication for all app users does not meet the requirements. Federated authentication allows a user to access a resource while being authenticated by another entity. For example, a shopping site may allow users to authenticate using their Google account.
Deploying a firewall and placing the app server behind the firewall does not meet the requirements. A firewall enhances network security but does not protect data in transit.
A company contracts with a cybersecurity firm to perform a detailed security review of the company network and procedures. After its initial review, the firm recommends that the company perform an internal review of its operational controls.
Which actions should the company include in this review? (Select Two)
A. Check user passwords to determine whether they are being changed on a regular basis.
B. Check all acceptable use policies to determine if they are accurate and appropriate.
C. Review the personnel who have permission to apply patches and updates.
D. Verify that users are aware of security policies and that they are being followed.
E. Verify that locks on the server room are engaging automatically.
A review of acceptable use policies and user awareness of security policies are both examples of operational control. Operational controls refer to policies and procedures such as:
• General written security policies
• Acceptable use policy
• Clean desk policy
• Disaster recovery and business continuity plans
• Adherence to compliance requirements and standards
× +
Reviewing the personnel who have permission to apply patches and updates and checking user passwords to determine if they are being changed are both types of technical controls. Other technical controls include:
• File and firewall access control lists
• Management and administrative permissions
• Use and administration of routers, firewalls, switches, and other network devices
• Network access controls
Verifying that locks on the server room are engaging automatically is an example of a physical control.
Physical controls include:
• Locks and other physical security devices
• Fences
• Lighting
• Cameras and motion sensors
It is recommended that all security controls be reviewed on a periodic basis, especially after a security incident.
A cyber consultant determines that sensitive information relating to company employees has been inappropriately released. The recommendation is made that access to this information should be limited to senior management and personnel in the human resources department. What type of access control should the company implement?
A. Rule-based
B. Location-based
C. Role-based
D. Context-based
The company should implement role-based access control. Role-based access control is based on user identity, job function, authority, or responsibility and would limit access based on recommendations.
The company should not implement rule-based access control. Rule-based access control limits authorization and access based on conditions such as patches, operating system type, and so forth, but not user.
The company should not implement location-based access control. This refers the physical location of the device. For example, location-based access control could set different access levels when accessing network resources from the internal network versus access from outside the network.
The company should not implement context-based access control. This is a firewall software feature in which access is based on protocol session information. This is typically implemented as a type of location-based access control.
A user notifies a security administrator about being prompted with an invalid certificate warning when connecting to the corporate intranet. Upon inspection, the administrator discovers an invalid ARP entry.
Which attack was most likely being perpetrated against the user?
A. Command injection
B. Buffer overflow
C. MITM
D. DNS spoofing
A man-in-the-middle (MITM) attack is most likely being perpetrated. An MITM occurs when an attacker intercepts communications between two nodes. Depending on the sophistication of the attack, the attacker may be able to read and even modify data in transit between the nodes. By modifying, or poisoning, the Address Resolution Protocol (ARP) cache, the attacker redirects messages destined for another node to a compromised machine.
A Domain Name System (DNS) spoofing attack is not being perpetrated. A DNS spoofing attack adds new or overwrites an existing cached hostname to IP address entries. For example, an attacker could add an invalid DNS cache entry for comptia.org such that when a user navigates to comptia.org, they are directed to a malicious website instead.
A command injection attack is not being perpetrated. Command injection attacks attempt to embed operating system commands in URLs or web forms in an attempt to execute the command on the hosting server.
A buffer overflow attack is not being perpetrated. In a buffer overflow attack, an attacker supplies excess information in an attempt to write outside of a process’s memory buffer. This can cause the process to crash or even allow malicious code to run.
A security administrator is concerned that sensitive data could be vulnerable to sniffing attacks. Which technology can the administrator use to mitigate this risk?
A. IPsec
B. Hashing
C. NAT
D. BitLocker
The administrator can use IPsec to mitigate the risk of a sniffing attack. When data in motion/transit is encrypted, it is secure from sniffing and eavesdropping while it is transferred between network nodes.
Transport Layer Security (TLS) is widely used to encrypt data in motion between user browsers and web servers. Other protocols such as IPsec encrypt all data between two nodes, regardless of the application being used.
Hashing does not mitigate the risk of a sniffing attack. Hashing algorithms or functions create fixed-length outputs from source data. Hashing is a form of encryption. However, hashes are meant to be universally unique as well as irreversible.
