Incorrectly Answered Subject Areas Flashcards
Dave’s company utilizes Google’s G-Suite environment for file sharing and office productivity, Slack for internal messaging, and AWS for hosting their web servers. Which of the following cloud models type of cloud deployment models is being used?
Multi-cloud
Community
Public
Private
Multi-cloud
Multi-cloud is a cloud deployment model where the cloud consumer uses multiple public cloud services
OBJ-2.2: Summarize Virtualization and Cloud Computing concepts
You are working as part of the server team for an online retail store. Due to the upcoming holidays, your boss is worried that the current servers may not be able to handle the increased demand during a big sale. Which of the following cloud computing concepts can quickly allow services to scale upward during busy periods and scale down during slower periods based on the changing user demand?
Metered services
Rapid elasticity
On-demand
Resource pooling
Rapid elasticity
OBJ-2.3: Summarize secure application development, deployment, and automation concepts
You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s servers must have a daily backup conducted on them. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when they are needed for restoration. Which of the following should you recommend?
Frequently restore the server from backup files to test them
Create an additional copy of the backups in an off-site datacenter
Set up scripts to automatically reattempt any failed backup jobs
Attempt to restore a test server from one of the backup files to verify them
Attempt to restore a test server from one of the backup files to verify them
OBJ: Given a scenario, implement security resilence
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the owner of the company if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donate them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
Degaussing
Shredding
Wiping
Purging
Wiping
Data wiping or clearing occurs by using a software tool to overwrite the data on a hard drive in an effort to destroy all electronic data on a hard disk or other media
Obj. 2.7: Explain the importance of physical security controls
In an effort to improve the security of the Dion Training corporate network, a security administrator wants to update the configuration of their wireless network to have IPSec built into the protocol by default. Additionally, the security administrator would like for NAT to no longer be required for extending the number of IP addresses available. What protocol should the administrator implement on the wireless network to achieve their goals?
WEP
IPv6
IPv4
WPA2
IPv6
IPv6 includes IPSec built into the protocol by default. Additionally, IPv6 also provides an extended IP address range for networks, which eliminates the need for using NAT
OBJ-3.1: Given a scenario, implement secure protocols
Michelle has just finished installing a new database application on her server. She then proceeds to uninstall the sample configuration files, properly configures the application settings, and updates the software to the latest version according to her company’s policy. What best describes the actions Michelle just took?
Application hardening
Vulnerability scanning
Input validation
Patch management
Application hardening
Obj-3.2: Given a scenario, implement host or application security solutions
Dion Training wants to reduce the management and administrative costs of using multiple digital certificates for all of their subdomains of diontraining.com. Which of the following solutions would allow the company to use one digital certificate for all of its subdomains?
OCSP
Wildcards
CRL
Key escrow
Wildcards
Wildcards are certificates that allow your company unlimited subdomains on a parent domain. Object identifiers identify an object. Key escrow is for key storage. OCSP is a protocol used to query CA about the revocation status of a certificate.
OBJ-3.9: Given Scenario, implement public key infrastructure
You are notified by an external organization that an IP address associated with your company’s email server has been sending spam emails requesting funds as part of a lottery collection scam. An investigation into the incident reveals the email account used was Connor from the sales department, and that Connor’s email account was only used from one workstation. You analyze Connor’s workstation and discover several unknown processes running, but netflow analysis reveals no attempted lateral movement to other workstations on the network. Which containment strategy would be most effective to use in this scenario?
Request disciplinary action for Connor for causing this incident
Isolate the workstation computer by disabling the switch port and reset Connor’s username/password
Unplug the workstation’s network cable and conduct a complete reimaging of the workstation
Isolate the network segment Connor is on and conduct a forensic review of all workstations in the sales department
Isolate the workstation computer by disabling the switch port and reset Connor’s username/password
OBJ-4.4: Given an Incident, apply mitigation techniques or controls to secure an enviroment
If an administrator cannot fully remediate a vulnerability, which of the following should they implement?
