Exam Topics Flashcards
A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?
A. Semi-authorized hackers
B. State actors
C. Script kiddies
D. Advanced persistent threats
B. State actors
A user wanted to catch up on some work over the weekend but had issues logging in to the corporate network using a VPN. On Monday, the user opened a ticket for this issue but was able to log in successfully. Which of the following BEST describes the policy that is being implemented?
A. Time-based logins
B. Geofencing
C. Network location
D. Password history
A. Time-based logins
A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?
A. Default system configuration
B. Unsecure protocols
C. Lack of vendor support
D. Weak encryption
C. Lack of vendor support
Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?
A. Smart card
B. Push notifications
C. Attestation service
D. HMAC-based
E. one-time password
B. Push notifications
Which of the following processes will eliminate data using a method that will allow the storage device to be reused after the process is complete?
A. Pulverizing
B. Overwriting
C. Shredding
D. Degaussing
B. Overwriting
A commercial cyber-threat intelligence organization observes IoCs across a variety of unrelated customers. Prior to releasing
specific threat intelligence to other paid subscribers, the organization is MOST likely obligated by contracts to:
A. perform attribution to specific APTs and nation-state actors.
B. anonymize any PII that is observed within the IoC data.
C. add metadata to track the utilization of threat intelligence reports.
D. assist companies with impact assessments based on the observed data.
B. anonymize any PII that is observed within the IoC data.
A company has migrated to two-factor authentication for accessing the corporate network, VPN, and SSO. Several legacy
applications cannot support multifactor authentication and must continue to use usernames and passwords. Which of the
following should be implemented to ensure the legacy applications are as secure as possible while ensuring functionality?
A. Privileged accounts
B. Password reuse restrictions
C. Password complexity requirements
D. Password recovery
E. Account disablement
C. Password complexity requirements
E. Account disablement
A security engineer wants to implement a site-to-site VPN that will require SSL certificates for mutual authentication. Which
of the following should the engineer implement if the design requires client MAC address to be visible across the tunnel?
A. Tunnel mode IPSec
B. Transport mode VPN IPSec
C. L2TP
D. SSL VPN
D. SSL VPN
A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the
attackers. The issue was triggered by a phishing email and IT administrator wants to ensure it does not happen again. Which
of the following should the IT administrator do FIRST after recovery?
A. Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis.
B. Restrict administrative privileges and patch all systems and applications.
C. Rebuild all workstations and install new antivirus software.
D. Implement application whitelisting and perform user application hardening.
A. Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis.
A network administrator is brute forcing accounts through a web interface. Which of the following would provide the BEST
defense from an account password being discovered?
A. Password history
B. Account lockout
C. Account expiration
D. Password complexity
B. Account lockout
A Chief Financial Officer (CFO) has been receiving email messages that have suspicious links embedded from unrecognized senders. The emails ask the recipient for identity verification. The IT department has not received reports of this happening to anyone else. Which of the following is the MOST likely explanation for this behavior?
A. The CFO is the target of a whaling attack.
B. The CFO is the target of identity fraud.
C. The CFO is receiving spam that got past the mail filters.
D. The CFO is experiencing an impersonation attack.
A. The CFO is the target of a whaling attack.
Joe, an employee, knows he is going to be fired in three days. Which of the following characterizations describes the employee?
A. An insider threat
B. A competitor
C. A hacktivist
D. A state actor
A. An insider threat
The IT department receives a call one morning about users being unable to access files on the network shared drives. An IT technician investigates and determines the files became encrypted at 12:00 a.m. While the files are being recovered from backups, one of the IT supervisors realizes the day is the birthday of a technician who was fired two months prior. Which of the following describes what MOST likely occurred?
A. The fired technician placed a logic bomb.
B. The fired technician installed a rootkit on all the affected users’ computers.
C. The fired technician installed ransomware on the file server.
D. The fired technician left a network worm on an old work computer.
A. The fired technician placed a logic bomb.
An organization has a policy in place that states the person who approves firewall controls/changes cannot be the one implementing the changes. Which of the following describes this policy?
A. Change management
B. Job rotation
C. Separation of duties
D. Least privilege
C. Separation of duties
Which of the following would be the BEST method to prevent the physical theft of staff laptops at an open-plan bank location with a high volume of customers each day?
A. Guards at the door
B. Cable locks
C. Visitor logs
D. Cameras
B. Cable locks
Which of the following disaster recovery sites would require the MOST time to get operations back online?
A. Colocation
B. Cold
C. Hot
D. Warm
B. Cold
A security manager needed to protect a high-security datacenter, so the manager installed an access control vestibule that can detect an employee’s heartbeat, weight, and badge. Which of the following did the security manager implement?
A. A physical control
B. A corrective control
C. A compensating control
D. A managerial control
A. A physical control
Which of the following if used would BEST reduce the number of successful phishing attacks?
A. Two-factor authentication
B. Application layer firewall
C. Mantraps
D. User training
D. User training
An input field that is accepting more data than has been allocated for it in memory is an attribute of:
A. buffer overflow.
B. memory leak.
C. cross-site request forgery.
D. resource exhaustion.
A. buffer overflow.
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:
Phishing
Privilege escalation
Backdoor access
Shoulder surfing
Backdoor access
Which of the following answers refer to smishing? (Select 2 answers)
Social engineering technique
E-mail communication
Spam over Internet Telephony (SPIT)
Text messaging
Spam over Internet Messaging (SPIM)
Social engineering technique
Text messaging
The practice of using a telephone system to manipulate user into disclosing confidential information is known as:
Whaling
Spear phishing
Vishing
Pharming
Vishing
Which of the following terms is commonly used to describe an unsolicited advertising message?
Spyware
Adware
Malware
Spam
Spam
What type of spam relies on text-based communication?
Vishing
SPIM
Bluesnarfing
SPIT
SPIM
Which of the following answers refer to the characteristic features of pharming? (Select 3 answers)
Domain hijacking
Traffic redirection
Fraudulent website
Password attack
Credential harvesting
Traffic redirection
Fraudulent website
Credential harvesting
Which of the following is used in data URL phishing?
Prepending
Typosquatting
Pretexting
Domain hijacking
Prepending
Pretexting is a form of social engineering where an attacker impersonates a trusted individual or organization to obtain sensitive information or access. It often involves manipulating the victim into providing information, like passwords or financial data, by pretending to need it for a legitimate reason