BitLocker does not mitigate the risk of a sniffing attack. BitLocker is a built-in encryption tool for Windows systems. BitLocker can be used to encrypt fixed and portable drives, including USB drives. BitLocker does not protect data in transit.
Network Address Translation (NAT) does not mitigate the risk of a sniffing attack. NAT is often used to enhance network privacy by hiding a network behind one or more public Internet Protocol (IP) addresses.
A cybersecurity analyst is responding to a ticket from a user regarding a PDF attachment to an email.
Although the email appears to be from a known contact, the user did not expect it to contain an attachment and wants to be sure it is legitimate. Which two of the following tools or techniques should the analyst use to safely determine whether or not the attachment is malicious? (Select TWO)
A. VirusTotal
B. EDR
C. Shodan
D. Sandboxing
The cybersecurity analyst should use VirusTotal or sandboxing to safely determine if the attachment is malicious. VirusTotal will allow the analyst to submit a file’s hash and then provide a detailed summary of any known information about the attachment, including whether or not it is a known malicious file. The hashes supported for use in this process are MD5, SHA1 and SHA256. Please note, VirusTotal also offers the option of uploading files for analysis, but analysts should generally choose the hash method as this removes any concerns of accidentally sharing sensitive or confidential information that may be present in the file and does not involve any legal or regulatory data processing requirements that may apply to the upload feature depending on factors like the industry and country that the analyst is working in. Sandboxing, which can be accomplished with a paid tool or using an isolated system or virtual machine, is a way to analyze the results of actually opening the attachment and seeing what happens. This is a great solution if the attachment is a novel malicious file that VirusTotal might not yet have detections or indicators of compromise for.
The cybersecurity analyst should not use Shodan to safely determine if the attachment is malicious. Shodan is a tool that allows its users, for both legitimate and potentially malicious purposes, to search and monitor internet-facing assets. The analyst may use Shodan to monitor their organization’s web servers for vulnerabilities but not analyze the PDF file.
The cybersecurity analyst would not use EDR to safely determine if the attachment is malicious. Endpoint Detection and Response (EDR) is a valuable tool to protect the organization’s endpoints in case a user opens the attachment, but it would not be considered a safe practice to open the attachment on a system just to see if EDR detects anything malicious. It is possible the attachment could be malicious, not be detected by the EDR, and then result in a compromised system. EDR would be used as a last line of defense against attachments like this, but it would not be a tool used to initially assess whether or not a file is malicious.
An anomaly-based NIDS is installed on a company’s network. During end-of-quarter accounting activities, the NIDS generates multiple alerts related to network bandwidth and database server activity. The database server is running a signature-based HIDS. What is the MOST likely cause of the alerts?
A. DDoS attack
B. Malware infection
C. Database server failure
D. False positive
The alerts are most likely to be the result of a false positive. An anomaly-based Intrusion Detection System (IDS) generates alerts based on variations from an established activity baseline. End-of-quarter accounting activities would generate additional network traffic and database activity.
This is not likely to be the result of a database server failure. A server failure would more likely result in the inability to access the server or other server performance problems.
This is not likely to be a distributed denial-of-service (DDoS) attack. It is more likely that the alerts are the result of valid, temporary variations in network activity.
This is not likely to be the result of a malware infection. The host-based intrusion detection systems (HIDS) running on the database server would probably detect this and generate alerts from the infection.
A company contracts with a cyber security analyst as part of a risk identification exercise. The analyst plans to interview individuals from each department in order to assess the risks each of them perceives related to the systems they own.
Which of the following is the analyst planning to perform?
A. Quantitative risk analysis
B. Threat modeling
C. Risk prioritization
D. Qualitative risk analysis
The analyst is planning to perform qualitative risk analysis. Risk analysis aims to identify, evaluate, and prioritize the risks that an organization faces. A qualitative risk analysis is more subjective and uses input from system owners, data custodians, and others. Generally speaking, qualitative risk analysis is less precise but also takes less time and costs less than quantitative risk analysis.
The analyst is not planning to perform threat modeling. Threat modeling is the process of identifying and evaluating threats. Threat modeling is an important part of risk analysis.
The analyst is not planning to perform quantitative risk analysis. Quantitative risk analysis is more objective than qualitative risk analysis and uses formulas to calculate the financial impact of a realized risk. This analysis results in the calculation of an annualized loss expectancy (ALE) for each system or process.