A policy
Access requirements
A compensating control
An engineering tradeoff
A compensating control
OBJ-5.1: Compare and Contrast various types of controls
What regulation protects the privacy of student educational records?
GLBA
SOX
FERPA
HIPAA
FERPA
OBJ-5.2 Explain the importance of policies to organizational security
Dion Training has performed an assessment as part of their disaster recovery planning. The assessment found that the organization’s RAID takes, on average, about 8 hours to repair when two drives within the RAID fail. Which of the following metrics would best represent this time period?
RTO
RPO
MTTR
MTBF
MTTR
Mean time to repair (MTTR) is a basic measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device.
OBJ-5.4: Summarize Risk Management processes and concepts
After completing an assessment, you create a chart listing the associated risks based on the vulnerabilities identified with your organization’s privacy policy. The chart contains listings such as high, medium, and low. It also utilizes red, yellow, and green colors based on the likelihood and impact of a given incident. Which of the following types of assessments did you just complete?
Quantitative risk assessment
Qualitative risk assessment
Privacy assessment
Supply chain assessment
Qualitative risk assessment
OBJ-5.4: Summarize Risk Management processes and concepts
Which of the following categories would contain information about an individual’s race or ethnic origin?
DLP
SPI
PHI
PII
SPI
OBJ: 5.5 Explain Privacy and sensitive data concepts in relation to security
Which of the following techniques would be the most appropriate solution to implementing a multi-factor authentication system?
Fingerprint and retinal scan
Password and security question
Username and password
Smartcard and PIN
Smartcard and PIN
OBJ-2.4: Summarize Authentication and authorizations design concepts
An insurance company has developed a new web application to allow its customers to choose and apply for an insurance plan. You have been asked to help perform a security review of the new web application. You have discovered that the application was developed in ASP and used MSSQL for its backend database. You have been able to locate an application’s search form and introduced the following code in the search input field: -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- IMG SRC=vbscript:msgbox(“Vulnerable_to_Attack”);> originalAttribute=”SRC” originalPath=”vbscript:msgbox(“Vulnerable_to_Attack “);>” -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- When you click submit on the search form, your web browser returns a pop-up window that displays Vulnerable_to_Attack. Which of the following vulnerabilities did you discover in the web application?
SQL injection
Cross-site request forgery
Command injection
Cross-site scripting
Cross-site scripting
You are troubleshooting an issue with a Windows desktop and need to display the active TCP connections on the machine. Which of the following commands should you use?
ping
netstat
ipconfig
net use
netstat
OBJ-4.1: Use the appropriate tool to assess organizational security
You have been asked to assist with an investigation into a malicious user’s activities. Unfortunately, your organization did not have full packet capture available for the time period of the suspected activities. Instead, you have received netflow data that contains statistics and information about the network traffic during that time period. Which of the following best represents the type of data you can obtain from this netflow data to support the investigation?
File contents
Email messages
Application logs
Metadata
Metadata
OBJ-4.3: Utilize Data sources to support an investigation
Which of the following identity and access management controls relies upon using a certificate-based authentication mechanism?
HOTP
Proximity card
TOTP
Smart card
Smart card
Smart cards, PIV, and CAC devices are used as an identity and access management control. These devices contain a digital certificate embedded within the smart card (PIV/CAC) that is presented to the system when it is inserted into the smart card reader.
Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded a copy of the corporate database to his work laptop. On his way home, he forgot the laptop in an Uber, and a few days later, the data was posted on the internet. Which of the following mitigations would have provided the greatest protection against this data breach?
Require data masking for any information stored in the database
Require data at rest encryption on all endpoints
Require all new employees to sign an NDA
Require a VPN to be utilized for all telework employees
Require data at rest encryption on all endpoints
Which protocol relies on mutual authentication of the client and the server for its security?
LDAPS
Two-factor authentication
CHAP
RADIUS
LDAPS
OBJ-3.1: Implement Secure Protocols