Multiple Choice 2 Flashcards

1
Q

A commercial cyber-threat intelligence organization observes IoCs across a variety of unrelated
customers. Prior to releasing specific threat intelligence to other paid subscribers, the
organization is MOST likely obligated by contracts to:

Indicators of compromise (IOCs)

A

Anonymize any PII that is observed within the IoC data.

Indicators of compromise (IOCs) serve as forensic evidence of potential intrusions on a host system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While checking logs, a security engineer notices a number of end users suddenly downloading
files with the .tar.gz extension. Closer examination of the files reveals they are PE32 files. The
end users state they did not initiate any of the downloads. Further investigation reveals the end
users all clicked on an external email containing an infected MHT file with an href link a week
prior. Which of the following is MOST likely occurring?

A

A RAT was installed and is transferring additional exploit tools.

A TAR. GZ file contains one or more compressed files and is commonly used on Unix operating systems to package files, programs, and installers.

PE32 files is Portable Executable, a member of the EXE family

MHT stands for MHTML Web Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization is developing a plan in the event of a complete loss of critical systems and data.
Which of the following plans is the organization MOST likely developing?

A

Disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the purpose of a risk register?

A

To identify the risk, the risk owner, and the risk measures

Risk registers are a widespread utility that allow practitioners to track and measure risks in one place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A university with remote campuses, which all use different service providers, loses Internet
connectivity across all locations. After a few minutes, Internet and VoIP services are restored,
only to go offline again at random intervals, typically within four minutes of services being
restored. Outages continue throughout the day, impacting all inbound and outbound connections
and services. Services that are limited to the local LAN or WiFi network are not impacted, but all
WAN and VoIP services are affected.
Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to
exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads.
Which of the following BEST describe this type of attack? (Choose two.)

Session Initiation Protocol (SIP)

A

DoS & Race conditions

Race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time

VoIP: calls are being made within an internal system so external hackers cannot easily intercept the data.

Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time communications sessions between Internet Protocol (IP) devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company recently set up an e-commerce portal to sell its product online. The company wants to
start accepting credit cards for payment, which requires compliance with a security standard.
Which of the following standards must the company comply with before accepting credit cards on
its e-commerce platform?

A

PCI DSS

The Payment Card Industry (PCI) Data Security Standard (DSS) is an information security standard developed to enhance cardholder data security for organizations that store, process or transmit credit card data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following BEST describes a security exploit for which a vendor patch is not readily
available?

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the
company’s Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The
email states Ann is on vacation and has lost her purse, containing cash and credit cards. Which
of the following social- engineering techniques is the attacker using?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An organization wants to implement a third factor to an existing multifactor authentication. The
organization already uses a smart card and password. Which of the following would meet the
organization’s needs for a third factor?

A

Fingerprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An employee has been charged with fraud and is suspected of using corporate assets. As
authorities collect evidence, and to preserve the admissibility of the evidence, which of the
following forensic techniques should be used?

A

Chain of custody

The chain of custody is a tracking record beginning with detailed scene notes that describe where the evidence was received or collected. Collection techniques, preservation, packaging, transportation, storage and creation of the inventory list are all part of the process used in establishing the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company wants to deploy PKI on its Internet-facing website. The applications that are currently
deployed are:
www.company.com (main website)
contactus.company.com (for locating a nearby location)
quotes.company.com (for requesting a price quote)
The company wants to purchase one SSL certificate that will work for all the existing applications
and any future applications that follow the same naming conventions, such as
store.company.com. Which of the following certificate types would BEST meet the requirements?

A

Wildcard

A wildcard certificate is a public key certificate used by all subdomains within a larger domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each
salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment.
Which of the following recommendations would BEST address the CSO’s concern?

A

Implement managed FDE

Full disk encryption (FDE) is a security safeguard that protects all data stored on a hard drive from unauthorized access using disk-level encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user contacts the help desk to report the following:
- Two days ago, a pop-up browser window prompted the user for a name
and password after connecting to the corporate wireless SSID. This had
never happened before, but the user entered the information as
requested.
- The user was able to access the Internet but had trouble accessing
the department share until the next day.
- The user is now getting notifications from the bank about
unauthorized transactions.
Which of the following attack vectors was MOST likely used in this scenario?

A

Rogue access point

A rogue access point provides a wireless backdoor channel into the private network for outsiders. It can bypass network firewalls and other security devices and opens a network to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A host was infected with malware. During the incident response, Joe, a user, reported that he did
not receive any emails with links, but he had been browsing the Internet all day. Which of the
following would MOST likely show where the malware originated?

A

The DNS logs

The Domain Name System (DNS) log, Attackers are using DNS for data theft, denial-of-service, and other malicious activity. Proactive monitoring of DNS activity can help network administrators quickly detect and respond to these threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network
protocol to rapidly infect computers. Once infected, computers are encrypted and held for
ransom. Which of the following would BEST prevent this attack from reoccurring?

Server Message Block, SMB

A

Configure the perimeter firewall to deny inbound external connections to SMB ports.

Short for Server Message Block, SMB is an application layer protocol that allows for file, printer, device sharing and inter-process communication (IPC) between applications on a network through a client-server architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Joe, an employee, receives an email stating he won the lottery. The email includes a link that
requests a name, mobile phone number, address, and date of birth be provided to confirm Joe’s
identity before sending him the prize. Which of the following BEST describes this type of email?

A

Phishing

17
Q

Which of the following refers to applications and systems that are used within an organization
without consent or approval?

A

Shadow IT

Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval.

18
Q

A manufacturer creates designs for very high security products that are required to be protected
and controlled by the government regulations. These designs are not accessible by corporate
networks or the Internet. Which of the following is the BEST solution to protect these designs?

A

An air gap

Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection.

19
Q

A company processes highly sensitive data and senior management wants to protect the
sensitive data by utilizing classification labels. Which of the following access control schemes
would be BEST for the company to implement?

A

Mandatory

20
Q

Which of the following policies would help an organization identify and mitigate potential single
points of failure in the company’s IT/security operations?

A

Separation of duties