The analyst is not planning to perform risk prioritization. Risk prioritization occurs after risk analysis and implies that the organization decides which risks should be mitigated first.
A user returns from a sales trip and reports that their laptop seems to be running slowly. The security administrator runs malware scan and they do not detect any issues. However, the administrator discovers the following PowerShell script in the user’s Recycle Bin:
$PrintSetup = “HKIM: \Software\Microsoft\Windows\CurrentVersion\RunOnce”
set-itemproperty $PrintSetup “PrintProcess”
(‘C: \Windows\System32\WindowsPowerShell\v1. 0\Powershell.exe - executionPolicy Unrestricted -File ‘ + “C: \Temp\PrinterSetup.ps1”)
Which of the following should be the administrator’s primary concern?
A. Unauthorized changes have been made to the system registry.
B. The PowerShell execution policy has been compromised.
C. The malware scanner is missing critical signature updates.
D. An unapproved, hidden printer has been installed on the laptop.
The administrator’s primary concern should be that unauthorized changes have been made to the system registry. The Windows registry stores operating system, application, and service configuration settings.
Attackers frequently target the Run and RunOnce keys in the registry because the scripts or applications referenced in those two keys are executed automatically when a user logs on.
The administrator’s primary concern should not be that the malware scanner is missing critical signature updates. In signature-based intrusion detection, detection is based on a database of known attacks which are referred to as signatures or Indicators of Compromise (loC). As attack methods are ever changing, signatures must be updated frequently in order for these to be effective.
The administrator’s primary concern should not be that an unapproved, hidden printer has been installed on the laptop. The reference to PrintSetup and PrintProcess in the script is likely an obfuscation technique, which is meant to make the script appear important and harmless.
The administrator’s primary concern should not be that the PowerShell execution policy has been compromised. The Power Shell execution policy is meant to prevent accidental execution of PowerShell scripts. The fact that a PowerShell script could run on the system is a concern, but the primary concern is that a breach has likely occurred.
A company completes a careful review of IDS reports, device logs, and operating system logs. It determines that activity which was originally thought to be due to transient conditions is actually being caused by an ongoing attempt to infiltrate the network. The activities it has detected include network mapping, port scanning, attempts to hack passwords, and attempts to remotely administer servers. This has been occurring for six months.
Employee interviews indicate increased attempts at social media attacks and at least one attempt at a watering hole exploit.
The target appears to be the company’s database servers.
What is this an example of?
A. ATD
B. APT
C. Zero-day
This is an example of an attack based on an advanced persistent threat (APT). The attack can be categorized as such because of the length of time that the attack has been occurring and the sophistication indicated by the broad base of the attack. The fact that the attacker has proceeded gradually, making the attack harder to identify, is also a feature of an APT attack. The source of such attacks is usually a business competitor or a group sponsored by a government entity.
This is not an example of advanced threat detection (ATD). ATD is not an attack type but rather a method for detecting sophisticated attacks. ATD methods would likely be used to collect detailed information about an
АРТ.
This is not an example of a zero-day attack. A zero-day attack is an attack on a previously unknown vulnerability. Attacks of this type do not target previously known vulnerabilities, and they can use a combination of known attack types.
A company is moving to a cloud-based CRM solution. A security analyst recommends to the company that they ensure that customer PIl is protected. The analyst suggests that data should be protected using the method shown below:
Original Data
Tina Doe
Account Num: 404-1121
SSN: 123-34-4321
Secured Data
Tina Doe
Account Num: 158-7413
SSN: 901-33-7647
Which method is the analyst proposing?
Choose the correct answer
A. Masking
B. Tokenization
C. Hashing
D. Encryption
analyst is recommending tokenizing the data. Tokenization is designed to protect Personally Identifying Information (Pil) by replacing the original data with data in the same format. Most tokenization methods use random character replacement and store the original-to-tokenized data mapping in an encrypted database or file. If the tokenized data is compromised, it is of little use to an attacker.
The analyst is not recommending masking the data. Masking would permanently replace the original data.
The new data may be in the same format as the original data; however, this is not a requirement. For example, a Social Security number could be masked with symbols in the following manner: *******
The analyst is not recommending encrypting the data. Encryption uses a reversible algorithm, unlike tokenization, which is meant to be random. Encrypted output would not retain the same data structure.
