Multiple Choice Flashcards

1
Q

An organization is developing an authentication service for use at the entry and exit ports of
country borders. The service will use data feeds obtained from passport systems, passenger
manifests, and high- definition video feeds from CCTV systems that are located at the ports. The
service will incorporate machine-learning techniques to eliminate biometric enrollment processes
while still allowing authorities to identify passengers with increasing accuracy over time. The more
frequently passengers travel, the more accurately the service will identify them.
Which of the following biometrics will MOST likely be used, without the need for enrollment?

A

Gait & Facial

A gait recognition system uses the shape of the human body and the way it moves in order to identify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A small company that does not have security staff wants to improve its security posture. Which of
the following would BEST assist the company?

A

SOAR
Security orchestration, automation, and response
– Automate routine, tedious, and time intensive activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization’s help desk is flooded with phone calls from users stating they can no longer
access certain websites. The help desk escalates the issue to the security team, as these
websites were accessible the previous day. The security analysts run the following command:
ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an
impacted machine, and the issue goes away. Which of the following attacks MOST likely
occurred on the original DNS server?

A

Domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A cybersecurity manager has scheduled biannual meetings with the IT team and department
leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings,
the manager presents a scenario and injects additional information throughout the session to
replicate what might occur in a dynamic cybersecurity event involving the company, its facilities,
its data, and its staff. Which of the following describes what the manager is doing?

A

Conducting a tabletop exercise

A security incident preparedness activity, taking participants through the process of dealing with a simulated incident scenario and providing hands-on training for participants that can then highlight flaws in incident response planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A RAT that was used to compromise an organization’s banking credentials was found on a user’s
computer. The RAT evaded antivirus detection. It was installed by a user who has local
administrator rights to the system as part of a remote management toolset. Which of the
following recommendations would BEST prevent this from reoccurring?

(Remote Access Trojans)

A

Enforce application whitelisting

Creating a directory of software applications that are approved to run on your organization’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security analyst is reviewing a new website that will soon be made publicly available. The
analyst sees the following in the URL:
http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us
The analyst then sends an internal user a link to the new website for testing purposes, and when
the user clicks the link, the analyst is able to browse the website with the following URL:
http://dev-site.comptia.org/home/show.php?sessionID=98988475&loc=us
Which of the following application attacks is being tested?

A

Cross-site request forgery

A user might receive an email or a text message with a link, which deploys malware or injects malicious code into a web page. Once the user clicks the link, attackers use the malware or injected code to send requests to the web application on the user’s behalf.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator has been asked to install an IDS to improve the security posture of an
organization. Which of the following control types is an IDS?
IDS (Install Diagnostic Software)

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following should be put in place when negotiating with a new vendor about the
timeliness of the response to a significant outage or incident?

A

SLA
(Service Level Agreements)

Refer to how quickly you will respond to a technical issue being raised via phone, email or other methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A startup company is using multiple SaaS and IaaS platforms to stand up a corporate
infrastructure and build out a customer-facing web application. Which of the following solutions
would be BEST to provide security, manageability, and visibility into the platforms?

(Infrastructure as a service)
(Software as a Service)

A

CASB

(Cloud access security broker)

Is on-premises or cloud-based software that serves as a tool for enforcing an organization’s security policies through risk identification and regulation compliance whenever its cloud-residing data is accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A root cause analysis reveals that a web application outage was caused by one of the company’s
developers uploading a newer version of the third-party libraries that were shared among several
applications. Which of the following implementations would be BEST to prevent the issue from
reoccurring?

A

Containerization

used to isolate and maintain an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security administrator suspects there may be unnecessary services running on a server. Which
of the following tools will the administrator MOST likely use to confirm the suspicions?

A

Nmap
(Network Mapper)

Is an open-source security auditing and network scanning software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company has drafted an insider-threat policy that prohibits the use of external storage devices.
Which of the following would BEST protect the company from data exfiltration via removable
media?

A

Blocking removable-media devices and write capabilities using a host-based security tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which of the following common use cases would steganography be employed?

A

Obfuscation

The purpose of steganography is to conceal and deceive. It is a form of covert communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To secure an application after a large data breach, an e-commerce site will be resetting all users’
credentials. Which of the following will BEST ensure the site’s users are not compromised after
the reset?

A

Encrypted credentials in transit

(protects your data if communications are intercepted while data moves between your site and the cloud provider or between two services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which of the following risk management strategies would cybersecurity insurance be used?

A

Transference

The act of shifting risks from one area (or organization) to another. This is typically done because the original company lacks expertise in a particular area,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An organization has implemented a policy requiring the use of conductive metal lockboxes for
personal electronic devices outside of a secure research lab. Which of the following did the
organization determine to be the GREATEST risk to intellectual property when creating this policy?

A

Data exfiltration over a mobile hotspot

The theft or unauthorized removal or movement of any data from a device.

17
Q

A security analyst is using a recently released security advisory to review historical logs, looking
for the specific activity that was outlined in the advisory. Which of the following is the analyst
doing?

A

Threat hunting

18
Q

Which of the following would MOST likely support the integrity of a voting machine?

A

Perfect forward secrecy

Is an encryption style known for producing temporary private key exchanges between clients and servers

19
Q

A Chief Information Security Officer (CISO) needs to create a policy set that meets international
standards for data privacy and sharing. Which of the following should the CISO read and
understand before writing the policies?

A

GDPR (General Data Protection Regulation)

is a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU).

20
Q

The IT department at a university is concerned about professors placing servers on the university
network in an attempt to bypass security controls. Which of the following BEST represents this
type of threat?

A

Shadow IT

Is the use of information technology systems, devices, software, applications, and services without explicit IT department approval