ernesto Flashcards

1
Q

What is the first step in an incident response?
A) Detection
B) Preparation
C) Analysis
D) Containment

A

B) Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following cybersecurity frameworks is best suited for
integrating networking and security services into a single, cloud-based
platform to support the evolving secure access needs of
organizations?
A. Cloud-based Identity and Access Management (IAM)
B. Unified Threat Management (UTM)
C. Secure Access Service Edge (SASE)
D. Network Access Control (NAC)

A

C. Secure Access Service Edge (SASE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A corporation is focusing on enhancing its security measures by
isolating critical applications from potential threats within a shared
physical server infrastructure. Which technology is MOST suitable for
achieving effective isolation of these critical systems?
A. Network Segmentation with VLANs
B. Access Control Lists (ACLs)
C. Data Encryption
D. Containerization

A

D. Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following pairs falls into the category of directive security
controls? (NOTE: This question will only have acronyms)

A. IRP (Incident Response Plan) and AUP (Acceptable Use Policy)
B. IDS (Intrusion Detection System) and MFA (Multi-Factor
Authentication)
C. IPS (Intrusion Prevention System) and MFA (Multi-Factor
Authentication)
D. IRP (Incident Response Plan) and IDS (Intrusion Detection
System)

A

A. IRP (Incident Response Plan) and AUP (Acceptable Use Policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary objective of conducting an account audit in the
context of Privileged Access Management (PAM)?
A. To ensure compliance with regulatory standards
B. To monitor real-time user activities
C. To identify and rectify privilege creep
D. To track system performance and usage

A

C. To identify and rectify privilege creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Employees have noticed fluctuating wireless connectivity in the office,
with the network being inaccessible on certain days but functioning well on others. Which type of attack could be causing these
intermittent wireless network disruptions?

A. Wireless jamming attack
B. IV (Initialization Vector) attack
C. Rogue Access Point installation
D. Wi-Fi Pineapple deployment

A

A. Wireless jamming attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of EAP (Extensible Authentication
Protocol) in a network security context?
A. To provide a method for two systems to create a secure encryption
key for data transmission
B. To facilitate dynamic IP addressing for devices connecting to a
network.
C. To standardize the format of data packets for efficient routing and
delivery.
D. To provide a secure management framework for network devices
and services.

A

A. To provide a method for two systems to create a secure encryption
key for data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term is used to describe the likelihood that a potential danger
might exploit a weakness in a system, leading to negative
consequences for an organization?
A. Vulnerability
B. Threat
C. Risk
D. Exploit

A

C. Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An organization receives a phishing email claiming to be from a
vendor. This represents a:
A. Vulnerability
B. Exploit
C. Threat
D. Risk

A

C. Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After a cybersecurity incident involving a ransomware attack on your
company's network, which stage of the incident response process
involves analyzing the event to improve future security measures and
responses?
A. Lessons Learned
B. Eradication
C. Recovery
D. Preparation

A

A. Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a corporate environment, what is the process called where an
independent and systematic examination of cybersecurity practices is
conducted to ensure compliance with internal and external policies
and standards?
A. Audit
B. Attestation
C. Assessment
D. Certification

A

A. Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As a cybersecurity analyst, your supervisor instructs you to create a
document outlining the step-by-step process for configuring firewall
rules in the organization's network infrastructure. What type of
document are you creating?
A. Policy
B. Procedure
C. Standard
D. Guideline

A

B. Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When it comes to enforcing security policies and procedures for
employees and systems in a company, which term best describes the
responsibility and approach?
A. Due Care
B. Due Diligence
C. Regulatory Compliance
D. Risk Assessment

A

A. Due Care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A cybersecurity analyst, Taylor, is reviewing the logs of the
organization's web application and discovers an unusual log entry.
The entry shows a URL request to the web application:
http://example.com/products.php?id=105 OR 1=1. This pattern in the
URL raises security concerns.
A. Identify the type of attack suggested by this log entry and
determine what the attacker is trying to achieve.
B. Buffer Overflow, crash the server
C. Directory Traversal, access unauthorized files
D. SQL Injection, manipulate database query
E. Cross-Site Scripting, steal user data

A

D. SQL Injection, manipulate database query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sarah, a cybersecurity analyst, is scrutinizing her organization's web
application logs for potential security threats. She encounters several
requests that are indicative of an attempt to exploit vulnerabilities in
the application. Notable log entries are:
1. Request from IP: 192.0.2.15 - URL: http://webapp.com/search?q=
2. Request from IP: 198.51.100.30 - URL:
http://webapp.com/comment?text=
3. Request from IP: 203.0.113.60 - URL:
http://webapp.com/login?username=
Task: Identify the specific type of threat represented by these log
entries.

A. XSS
B. RAT
C. SQL Injection
D. CSRF

A

A. XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

 When an individual or organization seeks to obtain a digital certificate from a Certificate Authority (CA), they must submit a specific type of request that includes their public key and identity information. What is this request known as in the context of digital certificate management?