The analyst is not recommending hashing the data. Hashing algorithms produce fixed-length, irreversible output. Hashes are often used to verify data integrity.
requirement to support mobile devices and access from home-office based devices has increased recently. The corporate security team will implement a policy-based endpoint security management system to protect the network and company resources. The team needs to audit external and mobile devices that require network access to develop the policy. Which elements are typically required for an endpoint security management policy? (Select THREE.)
A. Operating system version
B. Anti-malware support
C. Client hoft firewall configuration
D. VPN support
E. Communication bandwidth
Typical required elements for an endpoint security system include:
• Operating system version
• VPN support
• Anti-malware support
An endpoint security management policy will specify supported operating systems, including version requirements. This often also includes minimum patch levels. It also specifies requirements for VPN connections to the network and client anti-malware support. Devices are checked when they attempt to connect to the network in order to verify that they meet minimum requirements. Endpoint security can be configured to either deny access or to allow limited access to facilitate endpoint device remediation to bring it up to minimum levels.
Endpoint security policy elements do not include communication bandwidth requirements. Support is usually provided at various bandwidths when it is necessary to support device connections.
VLAN support is not a required element of an endpoint policy. However, a VLAN might be used as a connection destination for devices that do not meet minimum security configuration requirements, and as a location from which to perform remediation tasks.
Client host firewall configuration is not a required element of an endpoint policy. However, use of a host firewall is typically recommended as a way to help reduce the potential risk to client computers when connecting to, and through, the Internet. Use of a host firewall can be required through an endpoint security policy.
The incidence response team collects a hard disk at an incident site and it may be used as evidence in a trial. The team needs to be able to show that the drive contents have not changed since collection.
What should the team use?
A. Hash utility
B. Forensic disk image
C. Chain of custody form
D. Write blocker
The team should use a hash utility to create a hash of the drive immediately after taking possession of it.
Another hash can be taken later. If both hash values are the same, it proves that the drive data has not changed.
The team could use a write blocker to protect the drive, but they should not rely on it as proof that the drive has not been modified. The write blocker could be removed, changes could be made, and then the write blocker could be replaced on the hard drive.
The chain of custody form does not provide proof that the drive content has not changed. It provides a record of who had possession of the drive and when, as well as when and where the drive was stored, but it does not provide proof that nothing was done to modify the drive.
A forensic disk image should be made, but it does not prove that the source drive has not been modified.
The same change could be made to both images so that they still would match. The primary purpose of creating a forensic image is so it can be used for analysis instead of the source drive.
A bank’s website was recently hacked and encryption keys were stolen. The bank has upgraded the web and database servers but it wants to ensure encryption keys are stored as securely as possible. Which is the best method for securely storing encryption keys?
A. Use AES on all servers to encrypt keys.
B. Install a TPM on all web and database servers.
C. Use an HSM to generate and store all keys.
D. Offload encryption functions to an SSL accelerator.
Using Hardware Security Modules (HSMs) to generate and store all keys is the best method for securely storing encryption keys. An HSM may be a dedicated compute device that is located in a data center, or a card that plugs into a server’s motherboard. An HSM stores and manages digital keys and performs cryptographic operations related to creating digital signatures and certificates. By using an HSM, the bank can ensure that the encryption keys are stored in a highly secure manner, reducing the risk of unauthorized key access and potential compromise.
Installing Trusted Platform Modules (TPMs) on all web and database servers is not the best method for securely storing encryption keys. A TPM is a cryptographic component that protects encryption keys. TPMs are embedded in devices like computers and provide a range of security features for that single device only, while HSMs is a standalone device focused on secure key management and cryptographic operations for the entire environment. In this scenario, TPM would provide additional security for a single server itself but it may not provide the same level of dedicated key management features as an HSM for the entire environment. As such, using an HSM to generate and store all keys, is the most suitable choice for securely storing encryption keys after a security breach.
Using Advanced Encryption Standard (AES) on all servers to encrypt keys is not the best method for securely storing encryption keys. AES is a symmetric encryption algorithm. However, an AES implementation is only as secure as the system it is used on. An HSM offers additional security mechanisms that AES alone cannot provide.
Offloading encryption functions to a Secure Sockets Layer (SSL) accelerator is not the best method for securely storing encryption keys. An SSL accelerator is typically a dedicated device used to offload CPU-intensive encryption processing.