A. CA
B. CRL
C. CSR
D. OCSP

17
Q

 A growing enterprise requires its IT infrastructure to accommodate increasing amounts of data and user traffic over time. Which characteristic is essential for their systems to effectively meet these evolving demands?

A. Elasticity
B. Scalability
C. Redundancy
D. Virtualization

A

B. Scalability

17
Q

 In a cybersecurity incident, an attacker captures encrypted authentication credentials as they are transmitted over a network. The attacker then uses these credentials later to impersonate the user and gain unauthorized system access. What type of attack does this scenario most closely represent?

A. Replay Attack
B. Session Hijacking
C. On-Path Attack
D. Cryptographic Attack

A

A. Replay Attack

18
Q

 Emily needs to protect all data on her company’s laptops from unauthorized access, especially in cases of theft or loss. Which security measure is most effective for this purpose?

A. TLS
B. File-level Encryption
C. FDE
D. Database Encryption

19
Q

 Which data obfuscation method uses a system of randomly generated values, mapped in a lookup table, to replace sensitive data, thereby preventing easy access to the actual values?

A. Hashing
B. Tokenization
C. Steganography
D. Masking

A

B. Tokenization

19
Q

 An online retail website experiences variable traffic patterns, with periods of low activity and sudden bursts of high user demand, especially during sales events. Which cloud computing principle should be implemented to efficiently manage these fluctuating resource requirements?

A. Scalability
B. Implementing a content delivery network (CDN)
C. Elasticity
D. Upgrading server hardware

A

C. Elasticity

20
Q

 A security analyst notices this suspicious URL in a web server log: http://companywebsite.com/app.php?file=../../config%00.txt. What kind of attack is indicated by this URL, and which file is being targeted?

A. SQL Injection, config.txt
B. Directory Traversal, config.txt
C. Cross-Site Scripting, config%00.txt
D. Denial of Service, config%00.txt

A

B. Directory Traversal, config.txt

21
Q

 A company has arranged a backup facility with some pre-installed hardware and connectivity capabilities, which can be activated relatively quickly in case of a major disruption. However, this site does not have real-time data synchronization. What type of disaster recovery site is this?

A. Cold Site
B. Warm Site
C. Hot Site
D. Mobile Site

A

B. Warm Site

22
Q

 The IT department of a company is planning its budget for the next fiscal year. Over the past three years, the company has observed a consistent 5% annual increase in the number of company-issued mobile devices that need replacement due to various reasons like damage, obsolescence, or loss. Which of the following best predicts the number of devices that will likely need replacement in the upcoming year?

A. ALE (Annualized Loss Expectancy)
B. ARO (Annual Rate of Occurence)
C. RPO (Recovery Point Objective)
D. SLE (Single Loss Expectancy)

A

B. ARO (Annual Rate of Occurence)

23
 In the context of cloud computing, an organization is considering various cloud deployment models to facilitate resource sharing among multiple organizations while maintaining separation from the public. Which cloud deployment model is most suitable for this scenario? A. Community B. Private C. Public D. Hybrid
A. Community
24
 Which protocol is most commonly used for centralized authentication, authorization, and accounting services in wireless networks and remote server connections? A. Kerberos B. CHAP C. TACACS+ D. RADIUS
D. RADIUS
25
 To address the risk of employees using unapproved cloud applications, what technology should the IT department implement to effectively monitor and control access to these cloud services? A. CASB B. VPN Concentrator C. DLP Software D. Network Firewall
A. CASB
26
 Which protocol suite is widely used for securing internet protocol communications by authenticating and encrypting each IP packet in a data stream? A. TLS B. SSL C. IPSec D. SNMP
C. IPSec
27
 A multinational corporation seeks to streamline its employees' access to a suite of internal and external cloud-based tools. They want a system where employees can log in once and have access to all necessary applications without needing to re-authenticate for each one. Which protocol is best suited for this type of enterprise-wide single sign-on (SSO) functionality? A. OAuth B. SAML C. LDAP D. Kerberos
B. SAML
28
 A web developer is implementing a system where users can log in to an application using their existing social media accounts. Which protocol is most suitable for allowing this type of third-party authentication without sharing the user's password with the application? A. OpenID B. SAML C. OAuth D. RADIUS
C. OAuth
29
 To address the risk of employees using unapproved cloud applications, what technology should the IT department implement to effectively monitor and control access to these cloud services? A. CASB B. VPN Concentrator C. DLP Software D. Network Firewall
A. CASB
30
 Which protocol suite is widely used for securing internet protocol communications by authenticating and encrypting each IP packet in a data stream? A. TLS B. SSL C. IPSec D. SNMP
C. IPSec
31
 A company wants to enhance its website's ability to handle high traffic and distribute network load efficiently across multiple servers, ensuring consistent performance during peak times. What is the most effective solution for this requirement? A. Load Balancer B. Reverse Proxy C. VPN Gateway D. Firewall
A. Load Balancer
32
 A company's network security policy requires users to validate their identity before gaining access to the system. This process involves users entering a combination of their username and password. Which security concept does this scenario specifically illustrate? A. Identification B. Authentication C. Authorization D. Accounting
B. Authentication